-
Notifications
You must be signed in to change notification settings - Fork 72
test #384
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
test #384
Conversation
…hift#259) Upstream-commit: c6d2f45bf2e87da37ba1abd19a969faa7975e582 Upstream-repository: api
…extConfig (openshift#261) Accepted values for SecurityContextConfig(string): legacy/resctricted(default) Upstream-commit: dfe859e2cf10757aa4cd0eef99917637c8feace9 Upstream-repository: api
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: timflannagan The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
The hack script needs to be fixed but I did see a diff present when running the following: $ rm -rf staging/*/vendor
$ git status
deleted: staging/operator-lifecycle-manager/vendor/github.com/operator-framework/api/crds/operators.coreos.com_catalogsources.yaml
deleted: staging/operator-lifecycle-manager/vendor/github.com/operator-framework/api/crds/zz_defs.go
deleted: staging/operator-lifecycle-manager/vendor/github.com/operator-framework/api/pkg/manifests/bundleloader.go
deleted: staging/operator-lifecycle-manager/vendor/github.com/operator-framework/api/pkg/operators/v1alpha1/catalogsource_types.go
deleted: staging/operator-lifecycle-manager/vendor/modules.txt Looks like the commits might've introduced some nested vendor changes. Not too sure whether that's the culprit here. |
…(#2845) * (chore) vendor in o-f/api v0.17.1 Signed-off-by: Anik Bhattacharjee <[email protected]> * (psa) allow legacy Catalogsources to run in non-restrcted namespaces This PR configures the Catalogsource reconciler to use the spec.GrpcPodConfig.SecurityContextConfig field to determine if the pod.spec.securityContext and container[*].spec.SecurityContext for the registry pod should be configured to be runnable in a PSA restrcited namespace or not, so that cluster admins can indicate that they want to run legacy catalogsources in a non-resctricted (baseline/privileged) namespace. This allows cluster admins to run catalogsources that are built with a version of opm that is less than v1.23.2 (i.e a version of opm that does not contain [this commit](operator-framework/operator-registry#974) Signed-off-by: Anik Bhattacharjee <[email protected]> Signed-off-by: Anik Bhattacharjee <[email protected]> Upstream-commit: edffd9c83c3065073e5f91ff0d7c7b78a5c77063 Upstream-repository: operator-lifecycle-manager
4e5d752
to
6bdc9f8
Compare
Closing as the OLM unit check is now back online. |
Bumps [k8s.io/client-go](https://github.com/kubernetes/client-go) from 0.31.3 to 0.32.0. - [Changelog](https://github.com/kubernetes/client-go/blob/master/CHANGELOG.md) - [Commits](kubernetes/client-go@v0.31.3...v0.32.0) --- updated-dependencies: - dependency-name: k8s.io/client-go dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <[email protected]> Signed-off-by: Per Goncalves da Silva <[email protected]> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Upstream-repository: api Upstream-commit: 8fae9f55f61c1e7236e98570b86767c1b97c49f2
wip