Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sync from upstream #455

Merged
merged 5 commits into from
Mar 31, 2023
Merged

Sync from upstream #455

merged 5 commits into from
Mar 31, 2023

Conversation

dhaiducek and others added 5 commits March 31, 2023 09:50
ref: https://issues.redhat.com/browse/ACM-3042
Signed-off-by: Dale Haiducek <19750917+dhaiducek@users.noreply.github.com>
(cherry picked from commit 7208f75)
ref: https://issues.redhat.com/browse/ACM-3321

Signed-off-by: Dale Haiducek <19750917+dhaiducek@users.noreply.github.com>
(cherry picked from commit 6e9bc97)

Signed-off-by: Justin Kulikauskas <jkulikau@redhat.com>
Signed-off-by: Will Kutler <wkutler@redhat.com>
(cherry picked from commit da14bdd)
Signed-off-by: Will Kutler <wkutler@redhat.com>
(cherry picked from commit e868a2b)
Description of problem:
When Pod security policy is created and the status is changed from inform to enforce, the status is toggling. Not able to enforce pod security policy.

How to fix
Set default value when Kube API value omitted

ref: https://issues.redhat.com/browse/ACM-3109
Signed-off-by: Yi Rae Kim <yikim@redhat.com>
(cherry picked from commit b70748b)
Copy link
Contributor Author

@JustinKuli JustinKuli left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pointing out the resolved conflicts for easier review

# Test coverage threshold
export COVERAGE_MIN ?= 75
COVERAGE_E2E_OUT ?= coverage_e2e.out

# Image URL to use all building/pushing image targets;
# Use your own docker registry and image name for dev/test by overridding the IMG and REGISTRY environment variable.
IMG ?= $(shell cat COMPONENT_NAME 2> /dev/null)
IMG ?= $(CONTROLLER_NAME)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Conflict here was:

<<<<<<< HEAD
IMG ?= $(shell cat COMPONENT_NAME 2> /dev/null)
REGISTRY ?= quay.io/stolostron
=======
IMG ?= $(CONTROLLER_NAME)
REGISTRY ?= quay.io/open-cluster-management
>>>>>>> 6e9bc97 (Sync the common Makefile)

KUBEBUILDER = $(LOCAL_BIN)/kubebuilder
KBVERSION = 3.9.1
K8S_VERSION = 1.26.1
GOSEC = $(LOCAL_BIN)/gosec
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Conflict here was:

<<<<<<< HEAD
format-go:
	@${FINDFILES} -name '*.go' \( ! \( -name '*.gen.go' -o -name '*.pb.go' \) \) -print0 | ${XARGS} goimports -w -local "github.com/stolostron"
=======
############################################################
#  Unit Test
############################################################
KUBEBUILDER = $(LOCAL_BIN)/kubebuilder
KBVERSION = 3.9.1
K8S_VERSION = 1.26.1
GOSEC = $(LOCAL_BIN)/gosec
>>>>>>> 6e9bc97 (Sync the common Makefile)

@@ -1,10 +1,6 @@
service:
# When updating this, also update the version stored in docker/build-tools/Dockerfile in the multicloudlab/tools repo.
golangci-lint-version: 1.19.x # use the fixed version to not introduce new linters unexpectedly
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Conflict here was:

<<<<<<< HEAD
service:
  # When updating this, also update the version stored in docker/build-tools/Dockerfile in the multicloudlab/tools repo.
  golangci-lint-version: 1.19.x # use the fixed version to not introduce new linters unexpectedly
=======
>>>>>>> 6e9bc97 (Sync the common Makefile)

@sonarcloud
Copy link

sonarcloud bot commented Mar 31, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 1 Code Smell

100.0% 100.0% Coverage
0.0% 0.0% Duplication

Copy link
Contributor

@dhaiducek dhaiducek left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems good to me! 😄

@openshift-ci
Copy link

openshift-ci bot commented Mar 31, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: dhaiducek, JustinKuli

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [JustinKuli,dhaiducek]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@JustinKuli
Copy link
Contributor Author

/override Pipelines as Code CI / config-policy-controller-0pyc-on-pull-request

@openshift-ci
Copy link

openshift-ci bot commented Mar 31, 2023

@JustinKuli: /override requires failed status contexts, check run or a prowjob name to operate on.
The following unknown contexts/checkruns were given:

  • /
  • CI
  • Code
  • Pipelines
  • as
  • config-policy-controller-0pyc-on-pull-request

Only the following failed contexts/checkruns were expected:

  • KinD / Tests (latest, false)
  • KinD / Tests (latest, true)
  • KinD tests (latest)
  • KinD tests (minimum)
  • Pipelines as Code CI / config-policy-controller-0pyc-on-pull-request
  • SonarCloud
  • SonarCloud Code Analysis
  • Upstream reference checks
  • ci/prow/images
  • ci/prow/pr-image-mirror
  • pull-ci-stolostron-config-policy-controller-main-images
  • pull-ci-stolostron-config-policy-controller-main-pr-image-mirror
  • tide

If you are trying to override a checkrun that has a space in it, you must put a double quote on the context.

In response to this:

/override Pipelines as Code CI / config-policy-controller-0pyc-on-pull-request

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@JustinKuli
Copy link
Contributor Author

/override "Pipelines as Code CI / config-policy-controller-0pyc-on-pull-request"

@openshift-ci
Copy link

openshift-ci bot commented Mar 31, 2023

@JustinKuli: Overrode contexts on behalf of JustinKuli: Pipelines as Code CI / config-policy-controller-0pyc-on-pull-request

In response to this:

/override "Pipelines as Code CI / config-policy-controller-0pyc-on-pull-request"

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-merge-robot openshift-merge-robot merged commit 3ff1cad into main Mar 31, 2023
@openshift-merge-robot openshift-merge-robot deleted the mm-fix-to-pr111 branch March 31, 2023 17:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

😿 Failed to sync the upstream PRs: #109, #110, #112, #113, #111
5 participants