New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove support for seccomp annotations when determining whether a container update should trigger a policy evaluation #114846
Conversation
…tainer update should trigger a policy evaluation
@SataQiu: This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @liggitt |
/lgtm |
LGTM label has been added. Git tree hash: efa70f2df7405516cbdcdb8d4c85a2af28e9b9b0
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liggitt, SataQiu The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
1 similar comment
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
This cleanup has been planned to finish the corresponding KEP: kubernetes#91286 As follow-up on the partly removal of the seccomp annotations in kubernetes#109819, we now drop the version skew handling completely, but still warn as well as keep the validation in place if both (annotation and field) are set. The Pod Security Admission code has been already changed in kubernetes#114846. Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
This cleanup has been planned to finish the corresponding KEP: kubernetes#91286 As follow-up on the partly removal of the seccomp annotations in kubernetes#109819, we now drop the version skew handling completely, but still warn as well as keep the validation in place if both (annotation and field) are set. The Pod Security Admission code has been already changed in kubernetes#114846. Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
What type of PR is this?
/kind cleanup
What this PR does / why we need it:
Followup #109819, since the seccomp fields are immutable, so we can just drop them in 1.27
#109819 (comment)
Which issue(s) this PR fixes:
xref #95171
Special notes for your reviewer:
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: