Merge https://github.com/velero-io/velero:main (e6d928c) into oadp-dev#494
Merge https://github.com/velero-io/velero:main (e6d928c) into oadp-dev#494oadp-rebasebot-app[bot] wants to merge 119 commits intoopenshift:oadp-devfrom
Conversation
Signed-off-by: Lyndon-Li <lyonghui@vmware.com>
Signed-off-by: Lyndon-Li <lyonghui@vmware.com>
Signed-off-by: Lyndon-Li <lyonghui@vmware.com>
Signed-off-by: dongqingcc <dongqingcc@vmware.com>
Signed-off-by: dongqingcc <dongqingcc@vmware.com>
Restrict the listing of PodVolumeBackup resources to the specific restore namespace in both the core restore controller and the pod volume restore action plugin. This prevents "Forbidden" errors when Velero is configured with namespace-scoped minimum privileges, avoiding the need for cluster-scoped list permissions for PodVolumeBackups. Fixes: velero-io#9681 Signed-off-by: Adam Zhang <adam.zhang@broadcom.com>
Kubernetes 1.34 introduced VolumeGroupSnapshot v1beta2 API and deprecated v1beta1. Distributions running K8s 1.34+ (e.g. OpenShift 4.21+) have removed v1beta1 VGS CRDs entirely, breaking Velero's VGS functionality on those clusters. This change bumps external-snapshotter/client/v8 from v8.2.0 to v8.4.0 and migrates all VGS API usage from v1beta1 to v1beta2. The v1beta2 API is structurally compatible - the Spec-level types (GroupSnapshotHandles, VolumeGroupSnapshotContentSource) are unchanged. The Status-level change (VolumeSnapshotHandlePairList replaced by VolumeSnapshotInfoList) does not affect Velero as it does not directly consume that type. Fixes velero-io#9694 Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com>
Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com>
7859347 to
109df40
Compare
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: oadp-rebasebot-app[bot] The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Note Reviews pausedIt looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the Use the following commands to manage reviews:
Use the checkboxes below for quick actions:
WalkthroughBumps several dependencies and Go module updates; migrates external-snapshotter VolumeGroupSnapshot usages from v1beta1→v1beta2; narrows PodVolumeBackup/DataUpload listings to namespace scope; increases maintenance-status queue length; adds temp VSC create/delete delay; refines tarball-download error handling; removes restic build from images; adds CI filepath-check workflow and block-data-mover design doc. Changes
Sequence Diagram(s)sequenceDiagram
rect rgba(0,128,255,0.5)
participant Controller as BackupDeletionController
end
rect rgba(0,200,83,0.5)
participant Storage as BackupStore
end
rect rgba(255,152,0,0.5)
participant CSI as CSI Cleanup
end
rect rgba(156,39,176,0.5)
participant DB as DBR / API Objects
end
Controller->>Storage: Download backup tarball
alt Download succeeds
Controller->>Storage: Delete backup artifacts
Controller->>DB: Remove DBR / Backup CR
else Download fails
Controller->>CSI: Perform offline CSI snapshot cleanup
Controller->>Controller: isTarballNotFoundError(err)?
alt Error is not-found
Controller->>Storage: Delete backup artifacts
Controller->>DB: Remove DBR / Backup CR
else Other error
Controller->>DB: Record download error (keep DBR)
Controller-->>Storage: Skip backup-store deletion
Note right of Controller: Reconcile returns error (retry)
end
end
Estimated code review effort🎯 4 (Complex) | ⏱️ ~45 minutes 🚥 Pre-merge checks | ✅ 10 | ❌ 2❌ Failed checks (2 warnings)
✅ Passed checks (10 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Tip 💬 Introducing Slack Agent: The best way for teams to turn conversations into code.Slack Agent is built on CodeRabbit's deep understanding of your code, so your team can collaborate across the entire SDLC without losing context.
Built for teams:
One agent for your entire SDLC. Right inside Slack. Comment |
|
Hi @oadp-rebasebot-app[bot]. Thanks for your PR. I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with Regular contributors should join the org to skip this step. Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@go.mod`:
- Around line 175-179: Update the vulnerable module version: change the go.mod
entry for go.opentelemetry.io/otel/sdk from v1.42.0 to v1.43.0 (or a later
secure release) and then run the module upgrade commands to propagate changes
(e.g., `go get go.opentelemetry.io/otel/sdk@v1.43.0` and `go mod tidy`) so the
indirect entries are refreshed; ensure any references to
go.opentelemetry.io/otel/sdk in your module graph are now resolved to v1.43.0+
to mitigate CVE-2026-39883.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: CHILL
Plan: Pro
Run ID: 876c87aa-e14e-40e9-9021-5043294874f7
⛔ Files ignored due to path filters (1)
go.sumis excluded by!**/*.sum
📒 Files selected for processing (10)
.gitmoduleschangelogs/unreleased/9533-Lyndon-Lichangelogs/unreleased/9560-Lyndon-Lichangelogs/unreleased/9561-Lyndon-Lichangelogs/unreleased/9634-Lyndon-Lichangelogs/unreleased/9663-Lyndon-Lichangelogs/unreleased/9676-Lyndon-Lichangelogs/unreleased/9677-Lyndon-Ligo.modrestic
| go.opentelemetry.io/otel v1.42.0 // indirect | ||
| go.opentelemetry.io/otel/metric v1.42.0 // indirect | ||
| go.opentelemetry.io/otel/sdk v1.42.0 // indirect | ||
| go.opentelemetry.io/otel/sdk/metric v1.42.0 // indirect | ||
| go.opentelemetry.io/otel/trace v1.42.0 // indirect |
There was a problem hiding this comment.
🧩 Analysis chain
🏁 Script executed:
#!/bin/bash
set -euo pipefail
echo "1) Confirm pinned version in go.mod"
rg -n 'go\.opentelemetry\.io/otel/sdk\s+v' go.mod
echo
echo "2) Pull OSV advisory details"
curl -s https://api.osv.dev/v1/vulns/GHSA-hfvc-g4fc-pqhx | jq '{id, summary, affected: [.affected[] | {ecosystem: .package.ecosystem, name: .package.name, ranges: .ranges}]}'
echo
echo "3) Query OSV for this exact version"
curl -s https://api.osv.dev/v1/query \
-H 'Content-Type: application/json' \
-d '{"package":{"ecosystem":"Go","name":"go.opentelemetry.io/otel/sdk"},"version":"1.42.0"}' | jq .Repository: openshift/velero
Length of output: 4294
Update go.opentelemetry.io/otel/sdk from v1.42.0 to v1.43.0 or later before merge
go.opentelemetry.io/otel/sdk v1.42.0 (line 177) is affected by GHSA-hfvc-g4fc-pqhx (CVE-2026-39883), a HIGH severity vulnerability enabling arbitrary code execution via PATH hijacking on BSD/Solaris platforms. The vulnerability allows a local attacker to place a malicious kenv binary in $PATH that gets executed during OpenTelemetry resource initialization. This was fixed in v1.43.0.
🧰 Tools
🪛 OSV Scanner (2.3.5)
[HIGH] 177-177: go.opentelemetry.io/otel/sdk 1.42.0: opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.
In `@go.mod` around lines 175 - 179, Update the vulnerable module version: change
the go.mod entry for go.opentelemetry.io/otel/sdk from v1.42.0 to v1.43.0 (or a
later secure release) and then run the module upgrade commands to propagate
changes (e.g., `go get go.opentelemetry.io/otel/sdk@v1.43.0` and `go mod tidy`)
so the indirect entries are refreshed; ensure any references to
go.opentelemetry.io/otel/sdk in your module graph are now resolved to v1.43.0+
to mitigate CVE-2026-39883.
…r-scope Fix PodVolumeBackup list scope during restore
Signed-off-by: Lyndon-Li <lyonghui@vmware.com>
|
/ok-to-test |
|
/hold |
…napshotter-v8.4-vgs-v1beta2 Bump external-snapshotter to v8.4.0 for VGS v1beta2 support
…nance-history-queue-length Issue 9428: increase repo maintenance history queue length
The `getDataUpload` function in the CSI PVC backup plugin was previously making a cluster-scoped list query to retrieve DataUpload CRs. In environments with strict minimum-privilege RBAC, this would fail with forbidden errors. This explicitly passes the backup namespace into the `ListOptions` when calling `crClient.List`, correctly scoping the queries to the backup's namespace. Unit tests have also been updated to ensure cross-namespace queries are rejected appropriately. Signed-off-by: Adam Zhang <adam.zhang@broadcom.com>
Code-gen no longer required on verify due to velero-io#6039 Signed-off-by: Tiger Kaovilai <tkaovila@redhat.com> oadp-1.2: Update Makefile.prow to velero-restore-helper
…nshift#280) Signed-off-by: Scott Seago <sseago@redhat.com>
Signed-off-by: Tiger Kaovilai <tkaovila@redhat.com>
Signed-off-by: Tiger Kaovilai <tkaovila@redhat.com>
Signed-off-by: Mateus Oliveira <msouzaol@redhat.com>
* fix: ARM images Signed-off-by: Mateus Oliveira <msouzaol@redhat.com> * fixup! fix: ARM images Signed-off-by: Mateus Oliveira <msouzaol@redhat.com> --------- Signed-off-by: Mateus Oliveira <msouzaol@redhat.com>
…#336) Signed-off-by: Tiger Kaovilai <tkaovila@redhat.com>
…openshift#334) (openshift#338) add missing unit test for kopia hashing algo (openshift#337) Introduction of downstream only option to override Kopia default: - hashing algorithm - splitting algorithm - encryption algorithm With introduction of 3 environment variables it is possible to override Kopia algorithms used by Velero: KOPIA_HASHING_ALGORITHM KOPIA_SPLITTER_ALGORITHM KOPIA_ENCRYPTION_ALGORITHM If the env algorithms are not set or they are not within Kopia SupportedAlgorithms, the default algorithm will be used. This behavior is consistent with current behavior without this change. Signed-off-by: Michal Pryc <mpryc@redhat.com> Signed-off-by: Shubham Pampattiwar <shubhampampattiwar7@gmail.com>
The rework of Makefile to make it more readable and inclusion of lint as a target as well extract golangci-lint version from the upstream Dockerfile, so we test in PROW or locally on the same version as upstream. Signed-off-by: Michal Pryc <mpryc@redhat.com>
This fixes the PR openshift#334 where one additional line was in the code. This was not exposed previously as we did not had downstream CI Lint jobs. Signed-off-by: Michal Pryc <mpryc@redhat.com>
* run oadp-operator e2e test from the velero repo execute openshift/oadp-operator e2e tests directly against the velero repo locally or via prow ci Signed-off-by: Wesley Hayutin <weshayutin@gmail.com> * update variable names, add a cleanup * make sure env variable overrides default velero_image Signed-off-by: Wesley Hayutin <weshayutin@gmail.com> * add options to build, push, and only test Signed-off-by: Wesley Hayutin <weshayutin@gmail.com> * add arch to name Signed-off-by: Wesley Hayutin <weshayutin@gmail.com> * remove duplicated clean/rm operator checkout * simplify by dropping export var and use a oneliner Co-authored-by: Tiger Kaovilai <passawit.kaovilai@gmail.com> * drop export and use oneliner Co-authored-by: Tiger Kaovilai <passawit.kaovilai@gmail.com> * just in case, allow oadp to be deployed from makefile Signed-off-by: Wesley Hayutin <weshayutin@gmail.com> * Update Makefile.prow Co-authored-by: Tiger Kaovilai <passawit.kaovilai@gmail.com> --------- Signed-off-by: Wesley Hayutin <weshayutin@gmail.com> Co-authored-by: Tiger Kaovilai <passawit.kaovilai@gmail.com>
…t#436) Signed-off-by: Scott Seago <sseago@redhat.com>
Fixes linting error. Signed-off-by: oadp-team-rebase-bot <oadp-maintainers@redhat.com>
Fix golangci-lint version extraction and disable concat-loop check. Signed-off-by: Michal Pryc <mpryc@redhat.com>
20320a0 to
3aba53f
Compare
|
/retest |
|
@oadp-rebasebot-app[bot]: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Summary by CodeRabbit
New Features
Bug Fixes
Dependency Updates
Other