CNTRLPLANE-2777: add TypeMeta to GenericControllerConfig#2780
Conversation
|
Pipeline controller notification For optional jobs, comment This repository is configured in: LGTM mode |
|
Hello @ricardomaraschini! Some important instructions when contributing to openshift/api: |
|
On hold for now. /hold |
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Repository YAML (base), Organization UI (inherited) Review profile: CHILL Plan: Pro Run ID: ⛔ Files ignored due to path filters (1)
📒 Files selected for processing (3)
✅ Files skipped from review due to trivial changes (1)
🚧 Files skipped from review as they are similar to previous changes (1)
📝 WalkthroughWalkthrough
✨ Finishing Touches🧪 Generate unit tests (beta)
Warning There were issues while running some tools. Please review the errors and either fix the tool's configuration or disable the tool if it's a critical failure. 🔧 golangci-lint (2.11.4)Error: build linters: unable to load custom analyzer "kubeapilinter": tools/_output/bin/kube-api-linter.so, plugin: not implemented Comment |
08964da to
6a49569
Compare
The CVO now supports automatic injection of TLS security profile settings into operator ConfigMaps annotated with config.openshift.io/inject-tls . The CVO identifies eligible configuration types by checking the apiVersion and kind fields in YAML entries within the ConfigMap. The CVO currently supports two configuration types: - operator.openshift.io/v1alpha1.GenericOperatorConfig - config.openshift.io/v1.GenericControllerConfig The GenericControllerConfig type currently lacks apiVersion and kind fields (provided by TypeMeta), preventing the CVO from identifying it for automatic TLS profile injection. This change adds the missing TypeMeta field to enable proper type identification. When a matching type is identified, the CVO injects minTLSVersion and cipherSuites values from the cluster's APIServer tlsSecurityProfile into the configuration's .servingInfo section.
6a49569 to
6e17e9e
Compare
|
@ricardomaraschini: This pull request references CNTRLPLANE-2777 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
Asked for review. /unhold |
|
What is the story for upgrades? Existing clusters won't have this type meta in place presently, will operators populate this type meta moving forward? If so, which operators are affected by this change? |
Great question. The type was introduced in 2018 (#125), there isn't a lot of context about it, more: I could not find any reference to it in the whole GitHub |
|
Thanks for the response, agree, can't see any prior usage of this, odd 🤔 Seems to make sense to be able to handle versioning of this struct so, +1 /lgtm |
|
Pipeline controller notification No second-stage tests were triggered for this PR. This can happen when:
Use |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: JoelSpeed The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
EDIT: Should have looked at the linked PR first :). Agree with adding the ability to version this config. |
|
/verified bypass |
|
@ingvagabund: The DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@ricardomaraschini: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
The CVO now supports automatic injection of TLS security profile settings into operator ConfigMaps annotated with
config.openshift.io/inject-tls(openshift/cluster-version-operator#1322). The CVO identifies eligible configuration types by checking theapiVersionandkindfields in YAML entries within the ConfigMap.The CVO currently supports two configuration types:
operator.openshift.io/v1alpha1.GenericOperatorConfigconfig.openshift.io/v1.GenericControllerConfigThe
GenericControllerConfigtype currently lacksapiVersionandkindfields (provided byTypeMeta), preventing the CVO from identifying it for automatic TLS profile injection. This change adds the missingTypeMetafield to enable proper type identification.When a matching type is identified, the CVO injects
minTLSVersionandcipherSuitesvalues from the cluster's APIServertlsSecurityProfileinto the configuration's.servingInfosection.