-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ImagePolicyWebhook Admission Controller #30631
ImagePolicyWebhook Admission Controller #30631
Conversation
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
5 similar comments
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
@k8s-bot ok to test |
cc @kubernetes/sig-auth @erictune @smarterclayton @fabioy @philips |
} | ||
json.Unmarshal(raw, review) | ||
|
||
// TODO: why doesn't this work? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Q-Lee is this an issue with the PR for adding image types? KUBE_TEST_API_VERSIONS
seems to be set properly but the actual type just errors.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a mistake in the API type that might have caused this. I'm regenerating things with a fix atm.
@mikedanese actual PR for API group is #30241. This is a WIP that builds on top of that PR, so it pulls in the commits. |
if err != nil { | ||
glog.V(4).Infof("error contacting webhook backend: %s") | ||
if a.defaultAllow { | ||
glog.V(4).Infof("pod allowed in spite of webhook backend failure") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
.V(2)
I'd think
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could we log some more pertinent information here (e.g., pod name or even the error)? If this is effecting more than 1 request, it will be hard to follow what's happening.
Oops. |
Apparently I'm not actually an admin. Can someone else "ok to test" this? |
@ecordell I tried doing that, but I think I can only resolve discussions that I started. However, it didn't block my last PR. The only thing I see here is that the branch has conflicts tht must be resolved. Try rebasing against master (the API changes were merged, so resolve those conflicts). |
@ecordell PR needs rebase |
4f1b5ae
to
1103317
Compare
@deads2k could you lgtm with a higher priority to hopefully get it through? |
Sorry, I'm against queue jumping for net new features. I did add the milestone tag which helps a little bit. |
GCE e2e build/test passed for commit 11033177529d282f675f7b81380a82d8d19feeeb. |
@ecordell PR needs rebase |
1103317
to
711e3cf
Compare
@deads2k please LGTM |
GCE e2e build/test passed for commit 711e3cf. |
@ecordell I think .linted_packages has been dealt with. If we require 1 more rebase, then I'm going to up the priority. |
@k8s-bot test this [submit-queue is verifying that this PR is safe to merge] |
GCE e2e build/test passed for commit 711e3cf. |
Automatic merge from submit-queue |
What this PR does / why we need it: This is an implementation of the image provenance proposal. It also includes the API definitions by @Q-Lee from #30241
Special notes for your reviewer:
Please note that this is the first admission controller to make use of the admission controller config file (
--admission-controller-config-file
). I have defined a format for it but we may want to double check it's adequate for future use cases as well.The format defined is:
(or yaml)
Release note:
This change is