NO-JIRA: fix: add pod annotation: openshift.io/required-scc: hostaccess#450
Conversation
|
@damdo: This pull request explicitly references no jira issue. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Repository: openshift/coderabbit/.coderabbit.yaml Review profile: CHILL Plan: Pro Plus Run ID: 📒 Files selected for processing (2)
WalkthroughAdded pod annotation Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes 🚥 Pre-merge checks | ✅ 10✅ Passed checks (10 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@manifests/0000_26_cloud-controller-manager-operator_11_deployment.yaml`:
- Line 24: The deployment's pod template annotation openshift.io/required-scc:
restricted-v2 is incompatible with the pod spec (it uses hostNetwork: true and
the hostPath volume host-etc-kube), so update the openshift.io/required-scc
annotation on the Deployment's pod template metadata to an SCC that allows
hostNetwork and/or hostPath (for example hostnetwork-v2 or hostaccess), or
alternatively remove hostNetwork: true and the hostPath volume from the Pod spec
(refer to the Deployment/pod template and the hostNetwork and host-etc-kube
hostPath entries to apply the appropriate change).
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml
Review profile: CHILL
Plan: Pro Plus
Run ID: 8a033931-ca11-4061-9647-b70ec3add89e
📒 Files selected for processing (1)
manifests/0000_26_cloud-controller-manager-operator_11_deployment.yaml
|
/hold I think this might be a fair point: #450 (comment) |
4c8864f to
95fba41
Compare
There was a problem hiding this comment.
Actionable comments posted: 2
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@manifests/0000_26_cloud-controller-manager-operator_11_deployment.yaml`:
- Line 24: The PR title and manifest disagree: the annotation key
openshift.io/required-scc currently equals hostnetwork-v2 but the PR
title/description claim restricted-v2; either change the annotation value in the
Deployment manifest to restricted-v2 if that was intended (ensure compatibility
with prior review notes) or update the PR title and description to accurately
state hostnetwork-v2; locate the annotation entry openshift.io/required-scc in
the manifest and make the consistent change so code and PR metadata match.
- Line 24: The pod's annotation openshift.io/required-scc: hostnetwork-v2
conflicts with the pod's hostPath volume that mounts /etc/kubernetes (the
hostPath volume block and the container's volumeMount for /etc/kubernetes);
replace the SCC value with one that permits both hostNetwork and hostPath (e.g.,
hostaccess or hostmount-anyuid-v2) by updating the openshift.io/required-scc
annotation to that SCC name so admission will allow the hostPath mount while
preserving hostNetwork usage.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml
Review profile: CHILL
Plan: Pro Plus
Run ID: 63f79373-8e6c-4e4f-9c06-2c8b713f1f12
📒 Files selected for processing (1)
manifests/0000_26_cloud-controller-manager-operator_11_deployment.yaml
95fba41 to
7c4b24a
Compare
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@manifests/0000_26_cloud-controller-manager-operator_11_deployment.yaml`:
- Line 24: The manifest sets openshift.io/required-scc: hostaccess for the pod
but no ClusterRoleBinding grants the ServiceAccount permission to use that SCC;
create a ClusterRoleBinding that binds the built-in SCC use role
(system:openshift:scc:hostaccess) to the ServiceAccount
cluster-cloud-controller-manager in the
openshift-cloud-controller-manager-operator namespace (i.e., bind
system:serviceaccount:openshift-cloud-controller-manager-operator:cluster-cloud-controller-manager
to system:openshift:scc:hostaccess) so the pod can pass SCC admission.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml
Review profile: CHILL
Plan: Pro Plus
Run ID: 42674bb1-911a-42ad-a89f-ff0df8fb4243
📒 Files selected for processing (1)
manifests/0000_26_cloud-controller-manager-operator_11_deployment.yaml
the openshift.io/required-scc: hostaccess annotation should be set on pods as required by the requiredSCCAnnotationChecker: https://github.com/openshift/origin/blob/d7ad0db6b652a27b8e7d547dcca79a5e00be7d08/pkg/monitortests/authentication/requiredsccmonitortests/monitortest.go#L85-L87
7c4b24a to
cd12828
Compare
|
@damdo: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
/test ? |
|
@damdo: The following commands are available to trigger required jobs: The following commands are available to trigger optional jobs: Use DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/unhold |
The openshift.io/required-scc: hostaccess annotation should be set on
pods as required by the requiredSCCAnnotationChecker
more info on scc:
Summary by CodeRabbit