Skip to content
This repository has been archived by the owner on Feb 22, 2022. It is now read-only.

[stable/opa] add namespace selector to OPA webhook resource and bump … #13508

Merged
merged 2 commits into from
May 14, 2019

Conversation

cplee
Copy link
Contributor

@cplee cplee commented May 3, 2019

…version

Signed-off-by: Casey Lee cplee@nektos.com

What this PR does / why we need it:

@tsandall
When allowing the helm chart to manage the self-signed certs, it causes certs to be recreated on an upgrade and then the webhook restricts the opa chart for upgrading itself...resulting in deadlock.

Which issue this PR fixes

Special notes for your reviewer:

Checklist

[Place an '[x]' (no spaces) in all applicable fields. Please remove unrelated fields.]

  • DCO signed
  • Chart Version bumped
  • title of the PR contains starts with chart name e.g. [stable/chart]

…ersion

Signed-off-by: Casey Lee <cplee@nektos.com>
@helm-bot helm-bot added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. Contribution Allowed If the contributor has signed the DCO or the CNCF CLA (prior to the move to a DCO). labels May 3, 2019
@k8s-ci-robot
Copy link
Contributor

Hi @cplee. Thanks for your PR.

I'm waiting for a helm member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label May 3, 2019
Copy link
Collaborator

@tsandall tsandall left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@cplee I've got some questions/comments about this change. Let me know what you think!

stable/opa/templates/webhookconfiguration.yaml Outdated Show resolved Hide resolved
Signed-off-by: Casey Lee <cplee@nektos.com>
@cplee
Copy link
Contributor Author

cplee commented May 8, 2019

@tsandall thanks for the feedback! please check this latest commit.

@tsandall
Copy link
Collaborator

@cplee this change looks OK in isolation however what I'm not sure about is how to ensure that it works as expected. I.e., users will have to make sure they label the namespace where OPA is deployed accordingly. Is there any precedent for this? Are there other cases where self-management becomes a problem?

@cplee
Copy link
Contributor Author

cplee commented May 13, 2019

@tsandall I've been having some headaches with the OPA helm chart in which an update is creating a new cert that is out of sync with the cert the pod for OPA is using. This causes the webhook to fail for the other resources in the OPA helm chart...triggering a rollback. The rollback doesn't rollback cleanly since the webhook is now unable to run with inconsistent certs. At his point, the only workaround is to change the FailPolicy to Ignore.

@tsandall
Copy link
Collaborator

@cplee understood. I finally had time to test this out manually. I think since it's opt-out it's fine to have it on by default. We can recommend people label sensitive namespaces accordingly.

@tsandall
Copy link
Collaborator

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm Indicates that a PR is ready to be merged. label May 14, 2019
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cplee, tsandall

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label May 14, 2019
@tsandall
Copy link
Collaborator

/ok-to-test

@k8s-ci-robot
Copy link
Contributor

@tsandall: Cannot trigger testing until a trusted user reviews the PR and leaves an /ok-to-test message.

In response to this:

/ok-to-test

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot merged commit 10d07e6 into helm:master May 14, 2019
goshlanguage pushed a commit to goshlanguage/charts that referenced this pull request May 17, 2019
helm#13508)

* stable/opa:  add namespace selector to OPA webhook resource and bump version

Signed-off-by: Casey Lee <cplee@nektos.com>

* stable/opa: update namespace label to be 'opt-out' vs 'opt-in'

Signed-off-by: Casey Lee <cplee@nektos.com>
eyenx pushed a commit to eyenx/charts that referenced this pull request May 28, 2019
helm#13508)

* stable/opa:  add namespace selector to OPA webhook resource and bump version

Signed-off-by: Casey Lee <cplee@nektos.com>

* stable/opa: update namespace label to be 'opt-out' vs 'opt-in'

Signed-off-by: Casey Lee <cplee@nektos.com>
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. Contribution Allowed If the contributor has signed the DCO or the CNCF CLA (prior to the move to a DCO). lgtm Indicates that a PR is ready to be merged. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants