OCPBUGS-74525: OCPBUGS-74526: Remove UserNamespacesPodSecurityStandards and UserNamespacesSupport#2762
OCPBUGS-74525: OCPBUGS-74526: Remove UserNamespacesPodSecurityStandards and UserNamespacesSupport#2762bitoku wants to merge 1 commit intoopenshift:masterfrom
Conversation
…eature gates Both feature gates have been enabled by default since 4.21 and are no longer needed. The userNamespaceLevel field on SecurityContextConstraints is now ungated and always available. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
|
Pipeline controller notification For optional jobs, comment This repository is configured in: LGTM mode |
|
@bitoku: This pull request references Jira Issue OCPBUGS-74525, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Repository YAML (base), Central YAML (inherited) Review profile: CHILL Plan: Pro Run ID: ⛔ Files ignored due to path filters (3)
📒 Files selected for processing (13)
💤 Files with no reviewable changes (13)
📝 WalkthroughWalkthroughThis pull request removes two feature gates: UserNamespacesSupport and UserNamespacesPodSecurityStandards. The removals span feature gate definition files (features.go), documentation (features.md), configuration manifests across multiple Hypershift and SelfManagedHA profiles, and annotation references in proto and types definitions. Additionally, the test configuration file for UserNamespacesPodSecurityStandards is deleted. The changes eliminate these feature gates from the registry and all associated configuration profiles without modifying any remaining features or control flow. 🚥 Pre-merge checks | ✅ 4 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (4 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
📝 Coding Plan for PR comments
Comment |
|
Hello @bitoku! Some important instructions when contributing to openshift/api: |
|
Skipping CI for Draft Pull Request. |
|
@bitoku: This pull request references Jira Issue OCPBUGS-74525, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/test all |
|
PR-Agent: could not fine a component named |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
/payload-job periodic-ci-openshift-release-main-ci-4.22-e2e-gcp-ovn-usernamespace |
|
@bitoku: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/c6667530-1e26-11f1-9894-8d3e157c037f-0 |
|
/retest |
|
@bitoku: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
/payload-job periodic-ci-openshift-release-main-ci-4.22-e2e-gcp-ovn-usernamespace |
|
@bitoku: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/4eb8e340-1ef0-11f1-9273-49c828a7ffdd-0 |
UserNamespacesPodSecurityStandards dropped in 1.35 kubernetes/kubernetes@e8bd3f6
UserNamespacesSupport enabled by default in 1.33 kubernetes/kubernetes@96c2b81