Skip to content

Tighten VAP ServiceAccount check and remove policy stubs#431

Open
MikeSpreitzer wants to merge 1 commit intollm-d-incubation:mainfrom
MikeSpreitzer:fix-308
Open

Tighten VAP ServiceAccount check and remove policy stubs#431
MikeSpreitzer wants to merge 1 commit intollm-d-incubation:mainfrom
MikeSpreitzer:fix-308

Conversation

@MikeSpreitzer
Copy link
Copy Markdown
Collaborator

Summary

  • Tightened the ServiceAccount name regex in fma-immutable-fields and fma-bound-serverreqpod ValidatingAdmissionPolicy objects to require the -fma-controllers suffix instead of the broader -controllers, now that PR ✨ New management for ValidatingAdmissionPolicy[Binding] objects #297 has been adopted
  • Deleted the stub files in charts/fma-controllers/templates/policies/ that existed only for Git archaeology purposes
  • Removed the NOTE comments about the relaxed pattern

Closes #308

Test plan

  • Verify the ValidatingAdmissionPolicy objects accept requests from ServiceAccounts ending in -fma-controllers
  • Verify the ValidatingAdmissionPolicy objects reject requests from ServiceAccounts ending in -controllers (but not -fma-controllers)
  • Confirm no regressions in e2e tests

🤖 Generated with Claude Code

…ation#308)

Tighten the ServiceAccount name regex in ValidatingAdmissionPolicy
objects to require the `-fma-controllers` suffix instead of the
broader `-controllers`, now that PR 297 has been adopted. Also delete
the stub files in charts/fma-controllers/templates/policies/ that
existed only for git archaeology.

Closes llm-d-incubation#308

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Signed-off-by: Mike Spreitzer <mspreitz@us.ibm.com>
Copilot AI review requested due to automatic review settings April 16, 2026 04:36
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates the cluster-level ValidatingAdmissionPolicy CEL expressions to more strictly identify FMA controller ServiceAccounts (now requiring the -fma-controllers suffix) and removes obsolete Helm chart policy stub templates introduced for transition/archaeology after PR #297.

Changes:

  • Tighten the ServiceAccount username regex in fma-immutable-fields and fma-bound-serverreqpod policies to require *-fma-controllers.
  • Remove now-obsolete “relaxed pattern” NOTE comments from those policies.
  • Delete Helm chart templates/policies/* stub files that no longer serve an active purpose.

Reviewed changes

Copilot reviewed 6 out of 6 changed files in this pull request and generated no comments.

Show a summary per file
File Description
config/validating-admission-policies/fma-immutable-fields.yaml Tightens controller ServiceAccount username match to *-fma-controllers.
config/validating-admission-policies/fma-bound-serverreqpod.yaml Tightens controller ServiceAccount username match to *-fma-controllers.
charts/fma-controllers/templates/policies/validating-admission-policy-immutable-fields.yaml Removes deprecated Helm stub (policies no longer chart-managed).
charts/fma-controllers/templates/policies/validating-admission-policy-bound-serverReqPod.yaml Removes deprecated Helm stub (policies no longer chart-managed).
charts/fma-controllers/templates/policies/validating-admission-policy-binding-serverReqPod.yaml Removes deprecated Helm stub (policies no longer chart-managed).
charts/fma-controllers/templates/policies/validating-admission-policy-binding-fields.yaml Removes deprecated Helm stub (policies no longer chart-managed).

@MikeSpreitzer
Copy link
Copy Markdown
Collaborator Author

/ok-to-test

@github-actions
Copy link
Copy Markdown

🚀 E2E tests triggered by /ok-to-test

View the OpenShift E2E workflow run

@MikeSpreitzer
Copy link
Copy Markdown
Collaborator Author

The E2E test on OpenShift passed (failed first try due to #422, succeeded second try).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Cleanup on aisle 297

2 participants