-
Notifications
You must be signed in to change notification settings - Fork 51
Make SecurityContext configurable for webhook jobs #166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Warning Rate limit exceeded@chrislusf has exceeded the limit for the number of commits or files that can be reviewed per hour. Please wait 8 minutes and 36 seconds before requesting another review. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. 📒 Files selected for processing (4)
Note Other AI code review bot(s) detectedCodeRabbit has detected other AI code review bot(s) in this pull request and will avoid duplicating their findings in the review comments. This may lead to a less comprehensive review. WalkthroughThese changes add optional security context configuration to Helm templates for the webhook component. Security context blocks are conditionally rendered at pod and container levels in the webhook job template, with corresponding default values introduced in the Helm values file for init container and job container configurations. Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes
Possibly related PRs
Poem
Pre-merge checks and finishing touches✅ Passed checks (5 passed)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Summary of ChangesHello @chrislusf, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request enhances the Helm chart for the webhook component by making its Highlights
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
80b2601 to
ad1061f
Compare
|
/gemini review |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request introduces configurable security contexts for the webhook jobs, which is an excellent enhancement for clusters with restrictive Pod Security Policies. The implementation is clean, using Helm helpers to avoid code duplication in the job templates. The default values provided are sensible and align with the restricted Pod Security Standard, improving the security posture of the chart out of the box. The changes are applied consistently to all three webhook jobs, including the init containers. Overall, this is a well-executed and valuable contribution.
Fixes #165 Add configurable podSecurityContext and securityContext for webhook certificate jobs to support clusters with restrictive PodSecurity policies. Changes: - Add webhook.podSecurityContext and webhook.securityContext to values.yaml - Add helper templates for security contexts in _helpers.tpl - Update job template to use configurable security contexts - Fix trailing whitespace in helm_chart_release.yml workflow Default values are compliant with PodSecurity 'restricted' profile: - allowPrivilegeEscalation: false - capabilities.drop: [ALL] - runAsNonRoot: true - seccompProfile.type: RuntimeDefault
ad1061f to
76fe3ce
Compare
Summary
Fixes #165
Add configurable
podSecurityContextandsecurityContextfor webhook certificate jobs to support clusters with restrictive PodSecurity policies.Changes
webhook.podSecurityContextandwebhook.securityContexttovalues.yamlwebhookWaitInitContainerhelper to include security context for init containersDefault Values
Default values are compliant with PodSecurity
restrictedprofile:Testing
Verified templates render correctly with
helm templatecommand.Summary by CodeRabbit
✏️ Tip: You can customize this high-level summary in your review settings.