-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPBUGS-9382: Expose validation issue when creating TailoredProfiles #293
base: master
Are you sure you want to change the base?
Conversation
@rhmdnd: This pull request references Jira Issue OCPBUGS-9382, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: rhmdnd The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
TailoredProfiles can extend existing profiles, which can be either Node or Platform type. However, it's possible to create a TailoredProfile that extends a profile of a patricular type, and then reference rules of the opposite type. This causes issues during scans because you'd expect the rules to be excluded, but they're not. This commit adds an e2e test the exposes the issue. This can be addressed with improved validation when creating a TailoredProfile. Related to issue openshift#65.
@rhmdnd: This pull request references Jira Issue OCPBUGS-9382, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/hold for test |
It seems that it is only the tp validation issue. When you execute scan with the tp, the disabled rules will not included: |
/unhold |
E2E test is working as expected.
Just need to find an appropriate place for the validation. |
@rhmdnd: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
TailoredProfiles can extend existing profiles, which can be either Node
or Platform type.
However, it's possible to create a TailoredProfile that extends a
profile of a patricular type, and then reference rules of the opposite
type. This causes issues during scans because you'd expect the rules to
be excluded, but they're not.
This commit adds an e2e test the exposes the issue. This can be
addressed with improved validation when creating a TailoredProfile.
Related to issue #65.