-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Enforce NonAdminBackup spec field values #110
base: master
Are you sure you want to change the base?
fix: Enforce NonAdminBackup spec field values #110
Conversation
Skipping CI for Draft Pull Request. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mateusoliveira43 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
go.mod
Outdated
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect | ||
sigs.k8s.io/structured-merge-diff/v4 v4.4.1 // indirect | ||
sigs.k8s.io/yaml v1.4.0 // indirect | ||
) | ||
|
||
replace github.com/vmware-tanzu/velero => github.com/openshift/velero v0.10.2-0.20240919150610-92244630d90b | ||
|
||
replace github.com/openshift/oadp-operator => github.com/mateusoliveira43/oadp-operator v0.0.0-20241108184219-7913bfce1719 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
TODO remove this prior to merge
187da0e
to
dba046c
Compare
Signed-off-by: Mateus Oliveira <[email protected]>
c4c3074
to
306351b
Compare
setupLog.Error(err, "unable to create Kubernetes client") | ||
os.Exit(1) | ||
} | ||
// TODO we could pass DPA name as env var and do a get call directly. Better? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
TODO
name: "IncludedNamespaces", | ||
}, | ||
{ | ||
// should not be enforced? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
TODO
run make manifests Signed-off-by: Mateus Oliveira <[email protected]>
/hold Blocked by openshift/oadp-operator#1584 |
Why the changes were made
Resolves #33
Related to: #37
Blocked by: openshift/oadp-operator#1584
This PR adds fetching of OADP's DPA during NAC set up, adding DPA
spec.nonAdmin.enforceBackupSpec
toNonAdminBackupReconciler
and adds validation for NonAdminBackup spec respecting enforcement.How to test the changes made
Read design.
Follow install-from-source testing documentation, pointing this branch and my OADP fork branch
fix/enforce-non-admin-bckup-spec-field-values