Skip to content

Commit b6899d2

Browse files
committed
podsecurityreadinesscontroller: change type from cu to unclassified
1 parent 3a06aeb commit b6899d2

File tree

4 files changed

+22
-22
lines changed

4 files changed

+22
-22
lines changed

pkg/operator/podsecurityreadinesscontroller/classification.go

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,7 @@ func (c *PodSecurityReadinessController) classifyViolatingNamespace(
5151
return nil
5252
}
5353

54-
// Historically, we assume that this is a customer issue, but
55-
// actually it means we don't know what the root cause is.
56-
conditions.addViolatingCustomer(ns)
54+
conditions.addUnclassifiedIssue(ns)
5755

5856
return nil
5957
}

pkg/operator/podsecurityreadinesscontroller/classification_test.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ func TestClassifyViolatingNamespaceWithAPIErrors(t *testing.T) {
5555
}
5656

5757
// Ensure no classifications were made due to the error
58-
if len(conditions.violatingCustomerNamespaces) != 0 ||
58+
if len(conditions.violatingUnclassifiedNamespaces) != 0 ||
5959
len(conditions.violatingUserSCCNamespaces) != 0 ||
6060
len(conditions.violatingOpenShiftNamespaces) != 0 ||
6161
len(conditions.violatingRunLevelZeroNamespaces) != 0 ||
@@ -190,7 +190,7 @@ func TestClassifyViolatingNamespace(t *testing.T) {
190190
},
191191
enforceLevel: psapi.LevelRestricted,
192192
expectedConditions: podSecurityOperatorConditions{
193-
violatingCustomerNamespaces: []string{"customer-ns"},
193+
violatingUnclassifiedNamespaces: []string{"customer-ns"},
194194
},
195195
expectError: false,
196196
},
@@ -224,7 +224,7 @@ func TestClassifyViolatingNamespace(t *testing.T) {
224224
},
225225
enforceLevel: psapi.LevelRestricted,
226226
expectedConditions: podSecurityOperatorConditions{
227-
violatingCustomerNamespaces: []string{"customer-ns"},
227+
violatingUnclassifiedNamespaces: []string{"customer-ns"},
228228
},
229229
expectError: false,
230230
},
@@ -238,7 +238,7 @@ func TestClassifyViolatingNamespace(t *testing.T) {
238238
pods: []corev1.Pod{},
239239
enforceLevel: psapi.LevelRestricted,
240240
expectedConditions: podSecurityOperatorConditions{
241-
violatingCustomerNamespaces: []string{"customer-ns"},
241+
violatingUnclassifiedNamespaces: []string{"customer-ns"},
242242
},
243243
expectError: false,
244244
},
@@ -268,7 +268,7 @@ func TestClassifyViolatingNamespace(t *testing.T) {
268268
},
269269
enforceLevel: psapi.LevelRestricted,
270270
expectedConditions: podSecurityOperatorConditions{
271-
violatingCustomerNamespaces: []string{"customer-ns"},
271+
violatingUnclassifiedNamespaces: []string{"customer-ns"},
272272
},
273273
expectError: false,
274274
},
@@ -284,7 +284,7 @@ func TestClassifyViolatingNamespace(t *testing.T) {
284284
},
285285
enforceLevel: psapi.LevelPrivileged,
286286
expectedConditions: podSecurityOperatorConditions{
287-
violatingCustomerNamespaces: []string{"customer-ns"},
287+
violatingUnclassifiedNamespaces: []string{"customer-ns"},
288288
},
289289
expectError: false,
290290
},
@@ -453,7 +453,7 @@ func deepEqualPodSecurityOperatorConditions(
453453

454454
return slices.Equal(a.violatingOpenShiftNamespaces, b.violatingOpenShiftNamespaces) &&
455455
slices.Equal(a.violatingRunLevelZeroNamespaces, b.violatingRunLevelZeroNamespaces) &&
456-
slices.Equal(a.violatingCustomerNamespaces, b.violatingCustomerNamespaces) &&
456+
slices.Equal(a.violatingUnclassifiedNamespaces, b.violatingUnclassifiedNamespaces) &&
457457
slices.Equal(a.violatingDisabledSyncerNamespaces, b.violatingDisabledSyncerNamespaces) &&
458458
slices.Equal(a.violatingUserSCCNamespaces, b.violatingUserSCCNamespaces) &&
459459
slices.Equal(a.inconclusiveNamespaces, b.inconclusiveNamespaces)

pkg/operator/podsecurityreadinesscontroller/conditions.go

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,9 @@ import (
1212
)
1313

1414
const (
15-
PodSecurityCustomerType = "PodSecurityCustomerEvaluationConditionsDetected"
15+
// Historically, we assume that this is a customer issue, but
16+
// actually it means we don't know what the root cause is.
17+
PodSecurityUnknownType = "PodSecurityCustomerEvaluationConditionsDetected"
1618
PodSecurityOpenshiftType = "PodSecurityOpenshiftEvaluationConditionsDetected"
1719
PodSecurityRunLevelZeroType = "PodSecurityRunLevelZeroEvaluationConditionsDetected"
1820
PodSecurityDisabledSyncerType = "PodSecurityDisabledSyncerEvaluationConditionsDetected"
@@ -28,9 +30,9 @@ const (
2830
type podSecurityOperatorConditions struct {
2931
violatingOpenShiftNamespaces []string
3032
violatingRunLevelZeroNamespaces []string
31-
violatingCustomerNamespaces []string
3233
violatingDisabledSyncerNamespaces []string
3334
violatingUserSCCNamespaces []string
35+
violatingUnclassifiedNamespaces []string
3436
inconclusiveNamespaces []string
3537
}
3638

@@ -50,8 +52,8 @@ func (c *podSecurityOperatorConditions) addViolatingDisabledSyncer(ns *corev1.Na
5052
c.violatingDisabledSyncerNamespaces = append(c.violatingDisabledSyncerNamespaces, ns.Name)
5153
}
5254

53-
func (c *podSecurityOperatorConditions) addViolatingCustomer(ns *corev1.Namespace) {
54-
c.violatingCustomerNamespaces = append(c.violatingCustomerNamespaces, ns.Name)
55+
func (c *podSecurityOperatorConditions) addUnclassifiedIssue(ns *corev1.Namespace) {
56+
c.violatingUnclassifiedNamespaces = append(c.violatingUnclassifiedNamespaces, ns.Name)
5557
}
5658

5759
func (c *podSecurityOperatorConditions) addViolatingUserSCC(ns *corev1.Namespace) {
@@ -94,7 +96,7 @@ func makeCondition(conditionType, conditionReason string, namespaces []string) o
9496

9597
func (c *podSecurityOperatorConditions) toConditionFuncs() []v1helpers.UpdateStatusFunc {
9698
return []v1helpers.UpdateStatusFunc{
97-
v1helpers.UpdateConditionFn(makeCondition(PodSecurityCustomerType, violationReason, c.violatingCustomerNamespaces)),
99+
v1helpers.UpdateConditionFn(makeCondition(PodSecurityUnknownType, violationReason, c.violatingUnclassifiedNamespaces)),
98100
v1helpers.UpdateConditionFn(makeCondition(PodSecurityOpenshiftType, violationReason, c.violatingOpenShiftNamespaces)),
99101
v1helpers.UpdateConditionFn(makeCondition(PodSecurityRunLevelZeroType, violationReason, c.violatingRunLevelZeroNamespaces)),
100102
v1helpers.UpdateConditionFn(makeCondition(PodSecurityDisabledSyncerType, violationReason, c.violatingDisabledSyncerNamespaces)),

pkg/operator/podsecurityreadinesscontroller/conditions_test.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ func TestCondition(t *testing.T) {
1313
t.Run("with violating namespaces", func(t *testing.T) {
1414
namespaces := []string{"namespace1", "namespace2"}
1515
expectedCondition := operatorv1.OperatorCondition{
16-
Type: PodSecurityCustomerType,
16+
Type: PodSecurityUnknownType,
1717
Status: operatorv1.ConditionTrue,
1818
Reason: "PSViolationsDetected",
1919
Message: "Violations detected in namespaces: [namespace1 namespace2]",
2020
}
2121

22-
condition := makeCondition(PodSecurityCustomerType, violationReason, namespaces)
22+
condition := makeCondition(PodSecurityUnknownType, violationReason, namespaces)
2323

2424
if condition.Type != expectedCondition.Type {
2525
t.Errorf("expected condition type %s, got %s", expectedCondition.Type, condition.Type)
@@ -41,13 +41,13 @@ func TestCondition(t *testing.T) {
4141
t.Run("with inconclusive namespaces", func(t *testing.T) {
4242
namespaces := []string{"namespace1", "namespace2"}
4343
expectedCondition := operatorv1.OperatorCondition{
44-
Type: PodSecurityCustomerType,
44+
Type: PodSecurityUnknownType,
4545
Status: operatorv1.ConditionTrue,
4646
Reason: "PSViolationDecisionInconclusive",
4747
Message: "Could not evaluate violations for namespaces: [namespace1 namespace2]",
4848
}
4949

50-
condition := makeCondition(PodSecurityCustomerType, inconclusiveReason, namespaces)
50+
condition := makeCondition(PodSecurityUnknownType, inconclusiveReason, namespaces)
5151

5252
if condition.Type != expectedCondition.Type {
5353
t.Errorf("expected condition type %s, got %s", expectedCondition.Type, condition.Type)
@@ -69,12 +69,12 @@ func TestCondition(t *testing.T) {
6969
t.Run("without namespaces", func(t *testing.T) {
7070
namespaces := []string{}
7171
expectedCondition := operatorv1.OperatorCondition{
72-
Type: PodSecurityCustomerType,
72+
Type: PodSecurityUnknownType,
7373
Status: operatorv1.ConditionFalse,
7474
Reason: "ExpectedReason",
7575
}
7676

77-
condition := makeCondition(PodSecurityCustomerType, violationReason, namespaces)
77+
condition := makeCondition(PodSecurityUnknownType, violationReason, namespaces)
7878

7979
if condition.Type != expectedCondition.Type {
8080
t.Errorf("expected condition type %s, got %s", expectedCondition.Type, condition.Type)
@@ -298,7 +298,7 @@ func TestOperatorStatus(t *testing.T) {
298298
cond.addViolatingDisabledSyncer(ns)
299299
} else {
300300
// Default to customer violation for test purposes
301-
cond.addViolatingCustomer(ns)
301+
cond.addUnclassifiedIssue(ns)
302302
}
303303
}
304304
if tt.addInconclusive {

0 commit comments

Comments
 (0)