Skip to content

Commit 3625818

Browse files
committed
release 1.10.1: update the catalogs
Updating the catalogs to use the new version and newest bundle image. Signed-off-by: Julien Ropé <[email protected]>
1 parent 68a75cb commit 3625818

File tree

8 files changed

+685
-16
lines changed

8 files changed

+685
-16
lines changed

fbc/v4.16/catalog-template.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,9 @@ entries:
4747
- name: sandboxed-containers-operator.v1.10.0
4848
replaces: sandboxed-containers-operator.v1.9.0
4949
skipRange: '>=1.1.0 <1.10.0'
50+
- name: sandboxed-containers-operator.v1.10.1
51+
replaces: sandboxed-containers-operator.v1.10.0
52+
skipRange: '>=1.1.0 <1.10.1'
5053
name: stable
5154
package: sandboxed-containers-operator
5255
schema: olm.channel
@@ -88,6 +91,8 @@ entries:
8891
schema: olm.bundle
8992
- image: registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38
9093
schema: olm.bundle
94+
- image: registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:4746bf0f769c9d87a36e392540c80e1861c54edd4738865d31ef589dc04cc5fe
95+
schema: olm.bundle
9196
- schema: olm.deprecations
9297
package: sandboxed-containers-operator
9398
entries:

fbc/v4.16/catalog/sandboxed-containers-operator/catalog.json

Lines changed: 176 additions & 4 deletions
Large diffs are not rendered by default.

fbc/v4.17/catalog-template.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,9 @@ entries:
4747
- name: sandboxed-containers-operator.v1.10.0
4848
replaces: sandboxed-containers-operator.v1.9.0
4949
skipRange: '>=1.1.0 <1.10.0'
50+
- name: sandboxed-containers-operator.v1.10.1
51+
replaces: sandboxed-containers-operator.v1.10.0
52+
skipRange: '>=1.1.0 <1.10.1'
5053
name: stable
5154
package: sandboxed-containers-operator
5255
schema: olm.channel
@@ -88,6 +91,8 @@ entries:
8891
schema: olm.bundle
8992
- image: registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38
9093
schema: olm.bundle
94+
- image: registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:4746bf0f769c9d87a36e392540c80e1861c54edd4738865d31ef589dc04cc5fe
95+
schema: olm.bundle
9196
- schema: olm.deprecations
9297
package: sandboxed-containers-operator
9398
entries:

fbc/v4.17/catalog/sandboxed-containers-operator/catalog.json

Lines changed: 163 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,11 @@
8181
"name": "sandboxed-containers-operator.v1.10.0",
8282
"replaces": "sandboxed-containers-operator.v1.9.0",
8383
"skipRange": ">=1.1.0 <1.10.0"
84+
},
85+
{
86+
"name": "sandboxed-containers-operator.v1.10.1",
87+
"replaces": "sandboxed-containers-operator.v1.10.0",
88+
"skipRange": ">=1.1.0 <1.10.1"
8489
}
8590
]
8691
}
@@ -422,10 +427,6 @@
422427
}
423428
],
424429
"relatedImages": [
425-
{
426-
"name": "",
427-
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38"
428-
},
429430
{
430431
"name": "caa",
431432
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:6efba887ccaa4bc5a899751d365e2ccb70c45a842c694579972c5947ca65b49e"
@@ -442,6 +443,10 @@
442443
"name": "kata-monitor",
443444
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:10b51e39b051ba838343a82eae036299c10b135705d2ac5da7782ea068ba4dab"
444445
},
446+
{
447+
"name": "",
448+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38"
449+
},
445450
{
446451
"name": "podvm-builder",
447452
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:0a14d0562efa52c400174648653e5ed053659566603e3267aa797228222bccdc"
@@ -456,6 +461,160 @@
456461
}
457462
]
458463
}
464+
{
465+
"schema": "olm.bundle",
466+
"name": "sandboxed-containers-operator.v1.10.1",
467+
"package": "sandboxed-containers-operator",
468+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:4746bf0f769c9d87a36e392540c80e1861c54edd4738865d31ef589dc04cc5fe",
469+
"properties": [
470+
{
471+
"type": "olm.gvk",
472+
"value": {
473+
"group": "confidentialcontainers.org",
474+
"kind": "PeerPod",
475+
"version": "v1alpha1"
476+
}
477+
},
478+
{
479+
"type": "olm.gvk",
480+
"value": {
481+
"group": "kataconfiguration.openshift.io",
482+
"kind": "KataConfig",
483+
"version": "v1"
484+
}
485+
},
486+
{
487+
"type": "olm.package",
488+
"value": {
489+
"packageName": "sandboxed-containers-operator",
490+
"version": "1.10.1"
491+
}
492+
},
493+
{
494+
"type": "olm.csv.metadata",
495+
"value": {
496+
"annotations": {
497+
"alm-examples": "[\n {\n \"apiVersion\": \"kataconfiguration.openshift.io/v1\",\n \"kind\": \"KataConfig\",\n \"metadata\": {\n \"name\": \"example-kataconfig\"\n }\n }\n]",
498+
"capabilities": "Seamless Upgrades",
499+
"createdAt": "2025-08-05T15:10:52Z",
500+
"features.operators.openshift.io/cnf": "false",
501+
"features.operators.openshift.io/cni": "false",
502+
"features.operators.openshift.io/csi": "false",
503+
"features.operators.openshift.io/disconnected": "true",
504+
"features.operators.openshift.io/fips-compliant": "false",
505+
"features.operators.openshift.io/proxy-aware": "false",
506+
"features.operators.openshift.io/tls-profiles": "false",
507+
"features.operators.openshift.io/token-auth-aws": "false",
508+
"features.operators.openshift.io/token-auth-azure": "false",
509+
"features.operators.openshift.io/token-auth-gcp": "false",
510+
"olm.skipRange": ">=1.1.0 <1.10.1",
511+
"operatorframework.io/suggested-namespace": "openshift-sandboxed-containers-operator",
512+
"operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
513+
"operators.operatorframework.io/builder": "operator-sdk-v1.39.1",
514+
"operators.operatorframework.io/internal-objects": "[\"peerpods.confidentialcontainers.org\",\"peerpodconfigs.confidentialcontainers.org\"]",
515+
"operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
516+
"repository": "https://github.com/openshift/sandboxed-containers-operator"
517+
},
518+
"apiServiceDefinitions": {},
519+
"crdDescriptions": {
520+
"owned": [
521+
{
522+
"name": "kataconfigs.kataconfiguration.openshift.io",
523+
"version": "v1",
524+
"kind": "KataConfig",
525+
"description": "The kataconfig CR represent a installation of Kata in a cluster and its current state."
526+
},
527+
{
528+
"name": "peerpods.confidentialcontainers.org",
529+
"version": "v1alpha1",
530+
"kind": "PeerPod"
531+
}
532+
]
533+
},
534+
"description": "OpenShift sandboxed containers, based on the Kata Containers open source\nproject, provides an Open Container Initiative (OCI) compliant container\nruntime using lightweight virtual machines, running your workloads in their own\nisolated kernel and therefore contributing an additional layer of isolation\nback to OpenShift's Defense-in-Depth strategy. Click [this link](https://catalog.redhat.com/software/operators/detail/5ee0d499fdbe7cddc2c91cf5) for\nmore information.\n\n# Requirements\nYour cluster must be installed on bare metal infrastructure with Red Hat Enterprise Linux CoreOS workers.\n\n# Features & benefits\n- **Isolated Developer Environments & Privileges Scoping**\n As a developer working on debugging an application using state-of-the-art\n tooling you might need elevated privileges such as `CAP_ADMIN` or `CAP_BPF`. With\n OpenShift sandboxed containers, any impact will be limited to a separate\n dedicated kernel.\n\n- **Legacy Containerized Workload Isolation**\n You are mid-way in converting a containerized monolith into cloud-native\n microservices. However, the monolith still runs on your cluster unpatched and\n unmaintained. OpenShift sandboxed containers helps isolate it in its own kernel\n to reduce risk.\n\n- **Safe Multi-tenancy & Resource Sharing (CI/CD Jobs, CNFs, ..)**\n If you are providing a service to multiple tenants, it could mean that the\n service workloads are sharing the same resources (e.g., worker node). By\n deploying in a dedicated kernel, the impact of these workloads have on one\n another is greatly reduced.\n\n- **Additional Isolation with Native Kubernetes User Experience**\n OpenShift sandboxed containers is used as a compliant OCI runtime.\n Therefore, many operational patterns used with normal containers are still\n preserved including but not limited to image scanning, GitOps, Imagestreams,\n and so on.\n\n# How to install\n Read the information about the Operator and click Install.\n\n On the Install Operator page:\n\n - Select `candidate` from the list of available Update Channel options.\n This ensures that you install the latest version of OpenShift sandboxed containers\n that is compatible with your OpenShift Container Platform version.\n\n - For Installed Namespace, ensure that the Operator recommended namespace\n option is selected. This installs the Operator in the mandatory\n `openshift-sandboxed-containers-operator` namespace, which is automatically\n created if it does not exist. Attempting to install the OpenShift\n sandboxed containers Operator in a namespace other than\n `openshift-sandboxed-containers-operator` causes the installation to fail.\n\n - For Approval Strategy, ensure that Automatic, which is the default value,\n is selected. OpenShift sandboxed containers automatically updates when a new\n z-stream release is available.\n\n - Click Install to make the Operator available to the OpenShift sandboxed\n containers namespace.\n\n - The OpenShift sandboxed containers Operator is now installed on your\n cluster. You can trigger the Operator by enabling the runtime on your cluster.\n You can do this by creating a `KataConfig` CustomResourceDefinition(CRD) instance. For this click\n on \"create instance\" on the operator overview page.\n\n# Documentation\nSee the [OpenShift sandboxed containers documentation](https://docs.redhat.com/en/documentation/openshift_sandboxed_containers/).",
535+
"displayName": "OpenShift sandboxed containers Operator",
536+
"installModes": [
537+
{
538+
"type": "OwnNamespace",
539+
"supported": true
540+
},
541+
{
542+
"type": "SingleNamespace",
543+
"supported": true
544+
},
545+
{
546+
"type": "MultiNamespace",
547+
"supported": false
548+
},
549+
{
550+
"type": "AllNamespaces",
551+
"supported": false
552+
}
553+
],
554+
"keywords": [
555+
"sandboxed-containers",
556+
"kata"
557+
],
558+
"labels": {
559+
"operatorframework.io/arch.amd64": "supported",
560+
"operatorframework.io/arch.s390x": "supported",
561+
"operatorframework.io/os.linux": "supported"
562+
},
563+
"links": [
564+
{
565+
"name": "Sandboxed Containers Operator",
566+
"url": "https://www.github.com/openshift/sandboxed-containers-operator"
567+
}
568+
],
569+
"maintainers": [
570+
{
571+
"name": "'Red Hat",
572+
"email": "[email protected]'"
573+
}
574+
],
575+
"maturity": "beta",
576+
"minKubeVersion": "1.28.0",
577+
"provider": {
578+
"name": "Red Hat"
579+
}
580+
}
581+
}
582+
],
583+
"relatedImages": [
584+
{
585+
"name": "",
586+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:4746bf0f769c9d87a36e392540c80e1861c54edd4738865d31ef589dc04cc5fe"
587+
},
588+
{
589+
"name": "caa",
590+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:d4973b793f3af9d9df3da45417082f77dc991e734ea9cf3d132aaf2d7def9552"
591+
},
592+
{
593+
"name": "peerpods-webhook",
594+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:ef4a8efcfb74e3e6b68fe3c566b343ac5da0a4d1de203342c46defae60029a81"
595+
},
596+
{
597+
"name": "podvm-oci",
598+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:3ae0ddf604a57a9f5a16d023e03f9d5060312e4d153e72ff2b537107a06ebf60"
599+
},
600+
{
601+
"name": "kata-monitor",
602+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:9e297de3d963cb5ebd80a609f848ee716eb1dedb0ee6cc76f523d7fe9005a167"
603+
},
604+
{
605+
"name": "podvm-builder",
606+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:8d23df1699f72afcf5cec8734d6c5d3b92ce432fcb488909e967380c74068a8a"
607+
},
608+
{
609+
"name": "podvm-payload",
610+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:d9b2ac90fd3663310a9160bcb232e1e7039869838d77c3509464b558d56f4142"
611+
},
612+
{
613+
"name": "",
614+
"image": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:4fb018ce03cfaa06b983e801508036352247d3f9fc09981949f85b7e8ab4520b"
615+
}
616+
]
617+
}
459618
{
460619
"schema": "olm.bundle",
461620
"name": "sandboxed-containers-operator.v1.2.2",

fbc/v4.18/catalog-template.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,9 @@ entries:
4747
- name: sandboxed-containers-operator.v1.10.0
4848
replaces: sandboxed-containers-operator.v1.9.0
4949
skipRange: '>=1.1.0 <1.10.0'
50+
- name: sandboxed-containers-operator.v1.10.1
51+
replaces: sandboxed-containers-operator.v1.10.0
52+
skipRange: '>=1.1.0 <1.10.1'
5053
name: stable
5154
package: sandboxed-containers-operator
5255
schema: olm.channel
@@ -88,6 +91,8 @@ entries:
8891
schema: olm.bundle
8992
- image: registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38
9093
schema: olm.bundle
94+
- image: registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:4746bf0f769c9d87a36e392540c80e1861c54edd4738865d31ef589dc04cc5fe
95+
schema: olm.bundle
9196
- schema: olm.deprecations
9297
package: sandboxed-containers-operator
9398
entries:

0 commit comments

Comments
 (0)