|
81 | 81 | "name": "sandboxed-containers-operator.v1.10.0",
|
82 | 82 | "replaces": "sandboxed-containers-operator.v1.9.0",
|
83 | 83 | "skipRange": ">=1.1.0 <1.10.0"
|
| 84 | + }, |
| 85 | + { |
| 86 | + "name": "sandboxed-containers-operator.v1.10.1", |
| 87 | + "replaces": "sandboxed-containers-operator.v1.10.0", |
| 88 | + "skipRange": ">=1.1.0 <1.10.1" |
84 | 89 | }
|
85 | 90 | ]
|
86 | 91 | }
|
|
422 | 427 | }
|
423 | 428 | ],
|
424 | 429 | "relatedImages": [
|
425 |
| - { |
426 |
| - "name": "", |
427 |
| - "image": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38" |
428 |
| - }, |
429 | 430 | {
|
430 | 431 | "name": "caa",
|
431 | 432 | "image": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:6efba887ccaa4bc5a899751d365e2ccb70c45a842c694579972c5947ca65b49e"
|
|
442 | 443 | "name": "kata-monitor",
|
443 | 444 | "image": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:10b51e39b051ba838343a82eae036299c10b135705d2ac5da7782ea068ba4dab"
|
444 | 445 | },
|
| 446 | + { |
| 447 | + "name": "", |
| 448 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38" |
| 449 | + }, |
445 | 450 | {
|
446 | 451 | "name": "podvm-builder",
|
447 | 452 | "image": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:0a14d0562efa52c400174648653e5ed053659566603e3267aa797228222bccdc"
|
|
456 | 461 | }
|
457 | 462 | ]
|
458 | 463 | }
|
| 464 | +{ |
| 465 | + "schema": "olm.bundle", |
| 466 | + "name": "sandboxed-containers-operator.v1.10.1", |
| 467 | + "package": "sandboxed-containers-operator", |
| 468 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:4746bf0f769c9d87a36e392540c80e1861c54edd4738865d31ef589dc04cc5fe", |
| 469 | + "properties": [ |
| 470 | + { |
| 471 | + "type": "olm.gvk", |
| 472 | + "value": { |
| 473 | + "group": "confidentialcontainers.org", |
| 474 | + "kind": "PeerPod", |
| 475 | + "version": "v1alpha1" |
| 476 | + } |
| 477 | + }, |
| 478 | + { |
| 479 | + "type": "olm.gvk", |
| 480 | + "value": { |
| 481 | + "group": "kataconfiguration.openshift.io", |
| 482 | + "kind": "KataConfig", |
| 483 | + "version": "v1" |
| 484 | + } |
| 485 | + }, |
| 486 | + { |
| 487 | + "type": "olm.package", |
| 488 | + "value": { |
| 489 | + "packageName": "sandboxed-containers-operator", |
| 490 | + "version": "1.10.1" |
| 491 | + } |
| 492 | + }, |
| 493 | + { |
| 494 | + "type": "olm.csv.metadata", |
| 495 | + "value": { |
| 496 | + "annotations": { |
| 497 | + "alm-examples": "[\n {\n \"apiVersion\": \"kataconfiguration.openshift.io/v1\",\n \"kind\": \"KataConfig\",\n \"metadata\": {\n \"name\": \"example-kataconfig\"\n }\n }\n]", |
| 498 | + "capabilities": "Seamless Upgrades", |
| 499 | + "createdAt": "2025-08-05T15:10:52Z", |
| 500 | + "features.operators.openshift.io/cnf": "false", |
| 501 | + "features.operators.openshift.io/cni": "false", |
| 502 | + "features.operators.openshift.io/csi": "false", |
| 503 | + "features.operators.openshift.io/disconnected": "true", |
| 504 | + "features.operators.openshift.io/fips-compliant": "false", |
| 505 | + "features.operators.openshift.io/proxy-aware": "false", |
| 506 | + "features.operators.openshift.io/tls-profiles": "false", |
| 507 | + "features.operators.openshift.io/token-auth-aws": "false", |
| 508 | + "features.operators.openshift.io/token-auth-azure": "false", |
| 509 | + "features.operators.openshift.io/token-auth-gcp": "false", |
| 510 | + "olm.skipRange": ">=1.1.0 <1.10.1", |
| 511 | + "operatorframework.io/suggested-namespace": "openshift-sandboxed-containers-operator", |
| 512 | + "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]", |
| 513 | + "operators.operatorframework.io/builder": "operator-sdk-v1.39.1", |
| 514 | + "operators.operatorframework.io/internal-objects": "[\"peerpods.confidentialcontainers.org\",\"peerpodconfigs.confidentialcontainers.org\"]", |
| 515 | + "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4", |
| 516 | + "repository": "https://github.com/openshift/sandboxed-containers-operator" |
| 517 | + }, |
| 518 | + "apiServiceDefinitions": {}, |
| 519 | + "crdDescriptions": { |
| 520 | + "owned": [ |
| 521 | + { |
| 522 | + "name": "kataconfigs.kataconfiguration.openshift.io", |
| 523 | + "version": "v1", |
| 524 | + "kind": "KataConfig", |
| 525 | + "description": "The kataconfig CR represent a installation of Kata in a cluster and its current state." |
| 526 | + }, |
| 527 | + { |
| 528 | + "name": "peerpods.confidentialcontainers.org", |
| 529 | + "version": "v1alpha1", |
| 530 | + "kind": "PeerPod" |
| 531 | + } |
| 532 | + ] |
| 533 | + }, |
| 534 | + "description": "OpenShift sandboxed containers, based on the Kata Containers open source\nproject, provides an Open Container Initiative (OCI) compliant container\nruntime using lightweight virtual machines, running your workloads in their own\nisolated kernel and therefore contributing an additional layer of isolation\nback to OpenShift's Defense-in-Depth strategy. Click [this link](https://catalog.redhat.com/software/operators/detail/5ee0d499fdbe7cddc2c91cf5) for\nmore information.\n\n# Requirements\nYour cluster must be installed on bare metal infrastructure with Red Hat Enterprise Linux CoreOS workers.\n\n# Features & benefits\n- **Isolated Developer Environments & Privileges Scoping**\n As a developer working on debugging an application using state-of-the-art\n tooling you might need elevated privileges such as `CAP_ADMIN` or `CAP_BPF`. With\n OpenShift sandboxed containers, any impact will be limited to a separate\n dedicated kernel.\n\n- **Legacy Containerized Workload Isolation**\n You are mid-way in converting a containerized monolith into cloud-native\n microservices. However, the monolith still runs on your cluster unpatched and\n unmaintained. OpenShift sandboxed containers helps isolate it in its own kernel\n to reduce risk.\n\n- **Safe Multi-tenancy & Resource Sharing (CI/CD Jobs, CNFs, ..)**\n If you are providing a service to multiple tenants, it could mean that the\n service workloads are sharing the same resources (e.g., worker node). By\n deploying in a dedicated kernel, the impact of these workloads have on one\n another is greatly reduced.\n\n- **Additional Isolation with Native Kubernetes User Experience**\n OpenShift sandboxed containers is used as a compliant OCI runtime.\n Therefore, many operational patterns used with normal containers are still\n preserved including but not limited to image scanning, GitOps, Imagestreams,\n and so on.\n\n# How to install\n Read the information about the Operator and click Install.\n\n On the Install Operator page:\n\n - Select `candidate` from the list of available Update Channel options.\n This ensures that you install the latest version of OpenShift sandboxed containers\n that is compatible with your OpenShift Container Platform version.\n\n - For Installed Namespace, ensure that the Operator recommended namespace\n option is selected. This installs the Operator in the mandatory\n `openshift-sandboxed-containers-operator` namespace, which is automatically\n created if it does not exist. Attempting to install the OpenShift\n sandboxed containers Operator in a namespace other than\n `openshift-sandboxed-containers-operator` causes the installation to fail.\n\n - For Approval Strategy, ensure that Automatic, which is the default value,\n is selected. OpenShift sandboxed containers automatically updates when a new\n z-stream release is available.\n\n - Click Install to make the Operator available to the OpenShift sandboxed\n containers namespace.\n\n - The OpenShift sandboxed containers Operator is now installed on your\n cluster. You can trigger the Operator by enabling the runtime on your cluster.\n You can do this by creating a `KataConfig` CustomResourceDefinition(CRD) instance. For this click\n on \"create instance\" on the operator overview page.\n\n# Documentation\nSee the [OpenShift sandboxed containers documentation](https://docs.redhat.com/en/documentation/openshift_sandboxed_containers/).", |
| 535 | + "displayName": "OpenShift sandboxed containers Operator", |
| 536 | + "installModes": [ |
| 537 | + { |
| 538 | + "type": "OwnNamespace", |
| 539 | + "supported": true |
| 540 | + }, |
| 541 | + { |
| 542 | + "type": "SingleNamespace", |
| 543 | + "supported": true |
| 544 | + }, |
| 545 | + { |
| 546 | + "type": "MultiNamespace", |
| 547 | + "supported": false |
| 548 | + }, |
| 549 | + { |
| 550 | + "type": "AllNamespaces", |
| 551 | + "supported": false |
| 552 | + } |
| 553 | + ], |
| 554 | + "keywords": [ |
| 555 | + "sandboxed-containers", |
| 556 | + "kata" |
| 557 | + ], |
| 558 | + "labels": { |
| 559 | + "operatorframework.io/arch.amd64": "supported", |
| 560 | + "operatorframework.io/arch.s390x": "supported", |
| 561 | + "operatorframework.io/os.linux": "supported" |
| 562 | + }, |
| 563 | + "links": [ |
| 564 | + { |
| 565 | + "name": "Sandboxed Containers Operator", |
| 566 | + "url": "https://www.github.com/openshift/sandboxed-containers-operator" |
| 567 | + } |
| 568 | + ], |
| 569 | + "maintainers": [ |
| 570 | + { |
| 571 | + "name": "'Red Hat", |
| 572 | + |
| 573 | + } |
| 574 | + ], |
| 575 | + "maturity": "beta", |
| 576 | + "minKubeVersion": "1.28.0", |
| 577 | + "provider": { |
| 578 | + "name": "Red Hat" |
| 579 | + } |
| 580 | + } |
| 581 | + } |
| 582 | + ], |
| 583 | + "relatedImages": [ |
| 584 | + { |
| 585 | + "name": "", |
| 586 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:4746bf0f769c9d87a36e392540c80e1861c54edd4738865d31ef589dc04cc5fe" |
| 587 | + }, |
| 588 | + { |
| 589 | + "name": "caa", |
| 590 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:d4973b793f3af9d9df3da45417082f77dc991e734ea9cf3d132aaf2d7def9552" |
| 591 | + }, |
| 592 | + { |
| 593 | + "name": "peerpods-webhook", |
| 594 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:ef4a8efcfb74e3e6b68fe3c566b343ac5da0a4d1de203342c46defae60029a81" |
| 595 | + }, |
| 596 | + { |
| 597 | + "name": "podvm-oci", |
| 598 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:3ae0ddf604a57a9f5a16d023e03f9d5060312e4d153e72ff2b537107a06ebf60" |
| 599 | + }, |
| 600 | + { |
| 601 | + "name": "kata-monitor", |
| 602 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:9e297de3d963cb5ebd80a609f848ee716eb1dedb0ee6cc76f523d7fe9005a167" |
| 603 | + }, |
| 604 | + { |
| 605 | + "name": "podvm-builder", |
| 606 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:8d23df1699f72afcf5cec8734d6c5d3b92ce432fcb488909e967380c74068a8a" |
| 607 | + }, |
| 608 | + { |
| 609 | + "name": "podvm-payload", |
| 610 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:d9b2ac90fd3663310a9160bcb232e1e7039869838d77c3509464b558d56f4142" |
| 611 | + }, |
| 612 | + { |
| 613 | + "name": "", |
| 614 | + "image": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:4fb018ce03cfaa06b983e801508036352247d3f9fc09981949f85b7e8ab4520b" |
| 615 | + } |
| 616 | + ] |
| 617 | +} |
459 | 618 | {
|
460 | 619 | "schema": "olm.bundle",
|
461 | 620 | "name": "sandboxed-containers-operator.v1.2.2",
|
|
0 commit comments