Skip to content

Commit f428055

Browse files
authored
Merge branch '1Password:main' into feat/add-empty-value-field
2 parents 5733c70 + fe930fe commit f428055

File tree

5 files changed

+20
-9
lines changed

5 files changed

+20
-9
lines changed

config/connect/deployment.yaml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ spec:
1212
app: onepassword-connect
1313
version: "1.0.0"
1414
spec:
15+
securityContext:
16+
runAsNonRoot: true
1517
volumes:
1618
- name: shared-data
1719
emptyDir: {}
@@ -32,6 +34,8 @@ spec:
3234
containers:
3335
- name: connect-api
3436
image: 1password/connect-api:latest
37+
securityContext:
38+
allowPrivilegeEscalation: false
3539
resources:
3640
limits:
3741
memory: "128Mi"
@@ -49,6 +53,8 @@ spec:
4953
name: shared-data
5054
- name: connect-sync
5155
image: 1password/connect-sync:latest
56+
securityContext:
57+
allowPrivilegeEscalation: false
5258
resources:
5359
limits:
5460
memory: "128Mi"

config/default/manager_auth_proxy_patch.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ metadata:
88
spec:
99
template:
1010
spec:
11+
securityContext:
12+
runAsNonRoot: true
1113
containers:
1214
- name: kube-rbac-proxy
1315
securityContext:

config/default/manager_config_patch.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ metadata:
66
spec:
77
template:
88
spec:
9+
securityContext:
10+
runAsNonRoot: true
911
containers:
1012
- name: manager
1113
args:

controllers/deployment_controller.go

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -95,12 +95,12 @@ func (r *DeploymentReconciler) Reconcile(ctx context.Context, req ctrl.Request)
9595
// This is so we can handle cleanup of associated secrets properly
9696
if !utils.ContainsString(deployment.ObjectMeta.Finalizers, finalizer) {
9797
deployment.ObjectMeta.Finalizers = append(deployment.ObjectMeta.Finalizers, finalizer)
98-
if err := r.Update(context.Background(), deployment); err != nil {
98+
if err = r.Update(context.Background(), deployment); err != nil {
9999
return reconcile.Result{}, err
100100
}
101101
}
102102
// Handles creation or updating secrets for deployment if needed
103-
if err := r.handleApplyingDeployment(deployment, deployment.Namespace, annotations, req); err != nil {
103+
if err = r.handleApplyingDeployment(deployment, deployment.Namespace, annotations, req); err != nil {
104104
return ctrl.Result{}, err
105105
}
106106
return ctrl.Result{}, nil
@@ -110,10 +110,12 @@ func (r *DeploymentReconciler) Reconcile(ctx context.Context, req ctrl.Request)
110110
if utils.ContainsString(deployment.ObjectMeta.Finalizers, finalizer) {
111111

112112
secretName := annotations[op.NameAnnotation]
113-
r.cleanupKubernetesSecretForDeployment(secretName, deployment)
113+
if err = r.cleanupKubernetesSecretForDeployment(secretName, deployment); err != nil {
114+
return ctrl.Result{}, err
115+
}
114116

115117
// Remove the finalizer from the deployment so deletion of deployment can be completed
116-
if err := r.removeOnePasswordFinalizerFromDeployment(deployment); err != nil {
118+
if err = r.removeOnePasswordFinalizerFromDeployment(deployment); err != nil {
117119
return reconcile.Result{}, err
118120
}
119121
}
@@ -144,7 +146,7 @@ func (r *DeploymentReconciler) cleanupKubernetesSecretForDeployment(secretName s
144146

145147
// Only delete the associated kubernetes secret if it is not being used by other deployments
146148
if !multipleDeploymentsUsingSecret {
147-
if err := r.Delete(context.Background(), kubernetesSecret); err != nil {
149+
if err = r.Delete(context.Background(), kubernetesSecret); err != nil {
148150
if !errors.IsNotFound(err) {
149151
return err
150152
}

controllers/onepassworditem_controller.go

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -95,13 +95,13 @@ func (r *OnePasswordItemReconciler) Reconcile(ctx context.Context, req ctrl.Requ
9595
// This is so we can handle cleanup of associated secrets properly
9696
if !utils.ContainsString(onepassworditem.ObjectMeta.Finalizers, finalizer) {
9797
onepassworditem.ObjectMeta.Finalizers = append(onepassworditem.ObjectMeta.Finalizers, finalizer)
98-
if err := r.Update(context.Background(), onepassworditem); err != nil {
98+
if err = r.Update(context.Background(), onepassworditem); err != nil {
9999
return ctrl.Result{}, err
100100
}
101101
}
102102

103103
// Handles creation or updating secrets for deployment if needed
104-
err := r.handleOnePasswordItem(onepassworditem, req)
104+
err = r.handleOnePasswordItem(onepassworditem, req)
105105
if updateStatusErr := r.updateStatus(onepassworditem, err); updateStatusErr != nil {
106106
return ctrl.Result{}, fmt.Errorf("cannot update status: %s", updateStatusErr)
107107
}
@@ -116,7 +116,7 @@ func (r *OnePasswordItemReconciler) Reconcile(ctx context.Context, req ctrl.Requ
116116
}
117117

118118
// Remove finalizer now that cleanup is complete
119-
if err := r.removeFinalizer(onepassworditem); err != nil {
119+
if err = r.removeFinalizer(onepassworditem); err != nil {
120120
return ctrl.Result{}, err
121121
}
122122
}
@@ -143,7 +143,6 @@ func (r *OnePasswordItemReconciler) cleanupKubernetesSecret(onePasswordItem *one
143143
kubernetesSecret.ObjectMeta.Name = onePasswordItem.Name
144144
kubernetesSecret.ObjectMeta.Namespace = onePasswordItem.Namespace
145145

146-
r.Delete(context.Background(), kubernetesSecret)
147146
if err := r.Delete(context.Background(), kubernetesSecret); err != nil {
148147
if !errors.IsNotFound(err) {
149148
return err

0 commit comments

Comments
 (0)