-
Notifications
You must be signed in to change notification settings - Fork 550
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
⚠️ Enforce PSA for restricted instead of baseline #3526
base: master
Are you sure you want to change the base?
⚠️ Enforce PSA for restricted instead of baseline #3526
Conversation
For the last two years, we've defaulted to baseline enforcement. At this point, I expect everyone to use catalog binaries that can handle restricted enforcement
d4a546c
to
0907b88
Compare
Hi @ @kevinrizza @perdasilva The follow up requested :-) |
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we confirm that we're okay with moving to restricted
?
I'm concerned we'll take these changes downstream, and then hit the same issue we were facing 2 years ago and be forced to revert (and potentially back port)
Looks like we might be facing an issue upstream too:
Could be a flake too. |
I updated this test: #3526 (comment) probably we need to remove or I did something wrong. But I agree we need to check this one properly.. we cannot only update. Thank you for call it out :-) |
Right, it looks like the test is possibly actually telling us we're not ready to move to |
For the last two years, we've defaulted to baseline enforcement. At this point, I expect everyone to use catalog binaries that can handle restricted enforcement.
Motivated by: #3524 (comment)