feat(must-gather): add new Chart for the RHDH Must-Gather tool [RHIDP-12626]#326
Conversation
PR Reviewer Guide 🔍(Review updated until commit 3751e9e)Here are some key observations to aid the review process:
|
PR Type(Describe updated until commit 0669dbe)Enhancement, Tests, Documentation Description
|
| Relevant files | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Configuration changes | 4 files
| ||||||||||||||
| Documentation | 3 files
| ||||||||||||||
| Tests | 7 files
| ||||||||||||||
| Enhancement | 7 files
|
PR Code Suggestions ✨Explore these optional code suggestions:
|
|||||||||||||||||
799f3ab to
8b06a13
Compare
The Security issues reported by SonarCloud are related to the |
PR Reviewer Guide 🔍Here are some key observations to aid the review process:
|
PR Code Suggestions ✨Explore these optional code suggestions:
|
|||||||||||||||||||
|
/agentic_review |
Code Review by Qodo
1. README uses non-official repo
|
6e01b02 to
22ae5bc
Compare
92338db to
c856e27
Compare
Co-authored-by: rhdh-qodo-merge[bot] <232573409+rhdh-qodo-merge[bot]@users.noreply.github.com>
The previous approach used to create issues with the PVC
automountServiceAccountToken: true mounts credentials into every container in the pod, including the data-holder which only runs "sleep infinity". Replace it with a projected volume carrying a bound (time-limited) service account token, mounted exclusively into the containers that actually call the Kubernetes API. Assisted-by: Cursor Made-with: Cursor
…ion is enabled This is needed because 'helm list' uses a Secret storage backend by default, so it is needed to identify such Helm releases
…lt values enforced in values.yaml and the JSON schema file
Kubernetes requires the installing user to already hold any permission they grant via a Role or ClusterRole. When deploying with namespace- scoped RBAC on a cluster where CRDs like backstages or sonataflows are not installed, the role creation fails because those permissions cannot be escalated. Rather than a single opaque toggle, expose per-API-group booleans under rbac.rules so users can precisely disable only the rules they cannot grant, while keeping the corresponding gather.with* collection flags enabled — the gather script already handles missing permissions gracefully at runtime. Also removes a duplicate config.openshift.io/clusterversions rule from the ClusterRole template. Assisted-by: Cursor Made-with: Cursor
58ebf1a to
0175764
Compare
…-helm-chart-for-rhdh-must-gather-for-easier-consumption-against-supported-non-ocp-platforms
|


Description of the change
This is to allow for easier consumption against supported non-OCP platforms, as we are preparing the tool for TP.
Which issue(s) does this PR fix or relate to
How to test changes / Special notes to the reviewer
Just deploy this chart using helm:
Checklist
Chart.yamlaccording to Semantic Versioning.values.yamland added to the corresponding README.md. The pre-commit utility can be used to generate the necessary content. Runpre-commit run --all-filesto run the hooks and then push any resulting changes. The pre-commit Workflow will enforce this and warn you if needed.pre-commithook.ct lintcommand.