-
Notifications
You must be signed in to change notification settings - Fork 71
manifests/*: comply to restricted pod security level #295
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: s-urbaniak The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@s-urbaniak Any idea on where I'd be able to get the list of violations for the CVO manifests in this repository. Is there any tooling that helps produce these violations? It would be nice to get some more context before approving this. |
@timflannagan the list of violations is not easy to retrieve, however not impossible: You'll need to install an openshift cluster, preserve the bootstrap node, ssh into it and then retrieve the kube-apiserver bootstrap audit log to introspect the failures posted in this PR. The general motivation for this PR can be read up in https://github.com/openshift/enhancements/blob/master/enhancements/authentication/pod-security-admission.md and in @stlaz's email posted to aos-devel. Also feel free to reach out in #forum-apiserver on Slack for OOB questions and clarifications. |
/test verify |
@timflannagan for any additional workloads we wrote |
@timflannagan to complete the picture, for a running cluster you can today must-gather audit logs and introspect potential violations by introspecting the kube-apiserver's audit logs. Just check for annotations with the |
@s-urbaniak: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
That e2e-gcp failure looks legitimate? |
securityContext: | ||
runAsNonRoot: true | ||
runAsUser: 65534 | ||
seccompProfile: | ||
type: RuntimeDefault |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Making direct changes to the staging/* directories without attaching metadata as a commit trailer will result in the verify prowjob to unfortunately fail.
We'd either need to introduce this changes to OLM, and cherrypick the upstream commit here to make the verify check happy, or inject these securityContext blocks as downstream-only changes. I think my preference would be to push through the latter right now.
@s-urbaniak: PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/close |
@s-urbaniak: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Signed-off-by: Steve Kuznetsov <[email protected]> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Signed-off-by: Steve Kuznetsov <[email protected]> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Signed-off-by: Steve Kuznetsov <[email protected]> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Signed-off-by: Steve Kuznetsov <[email protected]> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Signed-off-by: Steve Kuznetsov <[email protected]> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Starting from OpenShift 4.11 pod security admission is being activated. In OpenShift the default pod security admission level is going to be
restricted
. This PR fixes workloads from this repository. Concretely, the following violations have been detected:/cc @stlaz