manifests/*: comply to restricted pod security level#295
manifests/*: comply to restricted pod security level#295s-urbaniak wants to merge 1 commit intoopenshift:masterfrom
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: s-urbaniak The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
@s-urbaniak Any idea on where I'd be able to get the list of violations for the CVO manifests in this repository. Is there any tooling that helps produce these violations? It would be nice to get some more context before approving this. |
|
@timflannagan the list of violations is not easy to retrieve, however not impossible: You'll need to install an openshift cluster, preserve the bootstrap node, ssh into it and then retrieve the kube-apiserver bootstrap audit log to introspect the failures posted in this PR. The general motivation for this PR can be read up in https://github.com/openshift/enhancements/blob/master/enhancements/authentication/pod-security-admission.md and in @stlaz's email posted to aos-devel. Also feel free to reach out in #forum-apiserver on Slack for OOB questions and clarifications. |
|
/test verify |
|
@timflannagan for any additional workloads we wrote |
|
@timflannagan to complete the picture, for a running cluster you can today must-gather audit logs and introspect potential violations by introspecting the kube-apiserver's audit logs. Just check for annotations with the |
|
@s-urbaniak: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
That e2e-gcp failure looks legitimate? |
| securityContext: | ||
| runAsNonRoot: true | ||
| runAsUser: 65534 | ||
| seccompProfile: | ||
| type: RuntimeDefault |
There was a problem hiding this comment.
Making direct changes to the staging/* directories without attaching metadata as a commit trailer will result in the verify prowjob to unfortunately fail.
We'd either need to introduce this changes to OLM, and cherrypick the upstream commit here to make the verify check happy, or inject these securityContext blocks as downstream-only changes. I think my preference would be to push through the latter right now.
|
@s-urbaniak: PR needs rebase. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/close |
|
@s-urbaniak: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Signed-off-by: Steve Kuznetsov <skuznets@redhat.com> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Signed-off-by: Steve Kuznetsov <skuznets@redhat.com> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Signed-off-by: Steve Kuznetsov <skuznets@redhat.com> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Signed-off-by: Steve Kuznetsov <skuznets@redhat.com> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Signed-off-by: Steve Kuznetsov <skuznets@redhat.com> Upstream-repository: api Upstream-commit: 28c6773d2b746559369035cfa3d211360706a247
Starting from OpenShift 4.11 pod security admission is being activated. In OpenShift the default pod security admission level is going to be
restricted. This PR fixes workloads from this repository. Concretely, the following violations have been detected:/cc @stlaz