-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Forbid container privilege escalations for ETCD Druid component containers #1038
base: master
Are you sure you want to change the base?
Forbid container privilege escalations for ETCD Druid component containers #1038
Conversation
Skipping CI for Draft Pull Request. |
64a3aa3
to
566038c
Compare
@georgibaltiev, thanks for making the change to set the |
1e5eca0
to
66c2e63
Compare
/test pull-etcd-druid-e2e-kind |
/test pull-etcd-druid-integration |
/retest-required |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sorry for the slow review @georgibaltiev!
RunAsGroup: ptr.To[int64](0), | ||
RunAsNonRoot: ptr.To(false), | ||
RunAsUser: ptr.To[int64](0), | ||
AllowPrivilegeEscalation: ptr.To(false), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: this container is already running as root (is deployed only during tests), don't think setting this flag here would do anything. can this just be removed? please correct me if I'm wrong
AllowPrivilegeEscalation: ptr.To(false), |
RunAsGroup: ptr.To[int64](0), | ||
RunAsNonRoot: ptr.To(false), | ||
RunAsUser: ptr.To[int64](0), | ||
AllowPrivilegeEscalation: ptr.To(false), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AllowPrivilegeEscalation: ptr.To(false), |
How to categorize this PR?
/area security
/area compliance
/kind enhancement
What this PR does / why we need it:
This PR sets
securityContext.allowPrivilegeEscalation
to false for everySeed
andGarden
cluster component container, which does not havesecurityContext.Privileged
set totrue
or one ofCAP_SYS_ADMIN/SYS_ADMIN
capabilities added.**Which issue(s) this PR
Part of gardener/gardener#11139
Special notes for your reviewer:
cc @AleksandarSavchev @ialidzhikov
Release note: