-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Remove binaries from argoexec image. Fixes #7486 #8292
Conversation
Signed-off-by: Alex Collins <alex_collins@intuit.com>
Signed-off-by: Alex Collins <alex_collins@intuit.com>
Thanks let me know when ready for review. |
This PR should have a tough review. |
Signed-off-by: Alex Collins <alex_collins@intuit.com>
Signed-off-by: Alex Collins <alex_collins@intuit.com>
Signed-off-by: Alex Collins <alex_collins@intuit.com>
Signed-off-by: Alex Collins <alex_collins@intuit.com>
Signed-off-by: Alex Collins <alex_collins@intuit.com>
Signed-off-by: Alex Collins <alex_collins@intuit.com>
Signed-off-by: Alex Collins <alex_collins@intuit.com>
changes made - ready for review again |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
The removal of the
|
Signed-off-by: Alex Collins alex_collins@intuit.com
Fixes #8291
Fixes #7800
Fixes #7798
Fixes #7796
Fixes #7486
argoexec
still runs as root with read-write FS, but is much lower risk.This PR obviates the following:
Closes #7253
Closes #7799
Closes #7983
Closes #7797
Why? The big security issue with both alpine and debian base images is that, when compromised by an attacker:
Using distroless/scratch only things pre-installed can be run:
argoexec
,jq
andkubectl
. Naturally,kubectl
is still an bad escalation if the pod is over-permissioned.Next steps:
wait
container as non-root #6895