-
Notifications
You must be signed in to change notification settings - Fork 226
Non root controller image #262
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/cc @acornett21 |
|
@vijtrip2: GitHub didn't allow me to request PR reviews from the following users: acornett21. Note that only aws-controllers-k8s members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@vijtrip2 I'm not sure OpenShift allows this, I think the deployment/container are a bonded pair and a change in either would require an |
I saw post about bitnami non-root container that runs on open-shift and they are built as default non-root images. I have image for you that you can use to test this locally. Following up offline on slack. |
|
@vijtrip2 It seems in this case the UID that OpenShift generates for the namespace does get propigated all the way to the node -> pod -> container and having |
jaypipes
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice, thanks for the deep dive on this @vijtrip2!
|
/lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: acornett21, jaypipes, vijtrip2 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Description of changes:
Before
nonRootsecurity posture by running container images using random UID and does not allow specifyingrunAsUserfield in deployment spec.nonRootsecurity posture usingSecurityContext'srunAsUserandrunAsNonRootfield, while the container image ran asrootby defaultNow
non-rootUser(1000)runAsUserfield from deployment templates. This change keeps the existing functionality because K8s pod inherit UserId from Image metadata and ACK controller still runs with non-root user(1000) [Tested and Validated]runAsUserunblock OpenShift installation and allows OpenShift to run container using random UserIdrunAsNonRootfield, keeps the validation in place that ACK controller does not run asroot. This validation helps security posture for both OpenShift and helm/kustomize installation.By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.