Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Run container images with readonly filesystem #51

Open
1 of 2 tasks
flavio opened this issue Dec 13, 2021 · 0 comments
Open
1 of 2 tasks

Run container images with readonly filesystem #51

flavio opened this issue Dec 13, 2021 · 0 comments
Labels
good first issue Good for newcomers kind/enhancement New feature or request

Comments

@flavio
Copy link
Member

flavio commented Dec 13, 2021

Running container images with a read-only filesystem is considered a good security practice. I think we can achieve that both for policy-server and for kubewarden-controller.

For policy-server we will need to declare an emptyDir volume to store the policies that are being downloaded.

Acceptance criteria

  • policy-server deployment has a read-only container image
  • kubewarden-controller has a read-only container image
@flavio flavio added kind/enhancement New feature or request good first issue Good for newcomers labels Dec 13, 2021
flavio added a commit to flavio/kubewarden-controller that referenced this issue Jan 20, 2022
Ensure the Policy Server container runs with a readonly root filesystem.
This improves the security of the project.

This partially addresses kubewarden/helm-charts#51

Signed-off-by: Flavio Castelli <[email protected]>
flavio added a commit to flavio/kubewarden-controller that referenced this issue Jan 20, 2022
Ensure the Policy Server container runs with a readonly root filesystem.
This improves the security of the project.

This partially addresses kubewarden/helm-charts#51

Signed-off-by: Flavio Castelli <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
good first issue Good for newcomers kind/enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant