-
Notifications
You must be signed in to change notification settings - Fork 334
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow customization of (& provide sensible defaults for) securityContext across each component #3989
Comments
You might be able to bring some light here. What's the point of overriding the security context? Isn't it in the depending on what runs in the pod? |
@johnharris85 waiting on you to get a bit info about this. |
So, depends on the components, but generally sure, overriding makes less sense if they are set correctly by us (although there are valid use cases like debugging where a user might want to allow higher privilege for other tools / etc...). So best case scenario is that we set the least privilege necessary for all our different pods / containers. Interim 'good' case scenario is that we allow users to customize them to it themselves in the case of special requirements.
Right now we don't set or allow these to be set by the user. Leads to issues with security admission controllers rejecting the deployments because they're out of policy, and / or users 'guessing' at what correct configuration should be and having to work around the helm chart causing either broken deployments (too restrictive) or insecure deployments (too permissive). |
@johnharris85 I believe this was done in #4153 and #3925 covers the remaining gap of customizing the sidecar container notably for security context. |
The only piece that (may?) be missing is our recommended defaults. I see that there are values commented out in the Helm chart additions in #4153 but not sure if we've validated they are actually the least-privilege defaults that still allow a working configuration? |
This issue was inactive for 30 days it will be reviewed in the next triage meeting and might be closed. |
Tracking recommended defaults in: #4298 |
Automatically closing the issue due to having one of the "closed state label". |
Description
There is another issue (#3925) tracking customization of the sidecar, but we should also provide sensible defaults (and the ability to override) for the other components, cp, webhook deletion jobs, etc...
The text was updated successfully, but these errors were encountered: