chore: Correct security context to use nonroot
user
#5819
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes #N/A
Description
This change corrects the
runAsUser
andrunAsGroup
to run using thenonroot
user. This was previously mapping to another non-root, random user, but wasn't within the valid set of UIDs on older linux kernels (65535). Additionally, distroless and scratch images use a standard "nonroot" user (65532) by default and give permission to certain filepaths on the image. Karpenter uses thepublic.ecr.aws/eks-distro-build-tooling/eks-distro-minimal-base
image by default, which assigns file permission to user65532
How was this change tested?
Does this change impact docs?
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.