-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: secure-pod-defaults is enabled by default #14168
Conversation
f5e91db
to
c8063c3
Compare
e680a43
to
faa0f31
Compare
18474ca
to
bc94f59
Compare
a65102f
to
590813d
Compare
Hello @psschwei, I'm working on updating the tests to account for enabling the flag Just to recap (and to confirm my own understanding), setting Anyways, I do see a bit of a conflict between these two flags. Perhaps the flag to set PodSpecSecurityContext is now redundant or when SecurePodDefault is enabled it enables PodSpecSecurityContext by default? I would like to heart your thoughts. |
I think you're right
I think the latter option (SecurePodDefault enabled also enables PodSpecSecurityContext) makes sense for now. There might be some scenario where someone doesn't want to use our secure defaults or enable the pod security context, so it may make sense to leave in the PodSpecSecurityContext flag, at least for the time being. cc @evankanderson who also had thoughts on this iirc |
I'm wondering what should be the timeline for making Currently, |
I think you'd need to do that for this PR, but I'd keep both flags (so that a user could toggle them both off if they so desired). |
We shouldn't do this.
Enabling |
If #14363 means secure pod defaults is broken when enabled then we should fix it (and I'll cherry-pick it) I think the scope of this PR should just remain to flipping secure pod defaults from off to on |
590813d
to
58c5e7e
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: kauana The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #14168 +/- ##
==========================================
+ Coverage 86.11% 86.12% +0.01%
==========================================
Files 196 196
Lines 14880 14880
==========================================
+ Hits 12814 12816 +2
+ Misses 1758 1754 -4
- Partials 308 310 +2 ☔ View full report in Codecov by Sentry. |
bae5bb4
to
97d080d
Compare
3b76307
to
76f9f52
Compare
/retest |
- Secure pod default off and podspec security context off ..can't set special securitycontext properties - Secure pod default off and podspec security context on...can change allowed securitycontext to anything, e.g. runAsNonRoot: false - Secure pod default on and podspec security context off...must use restricted profile security properties
76f9f52
to
8b51a60
Compare
/retest |
8239a07
to
a3204f1
Compare
@kauana: The following test failed, say
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
/hold see: #14029 (comment) |
This Pull Request is stale because it has been open for 90 days with |
Fixes #14029
Proposed Changes
secure-pod-defaults
is now enabled by default on the config-features ConfigMap