Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: remove SeccompProfile #164

Merged
merged 1 commit into from
Jun 17, 2022
Merged

Conversation

simonpasquier
Copy link
Contributor

@simonpasquier simonpasquier commented Jun 16, 2022

It seems that built-in SCCs (except privileged) don't allow to set the
seccomp profile [1]. Until this is fixed in OpenShift, we should leave
it to the default (which is already RuntimeDefault).

[1] openshift/cluster-kube-apiserver-operator#1325

Fixes #163

@simonpasquier simonpasquier marked this pull request as ready for review June 16, 2022 14:48
@simonpasquier simonpasquier requested a review from a team as a code owner June 16, 2022 14:48
It seems that built-in SCCs (except `privileged`) don't allow to set the
seccomp profile [1]. Until this is fixed in OpenShift, we shouldn't try
to set `seccompProfile` (the container runtime should already use
`RuntimeDefault`).

[1] openshift/cluster-kube-apiserver-operator#1325

Signed-off-by: Simon Pasquier <[email protected]>
Copy link
Contributor

@JoaoBraveCoding JoaoBraveCoding left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! However I'll open an issue to track we comply with pod security admission on 4.12

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

SecurityContexts in MSO
2 participants