-
Notifications
You must be signed in to change notification settings - Fork 173
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Zarf overwrites namespace labels required when deploying to env with restricted pod security standard #2932
Comments
Hey @Ansible-man just to make sure I understand you are talking specifically about the |
Yes @AustinAbro321 . Please see Because PSA is enforcing the restricted Pod Security Level and Zarf does not apply security context to its deployment like spec:
We have to apply labels to the zarf namespace so the PSA will allow it to run apiVersion: v1 |
I would be more than happy to do testing and put in a PR to apply the proper security context on the zarf-agent if its something you guys want. The root issue is Zarf not complying with the restricted pod security standard. |
@Ansible-man A PR to apply the proper security context on the Zarf agent would be great. I'm relatively certain we can adhere to the restricted level without breaking any functionality. Tests should catch it if so |
@AustinAbro321 Sounds good, I will look into doing this in the next few days. Thanks |
Hey @AustinAbro321 @Ansible-man , have any updates in there ? I have same problem too. |
I have it on my calendar to do this next week.
|
@AustinAbro321 I have the code ready to commit, I can't seem to make a branch or access the slack channel. I read the contributing docs and I see where it says to create a draft PR but I am not able to make the branch for the draft PR. |
@Ansible-man Only members of the org can make a new branch in this repo, you'll have to create a fork |
Tested the above in my rke2 cluster at home with the restricted PSS and all seemed to go well. We only deploy the zarf agent without any other components so I cannot speak to their compliance. |
Hi @Ansible-man , |
Environment
Device and OS: RHEL 9
App version: 0.38.3
Kubernetes distro being used: rke2
Other:
Steps to reproduce
Expected result
Actual Result
Zarf removes the labels and fails to deploy due to non compliance
Visual Proof (screenshots, videos, text, etc)
Severity/Priority
medium
Additional Context
Add any other context or screenshots about the technical debt here.
Instead of requiring users to apply exceptions Zarf should natively comply with the Kubernetes restricted pod security standard. Especially when building it for a government use case.
Please see
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
The text was updated successfully, but these errors were encountered: