-
Notifications
You must be signed in to change notification settings - Fork 242
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PodSecurity Admission #6339
Comments
Grooming (2023-01-19)
=> TODO for Sprint 231 (3 days): More research with concrete examples |
On IBM Cloud, PodSecurity feature gate is active on Kubernetes clusters >= 1.25 (ref: https://cloud.ibm.com/docs/containers?topic=containers-service-settings#feature-gates) |
Do you know if anything is set to |
Do we want to mutate the Pod before or after pod/container-overrides? for example, if the user sets |
The use of |
On IBM Cloud:
So, no |
before, users should have the ability to override it in devfile. |
@valaparthvi Why was this moved to done? |
IIRC, the work on the issue for that particular sprint was done, so it was marked as Done. We should be able to set it back to To Do once we move it to a new sprint. |
As discussed during the devfile cabal, this feature can be implemented in the devfile library, passing the policy we want to enforce when calling |
I realize that it won't be easy to patch the pod for security admission before container-overrides, without changing the way the container-overrides are handled for the moment. As a matter of fact, the containers are overridden when Pod Security Admission rules are defined for pods, not at the container level, and so they don't really make sense at the time of calling |
/status blocked Marking this as waiting for devfile/library#167 |
@rm3l: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/kind user-story
User Story
As an odo user, I want to be able to run my application with standard Devfile even if the cluster that I'm using enforces security policies using PodSecurity Admission controller.
Acceptance Criteria
Details:
enforce
policy. Other policiesaudit
andwarn
should not effect the ability to run the container that doesn't meet the set policies.pod-security.kubernetes.io/enforce
labelpod-security.kubernetes.io/enforce
is set../enforce-version
label that indicates what version is being used. If not set odo should assume the latest version it knows.https://kubernetes.io/docs/concepts/security/pod-security-admission/
https://kubernetes.io/docs/concepts/security/pod-security-standards/
/kind user-story
The text was updated successfully, but these errors were encountered: