-
Notifications
You must be signed in to change notification settings - Fork 2k
Use the "runtime default" seccomp profile #3629
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
e3d2428
to
41795ce
Compare
Codecov Report
📣 This organization is not using Codecov’s GitHub App Integration. We recommend you install it so Codecov can continue to function properly for your repositories. Learn more @@ Coverage Diff @@
## main #3629 +/- ##
==========================================
+ Coverage 52.21% 52.23% +0.02%
==========================================
Files 59 59
Lines 16877 16877
==========================================
+ Hits 8812 8816 +4
+ Misses 7768 7766 -2
+ Partials 297 295 -2 see 1 file with indirect coverage changes 📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more |
62f1e1d
to
23d3df0
Compare
deployments/helm-chart-dos-arbitrator/templates/controller-deployment.yaml
Outdated
Show resolved
Hide resolved
04131cc
to
0ad9840
Compare
0ad9840
to
7213349
Compare
seccomp profiles allow sandboxing processes, in particular to restrict allowed syscalls from applications to the kernel. Kubernetes default in current release is Unconfined seccomp profile, which is essentially privileged. It is preferred for security purposes to restrict this. KEP-2413 proposes that RuntimeDefault will become the new default for Kubernetes. With Kubernetes v1.25, this is in Beta, and available with `SeccompDefault` feature gate and `--seccomp-default` CLI flag. `nginx-ingress` should switch to this new default, in order to ensure compatibility down the line, as well as enable enhanced security on older Kubernetes versions. Co-authored-by: Christian Ihle <blurpy@users.noreply.github.com>
7213349
to
dee411a
Compare
@sigv This looks good. Tested the PR against edge with success! |
Proposed changes
seccomp profiles allow sandboxing processes, in particular to restrict allowed syscalls from applications to the kernel. Kubernetes default in current release is Unconfined seccomp profile, which is essentially privileged. It is preferred for security purposes to restrict this.
KEP-2413 proposes that RuntimeDefault will become the new default for Kubernetes. With Kubernetes v1.25, this is in Beta, and available with
SeccompDefault
feature gate and--seccomp-default
CLI flag.nginx-ingress
should switch to this new default, in order to ensure compatibility down the line, as well as enable enhanced security on older Kubernetes versions.This improves on #3544 as reported by @blurpy.
Checklist
Before creating a PR, run through this checklist and mark each as complete.