-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Add security context to helm chart #39205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add security context to helm chart #39205
Conversation
Interesting! It seems reasonable, but this is definitely a deep-in-the-machine change. I'm tagging @cilium/sig-datapath for review, since they know the kernel implications of the RuntimeDefault seccomp profile better than I. |
Also, FYI, you need one more automatic update -- see the failed CI job for details. |
18aa7b9
to
1d8919f
Compare
As far as I understand the "GitHub Workflow Related Checks" issue is fixed by #39398 . |
09d9fcd
to
47d63d0
Compare
/test |
I clicked the "Update with rebase" button and triggered the tests. Let's see the results. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM as long as we're confident that the CI covers the RuntimeDefault seccomp profile enough to make it the default.
/test |
…ners Signed-off-by: Aurelien Benoist <aurelien.larcin@gmail.com>
Head branch was pushed to by a user without write access
47d63d0
to
3ef67c8
Compare
I Just rebased to see if that fixes the test ci |
@Sindvero were you able to triage the results? I'd like to make sure if possible we are looking at the results to see whether there are existing issues filed for them or if they are new to this PR. Otherwise we can end up trapped in a cycle of rebase/retrigger. |
/test |
I didn't check the test. |
Looks like it passed the tests it wasn't passing previously. Thanks |
My biggest concern is that the default containerd seccomp profile somehow blocks a syscall we rely on. I ultimately think this is unlikely; it is configured to reject disallowed syscalls with a non-zero errno. Unless there is some seriously yolo code in Cilium, we should be noticing if a given syscall fails. So this is probably safe to merge, especially since it would have lots of time to "soak" in CI. |
We had a discussion about this during the Cilium community meeting. Some notes:
|
/ci-gke versions=all channel=stable |
/ci-gke versions=all |
/ci-gke channel=extended |
/ci-gke versions=all channel=extended |
Add security context previously empty, to follow best security practice, for the following components:
The components have been running with the updated security contexts for 1+ year now without any issues and with OPA safeguard, in 100+ clusters.
Users can still disable those security contexts if wanted, but by default, I think it should be as contained as possible.