-
Notifications
You must be signed in to change notification settings - Fork 527
Change some of the Gardener components' base images to distroless #6159
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change some of the Gardener components' base images to distroless #6159
Conversation
/lgtm |
Thanks, nice PR!
I think we still need if even with reversed VPN only.
Why did you decide to not adopt the same "fix" as in https://github.com/kubernetes/kubernetes/blob/f33ca2306548719e5116b53fccfc278bffb809a8/build/server-image/kube-apiserver/Dockerfile#L24? |
Is there any hard requirement the gardener-apiserver to run on port 443? If not, the less privileges are assigned to the binary, the better the security is. |
Yes, it is an alternative. In order to use the fix some code looking like this should be introduced in the Dockerfiles that are building the
In the end my thinking was that we should not give any escalated permissions if we do not have a hard requirement to start this process on port lower than 1024. |
I hope not, I cannot think of anything like it (and passing e2e tests are already a good indicator that it should be fine), but I cannot be 100% sure. 👀 OK, let's proceed then as suggested for now :) Thanks! /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: rfranzke The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
I can follow up with a PR that will enable the configuration of this port in case this causes some troubles to someone. And if any hard requirements occur later on to run this service on port |
Thanks @dimityrmirchev ❤️ |
/test pull-gardener-e2e-kind |
1 similar comment
/test pull-gardener-e2e-kind |
How to categorize this PR?
/area open-source security
/kind enhancement
What this PR does / why we need it:
This PR changes the base image to some of the Gardener's components from alpine to distroless. It changes the default user that is executing the binaries from root to a nonroot user. This will help reduce the attack surface of the images.
Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
tzdata
is preinstalled in the distroless base image.openvpn
binary. I am not sure if this will still be needed when we deprecate the non reversed VPN.Release note: