-
Story
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
None
-
Strategic Product Work
-
8
-
False
-
None
-
False
-
OCPSTRAT-487 - Pod Security Admission Integration - Restricted Enforcement
-
-
-
Auth - Sprint 249, Auth - Sprint 250
When creating a custom SCC, it is possible to assign a priority that is higher than existing SCCs. This means that any SA with access to all SCCs might use the higher priority custom SCC, and this might mutate a workload in an unexpected/unintended way.
To protect platform workloads from such an effect (which, combined with PSa, might result in rejecting the workload once we start enforcing the "restricted" profile) we must pin the required SCC to all workloads in platform namespaces (openshift-, kube-, default).
Each workload should pin the SCC with the least-privilege, except workloads in runlevel 0 namespaces that should pin the "privileged" SCC (SCC admission is not enabled on these namespaces, but we should pin an SCC for tracking purposes).
The following tables track progress.
Progress summary
# namespaces | 4.18 | 4.17 | 4.16 | 4.15 |
---|---|---|---|---|
monitored | 82 | 82 | 82 | 82 |
fix needed | 69 | 69 | 69 | 69 |
fixed | 34 | 30 | 30 | 39 |
remaining | 35 | 39 | 39 | 30 |
~ remaining non-runlevel | 15 | 19 | 19 | 10 |
~ remaining runlevel (low-prio) | 20 | 20 | 20 | 20 |
~ untested | 2 | 2 | 2 | 82 |
Progress breakdown
# | namespace | 4.18 | 4.17 | 4.16 | 4.15 |
---|---|---|---|---|---|
1 | oc debug node pods | #1763 | #1816 | #1818 | |
2 | openshift-apiserver-operator | #573 | #581 | ||
3 | openshift-authentication | #656 | #675 | ||
4 | openshift-authentication-operator | #656 | #675 | ||
5 | openshift-catalogd | #50 | #58 | ||
6 | openshift-cloud-credential-operator | #681 | #736 | ||
7 | openshift-cloud-network-config-controller | #2282 | #2490 | #2496 | |
8 | openshift-cluster-csi-drivers | #170 #459 | #484 | ||
9 | openshift-cluster-node-tuning-operator | #968 | #1117 | ||
10 | openshift-cluster-olm-operator | #54 | n/a | ||
11 | openshift-cluster-samples-operator | #535 | #548 | ||
12 | openshift-cluster-storage-operator | #459 #196 | #484 #211 | ||
13 | openshift-cluster-version | #1038 | #1068 | ||
14 | openshift-config-operator | #410 | #420 | ||
15 | openshift-console | #871 | #908 | #924 | |
16 | openshift-console-operator | #871 | #908 | #924 | |
17 | openshift-controller-manager | #336 | #361 | ||
18 | openshift-controller-manager-operator | #336 | #361 | ||
19 | openshift-e2e-loki | #56579 | #56579 | #56579 | #56579 |
20 | openshift-image-registry | #1008 | #1067 | ||
21 | openshift-infra | ||||
22 | openshift-ingress | #1031 | |||
23 | openshift-ingress-canary | #1031 | |||
24 | openshift-ingress-operator | #1031 | |||
25 | openshift-insights | #915 | #967 | ||
26 | openshift-kni-infra | #4504 | #4542 | #4539 | #4540 |
27 | openshift-kube-storage-version-migrator | #107 | #112 | ||
28 | openshift-kube-storage-version-migrator-operator | #107 | #112 | ||
29 | openshift-machine-api | #407 | #315 #282 #1220 #73 #50 #433 | #332 #326 #1288 #81 #57 #443 | |
30 | openshift-machine-config-operator | #4219 | #4384 | #4393 | |
31 | openshift-manila-csi-driver | #234 | #235 | #236 | |
32 | openshift-marketplace | #561 | #570 | ||
33 | openshift-metallb-system | #238 | #240 | #241 | |
34 | openshift-monitoring | #2335 | #2420 | ||
35 | openshift-network-console | ||||
36 | openshift-network-diagnostics | #2282 | #2490 | #2496 | |
37 | openshift-network-node-identity | #2282 | #2490 | #2496 | |
38 | openshift-nutanix-infra | #4504 | #4504 | #4539 | #4540 |
39 | openshift-oauth-apiserver | #656 | #675 | ||
40 | openshift-openstack-infra | #4504 | #4504 | #4539 | #4540 |
41 | openshift-operator-controller | #100 | #120 | ||
42 | openshift-operator-lifecycle-manager | #703 | #828 | ||
43 | openshift-route-controller-manager | #336 | #361 | ||
44 | openshift-service-ca | #235 | #243 | ||
45 | openshift-service-ca-operator | #235 | #243 | ||
46 | openshift-sriov-network-operator | #754 #995 | #999 | #1003 | |
47 | openshift-storage | ||||
48 | openshift-user-workload-monitoring | #2335 | #2420 | ||
49 | openshift-vsphere-infra | #4504 | #4542 | #4539 | #4540 |
50 | (runlevel) kube-system | ||||
51 | (runlevel) openshift-cloud-controller-manager | ||||
52 | (runlevel) openshift-cloud-controller-manager-operator | ||||
53 | (runlevel) openshift-cluster-api | ||||
54 | (runlevel) openshift-cluster-machine-approver | ||||
55 | (runlevel) openshift-dns | ||||
56 | (runlevel) openshift-dns-operator | ||||
57 | (runlevel) openshift-etcd | ||||
58 | (runlevel) openshift-etcd-operator | ||||
59 | (runlevel) openshift-kube-apiserver | ||||
60 | (runlevel) openshift-kube-apiserver-operator | ||||
61 | (runlevel) openshift-kube-controller-manager | ||||
62 | (runlevel) openshift-kube-controller-manager-operator | ||||
63 | (runlevel) openshift-kube-proxy | ||||
64 | (runlevel) openshift-kube-scheduler | ||||
65 | (runlevel) openshift-kube-scheduler-operator | ||||
66 | (runlevel) openshift-multus | ||||
67 | (runlevel) openshift-network-operator | ||||
68 | (runlevel) openshift-ovn-kubernetes | ||||
69 | (runlevel) openshift-sdn |
- relates to
-
OCPBUGS-20192 openshift.io/scc: restricted-readonly when setting up router sharding
- Closed
- links to