Uploaded image for project: 'OpenShift Virtualization'
  1. OpenShift Virtualization
  2. CNV-21783

[2133543] [pod security violation audit] Audit violation in "kube-rbac-proxy" container should be fixed

    XMLWordPrintable

Details

    • CNV-net-QE-230
    • Medium

    Description

      Description of problem:
      -----------------------
      Test run[1] that looks for 'pod security violation entries' in audit logs,against 4.11.1-20, found few audit violation.

      [1] - https://main-jenkins-csb-cnvqe.apps.ocp-c1.prod.psi.redhat.com/view/cnv-tests%20runner/job/cnv-tests-runner/4297/consoleFull.

      This bug is to fix violation in 'kube-rbac-proxy' container.

      <snip>
      'pod-security.kubernetes.io/audit-violations': 'would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (containers "manager", "kube-rbac-proxy" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (containers "manager", "kube-rbac-proxy" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or containers "manager", "kube-rbac-proxy" must set securityContext.runAsNonRoot=true), seccompProfile (pod or containers "manager", "kube-rbac-proxy" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost")'}}
      </snip>

      Version-Release number of selected component (if applicable):
      -------------------------------------------------------------
      4.11.1-20

      How reproducible:
      -----------------
      Always

      Expected results:
      -----------------
      No audit-violation to be found

      Attachments

        Activity

          People

            phoracek@redhat.com Petr Horacek
            sasundar@redhat.com Satheesaran Sundaramoorthi
            Satyajit Bulage Satyajit Bulage (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: