-
Story
-
Resolution: Done
-
Major
-
None
-
None
-
2
-
False
-
None
-
False
-
OCPSTRAT-518 - Console: Customer Happiness (RFEs) for 4.15
-
-
-
HAC Infra OCP - Sprint 245
According to security best practice, it's recommended to set readOnlyRootFilesystem: true for all containers running on kubernetes. Given that openshift-console does not set that explicitly, it's requested that this is being evaluated and if possible set to readOnlyRootFilesystem: true or otherwise to readOnlyRootFilesystem: false with a potential explanation why the file-system needs to be write-able.
3. Why does the customer need this? (List the business requirements here)
Extensive security audits are run on OpenShift Container Platform 4 and are highlighting that many vendor specific container is missing to set readOnlyRootFilesystem: true or else justify why readOnlyRootFilesystem: false is set.
AC: Set up readOnlyRootFilesystem field on both console and console-operator deployment's spec. Part of the work is to determine the value. True if the pod if not doing any writing to its filesystem, otherwise false.
- is blocked by
-
OCPBUGS-23991 Downloads pod crashed due to Read-only file system
- Closed
- is related to
-
RFE-4149 [openshift-console] - readOnlyRootFilesystem should be explicitly to true and if required to false for security reason
- Accepted
- links to