-
Bug
-
Resolution: Done
-
Major
-
None
-
4.13, 4.12, 4.14
-
None
-
Important
-
No
-
Hypershift Sprint 235
-
1
-
Proposed
-
False
-
-
N/A
-
Bug Fix
-
Done
This is a clone of issue OCPBUGS-10807. The following is the description of the original issue:
—
Description of problem:
Cluster Network Operator managed component multus-admission-controller does not conform to Hypershift control plane expectations. When CNO is managed by Hypershift, multus-admission-controller and other CNO-managed deployments should run with non-root security context. If Hypershift runs control plane on kubernetes (as opposed to Openshift) management cluster, it adds pod security context to its managed deployments, including CNO, with runAsUser element inside. In such a case CNO should do the same, set security context for its managed deployments, like multus-admission-controller, to meet Hypershift security rules.
Version-Release number of selected component (if applicable):
How reproducible:
Always
Steps to Reproduce:
1.Create OCP cluster using Hypershift using Kube management cluster 2.Check pod security context of multus-admission-controller
Actual results:
no pod security context is set on multus-admission-controller
Expected results:
pod security context is set with runAsUser: xxxx
Additional info:
Corresponding CNO change
- blocks
-
OCPBUGS-11544 multus-admission-controller should not run as root under Hypershift-managed CNO
- Closed
- clones
-
OCPBUGS-10807 multus-admission-controller should not run as root under Hypershift-managed CNO
- Closed
- is blocked by
-
OCPBUGS-10807 multus-admission-controller should not run as root under Hypershift-managed CNO
- Closed
- links to