-
Bug
-
Resolution: Obsolete
-
Undefined
-
None
-
4.13, 4.12, 4.14
-
Quality / Stability / Reliability
-
False
-
-
None
-
Important
-
No
-
None
-
Rejected
-
Hypershift Sprint 241
-
1
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Description of problem:
Currently hypershift sets the pod security admission level of control plane namespaces as `privileged`. The reason for this is that the router we create in that namespace needs privilege escalation. However, this is achievable with a policy of `baseline`.
Version-Release number of selected component (if applicable):
all
How reproducible:
always
Steps to Reproduce:
1. Create a hosted cluster 2. Inspect labels of hosted control plane namespace 3.
Actual results:
pod-security.kubernetes.io/enforce is set to 'privileged'
Expected results:
pod-security.kubernetes.io/enforce is set to 'baseline'
Additional info: