-
Bug
-
Resolution: Done-Errata
-
Critical
-
4.19
-
Quality / Stability / Reliability
-
False
-
-
None
-
Critical
-
Yes
-
None
-
Approved
-
None
-
In Progress
-
Release Note Not Required
-
None
-
None
-
None
-
None
-
None
Description of problem:
PSA is enabled in 4.19
Version-Release number of selected component (if applicable):
4.19.0-rc
How reproducible:
Always
Steps to Reproduce:
1. Create a namespace
2. pod-security.kubernetes.io/enforce is being set
and
1. Run: oc -n openshift-kube-apiserver get cm config -ojson | jq .data | rg config | awk '{ print $2 }' | sed 's/\\//g' | sed 's/"$//g' | sed 's/^"//g' | jq '.admission.pluginConfig.PodSecurity.configuration.defaults'
Actual results:
pod-security.kubernetes.io/enforce is being set
and
{
"audit": "restricted",
"audit-version": "latest",
"enforce": "restricted",
"enforce-version": "latest",
"warn": "restricted",
"warn-version": "latest"
}
Expected results:
pod-security.kubernetes.io/enforce should not be set
or
{
"audit": "restricted",
"audit-version": "latest",
"enforce": "privileged",
"enforce-version": "latest",
"warn": "restricted",
"warn-version": "latest"
}
Additional info:
We need to disable the feature flag.
- depends on
-
OCPBUGS-56778 Disable PSA for 4.20
-
- Closed
-
- is cloned by
-
OCPBUGS-56777 Don't enforce restricted PSA for 4.19 hosted cluster
-
- Closed
-
-
OCPBUGS-56778 Disable PSA for 4.20
-
- Closed
-
- links to
-
RHEA-2024:11038
OpenShift Container Platform 4.19.z bug fix update