-
Feature Request
-
Resolution: Done
-
Major
-
None
-
None
-
False
-
None
-
False
-
Not Selected
-
-
-
-
1. Proposed title of this feature request
[openshift-ingress] - readOnlyRootFilesystem should be explicitly to true and if required to false for security reason
2. What is the nature and description of the request?
According to security best practice, it's recommended to set readOnlyRootFilesystem: true for all containers running on kubernetes. Given that openshift-ingress does not set that explicitly, it's requested that this is being evaluated and if possible set to readOnlyRootFilesystem: true or otherwise to readOnlyRootFilesystem: false with a potential explanation why the file-system needs to be write-able.
3. Why does the customer need this? (List the business requirements here)
Extensive security audits are run on OpenShift Container Platform 4 and are highlighting that many vendor specific container is missing to set readOnlyRootFilesystem: true or else justify why readOnlyRootFilesystem: false is set.
4. List any affected packages or components.
openshift-ingress
- is related to
-
OCPBUGS-20192 openshift.io/scc: restricted-readonly when setting up router sharding
- Closed
- relates to
-
OCPSTRAT-1699 Configure containers to set readOnlyRootFilesystem to true
- New