-
Feature Request
-
Resolution: Done
-
Major
-
None
-
None
-
False
-
None
-
False
-
Not Selected
-
-
-
-
-
1. Proposed title of this feature request
[openshift-image-registry] - readOnlyRootFilesystem should be explicitly to true and if required to false for security reason
2. What is the nature and description of the request?
According to security best practice, it's recommended to set readOnlyRootFilesystem: true for all containers running on kubernetes. Given that openshift-image-registry does not set that explicitly, it's requested that this is being evaluated and if possible set to readOnlyRootFilesystem: true or otherwise to readOnlyRootFilesystem: false with a potential explanation why the file-system needs to be write-able.
3. Why does the customer need this? (List the business requirements here)
Extensive security audits are run on OpenShift Container Platform 4 and are highlighting that many vendor specific container is missing to set readOnlyRootFilesystem: true or else justify why readOnlyRootFilesystem: false is set.
4. List any affected packages or components.
openshift-image-registry
- is incorporated by
-
OCPSTRAT-1076 Align the IR with security best practices about read-only root filesystem
- New
- relates to
-
OCPSTRAT-1699 Configure containers to set readOnlyRootFilesystem to true
- New