-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[PodSecurity] Add privileged containers baseline check #103364
Conversation
/release-note-none |
83c885a
to
05eb775
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks good, just a couple minor comments.
staging/src/k8s.io/pod-security-admission/policy/check_privileged.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/pod-security-admission/test/fixtures_privileged.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/pod-security-admission/test/fixtures_privileged.go
Outdated
Show resolved
Hide resolved
05eb775
to
f8c4880
Compare
@tallclair Thank you for the review. Updated the forbidden reason and updated fixtures based on the comments. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
one comment on the testcases, then lgtm
staging/src/k8s.io/pod-security-admission/test/fixtures_privileged.go
Outdated
Show resolved
Hide resolved
oh, looks like you also need to update the integration test in test/integration/auth/podsecurity_test.go to pass |
aaaand we serve the CI robots, clearly :) |
f8c4880
to
e07f1bb
Compare
@liggitt Thanks for the pointer! Updated it. |
/lgtm might need a rebase if #103365 beats it in |
e07f1bb
to
f8b9a36
Compare
@liggitt Pushed a change to set
integration test error. I did see this as well in the last test run: |
that should be fixed by #103364 (comment) |
The last test run failed with that flag set in the apiserver. |
staging/src/k8s.io/pod-security-admission/test/fixtures_privileged.go
Outdated
Show resolved
Hide resolved
are you sure? checking this branch out locally, the integration test passes once I made sure AllowPrivilegeEscalation was nil in these testcases |
b320c89
to
df1ac6a
Compare
This run was with the flags as it ran after the I set |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aramase, liggitt The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/triage accepted |
figured it out... other servers in the integration test package initialized this already, so it was ineffective when running all tests in the package to ensure the global is set the way we want, in addition to + "k8s.io/kubernetes/pkg/capabilities"
...
+ // ensure the global is set to allow privileged containers
+ capabilities.SetForTests(capabilities.Capabilities{AllowPrivileged: true}) |
Signed-off-by: Anish Ramasekar <[email protected]>
df1ac6a
to
5bd3334
Compare
Ah, gotcha! Added |
/lgtm |
Signed-off-by: Anish Ramasekar [email protected]
What type of PR is this?
/kind feature
What this PR does / why we need it:
Which issue(s) this PR fixes:
Fixes #103196
Special notes for your reviewer:
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: