-
Notifications
You must be signed in to change notification settings - Fork 3
fix(chart): resolve kubernetes security scan violations for compliance #96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
936df5d to
b1b21e3
Compare
|
Did you run this chart in a kind cluster and verify that operator-agent tests and some of the e2e tests still work? |
Yes, verified locally with e2e-tests |
|
The release docs also need to be updated to set the digest. Until now we were using the chart == operator version. But with using digest we have to fetch that now and put it into the chart. It would be good to add a section about updating the chart with a command that transforms an image + tag into the multi-arch digest |
The e2e tests don't actually run the operator in k8s though. It runs from a local process onto the api. You should do a test where you install the helm chart then go through and run the simple operator agent directly Make sure the |
Overview
This PR addresses failing checks from the helm chart security scan in preparation for the October 1st compliance requirement when these checks will become blocking instead of warnings.
Security Fixes Implemented
Container Security Context Hardening:
allowPrivilegeEscalation: falseto all containersreadOnlyRootFilesystem: truefor enhanced securityResource Management:
Health Monitoring:
Image Security:
Namespace Security:
Admission Webhook Security:
allowWriteWebhookConfig: falsefor least-privilege accessExcluded Check
CKV_K8S_155: "Minimize ClusterRoles that grant control over validating or mutating admission webhook configurations"
Testing
References