-
Notifications
You must be signed in to change notification settings - Fork 420
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
EventListeners do not have correct SecurityContext to run in tekton-pipelines namespace #1490
Comments
From Slack thread: |
The security context is the same one that is applied to other Tekton workloads such as the Triggers and Pipeline controller pods. Eventlisteners already run as non-root, non-privileged containers. Adding this setting allows them to run in environments with pod security admission set to "restricted" (such as the tekton-pipelines namespace) Fixes tektoncd#1490 Signed-off-by: Dibyo Mukherjee <[email protected]>
The security context is the same one that is applied to other Tekton workloads such as the Triggers and Pipeline controller pods. Eventlisteners already run as non-root, non-privileged containers. Adding this setting allows them to run in environments with pod security admission set to "restricted" (such as the tekton-pipelines namespace) Fixes tektoncd#1490 Signed-off-by: Dibyo Mukherjee <[email protected]>
The security context is the same one that is applied to other Tekton workloads such as the Triggers and Pipeline controller pods. Eventlisteners already run as non-root, non-privileged containers. Adding this setting allows them to run in environments with pod security admission set to "restricted" (such as the tekton-pipelines namespace) Fixes tektoncd#1490 Signed-off-by: Dibyo Mukherjee <[email protected]>
The security context is the same one that is applied to other Tekton workloads such as the Triggers and Pipeline controller pods. Eventlisteners already run as non-root, non-privileged containers. Adding this setting allows them to run in environments with pod security admission set to "restricted" (such as the tekton-pipelines namespace) Fixes tektoncd#1490 Signed-off-by: Dibyo Mukherjee <[email protected]>
The security context is the same one that is applied to other Tekton workloads such as the Triggers and Pipeline controller pods. Eventlisteners already run as non-root, non-privileged containers. Adding this setting allows them to run in environments with pod security admission set to "restricted" (such as the tekton-pipelines namespace) Fixes #1490 Signed-off-by: Dibyo Mukherjee <[email protected]>
The security context is the same one that is applied to other Tekton workloads such as the Triggers and Pipeline controller pods. Eventlisteners already run as non-root, non-privileged containers. Adding this setting allows them to run in environments with pod security admission set to "restricted" (such as the tekton-pipelines namespace) Fixes tektoncd#1490 Signed-off-by: Dibyo Mukherjee <[email protected]>
Originally posted by @seunggs in #1477 (comment)
The text was updated successfully, but these errors were encountered: