Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update eventlistener podSeurityContext to adhere to restricted pod se… #1740

Conversation

kristofferchr
Copy link
Contributor

@kristofferchr kristofferchr commented Jul 1, 2024

Solves issue #1739

Currently, when el-security-context is enabled, the securityContext for EventListener in the pod template only sets runAsNonRoot. Expanding podTemplate securityContext can make it easier to fulfill restricted pod security standards.

Makes it possible to have a default securityContext set for injected sidecar containers that does not fulfill restricted pod security standars. An example of this is injected istio containers.

Changes

Alter podSecurityContext to include seccompProfile, runAsUser, runAsGroup and fsGroup when set-security-context is set.

Submitter Checklist

As the author of this PR, please check off the items in this checklist:

  • Has Docs if any changes are user facing, including updates to minimum requirements e.g. Kubernetes version bumps
  • Has Tests included if any functionality added or changed
  • Follows the commit message standard
  • Meets the Tekton contributor standards (including functionality, content, code)
  • Has a kind label. You can add one by adding a comment on this PR that contains /kind <type>. Valid types are bug, cleanup, design, documentation, feature, flake, misc, question, tep
  • Release notes block below has been updated with any user facing changes (API changes, bug fixes, changes requiring upgrade notices or deprecation warnings). See some examples of good release notes.
  • Release notes contains the string "action required" if the change requires additional action from users switching to the new release

Release Notes

Eventlistener podTemplate now includes securityContext settings: seccompProfile, runAsUser, runAsGroup, and fsGroup when flag el-security-context is true. 

@tekton-robot tekton-robot added the release-note Denotes a PR that will be considered when it comes time to generate release notes. label Jul 1, 2024
@tekton-robot
Copy link

Hi @kristofferchr. Thanks for your PR.

I'm waiting for a tektoncd member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@tekton-robot tekton-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Jul 1, 2024
@tekton-robot tekton-robot requested review from bobcatfish and dibyom July 1, 2024 22:11
Copy link

linux-foundation-easycla bot commented Jul 1, 2024

CLA Signed

The committers listed above are authorized under a signed CLA.

  • ✅ login: kristofferchr / name: Kristoffer Moberg Christensen (19b92f4)

@kristofferchr
Copy link
Contributor Author

/kind feature

@tekton-robot tekton-robot added the kind/feature Categorizes issue or PR as related to a new feature. label Jul 1, 2024
Copy link
Contributor

@khrm khrm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/ok-to-test

@tekton-robot tekton-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Jul 2, 2024
@kristofferchr
Copy link
Contributor Author

/retest

1 similar comment
@kristofferchr
Copy link
Contributor Author

/retest

@kristofferchr kristofferchr force-pushed the feature/add-stronger-security-context-pod-template branch 2 times, most recently from cf0b25d to 53e47ba Compare July 2, 2024 20:30
Comment on lines 48 to 64
func getStrongerSecurityPolicy(cfg *config.Config) corev1.PodSecurityContext {
securityContext := baseStrongerSecurityPolicy
securityContext.RunAsUser = ptr.Int64(cfg.Defaults.DefaultRunAsUser)
securityContext.RunAsGroup = ptr.Int64(cfg.Defaults.DefaultRunAsGroup)
securityContext.FSGroup = ptr.Int64(cfg.Defaults.DefaultRunAsGroup)
return securityContext
}

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I checked my specific use case again(istio injected sidecars) and it appears runAsGroup and runAsUser is set for that container.

However, i would like to keep seccompProfile as it is not set and therefore violates restricted pod security standards.
FSGroup is not available in container securityContext, only PodSecurityContext.

I can remove runAsGroup and runAsUser if you do not wish to have a pod level default.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we can keep for pod level as well i don't see issue

cc @khrm @dibyom

Copy link
Contributor Author

@kristofferchr kristofferchr Jul 15, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there anything that is missing or changes that is required for this PR before approval?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@tekton-robot tekton-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jul 8, 2024
@kristofferchr kristofferchr force-pushed the feature/add-stronger-security-context-pod-template branch from 53e47ba to 38745aa Compare July 15, 2024 10:41
@tekton-robot tekton-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jul 15, 2024
@kristofferchr kristofferchr force-pushed the feature/add-stronger-security-context-pod-template branch 2 times, most recently from dedb181 to c91c57b Compare July 15, 2024 10:49
@kristofferchr
Copy link
Contributor Author

bump @khrm @savitaashture

Comment on lines 50 to 51
securityContext.RunAsUser = ptr.Int64(cfg.Defaults.DefaultRunAsUser)
securityContext.RunAsGroup = ptr.Int64(cfg.Defaults.DefaultRunAsGroup)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @kristofferchr
For runAsUser and runAsGroup
can you handle similar to this https://github.com/tektoncd/triggers/blob/main/pkg/reconciler/eventlistener/resources/container.go#L71-L76
because In a platform like OpenShift we set "" value so lets keep runAsUser and runAsGroup when its actually set

Copy link
Contributor Author

@kristofferchr kristofferchr Aug 6, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Certainly. FSGroup as well?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Implemented and added tests.

@kristofferchr kristofferchr force-pushed the feature/add-stronger-security-context-pod-template branch from c91c57b to f669160 Compare August 6, 2024 07:41

if !cfg.Defaults.IsDefaultRunAsGroupEmpty {
securityContext.RunAsGroup = ptr.Int64(cfg.Defaults.DefaultRunAsGroup)
securityContext.FSGroup = ptr.Int64(cfg.Defaults.DefaultRunAsGroup)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is FSGroup and runAsGroup same ??

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I set them as the same, as i do not need change it for my use case. Should i make it configurable through a Defaults or wait for a specific use case?

Copy link
Contributor

@savitaashture savitaashture Aug 6, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IMO lets wait for a specific case
we can add it whenever we have usecase

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

agreed. I will keep it as it is with FSGroup set to RunAsGroup

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh wait my point is can we completly remove FSGroup or is it required ?

Copy link
Contributor Author

@kristofferchr kristofferchr Aug 6, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I need it for my usecase to adhere to aks policy: https://github.com/Azure/azure-policy/blob/master/built-in-policies/policySetDefinitions/Kubernetes/PSPRestrictedStandard.json#L256

Currently we need policy exemptions because of this requirement.

Copy link
Contributor

@savitaashture savitaashture Aug 12, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I set them as the same, as i do not need change it for my use case. Should i make it configurable through a Defaults or wait for a specific use case?

Shall we configure it so that if someone wants they can set to different value
as both FSGroup and RUnAsGroup functionality is different

Once you add the configuration for FSGroup smilar to RunAsGroup I think we are good to merge

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@savitaashture updated :)

@kristofferchr
Copy link
Contributor Author

/retest

@kristofferchr kristofferchr force-pushed the feature/add-stronger-security-context-pod-template branch from f669160 to 10b5ec4 Compare August 6, 2024 08:38
…curity standards

Alter podSecurityContext to include seccompProfile, runAsUser, runAsGroup and fsGroup
when set-security-context is set.

As podSecurityContext only included runAsNonRoot, which could cause injected sidecars
to miss some required restricted pod security standards securityContext
fields.
@kristofferchr kristofferchr force-pushed the feature/add-stronger-security-context-pod-template branch from 10b5ec4 to 19b92f4 Compare August 16, 2024 11:23
@tekton-robot
Copy link

The following is the coverage report on the affected files.
Say /test pull-tekton-triggers-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
pkg/apis/config/default.go 88.2% 87.8% -0.4

@tekton-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: savitaashture

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@tekton-robot tekton-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 19, 2024
Copy link
Contributor

@khrm khrm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@tekton-robot tekton-robot added the lgtm Indicates that a PR is ready to be merged. label Aug 19, 2024
@tekton-robot tekton-robot merged commit e4cd11d into tektoncd:main Aug 19, 2024
6 checks passed
savitaashture added a commit to savitaashture/operator that referenced this pull request Aug 19, 2024
…curityContext for Triggers

as part of this PR tektoncd/triggers#1740 we've introduced an FSGroup setting to comply with restricted pod security standards for the podTemplate.
But the default value 65532 won't work on OpenShift so setting  by default for FSGroup

Signed-off-by: Savita Ashture <[email protected]>
@kristofferchr kristofferchr deleted the feature/add-stronger-security-context-pod-template branch August 19, 2024 08:26
tekton-robot pushed a commit to tektoncd/operator that referenced this pull request Aug 19, 2024
…curityContext for Triggers

as part of this PR tektoncd/triggers#1740 we've introduced an FSGroup setting to comply with restricted pod security standards for the podTemplate.
But the default value 65532 won't work on OpenShift so setting  by default for FSGroup

Signed-off-by: Savita Ashture <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. kind/feature Categorizes issue or PR as related to a new feature. lgtm Indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. release-note Denotes a PR that will be considered when it comes time to generate release notes. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants