Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added configurable securityContext and follow restricted PSS #210

Open
wants to merge 5 commits into
base: main
Choose a base branch
from

Conversation

applejag
Copy link

@applejag applejag commented Sep 27, 2024

Hello! We want to be able to control the securityContext of the 1Password Connect pods to follow our own set of guidelines. Such as we want our pods to use a specific UID.

I've also changed it to follow the restricted Pod Security Standard by default, so people can use the 1Password Connect operator when they have the pod-security.kubernetes.io/enforce: restricted namespace label.

Changes:

  • Added securityContext settings to connect chart
  • Added securityContext settings to secrets-injector chart
  • Changed securityContext to follow restricted Pod Security Standard by default
  • Added pre-upgrade to secrets-injector to also update on upgrades
  • Added emptyDir for /tmp to secrets-injector as I'm setting securityContext.readOnlyRootFilesystem: true and the glog library requires it to write logs into (changing -alsologtostderr to -logtostderr didn't help)

I've tested this by installing into a test cluster and running the acceptance tests.

Closes #192

@applejag
Copy link
Author

Anything I'm missing or that I can help with to get this PR reviewed and merged?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Pod Security Admission warnings
1 participant