-
Notifications
You must be signed in to change notification settings - Fork 3.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
defaultworkflow securitycontext is not applied #3767
Comments
The spec under I'm assuming you want to apply this security context to every pod? I'm not sure this is possible. It would be good to know more about your use case. |
Yes, i want to apply that security context to every user container, but not the argoexec container. |
This would be a new feature, but it maybe you can active this another way? https://kubernetes.io/docs/concepts/policy/pod-security-policy/ |
Ok, that is sad. Could you consider adding SYS_CHROOT like SYS_PTRACE to the argoexec pod, as done here #1214 ? SYS_CHROOT is needed for the PNS executor and would help to make the PSP more secure. I am currently running kubeflow pipelines including argo without!!! any root containers using PSP and manually built images. |
You are amazing! i hope you do a release soon :-) |
Summary
The workflowDefaults as are not applied. I used https://github.com/argoproj/argo/blob/master/docs/default-workflow-specs.md as reference.
I am using Kubeflow pipelines generated workflows. I manually added the security context in the yaml file and it is correctly applied.
I tried to add a securitycontext to all main/user containers of all workflows by default, but it is just ignored.
Diagnostics
What version of Argo Workflows are you running? 2.7.5
workflow-controller.log
workflow.txt
Message from the maintainers:
Impacted by this bug? Give it a 👍. We prioritise the issues with the most 👍.
The text was updated successfully, but these errors were encountered: