-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix v1.24 Cluster Scan Failures #92
Conversation
merging the PR. |
I don't believe that setting an or condition to check "whether the The change in this PR could therefore result in falsely passing scans (both permissive and hardened) for any minor release prior to 1.24. |
You're right that the flag itself was semi-removed in 1.21. My previous message was therefore somewhat incorrect. The problem then is similar though: "The change in this PR could therefore result in falsely passing scans for any minor release prior to 1.21. From what I understand, our profiles conform to the CIS Benchmark guides. The starred one in the below screenshot is our default: I don't think it's correct to necessarily change what our checks are doing to be different from these. Rather we should properly to document to users that "if they are using kubernetes v1.23+, they should use the 1.23 scan profile". I obtained the following information from these PDFs:
To me, it's almost more correct if we don't have this OR condition that was added as part of the PR, and instead actually keep the passing scans. |
So please confirm if we should do the below changes
Please note that this will show Failed scans for 1.20 and 1.6 on clusters where this flag is missing. So please confirm that this is the expected result and we are fine with those failures. |
I think that's the correct approach, but I am not the right person to make the call. Adding @prachidamle @brandonsuse @samkulkarni20 @MKlimuszka for visibility/prioritization. |
After QA validation, they found that the --insecure-port check is failing on every cluster. So this PR fixes them all.
check_cafile_permissions.sh script is also failing (on K8s 1.24 cluster) for RKE1 permissive profile scans, this PR fixes that as well.
Related:
rancher/cis-operator#135
rancher/cis-operator#153
Note: All the fixes are tested on respective clusters.