Bug 2000820
| Summary: | (release-4.9) Gather PodSecurityPolicies names installed in a cluster | |||
|---|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | Tomas Remes <tremes> | |
| Component: | Insights Operator | Assignee: | Tomas Remes <tremes> | |
| Status: | CLOSED ERRATA | QA Contact: | Dmitry Misharov <dmisharo> | |
| Severity: | medium | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 4.9 | CC: | aos-bugs, inecas, mklika, tremes | |
| Target Milestone: | --- | |||
| Target Release: | 4.9.0 | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | ||
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 2001457 (view as bug list) | Environment: | ||
| Last Closed: | 2021-10-18 17:51:23 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2001457 | |||
|
Description
Tomas Remes
2021-09-03 05:56:25 UTC
Verified on 4.9.0-0.ci-2021-09-06-064221.
Verification steps:
1. cat psp.yaml
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
annotations:
apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default'
seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
name: next-psp-name
spec:
# default set of capabilities are implicitly allowed
allowedCapabilities: []
allowPrivilegeEscalation: false
fsGroup:
rule: 'MustRunAs'
ranges:
# Forbid adding the root group.
- min: 1
max: 65535
hostIPC: false
hostNetwork: false
hostPID: false
privileged: false
readOnlyRootFilesystem: false
runAsUser:
rule: 'MustRunAsNonRoot'
seLinux:
rule: 'RunAsAny'
supplementalGroups:
rule: 'MustRunAs'
ranges:
# Forbid adding the root group.
- min: 1
max: 65535
volumes:
- 'configMap'
- 'downwardAPI'
- 'emptyDir'
- 'persistentVolumeClaim'
- 'projected'
- 'secret'
hostPorts:
- min: 0
max: 0
2. oc apply -f psp.yaml
3. oc delete pod insights-operator-<some name>
4. download the archive
oc rsync insights-operator-<some name>:/var/lib/insights-operator/insights-<date>.tar.gz /tmp
5. check if config/psp_names.json exists and has the right content
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.9.0 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:3759 |