Bug 2095716
Summary: | New PSA component for Pod Security Standards enforcement is refusing openshift-operators ns | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Camila Macedo <cmacedo> |
Component: | apiserver-auth | Assignee: | Standa Laznicka <slaznick> |
Status: | CLOSED ERRATA | QA Contact: | Yash Tripathi <ytripath> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 4.11 | CC: | mfojtik, surbania |
Target Milestone: | --- | ||
Target Release: | 4.11.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | 4.11.0 | Doc Type: | No Doc Update |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-08-10 11:17:24 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | 4.11.0 |
Embargoed: |
Description
Camila Macedo
2022-06-10 11:03:22 UTC
Verified on Cluster version is 4.11.0-0.nightly-2022-06-15-222801 Using the following steps: 1. oc get ns openshift-operators -o yaml ... labels: kubernetes.io/metadata.name: openshift-operators openshift.io/scc: anyuid ... 2. oc label ns openshift-operators security.openshift.io/scc.podSecurityLabelSync="true" namespace/openshift-operators labeled 3. oc get ns openshift-operators -o yaml ... pod-security.kubernetes.io/audit: restricted pod-security.kubernetes.io/audit-version: v1.24 pod-security.kubernetes.io/warn: restricted pod-security.kubernetes.io/warn-version: v1.24 security.openshift.io/scc.podSecurityLabelSync: "true" ... 4. oc label ns openshift-operators security.openshift.io/scc.podSecurityLabelSync="false" --overwrite namespace/openshift-operators labeled 5. oc adm policy add-scc-to-user privileged -z default -n openshift-operators --context admin clusterrole.rbac.authorization.k8s.io/system:openshift:scc:privileged added: "default" 6. oc get ns openshift-operators -o yaml --context=admin ... pod-security.kubernetes.io/audit: restricted pod-security.kubernetes.io/audit-version: v1.24 pod-security.kubernetes.io/warn: restricted pod-security.kubernetes.io/warn-version: v1.24 security.openshift.io/scc.podSecurityLabelSync: "false" ... 7. oc label ns openshift-operators security.openshift.io/scc.podSecurityLabelSync="true" --overwrite --context=admin namespace/openshift-operators unlabeled 8. oc get ns openshift-operators -o yaml --context=admin ... pod-security.kubernetes.io/audit: privileged pod-security.kubernetes.io/audit-version: v1.24 pod-security.kubernetes.io/warn: privileged pod-security.kubernetes.io/warn-version: v1.24 security.openshift.io/scc.podSecurityLabelSync: "true" ... Expected: openshift-operators will only sync if specifically opted in The openshift-operators namespace was labeled as expected, moving to Verified Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: OpenShift Container Platform 4.11.0 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:5069 |