+++ This bug was initially created as a clone of Bug #2133656 +++ Description of problem: ----------------------- Test run[1] that looks for 'pod security violation entries' in audit logs,against 4.11.1-20, found few audit violation. [1] - https://main-jenkins-csb-cnvqe.apps.ocp-c1.prod.psi.redhat.com/view/cnv-tests%20runner/job/cnv-tests-runner/4297/consoleFull. This bug is to fix violation in 'hostpath-provisioner-operator' container. <snip> 'pod-security.kubernetes.io/audit-violations': 'would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "hostpath-provisioner-operator" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "hostpath-provisioner-operator" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "hostpath-provisioner-operator" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "hostpath-provisioner-operator" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost")'}} </snip> Version-Release number of selected component (if applicable): ------------------------------------------------------------- 4.11.1-20 How reproducible: ----------------- Always Expected results: ----------------- No audit-violation to be found
PR was backported and merged U/S to 4.11, but since 4.11.1 is not released yet, there's no 4.11.2 D/S build at the moment.
Backported the Dockerfile midstream change (unclear if it's still needed)
Reverted this change. A similar change to CDI caused smoke test breakage, so I reverted both as a precaution. We've decided not to include these changes in 4.11, PSA was delayed one more version.