Open tylerslaton opened 2 years ago
This issue has become stale because it has been open 60 days with no activity. The maintainers of this repo will remove this label during issue triage or it will be removed automatically after an update. Adding the lifecycle/frozen
label will cause this issue to ignore lifecycle events.
/label lifecycle/stale
@awgreene: The label(s) /label lifecycle/stale
cannot be applied. These labels are supported: platform/aws, platform/azure, platform/baremetal, platform/google, platform/libvirt, platform/openstack, ga, tide/merge-method-merge, tide/merge-method-rebase, tide/merge-method-squash, px-approved, docs-approved, qe-approved, downstream-change-needed, approved, backport-risk-assessed, bugzilla/valid-bug, cherry-pick-approved, jira/valid-bug, staff-eng-approved
. Is this label configured under labels -> additional_labels
or labels -> restricted_labels
in plugin.yaml
?
Creating an issue from the follow-ups outlined here: https://github.com/operator-framework/rukpak/pull/539#issuecomment-1233371230
Summary
In a recent merge we introduced the initial approach for adding PSA compliance to RukPak resources. In this approach, however, we opted to run the
rukpak-system
namespace inbaseline
PSA enforcement, which allows lower levels of security validation (like Pods being allowed to run as root which is a necessity for the current image unpacker implementation).We would like to introduce a level of configuration for the
unpacker
struct that allows provisioners to opt-in to more a restrictive security context. This will allow theplain
provisioner (and potentiallyhelm
provisioner) to use that configuration for more advanced pod security while also allowing theregistry
provisioner to ignore the configuration as it has legacy content that could run as root and should be considered immutable.A/C
plain
provisioner to utilize this more restrictive configurationplain
provisioner to pass with restrictive contexts (I.E, not allowing root users for bundles)helm
provisioner.