Open kristofferchr opened 1 week ago
Hi @kristofferchr. Thanks for your PR.
I'm waiting for a tektoncd member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test
on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test
label.
I understand the commands that are listed here.
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by:
To complete the pull request process, please assign dibyom after the PR has been reviewed.
You can assign the PR to them by writing /assign @dibyom
in a comment when ready.
The full list of commands accepted by this bot can be found here.
/kind feature
/retest
/retest
@kristofferchr: PR needs rebase.
Solves issue #1739
Currently, when
el-security-context
is enabled, thesecurityContext
forEventListener
in the pod template only setsrunAsNonRoot
. Expanding podTemplatesecurityContext
can make it easier to fulfill restricted pod security standards.Makes it possible to have a default
securityContext
set for injected sidecar containers that does not fulfill restricted pod security standars. An example of this is injected istio containers.Changes
Alter podSecurityContext to include seccompProfile, runAsUser, runAsGroup and fsGroup when set-security-context is set.
Submitter Checklist
As the author of this PR, please check off the items in this checklist:
/kind <type>
. Valid types are bug, cleanup, design, documentation, feature, flake, misc, question, tepRelease Notes