Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify instructions for implementing SCCs #9569

Merged
merged 1 commit into from
Oct 3, 2022

Conversation

rhmdnd
Copy link
Collaborator

@rhmdnd rhmdnd commented Sep 26, 2022

We advise users to deploy security context constraints to secure pods. This is especially important with OpenShift 4, which comes with default security context constraints enabled and ready to use.

Previously, the documentation for using security context constraints was vague. This is somewhat understandable since using security context constrains is open-ended, and really depends on application and pods running within a cluster.

This commit tries to clarify the instructions by briefly introducing security context constraints, and leaving the educational heavy lifting to another OpenShift document that's dedicated to describing that feature and how to use it effectively.

Jira: https://issues.redhat.com/browse/OCPBUGS-698

@rhmdnd rhmdnd requested a review from jhrozek September 26, 2022 19:22
@github-actions
Copy link

Start a new ephemeral environment with changes proposed in this pull request:

Fedora Environment
Open in Gitpod

Oracle Linux 8 Environment
Open in Gitpod

@rhmdnd rhmdnd force-pushed the clarify-ssc-instructions branch 2 times, most recently from 94d6c9c to a9a82e6 Compare September 26, 2022 19:28
@Mab879 Mab879 added this to the 0.1.65 milestone Sep 26, 2022
@Mab879 Mab879 added OpenShift OpenShift product related. OCIL OCIL update. Related to the systems assessments. Update Rule Issues or pull requests related to Rules updates. labels Sep 26, 2022
Copy link
Collaborator

@jhrozek jhrozek left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM
I kicked the one test that failed.

@Mab879
Copy link
Member

Mab879 commented Sep 30, 2022

@jhrozek @rhmdnd Anything preventing this from being merged?

@rhmdnd
Copy link
Collaborator Author

rhmdnd commented Sep 30, 2022

@Mab879 Nope, just clarifying some instructions so they're easier to understand. We wanted to have someone from CaC put eyes on it though.

We advise users to deploy security context constraints to secure pods.
This is especially important with OpenShift 4, which comes with default
security context constraints enabled and ready to use.

Previously, the documentation for using security context constraints was
vague. This is somewhat understandable since using security context
constrains is open-ended, and really depends on application and pods
running within a cluster.

This commit tries to clarify the instructions by briefly introducing
security context constraints, and leaving the educational heavy lifting
to another OpenShift document that's dedicated to describing that
feature and how to use it effectively.

Jira: https://issues.redhat.com/browse/OCPBUGS-698
@codeclimate
Copy link

codeclimate bot commented Sep 30, 2022

Code Climate has analyzed commit 4415efc and detected 0 issues on this pull request.

The test coverage on the diff in this pull request is 100.0% (50% is the threshold).

This pull request will bring the total coverage in the repository to 40.7% (0.0% change).

View more on Code Climate.

Copy link
Collaborator

@jhrozek jhrozek left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@jhrozek jhrozek merged commit faa58ee into ComplianceAsCode:master Oct 3, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
OCIL OCIL update. Related to the systems assessments. OpenShift OpenShift product related. Update Rule Issues or pull requests related to Rules updates.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants