Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(operator): update kubearmor-scc to allow using custom seccomprofile on OpenShift #1684

Merged
merged 1 commit into from
Mar 13, 2024

Conversation

rksharma95
Copy link
Collaborator

Purpose of PR?:

With recent added feature kubearmor itself deploy with custom seccomp profiles to enhance security. this PR updates the SCC profile to be used on OpenShift cluster to allow using custom seccomp profiles.

Does this PR introduce a breaking change?
No
If the changes in this PR are manually verified, list down the scenarios covered::
Tested the changes on local microshift cluster setup

NAME              STATUS   ROLES                         AGE    VERSION    INTERNAL-IP      EXTERNAL-IP   OS-IMAGE                              KERNEL-VERSION                 CONTAINER-RUNTIME
api.crc.testing   Ready    control-plane,master,worker   167m   v1.27.10   192.168.130.11   <none>        Red Hat Enterprise Linux 9.2 (Plow)   5.14.0-284.30.1.el9_2.x86_64   cri-o://1.27.3-2.rhaos4.14.git03502b6.el9

Additional information for reviewer? :
Mention if this PR is part of any design or a continuation of previous PRs

Checklist:

  • Bug fix. Fixes #
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • This change requires a documentation update
  • PR Title follows the convention of <type>(<scope>): <subject>
  • Commit has unit tests
  • Commit has integration tests

Signed-off-by: rksharma95 <ramakant@accuknox.com>
@daemon1024 daemon1024 merged commit 9ae900d into kubearmor:main Mar 13, 2024
18 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants