Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Custom SecurityContext in Postgresql, OperatorConfiguration CRDs #2244

Open
wants to merge 3 commits into
base: master
Choose a base branch
from

Conversation

hshmilo
Copy link

@hshmilo hshmilo commented Feb 27, 2023

This PR extends the Postgresql, OperatorConfiguration CRDs with the following list of properties related to pod/containers SecurityContext.
Postgresql CRD:

  1. spiloSeccompProfile – adds SeccompProfile config property on the cluster pod level.
  2. securityContext for the sidecars configuration – configures securityContext property for particular sidecar container.

OperatorConfiguration CRD:

  1. dropped_pod_capabilities - list of dropped capabilities for spilo container.
  2. spilo_seccompprofile – adds SeccompProfile config property on clusters pod level.
  3. securityContext for the sidecars configuration – configures securityContext property for particular sidecar container.

This PR addresses #2223

@EmilMunksoe
Copy link

+1

1 similar comment
@x3rus
Copy link

x3rus commented May 17, 2023

+1

@ugur99
Copy link

ugur99 commented Aug 8, 2023

Hi everyone, any updates regarding this PR?

@m1m1x
Copy link

m1m1x commented Sep 17, 2023

Hi,

any chance to review this MR please? It would be a good addition for cluster security in depth.

@mattwing
Copy link

mattwing commented Dec 6, 2023

+1 on needing this to comply with restricted profiles, as @EmilMunksoe mentioned #2223 (comment)

@Tahedah
Copy link

Tahedah commented Apr 17, 2024

Hey, this is also a blocker for us since we have strict pod policies for the clusters. Is this something that will be merged soon?

@sj-porter-knime
Copy link

+1

1 similar comment
@BalintCsonka
Copy link

+1

@mrpainte
Copy link

mrpainte commented May 2, 2024

+1 this would allow my team to be able to deploy postgres into our clusters with this operator

@bumarcell
Copy link

Why is this MR (which will make many lives easier) ignored for over a year now? waiting only makes it more complicated to merge and now there are merge conflicts to resolve.
I hope there's a good reason for that.. 😓

@ajchiarello
Copy link

Honestly, the delay on this led me to move from this operator over the CloudNative PostgreSQL Operator, which does everything and is already secure.

@sdesbure
Copy link

Honestly, the delay on this led me to move from this operator over the CloudNative PostgreSQL Operator, which does everything and is already secure.

same here :(

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Waiting for review
Development

Successfully merging this pull request may close these issues.

None yet