-
Notifications
You must be signed in to change notification settings - Fork 116
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Harden the spo and bpf-recorder containers with custom apparmor profiles #2646
Conversation
cc @mhils |
98734a7
to
905ed1b
Compare
Change-Id: Iccb89ec24d4f513acff9d7828dea6a4ab3c33ef1 Signed-off-by: Cosmin Cojocar <[email protected]>
Change-Id: I8a4f7031c81fe1f47f1a0a55276b415bb6d59732 Signed-off-by: Cosmin Cojocar <[email protected]>
Change-Id: Ie5183b2d1f0550ab463f4c3d0fd713d1de6ec39b Signed-off-by: Cosmin Cojocar <[email protected]>
905ed1b
to
e638e83
Compare
…ofiles Change-Id: I913f1d20563311b5bb40b5f29293f1235a76a6d3 Signed-off-by: Cosmin Cojocar <[email protected]>
@saschagrunert Please could you have a look at this? Thanks a lot! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ccojocar, saschagrunert The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind feature
What this PR does / why we need it:
This pull request harden the security-profiles-operator and bpf-recorder containers as part of spod daemonset with custom apparmor profiles when apparmor is enabled.
These two containers run in privileged mode when the apparmor is activated.
Which issue(s) this PR fixes:
Fixes #65
Does this PR have test?
Yes
Special notes for your reviewer:
Does this PR introduce a user-facing change?