-
Notifications
You must be signed in to change notification settings - Fork 98
ci: drop running COSA as UID 0 #1716
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
This becaome obsolete when buildPod was introduced in coreos/coreos-ci-lib@f2a82bd
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request aims to improve security by no longer running the COSA container as root. This is a great improvement. However, by removing the root privileges, the mechanism for using the newly built coreos-installer binary was removed but not replaced. My review includes a critical suggestion to fix this by updating the PATH environment variable, ensuring that the CI continues to test the correct binary.
Allow group write permissions on /usr/bin because in upstream project's CI we want to overwrite binaries for testing. The dir is owned by root:root and CI runs in openshift as a user that is a member of the `root` (GID: 0) group. See coreos/coreos-installer#1716
20af0f5 to
e60c306
Compare
|
Ok I think this should be ready to go. requires https://github.com/coreos/coreos-assembler/pull/4410/changes (please review) |
e60c306 to
697848f
Compare
We opened up the permissions when building the COSA container [1] so this isn't necessary any longer with a few adjustments here. [1] coreos/coreos-assembler#4410
697848f to
7994979
Compare
This issue should have been fixed a long time ago. Let's drop this old workaround.
7994979 to
ea2cdcc
Compare
Allow group write permissions on /usr/ because in upstream project's CI we want to overwrite software for testing. The directories are typically owned by root:root and CI runs in openshift as a user that is a member of the `root` (GID: 0) group. See coreos/coreos-installer#1716
Allow group write permissions on /usr/ because in upstream project's CI we want to overwrite software for testing. The directories are typically owned by root:root and CI runs in openshift as a user that is a member of the `root` (GID: 0) group. See coreos/coreos-installer#1716 Also add an exception for /etc/grub.d for OSTree upstream CI.
No description provided.