Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS kube-up: Remove SecurityContextDeny admission controller (to mirror GCE) #25381

Merged
merged 1 commit into from
Jun 5, 2016
Merged

AWS kube-up: Remove SecurityContextDeny admission controller (to mirror GCE) #25381

merged 1 commit into from
Jun 5, 2016

Conversation

zquestz
Copy link

@zquestz zquestz commented May 9, 2016

This PR allows the user to tune the ADMISSION_CONTROL options for AWS environments (much like local-up-cluser.sh). The main impetus is to allow users to exclude the SecurityContextDeny admission controller which causes e2e AWS based tests to fail with pod.Spec.SecurityContext.SELinuxOptions is forbidden.

Now AWS e2e tests are happy and can actually go green.

@k8s-bot
Copy link

k8s-bot commented May 9, 2016

Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test".
(Note: "add to whitelist" is no longer supported. Please update configurations in kubernetes/test-infra/jenkins/job-configs/kubernetes-jenkins-pull instead.)

This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry.

Otherwise, if this message is too spammy, please complain to ixdy.

2 similar comments
@k8s-bot
Copy link

k8s-bot commented May 9, 2016

Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test".
(Note: "add to whitelist" is no longer supported. Please update configurations in kubernetes/test-infra/jenkins/job-configs/kubernetes-jenkins-pull instead.)

This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry.

Otherwise, if this message is too spammy, please complain to ixdy.

@k8s-bot
Copy link

k8s-bot commented May 9, 2016

Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test".
(Note: "add to whitelist" is no longer supported. Please update configurations in kubernetes/test-infra/jenkins/job-configs/kubernetes-jenkins-pull instead.)

This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry.

Otherwise, if this message is too spammy, please complain to ixdy.

@k8s-github-robot k8s-github-robot added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. release-note-label-needed labels May 9, 2016
@justinsb justinsb self-assigned this May 10, 2016
@k8s-github-robot k8s-github-robot added size/S Denotes a PR that changes 10-29 lines, ignoring generated files. and removed size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels May 10, 2016
@earlruby
Copy link

LGTM. Tests are now passing on my AWS cluster when I set ALLOW_SECURITY_CONTEXT=TRUE.

@zquestz
Copy link
Author

zquestz commented May 11, 2016

@earlruby thanks for testing. =)

@justinsb
Copy link
Member

So the SecurityContextDeny admission controller has been there "forever". But it is not present on GCE. It was removed in #16986 and #21004. I think we should just remove it on AWS also (no env var needed).

@ArtfulCoder from the PRs you seem to understand exactly what's going on here vs allow-privileged - can you comment on whether we should just remove SecurityContextDeny on AWS?

@justinsb
Copy link
Member

ok to test

@k8s-github-robot
Copy link

The author of this PR is not in the whitelist for merge, can one of the admins add the 'ok-to-merge' label?

@zquestz
Copy link
Author

zquestz commented May 13, 2016

I think we should keep this as an ENV var so that we can support AMI's with SELinux enabled. I pulled this logic from the local-up scripts, and I think the experience should be similar.

If we remove it, then later it will need to be added back anyways to allow for SELinux based testing.

@zquestz
Copy link
Author

zquestz commented May 26, 2016

Just checking in, whats the status?

@justinsb justinsb added this to the v1.3 milestone May 27, 2016
@justinsb justinsb added the priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. label May 27, 2016
@justinsb
Copy link
Member

@zquestz it's a good fix (thanks!), and I want to get it merged so our test results are clean again. We have to figure out whether there's any reason to make it optional (and then, if so, how to control the options - e.g. are we going to have individual env vars for each admission controller?)

@zquestz
Copy link
Author

zquestz commented May 27, 2016

I just made it option like the local up script, that way the experience is consistent. If we want to remove it, and not make it optional, then that should be done for all scripts for consistency.

@goltermann
Copy link
Contributor

@zquestz This PR has the v1.3 milestone tag applied, but hasn't been touched in a week or more. We will cut Beta and branch on June 10. Please either close, finish off, get an LGTM or rebase this as needed to make sure it makes its way into 1.3.

@zquestz
Copy link
Author

zquestz commented Jun 3, 2016

So this is done and I was just waiting on feedback on whether you want it as an option like in the local up scripts, or just remove SecurityContextDeny completely from the AWS configuration. Once I have a clear answer I am happy to make changes if needed.

@goltermann
Copy link
Contributor

@justinsb sounds like a question for you.

@justinsb
Copy link
Member

justinsb commented Jun 3, 2016

@zquestz can we just remove it entirely from the AWS configuration? That brings us closer to GCE. If GCE makes it optional, we can use the same name.

We have enough additional complexity in AWS without adding another dimension :-)

@zquestz
Copy link
Author

zquestz commented Jun 4, 2016

@justinsb I will made the changes now.

@zquestz
Copy link
Author

zquestz commented Jun 4, 2016

@justinsb I have amended the PR. Now I just remove SecurityContextDeny like GCE.

@k8s-github-robot k8s-github-robot removed the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Jun 4, 2016
@k8s-github-robot k8s-github-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Jun 4, 2016
@justinsb justinsb changed the title Support ALLOW_SECURITY_CONTEXT env var for AWS e2e testing AWS kube-up: Remove SecurityContextDeny admission controller (to mirror GCE) Jun 4, 2016
@justinsb justinsb added lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note Denotes a PR that will be considered when it comes time to generate release notes. and removed release-note-label-needed labels Jun 4, 2016
@justinsb
Copy link
Member

justinsb commented Jun 4, 2016

LGTM - thanks :-)

@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-bot
Copy link

k8s-bot commented Jun 5, 2016

GCE e2e build/test passed for commit 07f8d02.

@k8s-github-robot
Copy link

Automatic merge from submit-queue

@k8s-github-robot k8s-github-robot merged commit 411696d into kubernetes:master Jun 5, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lgtm "Looks good to me", indicates that a PR is ready to be merged. priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. release-note Denotes a PR that will be considered when it comes time to generate release notes. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants