-
Couldn't load subscription status.
- Fork 141
Fix port binding with reduced privileges #3574
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Problem: The nginx deployment was using extra privileges in order to bind to privileged ports (<1024). This included `allowPrivilegeEscalation` and `NET_BIND_SERVICE`. Solution: Remove these extra privileges and take advantage of `sysctls` to lower the allowed port range for the pod its defined on.
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #3574 +/- ##
==========================================
- Coverage 86.89% 86.86% -0.04%
==========================================
Files 127 127
Lines 15220 15226 +6
Branches 62 62
==========================================
Hits 13226 13226
- Misses 1843 1848 +5
- Partials 151 152 +1 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚀
Problem: The nginx deployment was using extra privileges in order to bind to privileged ports (<1024). This included `allowPrivilegeEscalation` and `NET_BIND_SERVICE`. Sometimes this could cause issues in some secure environments. Solution: Remove these extra privileges and take advantage of `sysctls` to lower the allowed port range for the pod its defined on.
Problem: The nginx deployment was using extra privileges in order to bind to privileged ports (<1024). This included `allowPrivilegeEscalation` and `NET_BIND_SERVICE`. Sometimes this could cause issues in some secure environments. Solution: Remove these extra privileges and take advantage of `sysctls` to lower the allowed port range for the pod its defined on.
Problem: The nginx deployment was using extra privileges in order to bind to privileged ports (<1024). This included
allowPrivilegeEscalationandNET_BIND_SERVICE. Sometimes this could cause issues in some secure environments.Solution: Remove these extra privileges and take advantage of
sysctlsto lower the allowed port range for the pod its defined on.Testing: Verified that everything still works, including in OpenShift.
Closes #3567
Checklist
Before creating a PR, run through this checklist and mark each as complete.
Release notes
If this PR introduces a change that affects users and needs to be mentioned in the release notes,
please add a brief note that summarizes the change.