Skip to content

Commit 3aca0fe

Browse files
authored
Merge pull request #59180 from ousleyp/cnv-21610
CNV-21610: 4.13 updates re: security/privileges
2 parents 9dc9fb2 + 13cb7d0 commit 3aca0fe

6 files changed

+32
-82
lines changed

_topic_maps/_topic_map.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3595,7 +3595,7 @@ Topics:
35953595
File: upgrading-virt
35963596
Distros: openshift-origin
35973597
- Name: Security policies
3598-
File: virt-additional-security-privileges-controller-and-launcher
3598+
File: virt-security-policies
35993599
- Name: Using the CLI tools
36003600
File: virt-using-the-cli-tools
36013601
- Name: Virtual machines
Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,11 @@
11
// Module included in the following assemblies:
22
//
3-
// * virt/virt-additional-security-privileges-controller-and-launcher.adoc
3+
// * virt/virt-security-policies.adoc
44

55
:_content-type: CONCEPT
66
[id="virt-about-workload-security_{context}"]
77
= About workload security
88

9-
By default, virtual machine (VM) workloads do not run with root privileges in {VirtProductName}.
9+
By default, virtual machine (VM) workloads do not run with root privileges in {VirtProductName}, and there are no supported {VirtProductName} features that require root privileges.
1010

11-
For each VM, a `virt-launcher` pod runs an instance of `libvirt` in _session mode_ to manage the VM process. In session mode, the `libvirt` daemon runs as a non-root user account and only permits connections from clients that are running under the same user identifier (UID). Therefore, VMs run as unprivileged pods, adhering to the security principle of least privilege.
12-
13-
There are no supported {VirtProductName} features that require root privileges. If a feature requires root, it might not be supported for use with {VirtProductName}.
11+
For each VM, a `virt-launcher` pod runs an instance of `libvirt` in _session mode_ to manage the VM process. In session mode, the `libvirt` daemon runs as a non-root user account and only permits connections from clients that are running under the same user identifier (UID). Therefore, VMs run as unprivileged pods, adhering to the security principle of least privilege.

modules/virt-additional-scc-for-kubevirt-controller.adoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
// Module included in the following assemblies:
22
//
3-
// * virt/virt-additional-security-privileges-controller-and-launcher.adoc
3+
// * virt/virt-security-policies.adoc
44

55
:_content-type: REFERENCE
66
[id="virt-additional-scc-for-kubevirt-controller_{context}"]
@@ -20,11 +20,10 @@ This allows virtual machines to use the hostpath volume plugin.
2020
* `scc.AllowPrivilegedContainer = false` +
2121
This ensures the virt-launcher pod is not run as a privileged container.
2222
23-
* `scc.AllowedCapabilities = []corev1.Capability{"SYS_NICE", "NET_BIND_SERVICE", "SYS_PTRACE"}` +
23+
* `scc.AllowedCapabilities = []corev1.Capability{"SYS_NICE", "NET_BIND_SERVICE"}` +
2424
2525
** `SYS_NICE` allows setting the CPU affinity.
2626
** `NET_BIND_SERVICE` allows DHCP and Slirp operations.
27-
** `SYS_PTRACE` enables certain versions of `libvirt` to find the process ID (PID) of `swtpm`, a software Trusted Platform Module (TPM) emulator.
2827

2928
== Viewing the SCC and RBAC definitions for the kubevirt-controller
3029

modules/virt-extended-selinux-policies-for-virt-launcher.adoc

Lines changed: 0 additions & 46 deletions
This file was deleted.

virt/virt-additional-security-privileges-controller-and-launcher.adoc

Lines changed: 0 additions & 27 deletions
This file was deleted.

virt/virt-security-policies.adoc

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
:_content-type: ASSEMBLY
2+
[id="virt-security-policies"]
3+
= Security policies
4+
include::_attributes/common-attributes.adoc[]
5+
:context: virt-security-policies
6+
7+
toc::[]
8+
9+
Learn about {VirtProductName} security and authorization.
10+
11+
.Key points
12+
* {VirtProductName} adheres to the `restricted` link:https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted[Kubernetes pod security standards] profile, which aims to enforce the current best practices for pod security.
13+
14+
* Virtual machine (VM) workloads run as unprivileged pods.
15+
16+
* xref:../authentication/managing-security-context-constraints.adoc#security-context-constraints-about_configuring-internal-oauth[Security context constraints] (SCCs) are defined for the `kubevirt-controller` service account.
17+
18+
include::modules/virt-about-workload-security.adoc[leveloffset=+1]
19+
20+
include::modules/virt-additional-scc-for-kubevirt-controller.adoc[leveloffset=+1]
21+
22+
[role="_additional-resources"]
23+
[id="additional-resources_{context}"]
24+
== Additional resources
25+
* xref:../authentication/managing-security-context-constraints.adoc#security-context-constraints-about_configuring-internal-oauth[Managing security context constraints]
26+
* xref:../authentication/using-rbac.adoc#using-rbac[Using RBAC to define and apply permissions]

0 commit comments

Comments
 (0)