You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Controls whether a process can gain more privileges than its parent process.
This bool directly controls whether the no_new_privs flag gets set on the container
process.
AllowPrivilegeEscalation is true always when the container is:
1) run as Privileged OR 2) has CAP_SYS_ADMIN.
""",
)
Currently, our logic is to treat True as a None value should and would be treated. I consider this a bug. The current behaviour is as if the default value was None, because our logic here makes us not explicitly set it.
Allows it to be set to None as well, to not set the property.
This is a breaking change for hubs where admins were granting
sudo rights to users. That already required some extra work,
so this would be an additional propety to set for that. The
added security benefit from this much more secure default is
well worth the breakage IMO.
Fixesjupyterhub#544
Allows it to be set to None as well, to not set the property.
This is a breaking change for hubs where admins were granting
sudo rights to users. That already required some extra work,
so this would be an additional propety to set for that. The
added security benefit from this much more secure default is
well worth the breakage IMO.
Fixesjupyterhub#544
Suggested changes
allow_privilege_escalation
beNone
,True
, orFalse
.None
should mean it won't be set explicitlyTrue
/False
should mean it will be set explicitly.allow_privilege_escalation
beFalse
Currently the default value is True but behaves as None.
Current situation
Currently, we the default value of
allow_privilege_escalation
isTrue
, and we don't allow the value to beNone
.kubespawner/kubespawner/spawner.py
Lines 915 to 927 in fdfa2ad
Currently, our logic is to treat
True
as aNone
value should and would be treated. I consider this a bug. The current behaviour is as if the default value was None, because our logic here makes us not explicitly set it.kubespawner/kubespawner/objects.py
Lines 427 to 428 in fdfa2ad
I consider this a bug because there is a difference between
True
andNone
in case there is a PodSecurityPolicy resource in the k8s cluster that has aDefaultAllowPrivilegeEscalation
set to False. See https://kubernetes.io/docs/concepts/policy/pod-security-policy/#privilege-escalation for some details about this.Background
Root escalation is one required step towards doing bad things, to default to preventing it by default is to put another barrier up against something problematic like https://www.wiz.io/blog/chaosdb-explained-azures-cosmos-db-vulnerability-walkthrough.
The text was updated successfully, but these errors were encountered: