-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Charts' device value files override component security contexts #815
Comments
Also, the vllm dropped the entire security context via #564. Now the init container carefully manages the security context but the main container runs as root and with all capabilities. |
UI and NGINX services are also missing user setting, i.e. running as root:
And this shows those same deployments also running with all the (default) capabilities):
Larger number of containers is running with (default) root group:
EDIT: groups are not in k8s security, so last one can be ignored. |
In addition to disabling read-only FS setting, there are also some Helm charts that do not set it at all:
|
I don't think the k8s pod security standard ever mention any requirements for group settings, so we just run the container with the default group settings defined by the container image itself. |
We need to double check if the new image can run with read-only FS now. It's set as false because when the helm chart was created, the container doesn't support running under read-only root FS by that time. |
I was not suggesting changing it blindly. This is more of a reminder to go through these items. And yes, groups are not mentioned k8s security standards, so that part can be ignored: https://kubernetes.io/docs/concepts/security/pod-security-standards/ |
The vllm security settings are disabled by this commit, the reason behind this was at that time, opea/vllm-hpu image doesn't support run as non-root, while opea/vllm supported. Also, since there is no way for the helm to unset/delete values for the child chart, so we're stuck with this no security settings situation. |
Then it should be changed to run as root (with comment indicating why), instead of dropping the whole security context. User 0 with the extra constraints is still fairly OK, without constraints, much less so. |
Several application values files change component
securityContext
, for example setting (container) root FS to be writable:Those overrides are for
tei
&teirerank
components, which seem to have same override for Gaudi, but I think that's wrong. Either component needs to write root FS or not, it should not depend on which device is used:I'm pretty sure those overrides were made redundant with #613 and #642.
latest testing status for
true
readOnlyRootFileSystem settings of commonThe text was updated successfully, but these errors were encountered: