Skip to content

Conversation

@kurlov
Copy link
Member

@kurlov kurlov commented Jan 13, 2026

Description

Container.SecurityContext might be nil and allowPrivilegeEscalation should be set to true explicitly for such cases. Otherwise allowPrivilegeEscalation policy will not trigger on container without securityContext. See example in the ticket description.

User-facing documentation

Testing and quality

  • the change is production ready: the change is GA, or otherwise the functionality is gated by a feature flag
  • CI results are inspected

Automated testing

  • added unit tests
  • added e2e tests
  • added regression tests
  • added compatibility tests
  • modified existing tests

How I validated my change

Added unit test

@openshift-ci
Copy link

openshift-ci bot commented Jan 13, 2026

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@kurlov kurlov changed the title Rox-32636: Set allowPrivilegeEscalation to true for empty securityContext ROX-32636: Set allowPrivilegeEscalation to true for empty securityContext Jan 13, 2026
@kurlov kurlov changed the title ROX-32636: Set allowPrivilegeEscalation to true for empty securityContext ROX-32636: Set allowPrivilegeEscalation for empty securityContext Jan 13, 2026
@rhacs-bot
Copy link
Contributor

Images are ready for the commit at cc15c56.

To use with deploy scripts, first export MAIN_IMAGE_TAG=4.10.x-765-gcc15c56888.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants