Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Redis Pods Running with Higher Privileges in Namespace-Scoped Argo CD Instance #1662

Open
Mangaal opened this issue Feb 12, 2025 · 0 comments

Comments

@Mangaal
Copy link
Contributor

Mangaal commented Feb 12, 2025

Description

When installing a namespace-scoped Argo CD instance, the argocd-redis pods are assigned the nonroot-v2 SecurityContextConstraints (SCC) instead of the default restricted-v2 SCC. This results in the pods having higher privileges than expected.

This issue appears to originate from the Redis container image, which explicitly sets RunAsUser: 999, requiring nonroot-v2 SCC instead of the more restrictive restricted-v2 SCC.

Key Question

Is there a specific reason the Redis container must run as UID 999 instead of using a dynamically assigned UID?

Security Concern: Elevated Privileges for Redis ServiceAccount

In OpenShift, SecurityContextConstraints (SCCs) define the security policies under which pods operate.

Expected SCC for namespace-scoped Argo CD instances: restricted-v2 (enforces randomized UID allocation and strict privilege restrictions).

Current SCC for Redis pods: nonroot-v2 (allows running as a fixed UID, in this case, 999, which grants higher privileges).

This discrepancy raises potential security concerns, as unprivileged users may be able to deploy a pod using the argocd-redis ServiceAccount with elevated privileges.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant