-
Notifications
You must be signed in to change notification settings - Fork 715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubernetes Security Assesment: evaluate kubeadm reset problems #1715
Comments
i think we should remove the
which only happens in a _linux.go file and the _windows.go file is a NOP. if
i still believe this is true and reset is best effort, unless something odd is going on e.g. missing |
document in both the CLI of reset and the k8s.io docs that reset is best effort: |
+1 |
At least make sure these errors are logged? |
a quick check does not reveal any errors that are not reported as warnings. |
this is fixed. |
https://github.com/kubernetes/community/blob/master/wg-security-audit/findings/Kubernetes%20Final%20Report.pdf
search for:
Kubeadm performs potentially-dangerous reset operations
Finding ID: TOB-K8S-014
the TL;DR is that
reset
according to the finding performs a set of Unix-ism unsafe operations.there are also comments about errors not being returned, but i personally slightly disagree with that because
kubeadm reset
is best-effort and should not error out on every small error it finds.The text was updated successfully, but these errors were encountered: