Skip to content

Conversation

@dustymabe
Copy link
Member

No description provided.

This becaome obsolete when buildPod was introduced in
coreos/coreos-ci-lib@f2a82bd
Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request aims to improve security by no longer running the COSA container as root. This is a great improvement. However, by removing the root privileges, the mechanism for using the newly built coreos-installer binary was removed but not replaced. My review includes a critical suggestion to fix this by updating the PATH environment variable, ensuring that the CI continues to test the correct binary.

dustymabe added a commit to dustymabe/coreos-assembler that referenced this pull request Jan 9, 2026
Allow group write permissions on /usr/bin because in upstream
project's CI we want to overwrite binaries for testing. The dir is
owned by root:root and CI runs in openshift as a user that is a
member of the `root` (GID: 0) group.

See coreos/coreos-installer#1716
@dustymabe
Copy link
Member Author

Ok I think this should be ready to go.

requires https://github.com/coreos/coreos-assembler/pull/4410/changes (please review)

We opened up the permissions when building the COSA container [1] so
this isn't necessary any longer with a few adjustments here.

[1] coreos/coreos-assembler#4410
This issue should have been fixed a long time ago. Let's drop this
old workaround.
@dustymabe dustymabe marked this pull request as ready for review January 9, 2026 20:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants