-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Figure out the future of the security context feature flag #9067
Comments
/area API |
kubernetes/enhancements#1598 is quite interesting: landed recently in upstream and would - I think - remove the use case we had for being able to set fsGroup. |
From @mattmoor : #7923 (comment)
|
This issue is stale because it has been open for 90 days with no |
/lifecycle frozen |
I was wondering why we constraint the user container's security context that much. I get why we want to constraint it pod-level, but not allowing the user to constraint their user-container as much as they want (i.e. dropping capabilities etc.) seems quite arbitrary. |
@markusthoemmes That's why I made the issue - I'd say when the feature flag was made we were being conservative with properties. Whatever we choose to open up we should make sure it's captured in the API spec |
/kind api-change /triage accepted /assign @evankanderson |
cc @julz @markusthoemmes @evankanderson As part of the spec work I went over the container security context and figured it was worth adding Here are the allowable fields - note serving/pkg/apis/serving/fieldmask.go Lines 612 to 631 in 9063864
|
I think I'm content to leave PodSecurityContext disabled by default and close out this issue after the above PR. Ideally we need finer grain control than Kubernetes currently offers. We ideally want distinct security contexts between our (queue-proxy etc.) and the users containers and volumes. |
Closing this out as the PR has merged |
This expands on #7924
Given that PR #9060 added a feature flag to unblock folks using EKS we should determine what we want to do long term.
tl;dr exposing the PodSecurityContext may give users control beyond their containers (ie. run user, group, fs group) and this could have unintended side-effects on our queue-proxy & potentially mesh sidecars
Originally posted by @julz in #9060
Originally posted by @dprotaso in #9060
The text was updated successfully, but these errors were encountered: