-
Notifications
You must be signed in to change notification settings - Fork 244
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] Pod securityContext fsGroup is not taking effect #814
Comments
@lulf This is because in kubernetes
PV specification on crc.
Hope this will help why this is a different behavior here. |
@praveenkumar Thanks for the explanation. Since what we are testing are end-user examples that uses persistenvolumeclaims, its not something we can change. Is there a workaround we can apply to CRC in order for this to work? |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
General information
crc setup
before starting it (Yes/No)?With CRC, attaching a persistentVolumeClaim to a pod with securityContext.fsGroup set, does not set the appropriate permissions on the persistent volume. With OpenShift 4.2 on AWS, the permissions are set as expected.
CRC version
CRC status
CRC config
Host Operating System
Steps to reproduce
Expected
On Openshift 4.2 on AWS:
Actual
On CRC:
The text was updated successfully, but these errors were encountered: