-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
User with privileged SCC can't let images start as default user #5317
Comments
|
from the default namespace |
Unless you specifically ask for something you will run as the most restrictive context available to you. In this case the admin has access to both the restricted and privileged scc. You should be able to set the RunAsUser to anything you want though. |
proposal: Requirements
Changes
Use casesAssumptionsCurrent scoring mechanism is modified for new features being introduced and will look as follows:
Max base score for everything except root (4 strategies): 66 All use cases assume the following SCCs are configured:
Use cases describe the returned sort in the form of [name:score] No ns annotation
NS annotation of 'restricted'
NS annotation of 'restricted,semi-privileged'
NS annotation of 'restricted,semi-privileged,privileged'
NS annotation of 'semi-privileged,restricted,privileged'
|
I would rephrase the requirements:
Why can we not structured this as "if the allowed SCCs allows the pod to On Mon, Oct 26, 2015 at 5:14 PM, Paul Weil [email protected] wrote:
|
Yeah, it's more "select the SCC that requires the least mutation of the pod" |
Do we not get that by default if we reverse the points comparison? Strategies that allow using dockerfile defaults are RunAsAny and RunAsNonRoot which have higher scores. |
"security points" isn't the same as "mutation distance"... only the RunAs strategies mutate (I think) |
That's correct. In that case we would only need to rate mutating strategies so the sort code could be reduced quite a bit. Ok with the admin influence piece of this? |
I guess |
The question is do we even need this complexity. The use case for keeping
On Tue, Oct 27, 2015 at 9:41 AM, Jordan Liggitt [email protected]
|
ok. In that case, how about if the annotation takes only takes a single, named SCC for the namespace. If it exists it is bumped to the front of the line, period. No changing of scores, no changing of sort methods. So the behavior would be:
|
Jordan and I argued for a bit. Here's the proposal:
On Tue, Oct 27, 2015 at 11:07 AM, Paul Weil [email protected]
|
Basically this replaces the calculated sorting (most-least restrictive, On Tue, Oct 27, 2015 at 11:33 AM, Clayton Coleman [email protected]
|
Close, but I think you only need step 3, and the application of an SCC should stay the same as it is today. Only the way we select the SCC would change. Some constraints (RunAsAny) wouldn't mutate the pod, while others would (RunAsRange). Which SCC gets selected determines whether the pod is mutated |
@liggitt - got it. Discussed in IRC. This won't change the way admission behaves (only the ByRestrictions sorter which will no longer be by restrictions it will be by priority) so I think it is relatively minor. I'll work it up. |
Pod created by cluster-admin is getting UID (first in range from project) assigned, but should have no uid set (because RunAsAny).
The text was updated successfully, but these errors were encountered: