Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PVC volumes are not allowed by default SCCs #8297

Closed
liggitt opened this issue Mar 30, 2016 · 7 comments
Closed

PVC volumes are not allowed by default SCCs #8297

liggitt opened this issue Mar 30, 2016 · 7 comments
Assignees
Labels
area/security component/storage kind/bug Categorizes issue or PR as related to a bug. priority/P0

Comments

@liggitt
Copy link
Contributor

liggitt commented Mar 30, 2016

persistant volume claim volumes are not allowed by default SCCs

That results in errors like this:

Error creating: pods "postgresql-1-" is forbidden: unable to validate against any security context constraint: [spec.containers[0].securityContext.volumes[0]: Invalid value: "persistentVolumeClaim": persistentVolumeClaim volumes are not allowed to be used spec.containers[0].securityContext.volumes[0]: Invalid value: "persistentVolumeClaim": persistentVolumeClaim volumes are not allowed to be used]

Default allowed volumes should include persistentVolumeClaim

@liggitt liggitt added kind/bug Categorizes issue or PR as related to a bug. priority/P0 component/storage area/security labels Mar 30, 2016
@smarterclayton
Copy link
Contributor

We need to add a regular user PVC -> PV scenario to the test-end-to-end (so that merges are blocked on PVCs not working).

@jorgemoralespou
Copy link

In case someone steps into this issue and needs to workaround until the fix PR is merged:

Add persistentVolumeClaim to all the SCC volumes arrays.

@spolti
Copy link

spolti commented Apr 1, 2016

Hi, is this bug related with this message: pods "docker-registry-1-" is forbidden: unable to validate against any security context constraint: [spec.containers[0].securityContext.privileged: Invalid value: true: Privileged containers are not allowed spec.containers[0].securityContext.volumes[0]: Invalid value: "hostPath": hostPath volumes are not allowed to be used]

?

@pweil-
Copy link
Contributor

pweil- commented Apr 4, 2016

@spolti - this error would've been persistentVolumeClaim volumes are not allowed to be used. Host paths are restricted by default in most SCCs since they provide direct access to the host. If you need to grant access to an elevated SCC you may use the oadm policy add-scc-to-user <scc name> <user name>

@sdodson
Copy link
Member

sdodson commented Apr 4, 2016

ETA on v1.1.6 for this?

@smarterclayton
Copy link
Contributor

Waiting to see what problems people hit this morning. Might be this
afternoon.

On Mon, Apr 4, 2016 at 1:34 PM, Scott Dodson [email protected]
wrote:

ETA on v1.1.6 for this?


You are receiving this because you commented.
Reply to this email directly or view it on GitHub
#8297 (comment)

@spolti
Copy link

spolti commented Apr 4, 2016

@pweil Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security component/storage kind/bug Categorizes issue or PR as related to a bug. priority/P0
Projects
None yet
Development

No branches or pull requests

6 participants