Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-2868

Add Security Context Constraint taylored to running Podman and Skopeo in a Pod

XMLWordPrintable

    • None
    • Product / Portfolio Work
    • None
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • None

      With more and more stuff being containerized, people want to inspect / run containers in a Pod, without needing a privileged Pod.

      Currently this knowledge is in blog posts like https://www.redhat.com/sysadmin/podman-inside-kubernetes
      However understanding the implications of the changes needed (Seccomp profile, dropping SeLinux confinement) is not trivial, and having a ready to use SCC for this purpose would help OpenShift users much.

      Such a `nested` SCC should be based on the `restricted` SCC and allows the minimum permissions to run podman/buildah inside pods.
      Needed permissions would include (to be verified):

              gausingh@redhat.com Gaurav Singh
              rhn-support-ekasprzy Emmanuel Kasprzyk (Inactive)
              None
              Votes:
              0 Vote for this issue
              Watchers:
              16 Start watching this issue

                Created:
                Updated:
                None
                None