Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-2868

Add Security Context Constraint taylored to running Podman and Skopeo in a Pod

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Done
    • Icon: Normal Normal
    • None
    • None
    • Node
    • False
    • None
    • False
    • Not Selected

      With more and more stuff being containerized, people want to inspect / run containers in a Pod, without needing a privileged Pod.

      Currently this knowledge is in blog posts like https://www.redhat.com/sysadmin/podman-inside-kubernetes
      However understanding the implications of the changes needed (Seccomp profile, dropping SeLinux confinement) is not trivial, and having a ready to use SCC for this purpose would help OpenShift users much.

      Such a `nested` SCC should be based on the `restricted` SCC and allows the minimum permissions to run podman/buildah inside pods.
      Needed permissions would include (to be verified):

              gausingh@redhat.com Gaurav Singh
              rhn-support-ekasprzy Emmanuel Kasprzyk
              Votes:
              0 Vote for this issue
              Watchers:
              15 Start watching this issue

                Created:
                Updated:
                Resolved: