mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-23 11:50:44 +00:00
Merge pull request #61930 from Random-Liu/fix-cri-run-as-group
Automatic merge from submit-queue (batch tested with PRs 61930, 61885). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. Fix comment in CRI run_as_group. This PR: 1) Clarify that runtime should return error if `run_as_group` is set when `run_as_user` is not. (Current behavior in dockershim, https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/dockershim/security_context.go#L93) 2) Remove `run_as_groupname` which is not supported now. /cc @kubernetes/sig-node-api-reviews /cc @krmayankk **Release note**: ```release-note none ```
This commit is contained in:
commit
92c5fa36f9
@ -557,7 +557,8 @@ type LinuxSandboxSecurityContext struct {
|
|||||||
SelinuxOptions *SELinuxOption `protobuf:"bytes,2,opt,name=selinux_options,json=selinuxOptions" json:"selinux_options,omitempty"`
|
SelinuxOptions *SELinuxOption `protobuf:"bytes,2,opt,name=selinux_options,json=selinuxOptions" json:"selinux_options,omitempty"`
|
||||||
// UID to run sandbox processes as, when applicable.
|
// UID to run sandbox processes as, when applicable.
|
||||||
RunAsUser *Int64Value `protobuf:"bytes,3,opt,name=run_as_user,json=runAsUser" json:"run_as_user,omitempty"`
|
RunAsUser *Int64Value `protobuf:"bytes,3,opt,name=run_as_user,json=runAsUser" json:"run_as_user,omitempty"`
|
||||||
// GID to run sandbox processes as, when applicable.
|
// GID to run sandbox processes as, when applicable. run_as_group should only
|
||||||
|
// be specified when run_as_user is specified; otherwise, the runtime MUST error.
|
||||||
RunAsGroup *Int64Value `protobuf:"bytes,8,opt,name=run_as_group,json=runAsGroup" json:"run_as_group,omitempty"`
|
RunAsGroup *Int64Value `protobuf:"bytes,8,opt,name=run_as_group,json=runAsGroup" json:"run_as_group,omitempty"`
|
||||||
// If set, the root filesystem of the sandbox is read-only.
|
// If set, the root filesystem of the sandbox is read-only.
|
||||||
ReadonlyRootfs bool `protobuf:"varint,4,opt,name=readonly_rootfs,json=readonlyRootfs,proto3" json:"readonly_rootfs,omitempty"`
|
ReadonlyRootfs bool `protobuf:"varint,4,opt,name=readonly_rootfs,json=readonlyRootfs,proto3" json:"readonly_rootfs,omitempty"`
|
||||||
@ -1465,8 +1466,9 @@ type LinuxContainerSecurityContext struct {
|
|||||||
// UID to run the container process as. Only one of run_as_user and
|
// UID to run the container process as. Only one of run_as_user and
|
||||||
// run_as_username can be specified at a time.
|
// run_as_username can be specified at a time.
|
||||||
RunAsUser *Int64Value `protobuf:"bytes,5,opt,name=run_as_user,json=runAsUser" json:"run_as_user,omitempty"`
|
RunAsUser *Int64Value `protobuf:"bytes,5,opt,name=run_as_user,json=runAsUser" json:"run_as_user,omitempty"`
|
||||||
// GID to run the container process as. Only one of run_as_group and
|
// GID to run the container process as. run_as_group should only be specified
|
||||||
// run_as_groupname can be specified at a time.
|
// when run_as_user or run_as_username is specified; otherwise, the runtime
|
||||||
|
// MUST error.
|
||||||
RunAsGroup *Int64Value `protobuf:"bytes,12,opt,name=run_as_group,json=runAsGroup" json:"run_as_group,omitempty"`
|
RunAsGroup *Int64Value `protobuf:"bytes,12,opt,name=run_as_group,json=runAsGroup" json:"run_as_group,omitempty"`
|
||||||
// User name to run the container process as. If specified, the user MUST
|
// User name to run the container process as. If specified, the user MUST
|
||||||
// exist in the container image (i.e. in the /etc/passwd inside the image),
|
// exist in the container image (i.e. in the /etc/passwd inside the image),
|
||||||
|
@ -237,7 +237,8 @@ message LinuxSandboxSecurityContext {
|
|||||||
SELinuxOption selinux_options = 2;
|
SELinuxOption selinux_options = 2;
|
||||||
// UID to run sandbox processes as, when applicable.
|
// UID to run sandbox processes as, when applicable.
|
||||||
Int64Value run_as_user = 3;
|
Int64Value run_as_user = 3;
|
||||||
// GID to run sandbox processes as, when applicable.
|
// GID to run sandbox processes as, when applicable. run_as_group should only
|
||||||
|
// be specified when run_as_user is specified; otherwise, the runtime MUST error.
|
||||||
Int64Value run_as_group = 8;
|
Int64Value run_as_group = 8;
|
||||||
// If set, the root filesystem of the sandbox is read-only.
|
// If set, the root filesystem of the sandbox is read-only.
|
||||||
bool readonly_rootfs = 4;
|
bool readonly_rootfs = 4;
|
||||||
@ -555,8 +556,9 @@ message LinuxContainerSecurityContext {
|
|||||||
// UID to run the container process as. Only one of run_as_user and
|
// UID to run the container process as. Only one of run_as_user and
|
||||||
// run_as_username can be specified at a time.
|
// run_as_username can be specified at a time.
|
||||||
Int64Value run_as_user = 5;
|
Int64Value run_as_user = 5;
|
||||||
// GID to run the container process as. Only one of run_as_group and
|
// GID to run the container process as. run_as_group should only be specified
|
||||||
// run_as_groupname can be specified at a time.
|
// when run_as_user or run_as_username is specified; otherwise, the runtime
|
||||||
|
// MUST error.
|
||||||
Int64Value run_as_group = 12;
|
Int64Value run_as_group = 12;
|
||||||
// User name to run the container process as. If specified, the user MUST
|
// User name to run the container process as. If specified, the user MUST
|
||||||
// exist in the container image (i.e. in the /etc/passwd inside the image),
|
// exist in the container image (i.e. in the /etc/passwd inside the image),
|
||||||
|
Loading…
Reference in New Issue
Block a user