-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
generate kube: do not set caps with --privileged #9283
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: vrothberg The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
LGTM |
Alright, hitting the same error as reported. Will have another look. |
newCaps, err := capAddDrop(c.config.Spec.Process.Capabilities) | ||
if err != nil { | ||
return nil, err | ||
var capabilities *v1.Capabilities |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't this be initialized? (I'm not a Gohead; I may be missing something obvious)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's no required here. Setting the container to privileged implies that all caps get set later on:
$ podman (fix-8897) $ podman top 5e5eb6e0fb43 capeff
EFFECTIVE CAPS
full
Tests red. Otherwise LGTM |
Do not play with capabilities for privileged containers where all capabilities will be set implicitly. Also, avoid the device check when running privileged since all of /dev/* will be mounted in any case. Fixes: containers#8897 Signed-off-by: Valentin Rothberg <[email protected]>
This is looking good now 👍 |
/lgtm |
LGTM |
/hold cancel |
Do not play with capabilities for privileged containers where all
capabilities will be set implicitly.
While the initital error report from #8897 is not reproducible,
privilged containers could not be executed due the bug at hand.
Fixes: #8897
Signed-off-by: Valentin Rothberg [email protected]