-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SCC caps defaults #6627
SCC caps defaults #6627
Conversation
My assumption originally that safe would drop almost all caps. Are there any on the fence? |
@soltysh note the additional carry when you rebase the rebase pull. |
So, the default caps that are given by docker are
in restricted and anyuid we are force dropping @eparis are any of those questionable? The other alternative for a "safer" version would be to have |
Safe in my head is very restrictive (as safe as possible) that can run On Wed, Jan 13, 2016 at 8:38 AM, Paul Weil notifications@github.com wrote:
|
aed1622
to
6cb0a4c
Compare
@eparis - bump |
Part three will be to change the default in origin and update our readme. We then need to clearly indicate for enterprise the more restrictive default, and reset to the more restrictive default per project in our tests. Then we can say "anyuid is allowed for origin" |
I'd like to merge this soon. |
[test] |
re[test] |
Evaluated for origin test up to 6cb0a4c |
continuous-integration/openshift-jenkins/test FAILURE (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/638/) |
LGTM [merge] - let's be sure to catch eric or dan when they have some cycles to make sure the list is correct. I'll draft the email and messaging around changing the default mode to "anyuid" in Origin and sync with Brenton on the productization impacts. |
image flake: https://ci.openshift.redhat.com/jenkins/job/merge_pull_requests_origin/4811/console re[merge] |
continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/merge_pull_requests_origin/4815/) (Image: devenv-rhel7_3301) |
[merge] On Mon, Feb 1, 2016 at 4:40 PM, OpenShift Bot notifications@github.com
|
Evaluated for origin merge up to 6cb0a4c |
last flake: #5881 |
Part 2, dependent on #6470 (second commit only)
Card: https://trello.com/c/7eesi2lw/586-add-defaulting-and-restrictions-in-scc-for-capabilities
@eparis @smarterclayton
Based on the SCCs we currently have and the request in the card here is what I came up with:
References:
audit_write
Add AUDIT_WRITE cap moby/moby#7179SCCs
I still need to test through the different scenarios to make sure things are working as expected.
cc @pmorie