-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug] OpenShift OAuth Proxy container failed to launch in default namespace #133
Comments
Hmm, I've been doing all the testing in my PRs with this:
and I haven't run into this problem. But it seems like something that should at least be configurable. |
Maybe it makes sense for us to apply a general Pod security context around everything, and then have optional container security contexts for each container within the Pod: Except for cases like this where we seem to know that a container will not run under the general Pod context, or at least on some common and supported k8s/OCP versions it won't, then we can provide a default for that particular container. |
I tested on another 4.15 cluster and on a 4.14 cluster and the simple |
Ahh opps, a mistake on my end, I didn't notice the chart was installed into the Thus, the pod won't be patched with |
Installing the chart into a different non-default namespace works as expected :D helm install cryostat \
--create-namespace=true --namespace myns \
--set authentication.openshift.enabled=true \
--set core.route.enabled=true \
./charts/cryostat/ I think we can close this issue as its not really a bug. Maybe we can document/give a warning this issue somewhere instead? |
Ahh makes sense, yes, I think we should have that documented somewhere. Maybe a note in the |
Sounds good! I can help open a quick PR for that :D |
After saying all that, I see we do have separate container security contexts: https://github.com/cryostatio/cryostat-helm?tab=readme-ov-file#jfr-data-source-container But the new storage and db containers don't have their own. They are mistakenly reusing the |
Opps closed by mistake :D |
Current Behavior
It seems like the Openshift OAuth proxy image does not specify a numeric non-root user. Thus,
runAsNonRoot: true
cannot be specified on pod.Container failed to launch with status:
Expected Behavior
Openshift Oauth proxy container should launch successfully.
Steps To Reproduce
Environment
Anything else?
Should the chart default to set
runAsUser
for the proxy container?The text was updated successfully, but these errors were encountered: