Skip to content

Conversation

@byako
Copy link
Contributor

@byako byako commented Oct 7, 2025

No description provided.

allowPrivilegeEscalation: false
capabilities:
drop: ["ALL"]
readOnlyRootFilesystem: true
Copy link
Contributor

@eero-t eero-t Oct 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While allowPrivilegeEscalation is no-op (always true) when privileged mode is used, according to docs: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.34/#securitycontext-v1-core

So are pretty much all the rest of these security settings no-ops with it, although that's not explicitly documented.

While it would be good to be able to restrict privileged mode with the other settings to just get (write) access to all host devices... Based on look at CRI-O & containerd code, container engines actually ignore the other security context restrictions when privileged mode is used.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah, this change is because API server does not accept conflicting (privileged vs. escalation) setup for this particular security item => I wonder why API server does not complain about other things that are not true with privileged mode...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants