Bug 1823609
Summary: | The SCC issue cause OTA can not smooth upgrade from 4.3.9 to 4.3.10. | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Phil Huang <pihuang> |
Component: | Cluster Version Operator | Assignee: | Abhinav Dahiya <adahiya> |
Status: | CLOSED DUPLICATE | QA Contact: | liujia <jiajliu> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 4.3.z | CC: | aos-bugs, jokerman, rbohne, scuppett |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-14 11:55:52 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Phil Huang
2020-04-14 02:54:45 UTC
I learn some news from Bug 1818893 Provide more informations from SCC anyuid and hostmount-anyuid $ oc get scc anyuid -o yaml allowHostDirVolumePlugin: false allowHostIPC: false allowHostNetwork: false allowHostPID: false allowHostPorts: false allowPrivilegeEscalation: true allowPrivilegedContainer: false allowedCapabilities: null apiVersion: security.openshift.io/v1 defaultAddCapabilities: null fsGroup: type: RunAsAny groups: - system:cluster-admins kind: SecurityContextConstraints metadata: annotations: kubernetes.io/description: anyuid provides all features of the restricted SCC but allows users to run with any UID and any GID. creationTimestamp: "2020-03-16T18:23:04Z" generation: 4 name: anyuid resourceVersion: "268421" selfLink: /apis/security.openshift.io/v1/securitycontextconstraints/anyuid uid: a66c7a1d-eda5-42ee-97e0-a814caee19cf priority: 10 readOnlyRootFilesystem: false requiredDropCapabilities: - MKNOD runAsUser: type: RunAsAny seLinuxContext: type: MustRunAs supplementalGroups: type: RunAsAny users: - system:serviceaccount:debugging:runasanyuid volumes: - configMap - downwardAPI - emptyDir - persistentVolumeClaim - projected - secret $ oc get scc hostmount-anyuid -o yaml allowHostDirVolumePlugin: true allowHostIPC: false allowHostNetwork: false allowHostPID: false allowHostPorts: false allowPrivilegeEscalation: true allowPrivilegedContainer: false allowedCapabilities: null apiVersion: security.openshift.io/v1 defaultAddCapabilities: null fsGroup: type: RunAsAny groups: [] kind: SecurityContextConstraints metadata: annotations: kubernetes.io/description: 'hostmount-anyuid provides all the features of the restricted SCC but allows host mounts and any UID by a pod. This is primarily used by the persistent volume recycler. WARNING: this SCC allows host file system access as any UID, including UID 0. Grant with caution.' creationTimestamp: "2020-03-16T18:23:04Z" generation: 2 name: hostmount-anyuid resourceVersion: "2291577" selfLink: /apis/security.openshift.io/v1/securitycontextconstraints/hostmount-anyuid uid: 853871a0-535f-4c2b-a462-8ce2b8682369 priority: null readOnlyRootFilesystem: false requiredDropCapabilities: - MKNOD runAsUser: type: RunAsAny seLinuxContext: type: MustRunAs supplementalGroups: type: RunAsAny users: - system:serviceaccount:openshift-infra:pv-recycler-controller - system:serviceaccount:default:nfs-client-provisioner volumes: - configMap - downwardAPI - emptyDir - hostPath - nfs - persistentVolumeClaim - projected - secret In SCC hostmount-anyuid, I try to remove users `- system:serviceaccount:default:nfs-client-provisioner`, and it is work. But I don't have any idea in SCC anyuid, any comment are welcome OK... I dont known what happened $ oc get clusterversion version NAME VERSION AVAILABLE PROGRESSING SINCE STATUS version 4.3.10 True False 2m46s Cluster version is 4.3.10 $ oc edit scc hostmount-anyuid and put `- system:serviceaccount:default:nfs-client-provisioner` back to users lists I think it is not a reality to change SCC on the production environment when upgrading OCP, and it should provide a more clear and specific solution with users. *** This bug has been marked as a duplicate of bug 1821905 *** |