capabilities and securityContext for runner pods #3460
lefterisALEX
started this conversation in
General
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello,
My team is offering managed Kubernetes inside out company and we are working on setting up ARC in our environment to allow the developers of our company to run GitHub actions.
What our users, mostly developers, would like to have is:
sudo apt-get install <package name>
).kaniko
andbuildah
.We are currently struggle a bit with what capabilities the runner pods should have. By default in all clusters we offer we drop all capabilities and we do not allow teams run containers as root, neither allow escalation.
But this in case of github actions do not allow teams use
apt-get install <package-name>
in their pipelines of course, and neither kaniko/buildah works.We said to give a try to allow use only the required capabilities , but we end up allowing too much, for example
SYS_ADMIN , SETUID, SETGID, CHOWN
and more...Is there a better way to tackle this instead of just adding capabilities?
Beta Was this translation helpful? Give feedback.
All reactions