-
Notifications
You must be signed in to change notification settings - Fork 894
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove IPC_LOCK capability #198
Remove IPC_LOCK capability #198
Conversation
Always great to see that someone already created the PR I just wanted to start working on. 👍 @jasonodonnell The only way that I can envision that this could break existing deployments is if someone would have explicitly defined |
@pabrahamsson You probably should also remove the two test cases in test/acceptance/server-ha.bats and test/acceptance/server.bats |
Thank you @tongpu, updated. |
this would also be nice for allowing deployment on eks + fargate |
@jasonodonnell is there anything I can do to help getting this PR merged? |
@pabrahamsson you would probably want to conditionally have the securityContext capability exist based on some .Values parameter some people may want that security context field there perhaps a .Values.mlock_enabled bool, defaulting to true, which adds the securityContext.capabilities element? |
@karabijavad while I can do what you suggest I'd like to understand the reasoning. The conditionals you're mentioning were already removed as part of #80. |
@pabrahamsson my apologies. i had no idea about that. youre right. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks!
Hello, could you release new version with this fix please ? Thanks! |
* Remove IPC_LOCK capability * Remove tests for IPC_LOCK
Having setcap set on the binary broke upstream Helm chart compatability due to hashicorp/vault-helm#198. Signed-off-by: Adrian Mouat <adrian@chainguard.dev>
Since we know we're deploying to k8s and are already disabling
mlock
(also see #80), is there a need forIPC_LOCK
?This also helps with deploying on for example Openshift as we now only need
--set server.uid
and--set server.gid
for the ranges allowed by therestricted
SCC. No more mucking around with SCCs and capabilities.