-
Notifications
You must be signed in to change notification settings - Fork 40.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Control permissions of non-emptyDir volumes #11319
Comments
So existing proposal is there is a pod wide security context that applies On Jul 15, 2015, at 2:12 PM, Paul Morie [email protected] wrote: This issue is to discuss how we can offer control of permissions on volumes @thockin https://github.com/thockin @eparis https://github.com/eparis — |
@smarterclayton I'm not sure whether I think it should be per-volume type -- it cuts across all volume types, doesn't it? |
Maybe - I wasn't sure whether one of the types might not be amenable to having a perm forced. |
@smarterclayton I am also not sure; I am talking to folks about this now. |
Issues go stale after 30d of inactivity. Prevent issues from auto-closing with an If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Forking from #2630
This issue is to discuss how we can offer control of permissions on volumes that are not emptyDir or based on emptyDir (secrets, git repo, downward API) so that they can be used easily with packages that have requirements about perms.
@thockin @eparis @smarterclayton
The text was updated successfully, but these errors were encountered: