-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug] OpenShift OAuth Proxy can't run in default namespace #969
Comments
I guess after this is resolved, we can also remove the note here about setting |
Indeed! I missed that comment initially. |
https://github.com/oauth2-proxy/oauth2-proxy/blob/master/Dockerfile "User": "", It looks like the oauth2-proxy does not have |
I suppose that's okay as we allow users to set a UID in the container's security context through the CRD. I think that's the only way this container will work in Kubernetes in a namespace with the restricted pod security level. It would be ideal if both images had explicit |
I wonder if the podman inspect quay.io/oauth2-proxy/oauth2-proxy | jq .[].User
"65532" |
Ah, I was inspecting a different tag: |
Oh actually, the |
Oh yep, I just did a quick test and it seems to run without issue^^ Probably need a double check :D |
I suppose one cool way we know this works is our Scorecard tests running in CI. The namespace is labeled as restricted pod security level: Line 231 in 0ec9a84
|
I believe this happens because the default namespace doesn't use SecurityContextConstraints. A fix would be adding something like
USER 1001
to the Containerfile.The text was updated successfully, but these errors were encountered: