Skip to content

Commit 0f9689c

Browse files
authored
Merge pull request #56497 from gabemontero/rhdevdocs-4304-4338
OSDOCS-RHDEVDOCS-4304: shared resource updates for validating admission webhooks
2 parents 2855c8f + 62de2b2 commit 0f9689c

4 files changed

+7
-6
lines changed

modules/ephemeral-storage-additional-support-limitations-for-shared-resource-csi-driver.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
The Shared Resource CSI Driver has the following noteworthy limitations:
88

99
* The driver is subject to the limitations of Container Storage Interface (CSI) inline ephemeral volumes.
10-
* The value of the `readOnly` field must be `true`. Otherwise, on volume provisioning during pod startup, the driver returns an error to the kubelet. This limitation is in keeping with proposed best practices for the upstream Kubernetes CSI Driver to apply SELinux labels to associated volumes.
10+
* The value of the `readOnly` field must be `true`. On `Pod` creation, a validating admission webhook rejects the pod creation if `readOnly` is `false`. If for some reason the validating admission webhook cannot be contacted, on volume provisioning during pod startup, the driver returns an error to the kubelet. Requiring `readOnly` is `true` is in keeping with proposed best practices for the upstream Kubernetes CSI Driver to apply SELinux labels to associated volumes.
1111
* The driver ignores the `FSType` field because it only supports `tmpfs` volumes.
1212
* The driver ignores the `NodePublishSecretRef` field. Instead, it uses `SubjectAccessReviews` with the `use` verb to evaluate whether a pod can obtain a volume that contains `SharedSecret` or `SharedConfigMap` custom resource (CR) instances.
13+
* You cannot create `SharedSecret` or `SharedConfigMap` custom resource (CR) instances whose names start with `openshift`.

modules/ephemeral-storage-csi-inline-overview.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This feature allows you to specify CSI volumes directly in the `Pod` specificati
1515
By default, {product-title} supports CSI inline ephemeral volumes with these limitations:
1616

1717
* Support is only available for CSI drivers. In-tree and FlexVolumes are not supported.
18-
* The Shared Resource CSI Driver supports inline ephemeral volumes as a Technology Preview feature.
18+
* The Shared Resource CSI Driver supports using inline ephemeral volumes only to access `Secrets` or `ConfigMaps` across multiple namespaces as a Technology Preview feature.
1919
* Community or storage vendors provide other CSI drivers that support these volumes. Follow the installation instructions provided by the CSI driver provider.
2020

2121
CSI drivers might not have implemented the inline volume functionality, including `Ephemeral` capacity. For details, see the CSI driver documentation.

modules/ephemeral-storage-using-a-sharedconfigmap-object-in-a-pod.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ To access a `SharedConfigMap` custom resource (CR) instance from a pod, you gran
1010

1111
* You have created a `SharedConfigMap` CR instance for the config map that you want to share across namespaces in the cluster.
1212
* You must have permission to perform the following actions:
13-
** Create build configs and start builds.
1413
** Discover which `SharedConfigMap` CR instances are available by entering the `oc get sharedconfigmaps` command and getting a non-empty list back.
15-
** Determine if the `builder` service accounts available to you in your namespace are allowed to use the given `SharedSecret` CR instance. That is, you can run `oc adm policy who-can use <identifier of specific SharedSecret>` to see if the `builder` service account in your namespace is listed.
14+
** Determine if the service account your pod specifies is allowed to use the given `SharedSecret` CR instance. That is, you can run `oc adm policy who-can use <identifier of specific SharedSecret>` to see if the service account in your namespace is listed.
15+
** Determine if the service account your pod specifies is allowed to use `csi` volumes, or if you, as the requesting user who created the pod directly, are allowed to use `csi` volumes. See "Understanding and managing pod security admission" for details.
1616

1717
[NOTE]
1818
====

modules/ephemeral-storage-using-a-sharedsecrets-resource-in-a-pod.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ To access a `SharedSecret` custom resource (CR) instance from a pod, you grant a
1010

1111
* You have created a `SharedSecret` CR instance for the secret you want to share across namespaces in the cluster.
1212
* You must have permission to perform the following actions
13-
** Create build configs and start builds.
1413
** Discover which `SharedSecret` CR instances are available by entering the `oc get sharedsecrets` command and getting a non-empty list back.
15-
** Determine if the `builder` service accounts available to you in your namespace are allowed to use the given `SharedSecret` CR instance. That is, you can run `oc adm policy who-can use <identifier of specific SharedSecret>` to see if the `builder` service account in your namespace is listed.
14+
** Determine if the service account your pod specifies is allowed to use the given `SharedSecret` CR instance. That is, you can run `oc adm policy who-can use <identifier of specific SharedSecret>` to see if the service account in your namespace is listed.
15+
** Determine if the service account your pod specifies is allowed to use `csi` volumes, or if you, as the requesting user who created the pod directly, are allowed to use `csi` volumes. See "Understanding and managing pod security admission" for details.
1616

1717
[NOTE]
1818
====

0 commit comments

Comments
 (0)