Skip to content

Commit 63437cd

Browse files
Merge pull request #53484 from michaelryanpeter/osdocs-4108-olm-psa-csv-label-synchronization
OSDOCS-4108: OLM PSA label synchronization for `openshift-*` NS
2 parents b762635 + 3fb4c11 commit 63437cd

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

modules/security-context-constraints-psa-opting.adoc

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,15 @@ Namespaces that are defined as part of the cluster payload have pod security adm
1919
* `openshift`
2020
* All system-created namespaces that are prefixed with `openshift-`, except for `openshift-operators`
2121
22-
By default, all namespaces that have an `openshift-` prefix are not synchronized. You can enable synchronization for any user-created [x-]`openshift-*` namespaces. You cannot enable synchronization for any system-created [x-]`openshift-*` namespaces, except for `openshift-operators`.
22+
By default, all namespaces that have an `openshift-` prefix are not synchronized. You can enable synchronization for any user-created [x-]`openshift-*` namespaces. You cannot enable synchronization for any system-created [x-]`openshift-*` namespaces, except for `openshift-operators`.
23+
24+
If an Operator is installed in a user-created `openshift-*` namespace, synchronization is turned on by default after a cluster service version (CSV) is created in the namespace. The synchronized label inherits the permissions of the service accounts in the namespace.
2325
====
2426

2527
.Procedure
2628

2729
* For each namespace that you want to configure, set a value for the `security.openshift.io/scc.podSecurityLabelSync` label:
28-
** To disable pod security admission label sychronization in a namespace, set the value of the `security.openshift.io/scc.podSecurityLabelSync` label to `false`.
30+
** To disable pod security admission label synchronization in a namespace, set the value of the `security.openshift.io/scc.podSecurityLabelSync` label to `false`.
2931
+
3032
Run the following command:
3133
+
@@ -34,7 +36,7 @@ Run the following command:
3436
$ oc label namespace <namespace> security.openshift.io/scc.podSecurityLabelSync=false
3537
----
3638
37-
** To enable pod security admission label sychronization in a namespace, set the value of the `security.openshift.io/scc.podSecurityLabelSync` label to `true`.
39+
** To enable pod security admission label synchronization in a namespace, set the value of the `security.openshift.io/scc.podSecurityLabelSync` label to `true`.
3840
+
3941
Run the following command:
4042
+

modules/security-context-constraints-psa-synchronization.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ In addition to the global pod security admission control configuration, a contro
1212

1313
[IMPORTANT]
1414
====
15-
Namespaces that are defined as part of the cluster payload have pod security admission synchronization disabled permanently. You can enable pod security admission synchronization on other namespaces as necessary.
15+
Namespaces that are defined as part of the cluster payload have pod security admission synchronization disabled permanently. You can enable pod security admission synchronization on other namespaces as necessary. If an Operator is installed in a user-created `openshift-*` namespace, synchronization is turned on by default after a cluster service version (CSV) is created in the namespace.
1616
====
1717

1818
The controller examines `ServiceAccount` object permissions to use security context constraints in each namespace. Security context constraints (SCCs) are mapped to pod security profiles based on their field values; the controller uses these translated profiles. Pod security admission `warn` and `audit` labels are set to the most privileged pod security profile found in the namespace to prevent warnings and audit logging as pods are created.

0 commit comments

Comments
 (0)