Skip to content

Commit 91dc759

Browse files
committed
OSDOCS-1451: This PR moves security context constraints information from OCP to OSD.
1 parent 46c3ced commit 91dc759

File tree

5 files changed

+26
-9
lines changed

5 files changed

+26
-9
lines changed

_topic_maps/_topic_map_osd.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,13 @@ Topics:
7575
- Name: Managing administration roles and users
7676
File: osd-admin-roles
7777
---
78+
Name: Authentication and authorization
79+
Dir: authentication
80+
Distros: openshift-dedicated
81+
Topics:
82+
- Name: Managing security context constraints
83+
File: managing-security-context-constraints
84+
---
7885
Name: Upgrading
7986
Dir: upgrading
8087
Topics:

_topic_maps/_topic_map_rosa.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,13 @@ Topics:
140140
- Name: Enabling multicast for a project
141141
File: enabling-multicast
142142
---
143+
Name: Authentication and authorization
144+
Dir: authentication
145+
Distros: openshift-rosa
146+
Topics:
147+
- Name: Managing security context constraints
148+
File: managing-security-context-constraints
149+
---
143150
Name: Nodes
144151
Dir: nodes
145152
Distros: openshift-rosa

authentication/managing-security-context-constraints.adoc

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,14 @@ include::modules/common-attributes.adoc[]
66
toc::[]
77

88
include::modules/security-context-constraints-about.adoc[leveloffset=+1]
9-
10-
// I should add a module about installing the OC command line.
11-
129
include::modules/security-context-constraints-pre-allocated-values.adoc[leveloffset=+1]
13-
1410
include::modules/security-context-constraints-example.adoc[leveloffset=+1]
1511

12+
// This section shouldn't show on OSD
13+
ifndef::openshift-dedicated[]
1614
include::modules/security-context-constraints-creating.adoc[leveloffset=+1]
15+
endif::[]
16+
// End Exclusion
1717

1818
include::modules/security-context-constraints-rbac.adoc[leveloffset=+1]
19-
2019
include::modules/security-context-constraints-command-reference.adoc[leveloffset=+1]

modules/security-context-constraints-about.adoc

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ The cluster contains several default security context constraints (SCCs) as desc
3434
[IMPORTANT]
3535
====
3636
Do not modify the default SCCs. Customizing the default SCCs can lead to issues when some of the platform pods deploy or {product-title} is upgraded. During upgrades between some versions of {product-title}, the values of the default SCCs are reset to the default values, which discards all customizations to those SCCs.
37+
3738
ifdef::openshift-origin,openshift-enterprise,openshift-webscale[]
3839
Instead, create new SCCs as needed.
3940
endif::[]
@@ -47,6 +48,7 @@ endif::[]
4748
|`anyuid`
4849
| Provides all features of the `restricted` SCC, but allows users to run with any UID and any GID.
4950

51+
ifndef::openshift-dedicated[]
5052
|`hostaccess`
5153
|Allows access to all host namespaces but still requires pods to be run with a UID and SELinux context that are allocated to the namespace.
5254

@@ -78,10 +80,12 @@ If additional workloads are run on control plane hosts, use caution when providi
7880
====
7981
This SCC allows host file system access as any UID, including UID 0. Grant with caution.
8082
====
83+
endif::[]
8184

8285
|`nonroot`
8386
|Provides all features of the `restricted` SCC, but allows users to run with any non-root UID. The user must specify the UID or it must be specified in the manifest of the container runtime.
8487

88+
ifndef::openshift-dedicated[]
8589
|`privileged`
8690
|Allows access to all privileged and host features and the ability to run as any user, any group, any FSGroup, and with any SELinux context.
8791

@@ -107,6 +111,7 @@ The `privileged` SCC allows:
107111
====
108112
Setting `privileged: true` in the pod specification does not select the `privileged` SCC. Setting `privileged: true` in the pod specification matches on the `allowPrivilegedContainer` field of an SCC.
109113
====
114+
endif::[]
110115

111116
|`restricted`
112117
|Denies access to all host features and requires pods to be run with a UID, and SELinux context that are allocated to the namespace. This is the most restrictive SCC and it is used by default for authenticated users.
@@ -119,7 +124,6 @@ The `restricted` SCC:
119124
* Requires that a pod is run with a pre-allocated MCS label
120125
* Allows pods to use any FSGroup
121126
* Allows pods to use any supplemental group
122-
123127
|===
124128

125129
[id="scc-settings_{context}"]
@@ -130,7 +134,6 @@ a pod has access to. These settings fall into three categories:
130134

131135
[cols="1,3",options="header"]
132136
|===
133-
134137
|Category
135138
|Description
136139

@@ -203,7 +206,7 @@ pre-allocated values. Uses the minimum value of the first range as the default.
203206
Validates against the first ID in the first range.
204207
* `RunAsAny` - No default provided. Allows any `fsGroup` ID to be specified.
205208

206-
209+
ifndef::openshift-dedicated[]
207210
[id="authorization-controlling-volumes_{context}"]
208211
== Controlling volumes
209212

@@ -257,6 +260,7 @@ settings in the `volumes` field. For example, if `allowHostDirVolumePlugin`
257260
is set to false but allowed in the `volumes` field, then the `hostPath`
258261
value will be removed from `volumes`.
259262
====
263+
endif::[]
260264

261265

262266
[id="admission_{context}"]

modules/security-context-constraints-pre-allocated-values.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
//
33
// * authentication/managing-security-context-constraints.adoc
44

5-
ifdef::openshift-origin,openshift-enterprise[]
5+
ifdef::openshift-origin,openshift-enterprise,openshift-dedicated,openshift-rosa[]
66
[id="security-context-constraints-pre-allocated-values_{context}"]
77
= About pre-allocated security context constraints values
88

0 commit comments

Comments
 (0)