Skip to content

Commit c3c176c

Browse files
committed
PSA and SCC Coexistence for PSA RHIBMCS-145
1 parent b52e0b8 commit c3c176c

File tree

2 files changed

+18
-0
lines changed

2 files changed

+18
-0
lines changed

authentication/understanding-and-managing-pod-security-admission.adoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@ Pod security admission is an implementation of the link:https://kubernetes.io/do
1111
// About pod security admission
1212
include::modules/security-context-constraints-psa-about.adoc[leveloffset=+1]
1313

14+
// Understanding pod security admission coexistence
15+
include::modules/security-context-constraints-psa-coexistence.adoc[leveloffset=+2]
16+
1417
// About pod security admission synchronization
1518
include::modules/security-context-constraints-psa-synchronization.adoc[leveloffset=+1]
1619

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * authentication/understanding-and-managing-pod-security-admission.adoc
4+
5+
:_mod-docs-content-type: CONCEPT
6+
[id="security-context-constraints-psa-coexistence_{context}"]
7+
= Pod security admission and security context constraints
8+
9+
Pod security admission standards and security context constraints are reconciled and enforced by two independent controllers. The two controllers work independently using the following processes to enforce security policies:
10+
11+
. The security context constraint controller may mutate some security context fields per the pod's assigned SCC. For example, if the seccomp profile is empty or not set and if the pod's assigned SCC enforces `seccompProfiles` field to be `runtime/default`, the controller sets the default type to `RuntimeDefault`.
12+
13+
. The security context constraint controller validates the pod's security context against the matching SCC.
14+
15+
. The pod security admission controller validates the pod's security context against the pod security standard assigned to the namespace.

0 commit comments

Comments
 (0)