Skip to content

Commit f04591c

Browse files
authored
Merge pull request #54600 from ousleyp/cnv-20962-scc
CNV-20962: SCC updates for 4.11+
2 parents ae3e070 + 491b0e1 commit f04591c

File tree

1 file changed

+7
-9
lines changed

1 file changed

+7
-9
lines changed

modules/virt-additional-scc-for-kubevirt-controller.adoc

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,9 @@
88

99
Security context constraints (SCCs) control permissions for pods. These permissions include actions that a pod, a collection of containers, can perform and what resources it can access. You can use SCCs to define a set of conditions that a pod must run with to be accepted into the system.
1010

11-
The `kubevirt-controller` is a cluster controller that creates the virt-launcher pods for virtual machines in the cluster. These virt-launcher pods are granted permissions by the `kubevirt-controller` service account.
11+
The `virt-controller` is a cluster controller that creates the `virt-launcher` pods for virtual machines in the cluster. These pods are granted permissions by the `kubevirt-controller` service account.
1212

13-
== Additional SCCs granted to the kubevirt-controller service account
14-
15-
The `kubevirt-controller` service account is granted additional SCCs and Linux capabilities so that it can create virt-launcher pods with the appropriate permissions. These extended permissions allow virtual machines to take advantage of {VirtProductName} features that are beyond the scope of typical pods.
13+
The `kubevirt-controller` service account is granted additional SCCs and Linux capabilities so that it can create `virt-launcher` pods with the appropriate permissions. These extended permissions allow virtual machines to use {VirtProductName} features that are beyond the scope of typical pods.
1614

1715
The `kubevirt-controller` service account is granted the following SCCs:
1816

@@ -22,11 +20,11 @@ This allows virtual machines to use the hostpath volume plug-in.
2220
* `scc.AllowPrivilegedContainer = false` +
2321
This ensures the virt-launcher pod is not run as a privileged container.
2422
25-
* `scc.AllowedCapabilities = []corev1.Capability{"NET_ADMIN", "NET_RAW", "SYS_NICE"}` +
26-
This provides the following additional Linux capabilities
27-
`NET_ADMIN`,
28-
`NET_RAW`, and
29-
`SYS_NICE`.
23+
* `scc.AllowedCapabilities = []corev1.Capability{"SYS_NICE", "NET_BIND_SERVICE", "SYS_PTRACE"}` +
24+
25+
** `SYS_NICE` allows setting the CPU affinity.
26+
** `NET_BIND_SERVICE` allows DHCP and Slirp operations.
27+
** `SYS_PTRACE` enables certain versions of `libvirt` to find the process ID (PID) of `swtpm`, a software Trusted Platform Module (TPM) emulator.
3028

3129
== Viewing the SCC and RBAC definitions for the kubevirt-controller
3230

0 commit comments

Comments
 (0)