You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/security-context-constraints-about.adoc
+14-10Lines changed: 14 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,16 +31,6 @@ If you have `cluster-admin` privileges, you can adjust the default SCC policies
31
31
be more permissive.
32
32
////
33
33
34
-
Docker has a
35
-
link:https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilities[default list of capabilities]
36
-
that are allowed for each container of a pod. The
37
-
containers use the capabilities from this default list, but pod manifest authors
38
-
can alter it by requesting additional capabilities or removing some of the
39
-
default behaviors. Use the `allowedCapabilities`, `defaultAddCapabilities`, and
40
-
`requiredDropCapabilities` parameters to control such requests from the
41
-
pods and to dictate which capabilities can be requested, which ones must be
42
-
added to each container, and which ones must be forbidden.
43
-
44
34
The cluster contains eight default SCCs:
45
35
46
36
* `anyuid`
@@ -123,6 +113,20 @@ values.
123
113
124
114
|===
125
115
116
+
CRI-O has the following default list of capabilities that are allowed for each container of a pod:
117
+
118
+
* `CHOWN`
119
+
* `DAC_OVERRIDE`
120
+
* `FSETID`
121
+
* `FOWNER`
122
+
* `SETGID`
123
+
* `SETUID`
124
+
* `SETPCAP`
125
+
* `NET_BIND_SERVICE`
126
+
* `KILL`
127
+
128
+
The containers use the capabilities from this default list, but pod manifest authors can alter it by requesting additional capabilities or removing some of the default behaviors. Use the `allowedCapabilities`, `defaultAddCapabilities`, and `requiredDropCapabilities` parameters to control such requests from the pods and to dictate which capabilities can be requested, which ones must be added to each container, and which ones must be forbidden.
Because capabilities are passed to the Docker, you can use a special `ALL` value
62
-
to drop all possible capabilities.
63
-
====
55
+
CRI-O supports the same list of capability values that are found in the link:https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilities[Docker documentation].
64
56
65
-
. Then, run `oc create` passing the file to create it:
0 commit comments