-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
What would be the best way to allow ContainerUser to create symlinks? #167
Comments
This issue has been open for 30 days with no updates. |
6 similar comments
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
Hey @TBBle, thanks for bringing this up. Unfortunately, I believe the |
This issue has been open for 30 days with no updates. |
8 similar comments
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
This issue has been open for 30 days with no updates. |
Revisiting this thread, if symlinks are still absolutely needed to the container ntrights is still going to be the best tool and run that using ContainerAdministrator. There may be an avenue to accomplish access permissions for ContainerUser via host configuration using HostProcess containers but that may be a bit of a hack. |
Coming from tektoncd/pipeline#1826 (comment), we have an application that relies on creating symlinks, and so on Windows Containers it cannot function as
ContainerUser
, but must beContainerAdministrator
or fails as follows:I saw mention that HCS does not currently support configuring privileges, so I assume that adding an option under a Kubernetes Pod's
securityContext.windowsOptions
is not currently feasible as that must pass through CRI and eventually to the runhcs-provided shim.My proposed but untested workaround is to have the container image contain a
RUN
forntrights
to grant theSeCreateSymbolicLinkPrivilege
toContainerUser
, but that requires either the ntrights tool or a workalike, and assumes that grant persists when committing the layer and later running from it.Is there a better way to do this?
Is there any chance
SeCreateSymbolicLinkPrivilege
could be granted toContainerUser
by default, or support added to HCS to grant extra privileges (either a specifically supported list, or arbitrary by name) to the user running in the container? I assume both of these options would require changes in HCS, and hence are probably not feasible for Windows Server 2022, but it'd be good to confirm that.The text was updated successfully, but these errors were encountered: