Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OpenShift Compatibility #60

Open
bthdimension opened this issue Jul 8, 2022 · 0 comments
Open

OpenShift Compatibility #60

bthdimension opened this issue Jul 8, 2022 · 0 comments

Comments

@bthdimension
Copy link

bthdimension commented Jul 8, 2022

Hi,
in Pull Request 48, there was an open question about OpenShift compatibility with the schema registry image. Since OpenShift replaces the user the pods are run with, the permission changes in this PR lead to de image not being deployable (at least with the default restricted SCC, which many companies enforce).

Is there any official solution to this from your part? One possible solution would be to have a numeric user and group instead of "appuser". Then we could just use the supplementalGroups in the security context to gain access to files and directories, as long as the group has the necessary access rights.

--> chown 1001:1001 and USER 1001 instead of chown appuser:appuser and USER appuser so we can use securityContext.supplementalGroups: [1001]

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant