Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support configuration of securityContext on calico installations #2720

Open
clayvan opened this issue Jul 7, 2023 · 1 comment
Open

Support configuration of securityContext on calico installations #2720

clayvan opened this issue Jul 7, 2023 · 1 comment
Labels
good first issue Good for newcomers kind/enhancement New feature or request

Comments

@clayvan
Copy link

clayvan commented Jul 7, 2023

As it stands today, we can only update specs like securityContext on the tigera operator itself, but the installation of calico components such as calico-kube-controllers is unable to configure settings like securityContext.

Expected Behavior

I would like a new installation property for each of typha, node, kube-controllers, etc to be allowed to configure the securityContext.

Current Behavior

Currently if we try to use a "hardened" image that runs as non-root, kube-controllers throws an error of open /status/status.json: permission denied and cannot write the readiness check, so ends up in a crash loop. All I need is to set the securitycontext to avoid this but it's impossible via Tigera operator.

@tmjd
Copy link
Member

tmjd commented Jul 7, 2023

That sounds like a good feature that could be added. I'd assume that could be new fields in the Installation resource under calicoNodeDaemonSet, csiNodeDriverDaemonSet, calicoKubeControllersDeployment, typhaDeployment`, and others like those. They mimic the K8s definitions of those resource types so it is probably obvious what the field names would be and the existing code should provide good examples. I would be happy to review a PR, though I'd first suggest a draft PR with the API changes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
good first issue Good for newcomers kind/enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants