$ oc get scc NAME PRIV CAPS HOSTDIR SELINUX RUNASUSER privileged true [] true RunAsAny RunAsAny restricted false [] false MustRunAs MustRunAsRange
Security context constraints allow administrators to control permissions for pods. To learn more about this API type please refer to the security context constraints (SCCs) architecture documentation. You may manage SCCs in your instance as normal API objects using the CLI.
You must have cluster-admin privileges to manage SCCs. |
To get a current list of SCCs:
$ oc get scc NAME PRIV CAPS HOSTDIR SELINUX RUNASUSER privileged true [] true RunAsAny RunAsAny restricted false [] false MustRunAs MustRunAsRange
To examine a particular SCC, use oc get
, oc describe
, oc export
, or oc edit
.
$ oc describe scc restricted Name: restricted Priority: <none> Access: Users: <none> Groups: system:authenticated Settings: Allow Privileged: false Default Add Capabilities: <none> Required Drop Capabilities: <none> Allowed Capabilities: <none> Allowed Volume Types: awsElasticBlockStore,azureFile,cephFS,cinder,configMap,downwardAPI,emptyDir,fc,flexVolume,flocker,gcePersistentDisk,gitRepo,glusterfs,iscsi,nfs,persistentVolumeClaim,rbd,secret Allow Host Network: false Allow Host Ports: false Allow Host PID: false Allow Host IPC: false Read Only Root Filesystem: false Run As User Strategy: MustRunAsRange UID: <none> UID Range Min: <none> UID Range Max: <none> SELinux Context Strategy: MustRunAs User: <none> Role: <none> Type: <none> Level: <none> FSGroup Strategy: RunAsAny Ranges: <none> Supplemental Groups Strategy: RunAsAny Ranges: <none>
In order to preserve customized SCCs during upgrades, do not edit settings on the default SCCs other than priority, users, and groups. |
To create a new SCC:
Define the SCC in a JSON or YAML file:
kind: SecurityContextConstraints apiVersion: v1 metadata: name: scc-admin allowPrivilegedContainer: true runAsUser: type: RunAsAny seLinuxContext: type: RunAsAny fsGroup: type: RunAsAny supplementalGroups: type: RunAsAny users: - my-admin-user groups: - my-admin-group
Optionally, you can add drop capabilities to an SCC by setting the
requiredDropCapabilities:
field with the desired values. Any specified
capabilities will be dropped from the container. For example, to create an SCC
with the KILL
, MKNOD
, and SYS_CHROOT
required drop capabilities, add
the following to the SCC object:
requiredDropCapabilities: - KILL - MKNOD - SYS_CHROOT
You can see the list of possible values in the Docker documentation.
Then, run oc create
passing the file to create it:
$ oc create -f scc_admin.yaml securitycontextconstraints/scc-admin
Verify that the SCC was created:
$ oc get scc NAME PRIV CAPS HOSTDIR SELINUX RUNASUSER privileged true [] true RunAsAny RunAsAny restricted false [] false MustRunAs MustRunAsRange scc-admin true [] false RunAsAny RunAsAny
To delete an SCC:
$ oc delete scc <scc_name>
If you delete the default SCCs, they will not be regenerated upon restart, unless you delete all SCCs. If any constraint already exists within the system, no regeneration will take place. |
To update an existing SCC:
$ oc edit scc <scc_name>
In order to preserve customized SCCs during upgrades, do not edit settings on the default SCCs other than priority, users, and groups. |
Default SCCs will be created when the master is started if they are missing. To reset SCCs to defaults, or update existing SCCs to new default definitions after an upgrade you may:
Delete any SCC you would like to be reset and let it be recreated by restarting the master
Use the oadm policy reconcile-sccs
command
The oadm policy reconcile-sccs
command will set all SCC policies to the default
values but retain any additional users and groups as well as priorities you may have already set.
To view which SCCs will be changed you may run the command with no options or by
specifying your preferred output with the -o <format>
option.
After reviewing it is recommended that you back up your existing SCCs and then
use the --confirm
option to persist the data.
If you would like to reset priorities and grants, use the
|
If you have customized settings other than priority, users, or groups in an SCC, you will lose those settings when you reconcile. |
The following describe common scenarios and procedures using SCCs.
In some cases, an administrator might want to allow users or groups outside the administrator group access to create more privileged pods. To do so, you can:
Determine the user or group you would like to have access to the SCC.
Run:
$ oadm policy add-scc-to-user <scc_name> <user_name> $ oadm policy add-scc-to-group <scc_name> <group_name>
Add the user or group to the users or groups field of the SCC.
For example, to allow the e2e-user access to the privileged SCC, add their user:
$ oadm policy add-scc-to-user privileged e2e-user
1 | The e2e-user added to the users section. |
First, create a service account.
For example, to create service account My_SVCACCT
in project My_Project
:
$ cat <<EOF | oc create -n My_Project -f - kind: ServiceAccount apiVersion: v1 metadata: name: My_SVCACCT (1) EOF
Then, add the service account to the privileged
SCC.
$ oc edit scc privileged
Add the following under users
:
- system:serviceaccount:My_Project:My_SVCACCT
To relax the security in your cluster so that images are not forced to run as a pre-allocated UID, without granting everyone access to the privileged SCC:
Edit the restricted SCC:
$ oadm policy add-scc-to-group anyuid system:authenticated
Change the runAsUser.Type
strategy to RunAsAny.
This allows images to run as the root UID if no USER is specified in the Dockerfile. |
Some Dockerhub images (examples: postgres
and redis
) require root access and
have certain expectations about how volumes are owned. For these images, add
the service account to the anyuid
SCC.
$ oadm policy add-scc-to-user anyuid system:serviceaccount:myproject:mysvcacct
It is recommended that
persistent storage using
PersistentVolume
and PersistentVolumeClaim
objects be used for
registry deployments. If
you are testing and would like to instead use the oadm registry
command with
the --mount-host
option, you must first create a new
service account for the registry and add it to the
privileged SCC. See the
Administrator
Guide for full instructions.
In some cases, an image may require capabilities that Docker does not provide out of the box. You can provide the ability to request additional capabilities in the pod specification which will be validated against an SCC.
This allows images to run with elevated capabilities and should be used only if necessary. You should not edit the default restricted SCC to enable additional capabilities. |
When used in conjunction with a non-root user, you must also ensure that the
file that requires the additional capability is granted the capabilities using
the setcap
command. For example, in the Dockerfile of the image:
setcap cap_net_raw,cap_net_admin+p /usr/bin/ping
Further, if a capability is provided by default in Docker, you do not need to
modify the pod specification to request it. For example, NET_RAW
is provided
by default and capabilities should already be set on ping
, therefore no
special steps should be required to run ping
.
To provide additional capabilities:
Create a new SCC
Add the allowed capability using the allowedCapabilities
field.
When creating the pod, request the capability in the
securityContext.capabilities.add
field.
To modify your cluster so that it does not pre-allocate UIDs, allows containers to run as any user, and prevents privileged containers:
In order to preserve customized SCCs during upgrades, do not edit settings on the default SCCs other than priority, users, and groups. |
Edit the restricted SCC:
$ oc edit scc restricted
Change runAsUser.Type
to RunAsAny.
Ensure allowPrivilegedContainer
is set to false.
Save the changes.
To modify your cluster so that it does not pre-allocate UIDs and does not allow containers to run as root:
Edit the restricted SCC:
$ oc edit scc restricted
Change runAsUser.Type
to MustRunAsNonRoot.
Save the changes.
To relax the security in your cluster so that pods are allowed to use the
hostPath
volume plug-in without granting everyone access to the privileged
SCC:
Edit the restricted SCC:
$ oc edit scc restricted
Add allowHostDirVolumePlugin: true
.
Save the changes.
You may control the sort ordering of SCCs in admission by setting the Priority
field of the SCCs. Please see the
SCC
Prioritization section for more information on sorting.