-
Notifications
You must be signed in to change notification settings - Fork 988
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add WindowsSecurityContextOptions to security_context #1623
Comments
What is the status of this issue: According to the documentation of kubernetes: https://kubernetes.io/docs/tasks/configure-pod-container/configure-runasusername/ The runAsUserName should be present under the tag:
Specific for windows nodes this is needed to get the Windows pod up and running. Otherwise the pod fails to run on the AKS cluster version 1.23.x and higher. |
Hi Hashicorp team, What is the status on this open issue? Is it being worked on? |
This seems like a rather old K8S feature to be still not supported in the provider - any ETA? I also need access to the pod's security context windows-options in order to be able to setup windows hostprocess containers. |
Please support the full crd, https://kubernetes.io/docs/reference/kubernetes-api/workload-resources/pod-v1/#security-context |
This has become an issue for us while trying to implement gMSA for our Windows pods. Would love to see this added soon so that we can avoid dropping into raw manifest files. Specifically: "securityContext.windowsOptions.gmsaCredentialSpecName" Ref: https://kubernetes.io/docs/reference/kubernetes-api/workload-resources/pod-v1/#security-context Thank you |
I'm revisiting this issue after some time and it appears that the pod spec now supports the "windowsOptions". Unfortunately, we are now encountering a downstream issue. security_context {
windows_options {
gmsa_credential_spec_name = "my-credential-spec-name"
}
}
When we use a raw manifest, the gmsaCredentialSpec and runAsUserName attributes are not required. Furthermore, the "GMSACredentialSpec is where the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the GMSA credential spec named by the GMSACredentialSpecName field.", therefore it should not be a required value. I might be posting this in the wrong place, but I figured I would start here. Any advice would be greatly appreciated. This is becoming an important feature for us as our current workarounds are not ideal... |
+1 this is still an issue gmsaCredentialSpecName: Invalid value: "" |
Description
I'm trying to set the username for windows containers but the WindowsSecurityContextOptions seem to be missing. Also documented here.
Potential Terraform Configuration
References
Community Note
The text was updated successfully, but these errors were encountered: