-
Notifications
You must be signed in to change notification settings - Fork 621
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[cinder-csi-plugin] Cinder CSI Plugin doesn't honor anymore securityContext/fsGroup #1362
Comments
/assign I can give a try |
I can't reproduce this error, can you provide additional info on the version you are using?
the image I am using is 1.20.0
|
FYI, This code is not part of csi plugin, this is of standalone cinder provisioner which is deprecated and removed in further releases |
yes, it's only for references how it was managed in the past. |
@jichenjc my used images:
for sidecar I have other versions regarding K8S support matrix: https://kubernetes-csi.github.io/docs/sidecar-containers.html hint: the images are 1:1 synced to another registry |
One of the differences between both setups is the cs-provisioner 1.6.1 vs. 2.0.2,
Then I found this: https://kubernetes-csi.github.io/docs/support-fsgroup.html
I checked both:
I then just copied one of our storage classes and defined "fsType: ext4" - when using this storage class, I had no permission issues. I'm not sure if this is kind of a bug, or a works as designed - and may just needs better documentation? |
interesting. @jichenjc can you share your storage class definition? Maybe it's only a documention issue. I have no special settings so far. |
@eumel8 nothing special, just defined from here ok, our manifest comes from and I am working on to bump the side car versions now |
I switched to csi-provisioner to 2.0.2 and now I got same result to you and updated storageclass as you mentioned can fix the problem
so I will submit a PR to see how to bump the version of provisioner |
@spielkind Thanks for sharing the inputs.
Just to clarify again, if fsType is explicitly defined , then this issue is resolved, is what you meant? |
@eumel8 We haven't updated the sidecars to 2.0.2 yet , we always suggest to use the versions specified in manifests which exists in respective versions. Like for 1.19 use the manifests in release-1.19 branch of cpo. |
check my comments above, with 2.0.2 , if no
|
@jichenjc Ok, got it. Then its a doc update or we can check if there is a way to specify default fstype if none specified. |
The PR #1366 failed and I think it's related to in-tree code so I opened |
Is this a BUG REPORT or FEATURE REQUEST?:
/kind bug
What happened:
In Kubernetes Container Specs it should be possible to set mount ownerships in securityContext:
Driver: cinder.csi.openstack.org
Driver version: 1.2.1
exec pod:
What you expected to happen:
Driver: cinder.csi.openstack.org version: 1.2.0
exec pod:
How to reproduce it:
deploy pod with pvc attached and securityContext/fsGroup:
Anything else we need to know?:
The last working version is release-1.18:
https://github.com/kubernetes/cloud-provider-openstack/blob/release-1.18/pkg/volume/cinder/cinder.go#L403
Or the internal K8s cinder driver:
https://github.com/kubernetes/kubernetes/blob/6d5cb36d36f34cb4f5735b6adcd5ea8ebb4440ba/pkg/volume/cinder/cinder.go#L451
But the code is complete reworked since 1.19. Is there now another option what I missed?
Environment:
The text was updated successfully, but these errors were encountered: