Skip to content

Commit 5b2b98f

Browse files
committed
SecurityContextConstraints: do not mutate nil privileged field to false.
1 parent 1c24d18 commit 5b2b98f

File tree

1 file changed

+1
-6
lines changed

1 file changed

+1
-6
lines changed

pkg/security/securitycontextconstraints/provider.go

+1-6
Original file line numberDiff line numberDiff line change
@@ -200,11 +200,6 @@ func (s *simpleProvider) CreateContainerSecurityContext(pod *api.Pod, container
200200
sc.SELinuxOptions = seLinux
201201
}
202202

203-
if sc.Privileged == nil {
204-
priv := false
205-
sc.Privileged = &priv
206-
}
207-
208203
// if we're using the non-root strategy set the marker that this container should not be
209204
// run as root which will signal to the kubelet to do a final check either on the runAsUser
210205
// or, if runAsUser is not set, the image
@@ -325,7 +320,7 @@ func (s *simpleProvider) ValidateContainerSecurityContext(pod *api.Pod, containe
325320
allErrs = append(allErrs, s.seLinuxStrategy.Validate(pod, container)...)
326321
allErrs = append(allErrs, s.seccompStrategy.ValidateContainer(pod, container)...)
327322

328-
if !s.scc.AllowPrivilegedContainer && *sc.Privileged {
323+
if !s.scc.AllowPrivilegedContainer && sc.Privileged != nil && *sc.Privileged {
329324
allErrs = append(allErrs, field.Invalid(fldPath.Child("privileged"), *sc.Privileged, "Privileged containers are not allowed"))
330325
}
331326

0 commit comments

Comments
 (0)