incorrect ownership with configmap/secret content from container, when related volume mounted with restrictive defaultMode and pod running with userns auto mode #20956
Labels
kind/bug
Categorizes issue or PR as related to a bug.
locked - please file new issue/PR
Assist humans wanting to comment on an old issue or PR with locked comments.
Issue Description
I'm using
podman kube play
to create a pod and associated volume, made from a configmap (or a secret) resource.I run this pod, as
root
, using--userns=auto
mode.Whenever such volume is created:
_data
folder is owned by one of the subordinate uid/gid tied withcontainers
account._data
, are owned byroot
, executingpodman
Whenever my volume is declared with restrictive permissions for
others
, usingdefaultMode
:I'm no longer able to consume volume's content from a container standpoint, lack of permissions prevent any access/modification.
Steps to reproduce the issue
Describe the results you received
until some action to fix permission, at host level is performed, volume file content at container level is unusable
Describe the results you expected
volume files permissions owned by a container subordinate uid/gid rather than a host uid/gid. Differently speaking, make volume file content available as soon as pod running without any post action required.
podman info output
The text was updated successfully, but these errors were encountered: