Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: mount options for fsGroup delegation must ensure RWX for the group #848

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

mpatlasov
Copy link
Contributor

If user sets fsGroup: <gid> in Pod's spec.securityContext, kubelet delegate fsGroup to CSI Driver, and NodeStageVolume() adds gid=<gid> to mount options. This might be not enough to make volume writable for the user:

$ kubectl exec fedora -- ls -ld /mnt/claim
drwxr-xr-x. 2 root 1002 0 Sep 13 12:04 /mnt/claim
$ kubectl exec fedora -- touch /mnt/claim/FILE
touch: cannot touch '/mnt/claim/FILE': Permission denied

/kind bug

Fixes #835

Release note:

none

If user sets `fsGroup: <gid>` in Pod's spec.securityContext, kubelet delegate fsGroup to CSI Driver, and NodeStageVolume() adds `gid=<gid>` to mount options. This might be not enough to make volume writable for the user:
```
$ kubectl exec fedora -- ls -ld /mnt/claim
drwxr-xr-x. 2 root 1002 0 Sep 13 12:04 /mnt/claim
$ kubectl exec fedora -- touch /mnt/claim/FILE
touch: cannot touch '/mnt/claim/FILE': Permission denied
```
See kubernetes-csi#835
@k8s-ci-robot k8s-ci-robot added release-note-none Denotes a PR that doesn't merit a release note. kind/bug Categorizes issue or PR as related to a bug. labels Sep 13, 2024
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: mpatlasov
Once this PR has been reviewed and has the lgtm label, please assign msau42 for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Sep 13, 2024
@k8s-ci-robot
Copy link
Contributor

Hi @mpatlasov. Thanks for your PR.

I'm waiting for a kubernetes-csi member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Sep 13, 2024
@coveralls
Copy link

Pull Request Test Coverage Report for Build 10848904027

Details

  • 0 of 20 (0.0%) changed or added relevant lines in 1 file are covered.
  • No unchanged relevant lines lost coverage.
  • Overall coverage decreased (-1.2%) to 77.716%

Changes Missing Coverage Covered Lines Changed/Added Lines %
pkg/smb/nodeserver.go 0 20 0.0%
Totals Coverage Status
Change from base Build 10845483309: -1.2%
Covered Lines: 980
Relevant Lines: 1261

💛 - Coveralls

mountOptions = append(mountOptions, "file_mode=0774")
}
if !raiseGroupRWXInMountFlags(mountOptions, "dir_mode") {
mountOptions = append(mountOptions, "dir_mode=0775")
Copy link
Member

@andyzhangx andyzhangx Sep 13, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

if dir_mode=0775 and file_mode=0774 is required, why not set those mount options in storage class or pv directly?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For dynamic provisioning case, the user doesn't create pv. The storage class can be used both by privileged users (who doesn't need fsGroup) and ordinary ones who expect that everything is fine if security context is set correctly for a pod. I think setting fsGroup for a pod must give access to the volume for any storage class. Is this wrong assumption?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

that's reasonable, and I think if file_mode is not specified in pv, then we should append file_mode=0774, same for dir_mode, if it's not specified in pv, then append dir_mode=0775, since if file_mode, dir_mode is specified in pv, we should respect the setting, that would make the logic more straightforward.

btw, in nfs volume mount, we use SetOwnerShip to recursively set the ownership of the volume per fsGroup, while this solution won't work for smb mount since the ownership cannot be changed after smb volume is mounted.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

if file_mode, dir_mode is specified in pv, we should respect the setting

That conflicts with fsGroup implementation in Kubernetes and all other CSI drivers. If fsGroup in a Pod depends on StorageClass parameters, it will need a very visible documentation that fsGroup support needs file_mode: 0770 and dir_mode: 0770 in a StorageClass or even make it a default.

I would prefer if the driver did the right thing out of the box, as this PR proposes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/bug Categorizes issue or PR as related to a bug. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. release-note-none Denotes a PR that doesn't merit a release note. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

The user can fail to write to a volume even if fsGroup is properly set in securityContext
5 participants