-
Notifications
You must be signed in to change notification settings - Fork 278
Fix #187: in openshift fix redis-session.ini permission denied #717
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
Fix #187: in openshift fix redis-session.ini permission denied #717
Conversation
Signed-off-by: WrenIX <[email protected]>
Signed-off-by: WrenIX <[email protected]>
Signed-off-by: WrenIX <[email protected]>
Signed-off-by: WrenIX <[email protected]>
Signed-off-by: WrenIX <[email protected]>
I suggest changing the PR title. This has nothing to do with OpenShift. - Fix #187: in openshift fix redis-session.ini permission denied
+ Fix redis-session.ini permission denied And if you mention |
This is an issue that happens 99% of case in OpenShift environment, because generally in any other Kubernetes deployment, we can run as root. It could happen to people who try to secure their non OpenShift Kubernetes, but otherway, for me it is very linked to OpenShift. However, I have no issue with removing openshit label in commit!
I don't know what is the "standard way" in nextcloud, but I looked at other commit in this repository, and it seems mostly the issue are in title. And the PR is linked in the related issue. But if the best practice in this repository is to put in commit body, ok for me! |
It's just how GitHub works, not particular to this repo. But Nextcloud seem to embrace it too, since they indicate it in the PR template that you missed filling in: Here's docs for how Github handles keywords in PRs: https://docs.github.com/en/get-started/writing-on-github/working-with-advanced-formatting/using-keywords-in-issues-and-pull-requests |
As you say; this is only an issue if one tries to run the Nextcloud deployment as non-root. So anyone that wants to run Nextcloud as non-root in Kubernetes will run into the issue, not just if they use OpenShift. Any well-configured Kubernetes environment may have PSA/PSS in place enforcing this, and any security minded individual may choose to deploy rootless anyway. So it's not at all specific to OpenShift, even if it obviously applies there too. |
Signed-off-by: antoinetran <[email protected]>
3cf2ae7
to
73a5127
Compare
done |
a554746
to
e9bad15
Compare
Description of the change
Benefits
Possible drawbacks
Applicable issues
Additional information
Checklist
Chart.yaml
according to semver.