You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What steps did you take and what happened:
A simple restore of a pod fails using Velero 1.15.1 due to incompatibility with OpenShift's SCC policies. Using Velero 1.15.0, restores are successful.
It looks like 1.15.1 adds the seccompProfile to the velero-restore-helper initContainer which restores the pods' volume(s).
What did you expect to happen:
The restore succeeds.
The following information will help us better understand what's going on:
The log shows:
time="2025-01-13T15:03:29Z" level=error msg="Namespace test-46f27e1e, resource restore error: error restoring pods/test-46f27e1e/pod-94ed0996: pods \"pod-94ed0996\" is forbidden: unable to validate against any security context constraint: pod.metadata.annotations[container.seccomp.security.alpha.kubernetes.io/restore-wait]: Forbidden: seccomp may not be set" logSource="pkg/controller/restore_controller.go:600"
Anything else you would like to add:
OpenShift does not admit the pod annotated with a seccompProfile, running with the default anyuid SCC. This is expected behaviour.
The anyuid Security Context is not configured with the seccompProfiles as other, for example restricted-v2 SCC.
The SCC was not designed to have the required configuration and currently the default SCC will not work if the deployment has the Seccomp Profiles configured.
The Pod Admission controller will prevent admitting the pod in the cluster.
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.
👍 for "I would like to see this bug fixed as soon as possible"
👎 for "There are more important bugs to focus on right now"
The text was updated successfully, but these errors were encountered:
berendiwema
changed the title
Restore of a pod fails on OpenShift 4 since Velero release 1.15.1 due to seccomp annotation
Restore of a pod with volume fails on OpenShift 4 since Velero release 1.15.1 due to seccomp annotation
Jan 14, 2025
What steps did you take and what happened:
A simple restore of a pod fails using Velero 1.15.1 due to incompatibility with OpenShift's SCC policies. Using Velero 1.15.0, restores are successful.
It looks like 1.15.1 adds the seccompProfile to the velero-restore-helper initContainer which restores the pods' volume(s).
What did you expect to happen:
The restore succeeds.
The following information will help us better understand what's going on:
The log shows:
Anything else you would like to add:
OpenShift does not admit the pod annotated with a seccompProfile, running with the default
anyuid
SCC. This is expected behaviour.The annotation was added this commit I believe.
Environment:
Vote on this issue!
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.
The text was updated successfully, but these errors were encountered: