kubernetes-sigs / aws-efs-csi-driver

CSI Driver for Amazon EFS https://aws.amazon.com/efs/
Apache License 2.0
693 stars 526 forks source link

Update securityContext:privileged to false as EKS Fargate do not sup… #1348

Closed mskanth972 closed 1 month ago

mskanth972 commented 1 month ago

…port privileged access.

Is this a bug fix or adding new feature?

What is this PR about? / Why do we need it? EKS Fargate does not support privileged access, so setting the parameter containerSecurityContext: privileged: true will break Fargate deployments. This parameter was mainly introduced because enabling it allows the deletion of the access point root directory when delete-access-point-root-dir is enabled. Users who want to delete the access point root directory can enable this manually.

What testing is done?

k8s-ci-robot commented 1 month ago

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mskanth972

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files: - ~~[OWNERS](https://github.com/kubernetes-sigs/aws-efs-csi-driver/blob/master/OWNERS)~~ [mskanth972] Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment
k8s-ci-robot commented 1 month ago

PR needs rebase.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes-sigs/prow](https://github.com/kubernetes-sigs/prow/issues/new?title=Prow%20issue:) repository.