claudio4j commented on PR #5558:
URL: https://github.com/apache/camel-k/pull/5558#issuecomment-2137566433

   I could reproduce the error in #4974 by installing camel-k 2.1.0 from 
operator hub in openshift 4.15.14.
   Updated to Camel K 2.2.0 from operator hub.
   Then there is no error anymore.
   The fix was provided by #4932 
   The problem was in 2.1.0, the `runAsUser` field of `securityContext` was set 
from the platform namespace, while the correct one should be from the 
integration namespace.
   
   The proposal of the test is to run an integration in a restricted namespace, 
whereas the `restricted` policy is the more [secured one by the policy 
definition](https://kubernetes.io/docs/concepts/security/pod-security-standards/).
   However when running in openshift the operator correctly sets the 
`securityContext` in compliance with the `restricted` policy, whereas when 
running not on openshift profile, the `securityContext` is not applied, so that 
results in error when the namespace is set with the `restricted` policy.
   I will open an issue to set the `securityContext` policy regardless if it's 
running in openshift, this way the integration can correctly run in a 
restricted policy in any kubernetes cluster.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to