summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorClayton Coleman <ccoleman@redhat.com>2016-12-20 12:17:53 -0500
committerGitHub <noreply@github.com>2016-12-20 12:17:53 -0500
commit67abb277cc0ef395842d1421db9e003da853175d (patch)
treeded4b24221c213d5bb8152a3cfa24ed8b7a01cc8
parent854e9518703851ec79e26a47d46a0c70d829fe37 (diff)
parent0d55cef953fa22bf5376d2e436029c58073a6391 (diff)
Merge pull request #143 from xilabao/update-scc-doc
update scc doc about the intent of psp
-rw-r--r--contributors/design-proposals/security-context-constraints.md7
1 files changed, 5 insertions, 2 deletions
diff --git a/contributors/design-proposals/security-context-constraints.md b/contributors/design-proposals/security-context-constraints.md
index ae966e21..e5f884a0 100644
--- a/contributors/design-proposals/security-context-constraints.md
+++ b/contributors/design-proposals/security-context-constraints.md
@@ -1,7 +1,8 @@
## Abstract
PodSecurityPolicy allows cluster administrators to control the creation and validation of a security
-context for a pod and containers.
+context for a pod and containers. The intent of PodSecurityPolicy is to protect the cluster from the
+pod and containers, not to protect a pod or containers from a user.
## Motivation
@@ -221,7 +222,9 @@ const (
As reusable objects in the root scope, PodSecurityPolicy follows the lifecycle of the
cluster itself. Maintenance of constraints such as adding, assigning, or changing them is the
-responsibility of the cluster administrator.
+responsibility of the cluster administrator. Deleting is not considered in PodSecurityPolicy,
+It's important for controllers without the ability to use psps (like the namespace controller)
+to be able to delete pods.
Creating a new user within a namespace should not require the cluster administrator to
define the user's PodSecurityPolicy. They should receive the default set of policies