-
Notifications
You must be signed in to change notification settings - Fork 39
Open
Description
I’m using the n8n-python image with the n8n Helm chart, and encountered permission-related errors when deploying with standard non-root podSecurityContext.
image:
repository: naskio/n8n-python
pullPolicy: IfNotPresent
tag: "1.104.0"
Error Logs:
❯ k logs -f n8n-69cf8874c8-j8hf2
chown: /home/node/.n8n: Operation not permitted
chown: /home/node/.n8n: Operation not permitted
su-exec: setgroups: Operation not permitted
These errors occur when running with the default security context:
podSecurityContext:
runAsNonRoot: false
runAsUser: 0
runAsGroup: 0
fsGroup: 0
To make it work, I had to override the security context like this:
podSecurityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
While this resolves the issue, running as root is not ideal and likely not a recommended best practice for production deployments.
Is it possible to modify the image so it works properly with a non-root podSecurityContext such as:
podSecurityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
This would help align the image with Kubernetes security best practices (e.g., PSPs, OPA/Gatekeeper policies, etc.).
Thanks in advance!
Metadata
Metadata
Assignees
Labels
No labels