-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Spec extension] Allow for IPC, NET, and CAP modifications to be specified in the CDI spec #55
Comments
This issue is stale because it has been open 90 days with no activity. This issue will be closed in 30 days unless new comments are made or the stale label is removed. |
This issue was automatically closed due to inactivity. |
we would have a use-case with |
@mythi let's reopen this then. Would you have time to expand on this / create a PR with the additions? Note that one concern is that these changes would happen without the user knowing about them, so it may be good to limit the scope to use cases that don't provide too many additional privileges. |
I did not think of the details yet. My use case is with QAT devices that use VFIO framework. Pods requesting resources (DRA/device plugins) would also need to know to add |
I will throw in rlimit settings, since k8s is not yet able to set them properly, where one would need CAP_SYS_RESOURCE as well so it kinda fits in here as well. kubernetes/kubernetes#3595 |
That is what we would need to discuss / define for this issue. We would need to define the modifications that are to be made to the OCI runtime spec as well as determine whether there could be contradicting configurations. |
Maybe splitting this into adding |
Hmm... changing the IPC and network namespace seems a bit extreme. A failure to inject with an appropriate error message in a case where a device requires host IPC or network namespace but runs in a different one sounds more appropriate... as a last resort. Now I have not followed the latest directions DRA has taken, but when a CDI device reference is added by a DRA driver, it would sound more appropriate to already fail as early as possible, in the DRA driver. |
@zvonkok for rlimit, CDI probably not the best way to do it. you can use NRI plugin to inject it based on the need. See containerd/nri#48 for details. |
I have a different use case where a local resource I am exposing requires I think from a security point of view it might be better to just produce an error if the container doesn't have the capabilities required, as just adding them behind the scenes via cdi might be surprising to the user and expose them to security risks without realizing the container is running with added capabilies. |
We have a use case that would require the following (
docker
) arguments to work out the box:Does it make sense to extend the CDI spec to allow for IPC, NET, and CAP modifications to the OCI spec?
The text was updated successfully, but these errors were encountered: