New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support User Namespaces in pods #127
Comments
This work is being done by @pweil- and is reviewed by @derekwaynecarr, it is sponsored by @kubernetes/sig-node |
@derekwaynecarr Could you help create a user story card for this feature? |
@derekwaynecarr can you confirm that this feature targets alpha for 1.5? |
Yes, this feature is experimental only so it would be considered alpha. |
@derekwaynecarr @pweil- can you confirm that this item targets beta in 1.6? |
@derekwaynecarr, the proposal kubernetes/kubernetes#34569 was closed by bot due to inactivity. @pweil-, in kubernetes/kubernetes#34569 (comment) you've proposed the approach pweil-/kubernetes@16f29eb which changes the group of |
@pweil-, I also wonder if similar to docker's |
@adelton in the end, I think having this be transparent to Kubernetes is the right approach. Whether that be something like shiftfs or implementation in the CRI (moby/moby#28593). You are correct that my existing proposal is not currently tracked in an open PR anymore. The reasoning behind using the chgrp was to follow our |
Thanks @pweil-. When you say transparent, you mean that nothing should be needed to be added to code or to configuration on Kubernetes' side to allow running under docker with As for the I have now filed kubernetes/kubernetes#55707 as an alternative approach where I make the remapped uid/gid an explicit option, and use those values to chown/chgrp the necessary directories. |
that would be ideal. Whether that is feasible (or more likely, feasible in an acceptable time frame) is another question 😄
Yes
👍 subscribed |
Ideally, the pod would specify how many distinct uids/gids it would require / list of uids it wants to see inside of the containers, and docker or different container runtime would setup the user namespace accordingly. But unless docker also changes ownership of the volumes mounted to the containers, Kubernetes will have to do that as part of the setup. |
@pwel-, what is the best way to get some review and comments on kubernetes/kubernetes#55707, to get it closer to mergeable state? |
@pweil- ^ |
@adelton I would try to engage the sig-node folks either at their Tuesday meeting or on slack: https://github.com/kubernetes/community/tree/master/sig-node |
@derekwaynecarr, could you please bring kubernetes/kubernetes#55707 to sig-node's radar? |
@pweil- @derekwaynecarr any progress on this feature is expected? |
/remove-label lead-opted-in |
Can we add the 1.29 milestone for this PR? We have for sure this PR targeted for 1.29: kubernetes/kubernetes#118760 |
friendly ping @SergeyKanzhelev @mrunalp ? |
/milestone v1.29 keeping the same stage as I understand |
Hello @rata, @saschagrunert and @giuseppe 👋, Enhancements team here. Just checking in as we approach enhancements freeze on Friday, 6th October 2023. This enhancement is targeting for stage Here's where this enhancement currently stands:
For this KEP, we would just need to update the following:
The status of this enhancement is marked as |
@salehsedghpour The PR with that is open here: #4147 |
@rata thank you, with this the status of this enhancement is marked |
Hello @rata @giuseppe @saschagrunert 👋, v1.29 Docs Shadow here. |
I have the placeholder PR ready here: kubernetes/website#43437 |
Hey again @rata @giuseppe @saschagrunert 👋 Enhancements team here, Just checking in as we approach code freeze at 01:00 UTC Wednesday 1st November. Here's where this enhancement currently stands:
For this enhancement, it looks like the following PRs are open and need to be merged before code freeze: With all this, the status of this KEP is Also, please let me know if there are other PRs in k/k we should be tracking for this KEP. |
hi @rata @giuseppe @saschagrunert, 👋 from the v1.29 Release Team-Communications! We would like to check if you have any plans to publish a blog for this KEP regarding new features, removals, and deprecations for this release. If so, you need to open a PR placeholder in the website repository. |
@a-mccarthy I don't think so, but I'll talk with the others working on this and let you know ASAP if we change our minds :) |
Hi all, Would it be possible for containerd and other runtime support be made beta graduation blocking for this KEP? |
Hi @rata @giuseppe @saschagrunert, Also, please let me know if there are other PRs in k/k we should be tracking for this KEP |
@salehsedghpour thanks! That should be all for this release! :) @vinayakankugoyal CRIO and crun support this in stable releases already. For containerd the support is merged but coming in the 2.0 release, that it will take a while and I'm unsure how fast will cloud providers adopt it (do you have an idea for Google cloud? I'm afraid they will be very conservative and slow to adopt, and not sure it is worth waiting for them in that case). We were discussing on aiming for beta for 1.30, as there will be a containerd release by then probably, but we haven't decided yet. We will probably join the sig-node in some weeks to discuss it with the community. |
Adding required documentation for [KEP-127](kubernetes/enhancements#127). Signed-off-by: Sascha Grunert <sgrunert@redhat.com> Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com>
https://github.com/kubernetes/enhancements/blob/fa647b424a0b11316e8e31274e50332b14434f9c/keps/sig-node/127-user-namespaces/README.md#pod-security-standards-pss-integration discusses integration with Pod Security Standards and puts a change behind a feature gate. That's hard to teach and I wonder if what we're really describing there is a feature gate for the admission checks. The way I figure it, the standards themselves will only change exactly once: the point at which this new user namespaces feature graduates to stable. |
Adding required documentation for [KEP-127](kubernetes/enhancements#127). Signed-off-by: Sascha Grunert <sgrunert@redhat.com> Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com> Co-authored-by: Tim Bannister <tim@scalefactory.com>
Adding required documentation for [KEP-127](kubernetes/enhancements#127). Signed-off-by: Sascha Grunert <sgrunert@redhat.com> Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com> Co-authored-by: Tim Bannister <tim@scalefactory.com> Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
Enhancement Description
k/enhancements
) update PR(s):k/k
) update PR(s):k/website
) update PR(s):k/enhancements
) update PR(s):k/k
) update PR(s):k/website
) update(s):Please keep this description up to date. This will help the Enhancement Team to track the evolution of the enhancement efficiently.
The text was updated successfully, but these errors were encountered: