Skip to content
This repository has been archived by the owner on Mar 9, 2022. It is now read-only.

Add user namespace support #790

Closed
Random-Liu opened this issue May 30, 2018 · 7 comments
Closed

Add user namespace support #790

Random-Liu opened this issue May 30, 2018 · 7 comments
Assignees

Comments

@Random-Liu
Copy link
Member

We should support node level user namespace after kubernetes/kubernetes#64005 is merged.

It shouldn't be hard for containerd given that all these happen on the client side, and there is already existing util function for per container user namespace remapping. https://github.com/containerd/containerd/blob/129167132c5e0dbd1b031badae201a432d1bd681/container_opts_unix.go#L149

@Random-Liu
Copy link
Member Author

The kubernetes PR is punted to 1.12. Let's punt, too.

@Random-Liu Random-Liu modified the milestones: v1.11, next-candidate Jun 8, 2018
@mikebrow
Copy link
Member

mikebrow commented Jun 8, 2018

I saw.. :(

@shuyingliang
Copy link

Hello, we're currently evaluating to use containerd/crio, crio has host-level user namespaces ready, we're wondering the timeline or plan of cri-containerd can have any level of user namespaces support?

In addition, regarding user namespaces performance issue: the performance overhead of chowning is significant (1s v.s. N>=7 mins in our use case), any plan to improve user namespaces performance?

Given most organizations taking long time to upgrade kernel (>=4.19) to be able to use metacopy=on feature, to improve container security adoption, we are thinking about whether we can enable disable chowning or enable the option to what files/directories to skip to chown? This is feasible because files/directories in the image are world-readable, and users usually have the images built with permissions of 755 to be able to execute at runtime, there is really no need to mutate the image with shifting uid/gid when user namespaces is enabled, before shiftfs support in...

Any thoughts? Thanks for sharing!

@alban
Copy link

alban commented Jun 19, 2020

Hi! We (@alban @mauriciovasquezbernal @rata) are working on implementing user namespaces support in containerd/cri. At the moment, we have a working proof-of-concept based on Kubernetes 1.17 and containerd/cri 1.3 (kinvolk#1). Once ready and rebased on master, we can make a proper PR.

@mikebrow
Copy link
Member

Hi! We (@alban @mauriciovasquezbernal @rata) are working on implementing user namespaces support in containerd/cri. At the moment, we have a working proof-of-concept based on Kubernetes 1.17 and containerd/cri 1.3 (kinvolk#1). Once ready and rebased on master, we can make a proper PR.

Excellent, interested to see your POC. If I remember right from the June 9 sig-node call.. Vince?? took the task to open a new kep to replace the now very old node level user namespace issue that was written pre-kep process.

@vbatts
Copy link

vbatts commented Jun 19, 2020

@mikebrow more-or-less I did 😸 . I was a conversation to see what the next step needed will be, and the answer was a KEP.

@alban
Copy link

alban commented Jun 22, 2020

Excellent, interested to see your POC

@mikebrow The links to the POC are the following:

@dmcgowan dmcgowan closed this as completed Mar 8, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

6 participants