-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KEP-3169: Fine-grained SupplementalGroups control #3620
KEP-3169: Fine-grained SupplementalGroups control #3620
Conversation
e3ce6f7
to
14a1169
Compare
65e4c29
to
d1617cd
Compare
d1617cd
to
0e57ad2
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@dchen1107 @derekwaynecarr would you mind reviewing this??
This needs to update CRI API and will impact CRI implementations. I'm not sure how I proceed to implement it. I really appreciated some comments/guidance from you.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mrunalp I updated the branch. PTAL.
I'm confused - what part of this is left unresolved? |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dchen1107, everpeace, johnbelamaric, mrunalp, SergeyKanzhelev The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This KEP roughly introduces belows in Kubernetes API: - 'PodSecurityContext.SupplementalGroupsPolicy' to control which groups are attached to the container process, and - 'ContainerStatus.User' so that user know which identities(uid, gid, supplemental groups) are ACTUALLY attached to the container process. The corresponding changes are also proposed in CRI. Co-authored-by: Sergey Kanzhelev <[email protected]>
…or alpha relevant sections.
I will squash my commits. Squash will also remove |
8b3e39b
to
b598ea5
Compare
I'm in Tokyo. It's very difficult for me to attend the SIG node meeting because of the timezone (the meeting is 3am in my time😭). I'd also like to know which part is unclear for merging this PR? I'm glad to address/answer it. |
Oh, my squash wiped out @thockin @mrunalp sorry, would you mind giving
edited: I noticed dchen1107 already gave |
/unhold |
/lgtm |
FYI: containerd fixed an issue related to supplemental GIDs. I don't think this change affects this KEP, but please confirm. |
Thanks for the info.
Confirmed. IIUC, the issue is caused by container runtimes not duplicating the primary group in the supplementary groups in some situations. This means that the primary group MUST always be duplicated into the supplementary groups, right? Then, although the fix does not affect the KEP as described, I would say we would need to update API description of |
Right. |
So this KEP got approved, but no PR merged for 1.27, right? Will we revisit for 1.28? |
No, sorry. I opened one cleanup PR in containerd side. But this was just approved and not merged.
Yes, I would like to work on this for 1.28. |
PodSecurityContext.SupplementalGroups
by custom container image although PSP(or other policy engines) enforces the field kubernetes#112879