Skip to content

Commit

Permalink
doc: add version skew and security points
Browse files Browse the repository at this point in the history
  • Loading branch information
alexander-ding committed Dec 2, 2022
1 parent ae05872 commit 59f0b48
Show file tree
Hide file tree
Showing 2 changed files with 41 additions and 6 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Recommended K8s Version: 1.23

## Usage

See [usage.md](/docs/API.md) for detailed usage instructions, as well as some notes on migrating from v1.
See [usage.md](/docs/API.md) for detailed usage instructions, as well as a migration guide from v1.

## Community, Discussion, Contribution, and Support

Expand Down
45 changes: 40 additions & 5 deletions docs/USAGE.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,11 @@ The user-facing interface is exposed in `/pkg/<API group>/`, whereas the `HostAP
Both these paths expose a method `New` that returns an instance of the API interface and `HostAPI`, respectively.
The relevant request/response types for the APIs are also provided under `/pkg/<API Group>`.

## Migrating from v1

The [Usage](#usage) section doubles as a migration guide.
Read over every subsection, as each corresponds to an action item for migration.

## Usage

### Go Code
Expand Down Expand Up @@ -53,26 +58,31 @@ func (mounter *CSIProxyMounterV1) PathExists(path string) (bool, error) {

### Deployment

CSI driver containers need to run as HostProcess pods for the CSI Proxy commands to complete privileged operations.
CSI driver containers need to run as HostProcess containers (HPC) for the CSI Proxy commands to complete privileged operations.
This can be done by updating the driver pod spec, typically embedded in a Daemonset.
The Kubernetes Windows HostProcess Pod [docs](https://kubernetes.io/docs/tasks/configure-pod-container/create-hostprocess-pod/) goes into more detail about each field.
The Kubernetes Windows HPC [docs](https://kubernetes.io/docs/tasks/configure-pod-container/create-hostprocess-pod/) goes into more detail about each field.

```yaml
spec:
securityContext:
hostNetwork: true
windowsOptions:
hostProcess: true
# you might want to use a different user name
# to limit the privileges of the containers
# see the `Security` section
runAsUserName: "NT AUTHORITY\\SYSTEM"
```
Using HostProcess pods have a few important consequences on the deployed containers, as noted in the HostProcess docs.
- HostProcess containers have no file system or resource isolation, so they have a complete view of the host machine’s file system.
Using HPCs have a few important consequences on the deployed containers, as noted in the docs linked above.
- HPCs have no file system or resource isolation, so they have a complete view of the host machine’s file system.
This means that paths passed in **paths passed as command line arguments must be absolute paths with respect to the host**.
On the other hand, depending on the containerd and the Windows OS version, Kubernetes volume mounts are either mounted relative to a subdirectory of the host machine specified by an environment variable `%CONTAINER_SANDBOX_MOUNT_POINT%` or **mounted relative to the host process root**. See [HostProcess Caveats](#hostprocess-caveats).
- HostProcess pods can only contain HostProcess containers.
- HPC is enabled at the pod level, and a HostProcess pod can only contain HostProcess containers.
Often, the CSI node registrar is deployed in the same pod as the driver, so file paths for both containers need to be updated.
- Named pipes and Unix domain sockets are not supported and should be accessed via their absolute path with respect to the host.
- The privileged nature of HPCs means that additional security policies must be put in place to reduce attack surface.
See [Security](#security)

Instead of mounting host process paths such as `c:\var\lib\kubelet` to each container’s own filesystem, the container can directly access these paths.

Expand Down Expand Up @@ -135,3 +145,28 @@ HostProcess containers require containerd v1.6 to work, but new Windows OS APIs
Practically, the difference is that HostProcess containers running on nodes with containerd v1.6 see the whole host file system, whereas HostProcess containers running on nodes with containerd v1.7 are presented with a merged view of the host OS’s file system and container-local volumes. Containerd v1.6 mounts the container files at `c:\C\{container-id}`, whereas containerd v1.7 mounts the container files at `c:\hpc`, where changes inside that path are only visible to the container. In both versions, the mount path is exposed as an environment variable `%CONTAINER_SANDBOX_MOUNT_POINT%`, which is also set as the default working directory of the containers.

Another key difference is that volume mounts in containerd v1.6 are relative to the container mount path (i.e., `%CONTAINER_SANDBOX_MOUNT_POINT%`), whereas volume mounts in containerd v1.7 are relative to the root of the host file system. Drivers that rely on mounting volumes to containers are likely going to be broken by containerd version changes. Therefore, it’s recommended to migrate drivers deployment specs to not use any volume mounts and instead rely on absolute host file system paths. This should ensure that the driver will work with both containerd v1.6 and v1.7.

### Version Skew

An important consideration for using CSI Proxy v2 is that support for HPCs is only enabled by default starting in Kubernetes 1.23.

Kubernetes [version skew policy](https://kubernetes.io/releases/version-skew-policy/) supports up to 2 minor versions of discrepancy between the control plane and worker nodes.
This means that drivers using CSI Proxy v2 cannot be safely deployed until the control plane is running in 1.25+, as worker nodes are guaranteed to run in 1.23+.
If worker nodes are running in 1.22 or earlier, they would not be able to recognize the HPC-related fields in the driver deployment spec issued by the control plane.

### Security

HPCs provide privileged access to the host machine.
This means that security measures should to be put in place to follow the principle of least privilege.
We identify a few ways to enable HPCs but minimize the attack surface.

- Administer admission webhooks to limit access to the HPC feature.
One could only enable the feature on the `kube-system` namespace, for example, and enforce access control to the system namespace.
- Create a Windows user group with the least amount of privilege necessary to support the CSI Proxy storage operations.
The HPC spec can be configured to create a temporary user created in that user group for each run by setting `runAsUserName` to the name of the group.
```yaml
spec:
securityContext:
windowsOptions:
runAsUserName: "custom-user-group"
```

0 comments on commit 59f0b48

Please sign in to comment.