Skip to content
This repository has been archived by the owner on Mar 9, 2022. It is now read-only.

sandbox: separate host accessing workload and privileged #866

Merged
merged 1 commit into from
Jul 26, 2018

Conversation

Random-Liu
Copy link
Member

@Random-Liu Random-Liu commented Jul 26, 2018

Cherrypick #857 to catch the containerd 1.2 release train, or else we need to wait till end of September.

VM isolated runtimes can support privileged workloads. In this
scenario, access to the guest VM is provided instead of the host.
Based on this, allow untrusted runtimes to run privileged workloads.

If the workload is specifically asking for node PID/IPC/network, etc.,
then continue to require the trusted runtime.

This commit repurposes the hostPrivilegedSandbox utility function to
only check for node namespace checking.

Fixes: containerd#855

Signed-off-by: Eric Ernst <[email protected]>
@mikebrow
Copy link
Member

just have to pick up the ci fix first then merge.. fun..

Copy link
Member

@mikebrow mikebrow left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/LGTM
with ci fix to clear tests

@Random-Liu
Copy link
Member Author

Random-Liu commented Jul 26, 2018

/test pull-cri-containerd-verify

@Random-Liu Random-Liu merged commit 5f0852e into containerd:release/1.11 Jul 26, 2018
@Random-Liu Random-Liu deleted the cherrypick-#857 branch July 26, 2018 20:12
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants