oci.WithPrivileged: set the current caps, not the known caps#5017
oci.WithPrivileged: set the current caps, not the known caps#5017estesp merged 2 commits intocontainerd:masterfrom
Conversation
061a0d1 to
3440a09
Compare
e6862c7 to
aa31742
Compare
5bc576c to
98a0349
Compare
312abe7 to
ec4e375
Compare
ec4e375 to
a586e24
Compare
|
Build succeeded.
|
|
@fuweid other than the nits above is this approach acceptable? kubernetes-sigs/kind#2058 we are trying to figure out if we should implement some workaround specific to our project (a runc shim?) or if we can depend on shipping a broad solution here. also thank you @AkihiroSuda ! |
|
@BenTheElder the approach looks good to me right now:) And I am still wondering whether it is impacted on systemd service case or not. Will update it later |
This change is needed for running the latest containerd inside Docker that is not aware of the recently added caps (BPF, PERFMON, CHECKPOINT_RESTORE). Without this change, containerd inside Docker fails to run containers with "apply caps: operation not permitted" error. See kubernetes-sigs/kind 2058 NOTE: The caller process of this function is now assumed to be as privileged as possible. Signed-off-by: Akihiro Suda <[email protected]>
a586e24 to
a2d1a8a
Compare
No substantial code change Signed-off-by: Akihiro Suda <[email protected]>
|
I was hoping that a null cap list in the oci spec would allow inheriting caps, but nope 😢 |
|
gentle ping @dims @dmcgowan (I hope this is OK! in Kubernetes it would be, but I'm not sure here) EDIT: Closely watching this PR as KIND will either have to rollback (and be in an awkward state without #5020), get this patch, or do something hacky to emulate this outside of containerd. |
This is a CRI-specific backport of the changes in containerd/containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
This is a CRI-specific backport of the changes in containerd/containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
Backport of containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
Backport of containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
Pull in backport of containerd/containerd#5017 Addresses k3s-io#3296 Signed-off-by: Jacob Blain Christen <[email protected]>
Pull in backport of containerd/containerd#5017 Addresses k3s-io#3296 Signed-off-by: Jacob Blain Christen <[email protected]>
Backport of containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
This is a CRI-specific backport of the changes in containerd/containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
Backport of containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
Backport of containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
Backport of containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
Backport of containerd#5017 Signed-off-by: Jacob Blain Christen <[email protected]>
This change is needed for running the latest containerd inside Docker that is not aware of the recently added caps (BPF, PERFMON, CHECKPOINT_RESTORE).
Without this change, containerd inside Docker fails to run containers with "apply caps: operation not permitted" error.
See kubernetes-sigs/kind#2058
NOTE: The caller process of this function is now assumed to be as privileged as possible.