Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cluster does not grant sudo #15

Open
sr229 opened this issue Oct 23, 2020 · 4 comments
Open

Cluster does not grant sudo #15

sr229 opened this issue Oct 23, 2020 · 4 comments
Labels
discussion feature request New feature or request feedback Any feedbacks

Comments

@sr229
Copy link

sr229 commented Oct 23, 2020

Apparently sandboxed containers do not grant sudo, which is required from Containers like Cloud9 and VSCode. I, as a developer, would expect these stacks to just work outside the box like a real machine, and apparently the gVisor containers don't allow such.

@sr229 sr229 changed the title gVisor does not grant sudo Cluster does not grant sudo Oct 23, 2020
@staroider
Copy link
Collaborator

Thank @sr229 for the feedback.

We currently forces non-root container for security reason. See https://engineering.bitnami.com/articles/running-non-root-containers-on-openshift.html. We'd like to allow root container if they can give the same level of security. Unfortunately, we had to choose only one between security and allowing root container, in today's technology. And we think providing enterprise level of security for user benefits more.

Please share us if you have a great solution for this!

@sr229
Copy link
Author

sr229 commented Oct 23, 2020

I think Kata containers as a isolation solution would have done the job of what Dedicated would be doing since it should allow root access to a container but completely isolates the damage on that specific container only IMO, this would allow fine grained resource constraints the same as gVisor-bavked containers does as well.

@staroider staroider added the feature request New feature or request label Oct 27, 2020
@staroider
Copy link
Collaborator

We researched Kata container a little bit and it looks promising. However there're few things that make it difficult to adopt it right now. We'll continue to evaluate this and more technologies to remove non-root container restrictions.

Thank @sr229 for the suggestion!

@sr229
Copy link
Author

sr229 commented Oct 28, 2020

Another thing to note is Kata Containers has a AWS Firecracker backend you can use (which is used at AWS in production) - so Kata Containers has been production-proven.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
discussion feature request New feature or request feedback Any feedbacks
Projects
None yet
Development

No branches or pull requests

3 participants