I do agree this is an issue, but its one that's exacerbated by containers not created by them. It makes more sense to me do try to accomplish this at the orchestration layer that has visibility to the platform and the containers.
Yes
Especially at a pod layer where it's critical to match UID/GID. Question here, would it require the use of Kubernetes volumes not Docker volumes to accomplish?
Kubernetes volumes are docker volumes, but as you note the orchestrator is the one who needs to pair those up
Would etcd be useful in this case to provide a specific set of UID/GID combos to containers? Security issues with that approach?
Kube has to have a concept of attribution (ownership of X implies ownership of Y), so we would make it an admins responsibility to configure the system in such a way that uids/gids are secure and fair (Kube has effective root on hosts anyway).
I don't think this addresses the rpm-ostree issue as that isn't container related, is it Colin? Am I misinterpreting that the potential issue comes from local changes vs composed changes that affect UID/GID assignments?
It does not, I merely wanted to dovetail the large scale concern so folks would be aware of the potential impact when dealing with individual containers (customers in the short term could need to build images with specific uids/gids in order to accomplish cluster wide volume sharing, in the long term user namespaces may reduce the need for that).
|