[pve-devel] applied: [PATCH v2 container 0/2] feature flags
Thomas Lamprecht
t.lamprecht at proxmox.com
Wed Oct 3 13:50:13 CEST 2018
On 10/2/18 11:13 AM, Wolfgang Bumiller wrote:
> This series adds a 'features' config option adding support for nesting,
> mounting and some quirks the user should know about when dealing with
> these settings.
> This makes use of the new apparmor profile generation & namespacing
> feature in lxc.
>
> This is updated with Thomas' feedback:
> - Dropped the specific permission checks and simply limited
> permissions to root at pam for now. We can still soften the
> restrictions later.
> - Code cleanup ($unprivileged vs $custom_idmap).
>
> For example:
> Given an unprivileged container `100`:
> # pct set 100 --features nesting=1
> is all that's required to run `lxd` inside the container.
>
> With docker the story is slightly different as it requires access to
> `keyctl` which systemd-networkd _cannot_ have access to, so for nested
> docker:
> # pct set 100 --features nesting=1,keyctl=1
> And you cannot depend on systemd-networkd in that container.
>
> To mount network file systems such as cifs or nfs:
> # pct set 100 --features mount=cifs;nfs
>
> Note that mounting block devices via `loop` devices will not work
> without also manually passing /dev/loop* to the containers. Since this
> has a rather large security impact I'm unsure we ever want to make this
> easy (see my forum post in [1]).
>
> [1] https://forum.proxmox.com/threads/mount-via-loop-device-in-container.47398/#post-223325
>
> Wolfgang Bumiller (2):
> config: whitelist new apparmor related config keys
> add feature flags using apparmor profile generation
>
> debian/control | 2 +-
> src/PVE/LXC.pm | 105 ++++++++++++++++++++++++++++++++++++++++++++++++--
> src/PVE/LXC/Config.pm | 55 ++++++++++++++++++++++++++
> 3 files changed, 157 insertions(+), 5 deletions(-)
>
applied series, thanks!
More information about the pve-devel
mailing list