-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ISO upgrades to support user namespaces #18488
Comments
Sounds like an experimental feature, that doesn't really fit with the LTS versions used in the minikube ISO (or KIC) Theoretically there could be two image versions, but that means more maintenance (and it is already struggling) |
KEP 127 looks completely untested/unimplemented for Docker, which is still the minikube default container runtime...
|
@afbjorklund if it helps to make a decision, it doesn't seem it will be implemented in cri-dockerd anytime soon, as docker has some limitations. I've been trying them to implement it for years now, and although they like the idea, there was no progress so far: Mirantis/cri-dockerd#74 |
Yeah at the moment it's definitely too soon to build an updated ISO for general use that enables this. I'm optimistic releases of containerd and runc will be available soon though :). But everything needs to be marked as an LTS release as well? |
It is not an absolute rule, but historically minikube used Ubuntu LTS as the base for decisions for the Buildroot versions.
But after that it was pretty arbitrary, stayed on 4.19 for a while since it was stable and then jumped to 5.10 (770d41f).
The versions of containerd and runc usually came (bundled) with Docker... https://docs.docker.com/engine/install/binaries/ (or
|
Note: Buildroot 2024.02 (LTS) supports these kernels:
See https://buildroot.org/news.html (and Going with Kernel 5.15 would be the more obvious choice. |
The user namespace stuff needs features from newer kernels than 5.15. I've had success with 6.6, apparently you can go back as far as 6.3 but it looks like that's not an option for buildroot. |
@mbaynton it should work fine with 5.12+ but you can't use tmpfs volumes (so service account tokens can't really work) and you have a higher pod start latency and storage overhead if you use 5.12 too. |
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
/remove-lifecycle rotten containerd 2.0 and runc 1.2 should be released this year with proper support. It seems worth keeping this open a little longer |
I agree we should have a tutorial that lets ppl build their own ISO easily and not part of released minikube ISOs |
What Happened?
A new feature is nearing readiness in kubernetes/containerd/runc that enables you to run your containers in their own linux user namespace. This is beneficial for security / container isolation and also enables you to do certain operations inside containers that were previously only possible with
privileged
host permissions.This feature is set to be promoted to beta in kubernetes 1.30.
It would be great to be able to use minikube to prototype setups that use user namespaces, but lots of much newer software in the ISO will be needed:
Attach the log file
n/a, trying to submit a feature request but can't find a better form
Operating System
Ubuntu
Driver
KVM2
The text was updated successfully, but these errors were encountered: