8000 Use path based unix socket for shims by crosbymichael · Pull Request #4343 · containerd/containerd · GitHub
[go: up one dir, main page]

Skip to content

Conversation

crosbymichael
Copy link
Member

This allows filesystem based ACLs for configuring access to the socket of a
shim.

Signed-off-by: Michael Crosby michael@thepasture.io

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jun 24, 2020

Build succeeded.

Copy link
Contributor
@Zyqsempai Zyqsempai left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jun 24, 2020

Build succeeded.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This breaks running multiple daemons

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's put runtime dir string into the hash

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ok, let me see if I can get that data easily.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also could you:

  • add a code comment to explain that /run/containerd/s is hard coded for the sake of avoiding hitting the SUN_PATH length limit
  • add MkdirAll("/run/containerd/s")

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's put runtime dir string into the hash

We can also consider putting the daemon UUID into the hash, not sure which one is better.

@dmcgowan dmcgowan added this to the 1.4 milestone Jun 25, 2020
AkihiroSuda added a commit to AkihiroSuda/docker that referenced this pull request Jun 26, 2020
The new shim socket path convention hardcodes `/run/containerd`:
containerd/containerd#4343

`dockerd-rootless.sh` is updated to hide the rootful `/run/containerd`
from the mount namespace of the rootless dockerd.

Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
@theopenlab-ci
Copy link
theopenlab-ci bot commented Jun 26, 2020

Build succeeded.

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jun 26, 2020

Build succeeded.

@crosbymichael
Copy link
Member Author

Ok, it looks like we have 1-2 test to fix. The handling and timeouts of using file based unix sockets seem to be different than an abstract socket. I'm guessing this has to be something about if there is someone listening on the other end or not.

If anyone else has time to look into this go for it, I'll try to debug Monday.

@AkihiroSuda
Copy link
Member

How can we help moving this forward?

8000

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 10, 2020

Build succeeded.

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 10, 2020

Build succeeded.

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 10, 2020

Build succeeded.

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 10, 2020

Build succeeded.

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 16, 2020

Build succeeded.

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 16, 2020

Build succeeded.

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 16, 2020

Build succeeded.

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 16, 2020

Build succeeded.

This allows filesystem based ACLs for configuring access to the socket of a
shim.

Signed-off-by: Michael Crosby <michael@thepasture.io>
@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 21, 2020

Build succeeded.

@theopenlab-ci
Copy link
theopenlab-ci bot commented Jul 22, 2020

Build succeeded.

@AkihiroSuda AkihiroSuda modified the milestones: 1.4, 1.5 Aug 6, 2020
@AkihiroSuda
Copy link
Member

Moved to v1.5 milestone. We can consider backporting to v1.4 after the PR gets stabilized.

docker-jenkins pushed a commit to docker-archive/docker-ce that referenced this pull request Oct 15, 2020
The new shim socket path convention hardcodes `/run/containerd`:
containerd/containerd#4343

`dockerd-rootless.sh` is updated to hide the rootful `/run/containerd`
from the mount namespace of the rootless dockerd.

Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
Upstream-commit: 794aa20983c9384726721e1c5d3a552ef7f8f4cf
Component: engine
AkihiroSuda added a commit to AkihiroSuda/docker that referenced this pull request Oct 16, 2020
The new shim socket path convention hardcodes `/run/containerd`:
containerd/containerd#4343

`dockerd-rootless.sh` is updated to hide the rootful `/run/containerd`
from the mount namespace of the rootless dockerd.

Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
(cherry picked from commit 794aa20)
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
docker-jenkins pushed a commit to docker-archive/docker-ce that referenced this pull request Oct 16, 2020
The new shim socket path convention hardcodes `/run/containerd`:
containerd/containerd#4343

`dockerd-rootless.sh` is updated to hide the rootful `/run/containerd`
from the mount namespace of the rootless dockerd.

Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
(cherry picked from commit 794aa20983c9384726721e1c5d3a552ef7f8f4cf)
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
Upstream-commit: c7253a0e1ac88bd8eb0db409570a685a5f6258f3
Component: engine
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants
0