Details
-
Improvement
-
Status: Accepted
-
Major
-
Resolution: Unresolved
-
None
-
None
-
None
Description
As a first pass at supporting user namespaces, figure out how we can use them to improve container security when running untrusted tasks.
This ticket is specifically targeting how to build a user namespace hierarchy and excluding any sort of ID mapping for the container images.
Attachments
Issue Links
- is blocked by
-
MESOS-8272 Fall back to bind mounting container devices.
- Resolved
-
MESOS-8286 Making bind mounts readonly fails with user namespaces.
- Resolved
- is related to
-
MESOS-8155 subprocess clone argument should return a Try<pid_t>
- Open
-
MESOS-4936 Improve container security for Mesos containerizer.
- Accepted
- is required by
-
MESOS-2952 Provide user namespaces for privileged access inside containers
- Accepted
- relates to
-
MESOS-8213 Private user namespaces for tasks
- Open