[ 
https://issues.apache.org/jira/browse/YARN-8342?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16490997#comment-16490997
 ] 

Shane Kumpf edited comment on YARN-8342 at 5/25/18 4:50 PM:
------------------------------------------------------------

{quote}Allow exemption to bind-mount launch-container.sh for untrusted yarn 
mode, and not drop launch_command.{quote}
The launch script typically handles symlinks, environment variables, prelaunch 
output, etc. Will this be compatible if all mounts are removed? Wouldn't it be 
easier to skip the launch script and just pass the "launch_command" from the 
Services API? The "exec bash" in the launch script seems like it would be 
problematic for this use case too.

{quote}The current implementation will block system auditing inside docker 
container with selinux turned on.{quote}
I thought this was related to enabling "no-new-privileges", which we aren't 
setting by default. Is there another case here that breaks SELinux?

{quote}Change the name docker.privileged-containers.registries back to 
docker.trusted.registries. Images outside of trusted.registries are 
disallowed.{quote}
I think that these could be treated as two separate items. Changing the name 
docker.privileged-containers.registries back to docker.trusted.registries could 
be done here and we could maintain the "untrusted sandbox" feature. I still 
don't love using the word "trusted" as it's overloaded too (e.g. "Docker 
Trusted Registry", "content trust", etc) but I certainly prefer "trusted" over 
"privileged", so I'm +1 for "trusted" here unless someone has a better name. 
YARN-8343 could handle the while list independent of this feature.

So I guess I'm in favor of some form of #1 and the first half of #2 being 
handled here.


was (Author: [email protected]):
{quote}Allow exemption to bind-mount launch-container.sh for untrusted yarn 
mode, and not drop launch_command.{quote}
The launch script typically handles symlinks, environment variables, prelaunch 
output, etc. Will this be compatible if all mounts are removed? Wouldn't it be 
easier to skip the launch script and just pass the "launch_command" from the 
Services API? The "exec bash" in the launch script seems like it would be 
problematic for this use case too.

{quote}The current implementation will block system auditing inside docker 
container with selinux turned on.{quote}
I thought this was related to enabling "no-new-privileges", which we aren't 
setting by default. Is there another case here that breaks SELinux?

{quote}Change the name docker.privileged-containers.registries back to 
docker.trusted.registries. Images outside of trusted.registries are 
disallowed.{code}
I think that these could be treated as two separate items. Changing the name 
docker.privileged-containers.registries back to docker.trusted.registries could 
be done here and we could maintain the "untrusted sandbox" feature. I still 
don't love using the word "trusted" as it's overloaded too (e.g. "Docker 
Trusted Registry", "content trust", etc) but I certainly prefer "trusted" over 
"privileged", so I'm +1 for "trusted" here unless someone has a better name. 
YARN-8343 could handle the while list independent of this feature.

So I guess I'm in favor of some form of #1 and the first half of #2 being 
handled here.

> Using docker image from a non-privileged registry, the launch_command is not 
> honored
> ------------------------------------------------------------------------------------
>
>                 Key: YARN-8342
>                 URL: https://issues.apache.org/jira/browse/YARN-8342
>             Project: Hadoop YARN
>          Issue Type: Sub-task
>            Reporter: Wangda Tan
>            Assignee: Eric Yang
>            Priority: Critical
>              Labels: Docker
>         Attachments: YARN-8342.001.patch
>
>
> During test of the Docker feature, I found that if a container comes from 
> non-privileged docker registry, the specified launch command will be ignored. 
> Container will success without any log, which is very confusing to end users. 
> And this behavior is inconsistent to containers from privileged docker 
> registries.
> cc: [~eyang], [[email protected]], [~ebadger], [~jlowe]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to