Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

UID of Ambassador image #391

Closed
pdmack opened this issue Apr 25, 2018 · 6 comments
Closed

UID of Ambassador image #391

pdmack opened this issue Apr 25, 2018 · 6 comments

Comments

@pdmack
Copy link

pdmack commented Apr 25, 2018

Some Kube platforms such as OpenShift by default have restricted UID ranges for any new project or namespace, thus necessitating this Kubeflow troubleshooting note.

It would be great if the Ambassador image was modified similar to what the radanalytics.io project has done for some of its images.
/cc @mhausenblas
/cc @tmckayus
/cc @willb

@kflynn
Copy link
Member

kflynn commented Apr 25, 2018

Hey @pdmack, are you on the Ambassador Gitter channel? Seems like it might be useful to chat about this there...

@kflynn kflynn closed this as completed Apr 25, 2018
@kflynn kflynn reopened this Apr 25, 2018
@kflynn
Copy link
Member

kflynn commented Apr 25, 2018

(Meant to comment, not close-and-comment. Sigh.)

@pdmack
Copy link
Author

pdmack commented Apr 25, 2018

coming...

@kflynn
Copy link
Member

kflynn commented Apr 25, 2018

Short version of the discussion we had on Gitter: for this to work, Ambassador needs to work when run as an arbitrary UID with GID 0. More information is here: https://blog.openshift.com/jupyter-on-openshift-part-6-running-as-an-assigned-user-id/ but the short version is that one can rely on group write permissions (how exactly it's "better" to rely on a known group than on a known user I'm not exactly sure ;) ).

As an added bonus, fixing this should also fix #199.

@pdmack
Copy link
Author

pdmack commented Apr 25, 2018

@kflynn I have environments by which I can test your PR when ready. At least for OpenShift. ;-)

@kflynn
Copy link
Member

kflynn commented May 29, 2018

Collecting all three security issues under #457.

@kflynn kflynn closed this as completed May 29, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants