yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #17199
[Bug 1340834] [NEW] Support configdrive in LXC
Public bug reported:
We'd like to support configdrive in Libvirt+LXC so that we can use
cloud-init to configure guest networking, inject SSH keys, etc.
Currently configdrive uses block devices which are attached to VM and
then are mounted by the guest.
For LXC our requirements are:
* We'd like to avoid using blockdevices (CAP_SYS_MOUNT maybe dropped
within a guest...not stock Libvirt, but it's possible we'd like to
support that use case eventually)
* We'd like avoid bind-mounts. Recent security concerns around bind-
mount have surfaced where a user could traverse to the top of a bind-
mounted FS. (User namespaces mitigated this, but we'd like to be extra-
safe)
The proposed implementation:
* Adds a `fs` configdrive type, that just drops the config-drive
information into a directory on the host, avoiding the creation of a
blockdevice
* Moves that config-drive directory into the root filesystem of the
guest at spawn time.
** Affects: nova
Importance: Undecided
Assignee: Rick Harris (rconradharris)
Status: In Progress
** Changed in: nova
Assignee: (unassigned) => Rick Harris (rconradharris)
** Changed in: nova
Status: New => In Progress
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1340834
Title:
Support configdrive in LXC
Status in OpenStack Compute (Nova):
In Progress
Bug description:
We'd like to support configdrive in Libvirt+LXC so that we can use
cloud-init to configure guest networking, inject SSH keys, etc.
Currently configdrive uses block devices which are attached to VM and
then are mounted by the guest.
For LXC our requirements are:
* We'd like to avoid using blockdevices (CAP_SYS_MOUNT maybe dropped
within a guest...not stock Libvirt, but it's possible we'd like to
support that use case eventually)
* We'd like avoid bind-mounts. Recent security concerns around bind-
mount have surfaced where a user could traverse to the top of a bind-
mounted FS. (User namespaces mitigated this, but we'd like to be
extra-safe)
The proposed implementation:
* Adds a `fs` configdrive type, that just drops the config-drive
information into a directory on the host, avoiding the creation of a
blockdevice
* Moves that config-drive directory into the root filesystem of the
guest at spawn time.
To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1340834/+subscriptions
Follow ups
References