From: Alexey Gladkov <legion@altlinux.ru> To: ALT Linux Team development discussions <devel@lists.altlinux.org> Cc: ldv@altlinux.org Subject: Re: [devel] [PATCH hasher-priv v1 3/3] Add cgroup support Date: Fri, 2 Oct 2020 14:58:57 +0200 Message-ID: <20201002125857.y7p5ckbxjpjxvk6u@comp-core-i7-2640m-0182e6> (raw) In-Reply-To: <20201002114645.GF1037402@cello> [-- Attachment #1: Type: text/plain, Size: 4690 bytes --] On Fri, Oct 02, 2020 at 02:46:45PM +0300, Arseny Maslennikov wrote: > > > There's a misunderstanding here. I'm not asking to explain the > > > semantics (what this patch does) — I repeat, it's rather obvious from > > > the source itself, the patch is indeed simple. I'm trying to get how the > > > patch's author would describe the pragmatic value of this patch. IOW: > > > we see this patch does XXX. What, in Alexey's view, are we trying to > > > achieve by implementing XXX? > > > > I remember that this patch was the result of a discussion with ldv. > > That discussion then likely was not public; in part, that's why I'm asking. Yeah. Sometimes it happens. > > The > > idea was that the admin would prepare the system for use of cgroups by the > > hasher-privd daemon. > > If I understood correctly ^U > To put it another way, we're doing this because the machine admin might > want hasher-privd to put the processes it spawns in cgroups > _at_an_arbitrary_path_, at the administrator's discretion. > > Ok, this is a valid explanation and a valid feature. Thank you. Yes. This is an optional feature for the administrator. > > I'm not considering the hasher-privd as an end user server. This is a > > low-level server on which you can build different solutions. I don't mean > > just hasher. > > Subject: the future of hasher-privd > > I'm not particularly opposed to the expansion of hasher-privd's utility > scope; there are quite a lot of potential use cases: hasher-privd as a > general-purpose cgroup manager, hasher-privd as a daemon-based > NO_NEW_PRIVS-ready policy-enforcing "su -", ... At the time when I made this patch and thought in the future to try to make the hasher-privd more general-purpose. I had thoughts to add support for seccomp via the libkafel library, extend the use of namespaces (user, pid, time, etc). Another thought was not directly related to hasher-privd. I was thinking about trying to implement the creation of a chroot from docker images. > While this sounds interesting, I believe there are currently some > obstacles. Would those solutions on top of hasher-privd be > co-installable and co-existing on a single machine? E.g. two hasher-privd > init scripts with different configuration files for different things, > spawning different processes. The hasher-priv/hasher-privd has a global configuration. As long as different solutions are able to use it together, they can coexist. But this reuse of the server seems a little strange to me. > Or they wouldn't? Or a single hasher-privd instance — aka node, aka main > process if you will — would do both services? I don't yet have a picture > of this in my head; this will have to be thought out. > > Will the decoupled, generic hasher-privd have to expand its IPC API? I didn't expect the API to be public. I mean it will be used by someone other than the hasher-priv. I didn't think that far. I propose to postpone this question. We don't even have a server yet. > If we decouple hasher-privd from hasher, this would also mean we support > arbitrary clients, so we'll have to formally define the IPC interface, > see my concerns on it in a previous mail. Yep. When this happens, we will need to make a thoughtful public API. > As it stands now, the hasher project currently sees hasher-privd as its > vital component, a specialized tool for a special purpose, configured at > /etc/hasher-priv/. You're proposing something different. > > In short, it's gonna be a long road. True. > > With this in mind, I don't think that this server should do > > everything out of the box without configuration. > > I believe the hasher project _would_ want some sane out-of-the-box > configuration. The generic privd you describe above might not, much like > runc/crun do not, but the hasher project definitely would. Furthermore, in > my personal (but shared by many) opinion, this hasher OOTB experience > would have to be catered to the common case of an ALT Team developer, > not to public builder services (which are already expected to take care > to tune and harden their non-trivial configuration, and we can even ship > recommendations for their use case in /usr/share/doc). I agree with you but let's not do it all at once. I have not been able to upstream the basic server implementation. I'm afraid more global changes will be accepted even slower. > The approach you suggest here could work, if e. g. the decoupled privd > is shipped with no defaults, and the hasher project ships its own > defaults for the desired operation of privd. -- Rgrds, legion [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 195 bytes --]
next prev parent reply other threads:[~2020-10-02 12:58 UTC|newest] Thread overview: 52+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-12-13 11:42 [devel] [PATCH hasher-priv v1 0/3] Make a daemon from the hasher-priv Alex Gladkov 2019-12-13 11:42 ` [devel] [PATCH hasher-priv v1 1/3] " Alex Gladkov 2020-09-17 13:10 ` Arseny Maslennikov 2020-10-01 19:43 ` Alexey Gladkov 2020-10-01 21:24 ` Arseny Maslennikov 2020-10-01 23:38 ` Alexey Gladkov 2020-09-17 13:10 ` [devel] [PATCH hasher-priv v1 1/3] *literacy* Arseny Maslennikov 2020-09-17 13:11 ` [devel] [PATCH hasher-priv v1 1/3] caller.c Arseny Maslennikov 2020-09-17 13:55 ` Arseny Maslennikov 2020-09-17 13:11 ` [devel] [PATCH hasher-priv v1 1/3] caller_server.c, caller_task.c Arseny Maslennikov 2020-10-01 19:47 ` Alexey Gladkov 2020-09-17 13:11 ` [devel] [PATCH hasher-priv v1 1/3] config.c Arseny Maslennikov 2020-09-18 10:42 ` Dmitry V. Levin 2020-09-17 13:12 ` [devel] [PATCH hasher-priv v1 1/3] hasher-privd.c Arseny Maslennikov 2020-09-17 13:12 ` [devel] [PATCH hasher-priv v1 1/3] logging.c Arseny Maslennikov 2020-09-17 13:12 ` [devel] [PATCH hasher-priv v1 1/3] Makefile Arseny Maslennikov 2020-09-17 15:09 ` Vladimir D. Seleznev 2020-09-18 10:48 ` Dmitry V. Levin 2020-09-18 10:54 ` Andrey Savchenko 2020-09-18 11:33 ` Dmitry V. Levin 2020-09-18 12:24 ` Arseny Maslennikov 2020-09-17 13:12 ` [devel] [PATCH hasher-priv v1 1/3] server.conf Arseny Maslennikov 2020-09-18 10:50 ` Dmitry V. Levin 2020-09-18 10:57 ` Arseny Maslennikov 2019-12-13 11:42 ` [devel] [PATCH hasher-priv v1 2/3] Add systemd and sysvinit service files Alex Gladkov 2020-06-17 22:31 ` Mikhail Novosyolov 2020-06-17 22:38 ` Mikhail Novosyolov 2020-06-17 22:50 ` Alexey Gladkov 2020-06-17 22:43 ` Alexey Gladkov 2020-06-17 22:53 ` Mikhail Novosyolov 2020-09-17 13:10 ` Arseny Maslennikov 2020-10-01 17:25 ` Alexey Gladkov 2020-10-01 17:50 ` Arseny Maslennikov 2019-12-13 11:42 ` [devel] [PATCH hasher-priv v1 3/3] Add cgroup support Alex Gladkov 2020-09-17 13:11 ` Arseny Maslennikov 2020-10-01 19:17 ` Alexey Gladkov 2020-10-01 20:23 ` Arseny Maslennikov 2020-10-02 0:42 ` Alexey Gladkov 2020-10-02 11:46 ` Arseny Maslennikov 2020-10-02 12:58 ` Alexey Gladkov [this message] 2019-12-15 8:50 ` [devel] [PATCH hasher-priv v1 0/3] Make a daemon from the hasher-priv Alexey Tourbin 2019-12-15 23:33 ` Andrey Savchenko 2019-12-16 9:35 ` Dmitry V. Levin 2019-12-29 11:03 ` Alexey Tourbin 2020-03-16 10:34 ` Alexey Gladkov 2020-06-17 22:01 ` Alexey Gladkov 2020-09-17 13:09 ` Arseny Maslennikov 2020-10-01 17:21 ` Alexey Gladkov 2020-10-01 17:44 ` Arseny Maslennikov 2020-10-01 20:01 ` Alexey Gladkov 2020-10-01 21:53 ` Arseny Maslennikov 2020-10-01 23:55 ` Alexey Gladkov
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20201002125857.y7p5ckbxjpjxvk6u@comp-core-i7-2640m-0182e6 \ --to=legion@altlinux.ru \ --cc=devel@lists.altlinux.org \ --cc=ldv@altlinux.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux Team development discussions This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/devel/0 devel/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 devel devel/ http://lore.altlinux.org/devel \ devel@altlinux.org devel@altlinux.ru devel@lists.altlinux.org devel@lists.altlinux.ru devel@linux.iplabs.ru mandrake-russian@linuxteam.iplabs.ru sisyphus@linuxteam.iplabs.ru public-inbox-index devel Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.devel AGPL code for this site: git clone https://public-inbox.org/public-inbox.git