-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Support running a workspace in kata containers #21105
Copy link
Copy link
Closed
Labels
area/dashboardarea/devworkspace-operatorkind/enhancementA feature request - must adhere to the feature request template.A feature request - must adhere to the feature request template.lifecycle/frozenIndicates that an issue or PR should not be auto-closed due to staleness.Indicates that an issue or PR should not be auto-closed due to staleness.severity/P1Has a major impact to usage or development of the system.Has a major impact to usage or development of the system.
Metadata
Metadata
Assignees
Labels
area/dashboardarea/devworkspace-operatorkind/enhancementA feature request - must adhere to the feature request template.A feature request - must adhere to the feature request template.lifecycle/frozenIndicates that an issue or PR should not be auto-closed due to staleness.Indicates that an issue or PR should not be auto-closed due to staleness.severity/P1Has a major impact to usage or development of the system.Has a major impact to usage or development of the system.
Is your enhancement related to a problem? Please describe
Kata containers allow running pod in dedicated VMs. That makes it possible to run a container as root without any security exposure (and run
apt-get/yum installorbuildah).To run a Che workspace in a kata container the workspace
Podshould specifyruntimeClassName: kata:But that's not currently possible.
Describe the solution you'd like
To implement we should:
spec.runtimeClassNamefield in DevWorkspace CRD that, if set and if the user has the necessary privileges, will be propagated to all the workspace Pods.runtime-class-name:https://<che-host>#<repository_url>?<runtimeClassName>. If set the resulting DevWorkspace should include theruntimeClassNameAdditional context
Here I have described how to setup an OpenShift cluster with kata containers and run buildah in it.