summaryrefslogtreecommitdiff
path: root/security_context.md
diff options
context:
space:
mode:
authorTim Hockin <thockin@google.com>2015-07-17 15:35:41 -0700
committerTim Hockin <thockin@google.com>2015-07-17 15:35:43 -0700
commitfabd20afce30e947425346fa2938ad0edfa8b867 (patch)
treee58fdcd51f663c410157830aced7d3a8da7ae573 /security_context.md
parent60cec0f5fa87f28f2a7f1357817d06db433b1e75 (diff)
Run gendocs
Diffstat (limited to 'security_context.md')
-rw-r--r--security_context.md6
1 files changed, 6 insertions, 0 deletions
diff --git a/security_context.md b/security_context.md
index bc76495a..03213927 100644
--- a/security_context.md
+++ b/security_context.md
@@ -30,8 +30,11 @@ Documentation for other releases can be found at
<!-- END STRIP_FOR_RELEASE -->
<!-- END MUNGE: UNVERSIONED_WARNING -->
+
# Security Contexts
+
## Abstract
+
A security context is a set of constraints that are applied to a container in order to achieve the following goals (from [security design](security.md)):
1. Ensure a clear isolation between container and the underlying host it runs on
@@ -53,11 +56,13 @@ to the container process.
Support for user namespaces has recently been [merged](https://github.com/docker/libcontainer/pull/304) into Docker's libcontainer project and should soon surface in Docker itself. It will make it possible to assign a range of unprivileged uids and gids from the host to each container, improving the isolation between host and container and between containers.
### External integration with shared storage
+
In order to support external integration with shared storage, processes running in a Kubernetes cluster
should be able to be uniquely identified by their Unix UID, such that a chain of ownership can be established.
Processes in pods will need to have consistent UID/GID/SELinux category labels in order to access shared disks.
## Constraints and Assumptions
+
* It is out of the scope of this document to prescribe a specific set
of constraints to isolate containers from their host. Different use cases need different
settings.
@@ -96,6 +101,7 @@ be addressed with security contexts:
## Proposed Design
### Overview
+
A *security context* consists of a set of constraints that determine how a container
is secured before getting created and run. A security context resides on the container and represents the runtime parameters that will
be used to create and run the container via container APIs. A *security context provider* is passed to the Kubelet so it can have a chance