@@ -250,6 +250,7 @@ container parameters:
250250 - cpuset memory
251251 - Block I/O class
252252 - RDT class
253+ - namespaces
253254
254255### Container Updates
255256
@@ -339,11 +340,14 @@ selectively configured to
3393401 . Reject OCI Hook injection: Reject any adjustment which tries to inject
340341OCI Hooks into a container.
341342
342- 2 . Verify global mandatory plugins: Verify that all configured mandatory
343+ 2 . Reject Linux Namespace adjustment: Reject any adjustment which tries to
344+ alter Linux namespaces of a container.
345+
346+ 3 . Verify global mandatory plugins: Verify that all configured mandatory
343347plugins are present and have processed a container. Otherwise reject the
344348creation of the container.
345349
346- 3 . Verify annotated mandatory plugins: Verify that an annotated set of
350+ 4 . Verify annotated mandatory plugins: Verify that an annotated set of
347351container-specific mandatory plugins are present and have processed a
348352container. Otherwise reject the creation of the container.
349353
@@ -352,10 +356,10 @@ allows one to deploy mandatory plugins as containers themselves.
352356
353357#### Default Validation Scope
354358
355- Currently only OCI hook injection can be restricted using the default
356- validator . However, this probably will change in the future. Especially
357- when NRI is extended with control over new container parameters. If such
358- parameters will have security implications, corresponding configurable
359+ Currently the default validator can restrict OCI hook injection and Linux
360+ namespace adjustment . However, this probably will change in the future.
361+ Especially when NRI is extended with control over new container parameters.
362+ If such parameters will have security implications, corresponding configurable
359363restrictions will be introduced to the default validator.
360364
361365## Runtime Adaptation
0 commit comments