Skip to content

Commit 3d34356

Browse files
committed
docs: update README.md with Linux namespace adjustment.
Signed-off-by: Krisztian Litkey <[email protected]>
1 parent 82692a1 commit 3d34356

File tree

1 file changed

+10
-6
lines changed

1 file changed

+10
-6
lines changed

README.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -250,6 +250,7 @@ container parameters:
250250
- cpuset memory
251251
- Block I/O class
252252
- RDT class
253+
- namespaces
253254

254255
### Container Updates
255256

@@ -339,11 +340,14 @@ selectively configured to
339340
1. Reject OCI Hook injection: Reject any adjustment which tries to inject
340341
OCI Hooks into a container.
341342

342-
2. Verify global mandatory plugins: Verify that all configured mandatory
343+
2. Reject Linux Namespace adjustment: Reject any adjustment which tries to
344+
alter Linux namespaces of a container.
345+
346+
3. Verify global mandatory plugins: Verify that all configured mandatory
343347
plugins are present and have processed a container. Otherwise reject the
344348
creation of the container.
345349

346-
3. Verify annotated mandatory plugins: Verify that an annotated set of
350+
4. Verify annotated mandatory plugins: Verify that an annotated set of
347351
container-specific mandatory plugins are present and have processed a
348352
container. Otherwise reject the creation of the container.
349353

@@ -352,10 +356,10 @@ allows one to deploy mandatory plugins as containers themselves.
352356

353357
#### Default Validation Scope
354358

355-
Currently only OCI hook injection can be restricted using the default
356-
validator. However, this probably will change in the future. Especially
357-
when NRI is extended with control over new container parameters. If such
358-
parameters will have security implications, corresponding configurable
359+
Currently the default validator can restrict OCI hook injection and Linux
360+
namespace adjustment. However, this probably will change in the future.
361+
Especially when NRI is extended with control over new container parameters.
362+
If such parameters will have security implications, corresponding configurable
359363
restrictions will be introduced to the default validator.
360364

361365
## Runtime Adaptation

0 commit comments

Comments
 (0)