Skip to content

Conversation

@danmihai1
Copy link

Allow all users to pull images by using containerd instead of having to worry about this tool potentially creating files that the caller of update_policy_samples.py doesn't own.

Granting all users access to containerd is also consistent with the behavior of upstream Kata CI.

If any users really need to execute genpolicy as root, hopefully executing this entire script as root is good enough for them.

Allow all users to pull images by using containerd instead of having
to worry about this tool potentially creating files that the caller
of update_policy_samples.py doesn't own.

Granting all users access to containerd is also consistent with the
behavior of upstream Kata CI.

If any users really need to execute genpolicy as root, hopefully
executing this entire script as root is good enough for them.

Signed-off-by: Dan Mihai <[email protected]>
@danmihai1 danmihai1 added the upstream/not-needed PRs that will not be upstreamed (e.g. internal) label May 8, 2024
@danmihai1 danmihai1 requested review from Redent0r, manuelh-dev and sprt May 8, 2024 19:21
@danmihai1 danmihai1 requested review from a team as code owners May 8, 2024 19:21
@danmihai1 danmihai1 merged commit 82b870c into msft-main May 10, 2024
@danmihai1 danmihai1 deleted the danmihai1/change-containerd-socket branch May 10, 2024 20:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

upstream/not-needed PRs that will not be upstreamed (e.g. internal)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants