-
Notifications
You must be signed in to change notification settings - Fork 47
cdi,SPECS.md: allow empty cgroup permissions. #301
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
/cc @oOraph |
kad
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks ok to me.
|
@elezar PTAL, if you have a few spare cycles. |
elezar
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The addition of none as a special case looks good. I do think that the device validation needs to be properly updated for this though.
|
hello, thanks for this pull request. Since the cdi is generic it may still be worth adding the none case. I just want to mention some runc specificity regarding permissions that would make the none case ineffective for this runtime: |
4d1f56c to
f8d98e4
Compare
Allow injecting devices with empty cgroup permissions, requested by the "none" permission string, also defined as pkg/cdi.NoPermissions. Signed-off-by: Krisztian Litkey <[email protected]>
f8d98e4 to
df2a787
Compare
Allow injecting devices with empty cgroup permissions, requested by the
"none"permission string or the newpkg/cdi.NoPermissionsconstant.Fixes #300