Skip to content

Commit d43fc42

Browse files
committed
config-linux: Lift no-tweaking namespace restriction
This restriction originally landed via 02b456e (Clarify behavior around namespaces paths, 2015-09-08, opencontainers#158). The hostname case landed via 66a0543 (config: Require a new UTS namespace for config.json's hostname, 2015-10-05, opencontainers#214) citing the namespace restriction. The restriciton extended to runtime namespaces in 01c2d55 (config-linux: Extend no-tweak requirement to runtime namespaces, 2016-08-24, opencontainers#538). There was a proposal in-flight to get config-wide consistency around the no-tweaking concept [1]. In today's meeting, the maintainer consensus was to strike the no-tweaking restriction [2], which is what I've done here. I've removed the ROADMAP entry because this gives folks a way to adjust existing containers (launch a new container which joins and tweaks the original). The hostname entry still mentions the UTS namespace to provide a guard against accidental foot-gunning. There was no no-tweaking language for properties related to other namespaces (e.g. 'mounts'). Maybe the other namespaces have more obvious names. [1]: opencontainers#540 [2]: http://ircbot.wl.linuxfoundation.org/meetings/opencontainers/2017/opencontainers.2017-01-11-22.04.log.html#l-117 Signed-off-by: W. Trevor King <[email protected]>
1 parent a3dd52f commit d43fc42

File tree

3 files changed

+2
-10
lines changed

3 files changed

+2
-10
lines changed

ROADMAP.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,14 +18,6 @@ Could be solved by lifecycle/ops and create/start split discussions
1818

1919
*Owner:* vishh & duglin
2020

21-
### Live Container Updates
22-
23-
Should we allow dynamic container updates to runtime options?
24-
25-
Proposal: make it an optional feature
26-
27-
*Owner:* hqhq (was vishh) robdolinms, bcorrie
28-
2921
### Version Schema
3022

3123
Decide on a robust versioning schema for the spec as it evolves.

config-linux.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,6 @@ The following parameters can be specified to setup namespaces:
3939

4040
If a path is specified, that particular file is used to join that type of namespace.
4141
If a namespace type is not specified in the `namespaces` array, the container MUST inherit the [runtime namespace](glossary.md#runtime-namespace) of that type.
42-
If a new namespace is not created (because the namespace type is not listed, or because it is listed with a `path`), runtimes MUST assume that the setup for that namespace has already been done and error out if the config specifies anything else related to that namespace.
4342
If a `namespaces` field contains duplicated namespaces with same `type`, the runtime MUST error out.
4443

4544
###### Example

config.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,8 @@ For Windows based systems the user structure has the following fields:
256256
## Hostname
257257

258258
* **`hostname`** (string, OPTIONAL) configures the container's hostname as seen by processes running inside the container.
259-
On Linux, you can only set this if your bundle creates a new [UTS namespace][uts-namespace].
259+
On Linux, this will change the hostname in the [container][container-namespace] [UTS namespace][uts-namespace].
260+
Depending on your [namespace configuration](config-linux.md#namespaces), the container UTS namespace may be the [runtime UTS namespace][runtime-namespace].
260261

261262
### Example
262263

0 commit comments

Comments
 (0)