-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Requires root access, or the root-equivalent 'docker' group #21
Comments
Another solution, which seems attractive at first glance: Podman. It runs without a daemon and prioritizes support for rootless mode, while being compatible with docker images and providing a docker-compatible CLI. So if it works well with the official tensorflow images, it should allow for an experience closes to Rustup, without any security concerns. Plus, the name matches nicely with "Tensorman". It's in the repos for Fedora and CentOS, but not Debian/Ubuntu. So we would have to package it. Edit: For example, you can run |
It looks like Podman is included in the Universe repository for Ubuntu 20.10 Groovy, so perhaps if it works without issue, tensorman can use Podman in Pop!_OS 20.10. Requirements for this:
|
It may be worth it to backport podman to 20.04 because we'll be supporting 20.04 for quite a while. |
Tensorman can use podman in place of docker using #24 with
|
It seems like tensorman is expected to be run by a user in the
docker
group.This group is considered fairly problematic if handy, and isn't supported on Red Hat due to security concerns, supposing this post is still accurate. The problem is that being a member of the
docker
group can be used to gain root access to the host system.If I'm not mistaken, this makes tensorman unsuitable for use in applications where a non-administrator user should be able to use TensorFlow, which presumably is desirable for some organizations. Even for a user in
sudoers
, having a means to acquire root access without entering a password is problematic.We inherit this issue from Docker, but if the goal is to wrap it and make it easier to work with, it would be good to address this. I see a few possible solutions:
docker
group, separate from the CLIThe daemon or SUID binary would be a pain to deal with, and raise their own challenges to keep secure. Rootless mode is very attractive, and would allow everything to run under the user's account, just like Rustup. I'm not sure if the Tensorflow images would run well without issue it, since is is experimental and somewhat limited.
The text was updated successfully, but these errors were encountered: