Replies: 1 comment 1 reply
-
|
There are many users doing exactly this. I’m not clear how they lock down their systems. I don’t think users are typically allowed to author the YAML. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I am considering using argo for running untrusted user-submitted code. Is argo suitable for such a thing?
The main problem I am facing is that I want to provide network isolation for the untrusted pod, so that it cannot communicate with the internal services. to do so, I can write a NetworkPolicy, but NetworkPolicy apply at the pod level, not container level, so that will block also requests from the
waitcontainer. there are other problems, like setting a specific serviceAccountName that doesn’t auto-mount only in the untrusted main container, but not in wait. not to mention a more secure container runtime like kata or gvisor (not sure if argo is compatible with them)Has anyone ever tried this? Does it make sense to use Argo, or should I look elsewhere?
Beta Was this translation helpful? Give feedback.
All reactions