Vincent Batts @vbatts
$> finger $(whoami)
Login: vbatts Name: Vincent Batts
Directory: /home/vbatts Shell: /bin/bash
Such mail.
Plan:
OHMAN
$> id -Gn
devel opencontainers docker appc redhat golang slackware
Kernel's Guarantee:
DON'T BREAK USERSPACE
But what is there to break?
Share the host's kernel
Crashes and Exploits alike
virtualizing by "namespacing" kernel resources and concepts
Isolation by control groups, syscall filtering, and Linux Security Modules (SELinux, apparmor, etc.)
How many have attempted to configure some open source project?
Discovered it required other projects to be configured first
Which required still more projects to be configured
Only to find a fundamental incompatibility with the distro version
Root ('/') File System
Approaches:
Cloud Native application development (see CNCF)
Rather than only shoving "legacy" code in new boxes
Discoverable APIs (see OpenAPIs)
"Scheduled" functionality (see OpenShift and Kubernetes)
intercommunication (see gRPC)
event driven functions (aka "serverless")
trusted pipeline (CI/CD, grafeas, etc)