-
Notifications
You must be signed in to change notification settings - Fork 550
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for MaskPaths and ReadonlyPaths #320
Comments
+1 ;) On Thu, Feb 4, 2016 at 8:55 AM, Kenfe-Mickaël Laventure <
Jessie Frazelle |
although readonly could probably be done by using mounts On Thu, Feb 4, 2016 at 8:59 AM, Jessica Frazelle [email protected] wrote:
Jessie Frazelle |
|
On Thu, Feb 04, 2016 at 08:55:08AM -0800, Kenfe-Mickaël Laventure wrote:
There's some previous discussion in #186. |
In runc this isn't possible atm, because you are not allowed to create a mount inside |
On Thu, Feb 25, 2016 at 09:28:24AM -0800, Tõnis Tiigi wrote:
Really? It looks like bind-mounting /dev/null over /proc entries is And I don't see anything about restricting mounts in a quick skim |
On Thu, Feb 25, 2016 at 06:39:23PM -0800, Tõnis Tiigi wrote:
Ah, got it. I'm skeptical about “we need to work around restrictions |
Yes, restriction in runC can be softened, and we already do that for fuse. So it's both doable for specs and implementations, I tend to keep this out of specs for now. |
We will just have this list in runc for now. You cannot specify these things as mounts because of the order of mounts and how devices are created. |
We are hitting this issue over and over again. Without this in the spec you are splitting things across runtime and spec settings. It would be much cleaner to have these two fields in the spec or else we need some type of |
For my 2 cents, it doesn't make sense to have so many behavior specific flags in If to run my container correctly I have to do more than Or to sum up: I'm for putting this in the specs and not adding it as a flag to the runtime |
On Wed, Mar 30, 2016 at 02:04:45PM -0700, Michael Crosby wrote:
Can you unpack that a bit? As I understand it, folks who want this |
On Wed, Mar 30, 2016 at 02:40:22PM -0700, Kenfe-Mickaël Laventure wrote:
And I'm +1 to this. I'm in favor of putting these settings in the |
Not really opinionated on it. It seems like something that could be accomplished with hooks / between create and start |
I don't think hooks will work for this. These type of things need to be supported by the runtime because proc is so insecure without it but it also needs to be disabled for ppl who want to not have that |
@crosbymichael I agree that hooks aren't the right way to handle this. I am okay either way on whether we add it to the spec or modify runc. |
On Thu, Mar 31, 2016 at 03:23:51PM -0700, Michael Crosby wrote:
Why not?
Making it possible to masking or make read-only parts of /proc makes |
@wking mounts wont work because it would be bind mounting the hosts dev/null over the files and that will cause fds to leak into the container breaking other things like c/r. this is a big security feature that should be a first class option and not hidden to users |
@crosbymichael Yeah, that's a good point. We can't just bind mount from outside. Makes the case for having a field stronger. |
On Thu, Mar 31, 2016 at 03:34:42PM -0700, Michael Crosby wrote:
So bind-mount the container's /dev/null (e.g. in a hook, or by |
Fixes opencontainers#320 This adds the maskedPaths and readonlyPaths fields to the spec so that proper masking and setting of files in /proc can be configured. Signed-off-by: Michael Crosby <[email protected]>
Fixes opencontainers#320 This adds the maskedPaths and readonlyPaths fields to the spec so that proper masking and setting of files in /proc can be configured. Signed-off-by: Michael Crosby <[email protected]>
Fixes opencontainers#320 This adds the maskedPaths and readonlyPaths fields to the spec so that proper masking and setting of files in /proc can be configured. Signed-off-by: Michael Crosby <[email protected]>
Fixes opencontainers#320 This adds the maskedPaths and readonlyPaths fields to the spec so that proper masking and setting of files in /proc can be configured. Signed-off-by: Michael Crosby <[email protected]>
It is currently not possible for a user to specify
libcontainer
MaskPaths and ReadonlyPaths fields content through the bundlejson
configuration.They should be added to the spec.
The text was updated successfully, but these errors were encountered: