diff options
author | Nicolas Lacasse <nlacasse@google.com> | 2018-09-04 20:31:52 -0700 |
---|---|---|
committer | Shentubot <shentubot@google.com> | 2018-09-04 20:33:05 -0700 |
commit | 0a9a40abcda602dc3403e2108e1348bf4e04051a (patch) | |
tree | b03a73b32dccaea8c35f39c340b55243ed207790 /runsc/boot | |
parent | ad8648c6343cf2cf3e51a0f58cb053ee303f6ffb (diff) |
runsc: Run sandbox as user nobody.
When starting a sandbox without direct file or network access, we create an
empty user namespace and run the sandbox in there. However, the root user in
that namespace is still mapped to the root user in the parent namespace.
This CL maps the "nobody" user from the parent namespace into the child
namespace, and runs the sandbox process as user "nobody" inside the new
namespace.
PiperOrigin-RevId: 211572223
Change-Id: I1b1f9b1a86c0b4e7e5ca7bc93be7d4887678bab6
Diffstat (limited to 'runsc/boot')
-rw-r--r-- | runsc/boot/config.go | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/runsc/boot/config.go b/runsc/boot/config.go index 212f5b003..87a47dd0b 100644 --- a/runsc/boot/config.go +++ b/runsc/boot/config.go @@ -213,6 +213,11 @@ type Config struct { // PanicSignal register signal handling that panics. Usually set to // SIGUSR2(12) to troubleshoot hangs. -1 disables it. PanicSignal int + + // TestOnlyAllowRunAsCurrentUser should only be used in tests. It + // allows runsc to start the sandbox process as the current user if we + // do not have capability to set uid/gid to another user. + TestOnlyAllowRunAsCurrentUser bool } // ToFlags returns a slice of flags that correspond to the given Config. |