From f3727528e57ab720fac55553471b31877163cc12 Mon Sep 17 00:00:00 2001 From: Lantao Liu Date: Mon, 18 Jun 2018 13:36:55 -0700 Subject: runsc: support symlink to the exec path. PiperOrigin-RevId: 201049912 Change-Id: Idd937492217a4c2ca3d59c602e41576a3b203dd9 --- runsc/specutils/specutils.go | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/runsc/specutils/specutils.go b/runsc/specutils/specutils.go index 0bb462eb5..8dae3efb1 100644 --- a/runsc/specutils/specutils.go +++ b/runsc/specutils/specutils.go @@ -106,7 +106,9 @@ func GetExecutablePath(exec, root string, env []string) (string, error) { // for. for _, p := range path { abs := filepath.Join(root, p, exec) - if _, err := os.Stat(abs); err == nil { + // Do not follow symlink link because the target is in the container + // root filesystem. + if _, err := os.Lstat(abs); err == nil { // We found it! Return the path relative to the root. return filepath.Join("/", p, exec), nil } -- cgit v1.2.3