-
Notifications
You must be signed in to change notification settings - Fork 561
userns mappings and reusing existing userns from a specified path #961
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This is my preference. I agree that the unmapped case doesn't seem very useful, but don't think it's worth adding spec language to forbid it.
Do you need to know the mapping for this? Don't you just need to know what IDs are mapped inside the container? Either way, if you're joining an existing user namespace, you can always look this up ahead of time before writing your config. |
Ok. Should it be a "MUST"?
Fair enough.
I am not sure, I just noticed those options in
Ok. |
It's already covered by this MUST.
It would get to runc via a caller-specified |
Enable UID/GID mappings for user namespaces, to be able to test user namespaces with most container runtimes. According to discussions in opencontainers/runtime-spec#961, it's clear that we can safely enable UID/GID mappings. Also add some comments about cgroup namespaces, which is not supported by runc yet. Signed-off-by: Dongsu Park <[email protected]>
When the config reuses an existing userns:
It is unclear how mappings should be specified:
If the existing userns already has mappings configured, the runtime will not be able to write to
/proc/$$/uid_map
again (see man 7 user_namespaces).Questions for the runtimes:
uidMappings
orgidMappings
sections when apath
is specified for userns?config.json
?Questions for the users:
uidMappings
orgidMappings
sections?path
refers to a userns with the same mappings?Note that runtimes might need to know the mappings for mounting some tmpfs with options like
,uid=1000,gid=1000
.The text was updated successfully, but these errors were encountered: