You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this commit, we are ensuring the dirs in the `/` root path of the temproot is as close as the 'real' one as possible.
`$SANDBOX_DIR/temproot` is now being created with the same permission as the host, and every other directories on the top level are created with the same mode as the real one.
Symlinks are now also created in the unshare, and removed after unshare finishes.
Tests are created to check the mode, ownership, and symlink of the files in the `/` directory.
Known issues
In the test, we're ignoring files with the name swap.
And also /proc, our current `mount -t proc proc /proc` invocation are creating the /proc dir with nobody and nogroup ownership. We're tracking this in #151
This PR currently assumes there are no regular files in the root dir besides the swap.img. We're tracking this in issue #150
* feat: keep toplevel dir perms in temproot - fixes#80
* feat: recreate symlinks in temproot - fixes#139
* feat: set correct permission for root dir, and remove symlink after unshare
* feat: set temproot to be writible before removing symlinks
* test: add new test to verify consistency of root dir (see known issues)
* test(reuse_problematic_sandbox): set test to use a non-symblink dir
* test(toplevel-perms): ignore acl bit, user&group ownership
dr-xr-xr-x 235 nobody root 0 Mar 16 01:50 proc
from #138
currently, we're using
mount -t proc proc /proc
Attempted solution
but we get
mount: a: wrong fs type, bad option, bad superblock on none, missing codepage or helper program, or other error.
The text was updated successfully, but these errors were encountered: