-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Some namespace path joining errors together with user ns #4138
Comments
That particular example is a configuration error -- if you join an existing namespace (such as IPC) and then make a new user namespace you won't have any capabilities over the IPC namespace and so stuff like that will fail and will require changing the configuration. |
But if I join container test's user ns path instead of create an new user ns, it will work. "namespaces": [
{
"type": "ipc",
"path": "/proc/14821/ns/ipc"
},
{
"type": "user",
"path": "/proc/14821/ns/user"
}
], The container test's user mapping has the same value as this one: "uidMappings": [{
"containerID": 0,
"hostID": 1000,
"size": 2000
}],
"gidMappings": [{
"containerID": 0,
"hostID": 1000,
"size": 2000
}], |
@lifubang That's just how user namespaces work. Every other namespace instance is owned by a user namespace, and capability permissions are based on the owning user namespace (not the kuid -- there are checks related to the kuid but basic capability checks are not). You can re-create this behaviour using
|
For example, we have started a container named test, and the init process' id is 14821.
The result will be:
pid
,net
, anduts
namespace path will have the same issue likeipc
.I don't know whether we should support this feature or not?
The text was updated successfully, but these errors were encountered: