-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add additional-gids to runc exec #1608
Conversation
This flag allows specifying additional gids for the process. Without this flag, the user will have to provide process.json which allows additional gids. Closes opencontainers#1306 Signed-off-by: Sumit Sanghrajka <[email protected]>
Signed-off-by: Sumit Sanghrajka <[email protected]>
@cyphar how should this work in userns? See travis failures for context. |
tests/integration/exec.bats
Outdated
|
||
@test "runc exec --additional-gids" { | ||
# --user can't work in rootless containers that don't have idmap. | ||
[[ "$ROOTLESS" -ne 0 ]] && requires rootless_idmap |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
--additional-gids
cannot ever work in a rootless container, because setgroups
is disabled. This should just be requires root
. In this case, the specconv
error is correct here.
Signed-off-by: Michael Crosby <[email protected]>
Ok, updated to skip that test when rootless is running. Good to review now |
As an aside, we probably should add (privileged) user namespace integration tests for cases like this. But we can work on that in the future. |
Closes #1307
This is a carry of #1307