Add capability for snapshotters to declare support for UID remapping
This allows user namespace support to progress, either by allowing snapshotters to deal with ownership, or falling back to containerd doing a recursive chown. In the future, when snapshotters implement idmap mounts, they should report the "remap-ids" capability. Co-authored-by: Rodrigo Campos <rodrigoca@microsoft.com> Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com> Signed-off-by: David Leadbeater <dgl@dgl.cx>
This commit is contained in:
		 David Leadbeater
					David Leadbeater
				
			
				
					committed by
					
						 Rodrigo Campos
						Rodrigo Campos
					
				
			
			
				
	
			
			
			 Rodrigo Campos
						Rodrigo Campos
					
				
			
						parent
						
							36f520dc04
						
					
				
				
					commit
					31a6449734
				
			| @@ -25,6 +25,7 @@ import ( | ||||
| 	"github.com/containerd/containerd" | ||||
| 	"github.com/containerd/containerd/oci" | ||||
| 	"github.com/containerd/containerd/plugin" | ||||
| 	"github.com/containerd/containerd/snapshots" | ||||
| 	imagespec "github.com/opencontainers/image-spec/specs-go/v1" | ||||
| 	runtimespec "github.com/opencontainers/runtime-spec/specs-go" | ||||
| 	selinux "github.com/opencontainers/selinux/go-selinux" | ||||
| @@ -358,3 +359,10 @@ func (c *criService) updateNetNamespacePath(spec *runtimespec.Spec, nsPath strin | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // sandboxSnapshotterOpts generates any platform specific snapshotter options | ||||
| // for a sandbox container. | ||||
| func sandboxSnapshotterOpts(config *runtime.PodSandboxConfig) ([]snapshots.Opt, error) { | ||||
| 	nsOpts := config.GetLinux().GetSecurityContext().GetNamespaceOptions() | ||||
| 	return snapshotterRemapOpts(nsOpts) | ||||
| } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user