[cri] don't clear base security settings
When a base runtime spec is being used, admins can configure defaults for the spec so that default ulimits or other security related settings get applied for all containers launched. Signed-off-by: Michael Crosby <michael@thepasture.io>
This commit is contained in:
parent
7126310a09
commit
3d358c9df3
@ -114,13 +114,20 @@ func (c *criService) containerSpec(id string, sandboxID string, sandboxPid uint3
|
|||||||
|
|
||||||
specOpts := []oci.SpecOpts{
|
specOpts := []oci.SpecOpts{
|
||||||
customopts.WithoutRunMount,
|
customopts.WithoutRunMount,
|
||||||
customopts.WithoutDefaultSecuritySettings,
|
}
|
||||||
|
// only clear the default security settings if the runtime does not have a custom
|
||||||
|
// base runtime spec spec. Admins can use this functionality to define
|
||||||
|
// default ulimits, seccomp, or other default settings.
|
||||||
|
if ociRuntime.BaseRuntimeSpec == "" {
|
||||||
|
specOpts = append(specOpts, customopts.WithoutDefaultSecuritySettings)
|
||||||
|
}
|
||||||
|
specOpts = append(specOpts,
|
||||||
customopts.WithRelativeRoot(relativeRootfsPath),
|
customopts.WithRelativeRoot(relativeRootfsPath),
|
||||||
customopts.WithProcessArgs(config, imageConfig),
|
customopts.WithProcessArgs(config, imageConfig),
|
||||||
oci.WithDefaultPathEnv,
|
oci.WithDefaultPathEnv,
|
||||||
// this will be set based on the security context below
|
// this will be set based on the security context below
|
||||||
oci.WithNewPrivileges,
|
oci.WithNewPrivileges,
|
||||||
}
|
)
|
||||||
if config.GetWorkingDir() != "" {
|
if config.GetWorkingDir() != "" {
|
||||||
specOpts = append(specOpts, oci.WithProcessCwd(config.GetWorkingDir()))
|
specOpts = append(specOpts, oci.WithProcessCwd(config.GetWorkingDir()))
|
||||||
} else if imageConfig.WorkingDir != "" {
|
} else if imageConfig.WorkingDir != "" {
|
||||||
|
Loading…
Reference in New Issue
Block a user