Merge pull request #8397 from thaJeztah/restore_readonly_comments
oci: partially restore comment on read-only mounts for uid/gid uses
This commit is contained in:
commit
8700566073
@ -683,6 +683,10 @@ func WithUser(userstr string) SpecOpts {
|
||||
return err
|
||||
}
|
||||
|
||||
// Use a read-only mount when trying to get user/group information
|
||||
// from the container's rootfs. Since the option does read operation
|
||||
// only, we append ReadOnly mount option to prevent the Linux kernel
|
||||
// from syncing whole filesystem in umount syscall.
|
||||
return mount.WithReadonlyTempMount(ctx, mounts, f)
|
||||
default:
|
||||
return fmt.Errorf("invalid USER value %s", userstr)
|
||||
@ -743,6 +747,10 @@ func WithUserID(uid uint32) SpecOpts {
|
||||
return err
|
||||
}
|
||||
|
||||
// Use a read-only mount when trying to get user/group information
|
||||
// from the container's rootfs. Since the option does read operation
|
||||
// only, we append ReadOnly mount option to prevent the Linux kernel
|
||||
// from syncing whole filesystem in umount syscall.
|
||||
return mount.WithReadonlyTempMount(ctx, mounts, setUser)
|
||||
}
|
||||
}
|
||||
@ -787,6 +795,10 @@ func WithUsername(username string) SpecOpts {
|
||||
return err
|
||||
}
|
||||
|
||||
// Use a read-only mount when trying to get user/group information
|
||||
// from the container's rootfs. Since the option does read operation
|
||||
// only, we append ReadOnly mount option to prevent the Linux kernel
|
||||
// from syncing whole filesystem in umount syscall.
|
||||
return mount.WithReadonlyTempMount(ctx, mounts, setUser)
|
||||
} else if s.Windows != nil {
|
||||
s.Process.User.Username = username
|
||||
@ -865,6 +877,10 @@ func WithAdditionalGIDs(userstr string) SpecOpts {
|
||||
return err
|
||||
}
|
||||
|
||||
// Use a read-only mount when trying to get user/group information
|
||||
// from the container's rootfs. Since the option does read operation
|
||||
// only, we append ReadOnly mount option to prevent the Linux kernel
|
||||
// from syncing whole filesystem in umount syscall.
|
||||
return mount.WithReadonlyTempMount(ctx, mounts, setAdditionalGids)
|
||||
}
|
||||
}
|
||||
@ -926,6 +942,10 @@ func WithAppendAdditionalGroups(groups ...string) SpecOpts {
|
||||
return err
|
||||
}
|
||||
|
||||
// Use a read-only mount when trying to get user/group information
|
||||
// from the container's rootfs. Since the option does read operation
|
||||
// only, we append ReadOnly mount option to prevent the Linux kernel
|
||||
// from syncing whole filesystem in umount syscall.
|
||||
return mount.WithReadonlyTempMount(ctx, mounts, setAdditionalGids)
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user