Merge pull request #4791 from crosbymichael/base-runtime-opts
[cri] don't clear base security settings
This commit is contained in:
commit
cb8253eea3
@ -114,13 +114,20 @@ func (c *criService) containerSpec(id string, sandboxID string, sandboxPid uint3
|
|||||||
|
|
||||||
specOpts := []oci.SpecOpts{
|
specOpts := []oci.SpecOpts{
|
||||||
customopts.WithoutRunMount,
|
customopts.WithoutRunMount,
|
||||||
customopts.WithoutDefaultSecuritySettings,
|
}
|
||||||
|
// only clear the default security settings if the runtime does not have a custom
|
||||||
|
// base runtime spec spec. Admins can use this functionality to define
|
||||||
|
// default ulimits, seccomp, or other default settings.
|
||||||
|
if ociRuntime.BaseRuntimeSpec == "" {
|
||||||
|
specOpts = append(specOpts, customopts.WithoutDefaultSecuritySettings)
|
||||||
|
}
|
||||||
|
specOpts = append(specOpts,
|
||||||
customopts.WithRelativeRoot(relativeRootfsPath),
|
customopts.WithRelativeRoot(relativeRootfsPath),
|
||||||
customopts.WithProcessArgs(config, imageConfig),
|
customopts.WithProcessArgs(config, imageConfig),
|
||||||
oci.WithDefaultPathEnv,
|
oci.WithDefaultPathEnv,
|
||||||
// this will be set based on the security context below
|
// this will be set based on the security context below
|
||||||
oci.WithNewPrivileges,
|
oci.WithNewPrivileges,
|
||||||
}
|
)
|
||||||
if config.GetWorkingDir() != "" {
|
if config.GetWorkingDir() != "" {
|
||||||
specOpts = append(specOpts, oci.WithProcessCwd(config.GetWorkingDir()))
|
specOpts = append(specOpts, oci.WithProcessCwd(config.GetWorkingDir()))
|
||||||
} else if imageConfig.WorkingDir != "" {
|
} else if imageConfig.WorkingDir != "" {
|
||||||
|
Loading…
Reference in New Issue
Block a user