1
0
mirror of https://github.com/containers/youki synced 2024-11-23 01:11:58 +01:00

Document namespace.rs

This commit is contained in:
Yashodhan Joshi 2021-07-22 16:45:34 +05:30
parent 90dd96c082
commit 938a20f7ca
3 changed files with 20 additions and 5 deletions

3
.gitignore vendored

@ -1,7 +1,8 @@
youki
/tutorial
/target
**/target
.vagrant/
tags

@ -87,9 +87,6 @@ This also provides implementation for Linux syscalls for the trait.
- [capabilities man page](https://man7.org/linux/man-pages/man7/capabilities.7.html)
- [unshare man page](https://man7.org/linux/man-pages/man2/unshare.2.html)
[oci runtime specification]: https://github.com/opencontainers/runtime-spec/blob/master/runtime.md
[runc man pages]: (https://github.com/opencontainers/runc/blob/master/man/runc.8.md)
## Capabilities
This has functions related to set and reset specific capabilities, as well as to drop extra privileges
@ -102,3 +99,12 @@ This has functions related to set and reset specific capabilities, as well as to
This is primarily for printing info about system running youki, such as OS release, architecture, cpu info, cgroups info etc. , as this info can be helpful when reporting issues.
- [about /etc/os-release](https://www.freedesktop.org/software/systemd/man/os-release.html)
## Namespaces
This has functions related to setting of namespaces to the calling process
- [CLONE_NEWUSER flag](https://man7.org/linux/man-pages/man2/clone.2.html)
[oci runtime specification]: https://github.com/opencontainers/runtime-spec/blob/master/runtime.md
[runc man pages]: (https://github.com/opencontainers/runc/blob/master/man/runc.8.md)

@ -17,6 +17,7 @@ use nix::{
};
use oci_spec::LinuxNamespace;
/// Holds information about namespaces
pub struct Namespaces {
spaces: Vec<LinuxNamespace>,
command: Box<dyn Syscall>,
@ -43,11 +44,12 @@ impl From<Vec<LinuxNamespace>> for Namespaces {
}
impl Namespaces {
/// sets namespaces as defined in structure to calling process
pub fn apply_setns(&self) -> Result<()> {
let to_enter: Vec<(CloneFlags, i32)> = self
.spaces
.iter()
.filter(|ns| ns.path.is_some())
.filter(|ns| ns.path.is_some()) // filter those which are actually present on the system
.map(|ns| {
let space = CloneFlags::from_bits_truncate(ns.typ as i32);
let fd = fcntl::open(
@ -61,8 +63,12 @@ impl Namespaces {
.collect();
for &(space, fd) in &to_enter {
// set the namespace
self.command.set_ns(fd, space)?;
unistd::close(fd)?;
// if namespace is cloned with newuser flag, then it creates a new user namespace,
// and we need to set the user and group id to 0
// see https://man7.org/linux/man-pages/man2/clone.2.html for more info
if space == sched::CloneFlags::CLONE_NEWUSER {
self.command.set_id(Uid::from_raw(0), Gid::from_raw(0))?;
}
@ -70,6 +76,8 @@ impl Namespaces {
Ok(())
}
/// disassociate given parts context of calling process from other process
// see https://man7.org/linux/man-pages/man2/unshare.2.html for more info
pub fn apply_unshare(&self, without: CloneFlags) -> Result<()> {
self.command.unshare(self.clone_flags & !without)?;
Ok(())