Skip to content
This repository has been archived by the owner on Aug 14, 2020. It is now read-only.

spec: implement os/linux/no-new-privs isolator #611

Merged
merged 1 commit into from
May 24, 2016

Conversation

s-urbaniak
Copy link
Contributor

This adds a new no-new-privs isolator type.

actool support was added for patching a manifest:
actool patch-manifest -isolators='os/linux/no-new-privs,true'.

This is a prerequisite for rkt/rkt#1469.

@s-urbaniak
Copy link
Contributor Author

@alban @iaguis @jonboulle PTAL

"value": true
```

In the example above, the process will have `no_new_privs` set. If the app's executable has i.e. setuid/setgid bits set they will be ignored.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It should say that the default is false.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

done

@jonboulle
Copy link
Contributor

since we generally favour verbosity in the names (e.g. capabilities rather than caps), I wonder if we should call this no-new-privileges ..?

@s-urbaniak
Copy link
Contributor Author

s-urbaniak commented May 24, 2016

@jonboulle i was thinking back and forth about the longer version, preferred the longershorter one for a reason I cannot explain, but systemd also uses the longer NoNewPrivileges. I leave it up to you to decide ;-)

@s-urbaniak
Copy link
Contributor Author

gah, typo, I preferred the shorter one ;-)

This adds a new no-new-privileges isolator type.

actool support was added for patching a manifest:
`actool patch-manifest -isolators='os/linux/no-new-privileges,true'`.

This is a prerequisite for rkt/rkt#1469.
@s-urbaniak
Copy link
Contributor Author

@alban @jonboulle I implemented the longer version "no-new-privileges", and addressed review comments, PTAL

@jonboulle
Copy link
Contributor

LGTM

@jonboulle jonboulle merged commit dab935e into appc:master May 24, 2016
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants