Skip to content

Commit 397ba66

Browse files
authored
Add "privileged container" mode to sandbox.c (JuliaPackaging#132)
* Add "privileged container" mode to `sandbox.c` On some Linux kernels, mounting overlay filesystems within user namespaces is broken, see [0] for an Ubuntu issue tracking this and their patch to fix it. To work around this, we allow the user to enable running the sandbox through `sudo`, which adds another path through the already convoluted `sandbox.c`. After a thorough reorganization of `sandbox.c`, we now have three well-defined execution modes (init, unprivileged and privileged) and a `sandbox` that can either mount overlay filesystems as root within a user namespace, or can mount overlay filesystems as root outside of a user namespace, then enter the user namespace. [0] https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1531747 * Bump rootfs version * Quash some small bugs
1 parent 4c98bc6 commit 397ba66

File tree

12 files changed

+486
-231
lines changed

12 files changed

+486
-231
lines changed

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,3 +2,4 @@
22
*.jl.*.cov
33
*.jl.mem
44
global_prefix
5+
.vscode/

.travis.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ env:
2323
matrix:
2424
- BINARYBUILDER_USE_SQUASHFS=true
2525
- BINARYBUILDER_USE_SQUASHFS=false
26-
26+
- BINARYBUILDER_RUNNER=privileged
27+
2728
cache:
2829
directories:
2930
- deps/downloads

0 commit comments

Comments
 (0)