gvisor/runsc
Fabricio Voznika f3ffa4db52 Resolve mount paths while setting up root fs mount
It's hard to resolve symlinks inside the sandbox because rootfs and mounts
may be read-only, forcing us to create mount points inside lower layer of an
overlay, **before** the volumes are mounted.

Since the destination must already be resolved outside the sandbox when creating
mounts, take this opportunity to rewrite the spec with paths resolved.
"runsc boot" will use the "resolved" spec to load mounts. In addition, symlink
traversals were disabled while mounting containers inside the sandbox.

It haven't been able to write a good test for it. So I'm relying on manual tests
for now.

PiperOrigin-RevId: 217749904
Change-Id: I7ac434d5befd230db1488446cda03300cc0751a9
2018-10-18 12:42:24 -07:00
..
boot Resolve mount paths while setting up root fs mount 2018-10-18 12:42:24 -07:00
cgroup Make removing cgroups retry up to 5 seconds. 2018-10-17 09:03:01 -07:00
cmd Resolve mount paths while setting up root fs mount 2018-10-18 12:42:24 -07:00
console runsc: Pass root container's stdio via FD. 2018-10-03 10:32:03 -07:00
container Resolve mount paths while setting up root fs mount 2018-10-18 12:42:24 -07:00
fsgofer Run gofmt -s on everything 2018-09-21 14:06:59 -07:00
sandbox Resolve mount paths while setting up root fs mount 2018-10-18 12:42:24 -07:00
specutils Resolve mount paths while setting up root fs mount 2018-10-18 12:42:24 -07:00
test Resolve mount paths while setting up root fs mount 2018-10-18 12:42:24 -07:00
tools/dockercfg Add tool to configure runtime settings in docker 2018-06-20 13:01:16 -07:00
BUILD runsc: Pass log and config files to sandbox process by FD. 2018-09-04 20:10:01 -07:00
main.go Added spec command to create OCI spec config.json 2018-10-12 12:59:49 -07:00