bubblewrap
bubblewrap copied to clipboard
Low-level unprivileged sandboxing tool used by Flatpak and similar projects
I want to `--bind . /something`, but while the user has access to `.`, it intentionally has no access to `..` or several parent directories. This seems to fail at...
Hi! Thanks for making bubblewrap and sharing it as Software Libre! :pray: Someone pointed out the importance of `--new-session` [on Hacker News](https://news.ycombinator.com/item?id=30825088) and I'm in debt to them for speaking...
The documentation of `--cap-drop` states: By default no caps are left in the sandboxed process. That seems not to be true: id uid=0(root) gid=0(root) groups=0(root) getpcaps $$ 14257: =ep bwrap...
When root, it's not necessary to --unshare-user to be able to change uid/gid, so bubblewrap shouldn't require it.
If already in a user namespace, a regular user can have all the required permissions necessary for bubblewrap to function correctly. Hence bubblewrap shouldn't implicitly enable --unshare-user when not running...
Trying to get a grasp on the nested namespaces and how to enter those with --userns2 There are no examples or tests I can find For example when I run...
I want to use a FUSE mount inside bubblewrap namespace and that to be seen for any other process I launch in that namespace Launching a shell as an example...
If you setup a systemd automount similar to this: ``` # var-home-user-mount.automount [Unit] Description=auto mount StartLimitIntervalSec=0 Requires=network.target [Automount] Where=/var/home/user/mount TimeoutIdleSec=10min [Install] WantedBy=remote-fs.target ``` ``` # var-home-user-mount.mount [Unit] Description=mount Requires=network.target StartLimitIntervalSec=0...
Issue [#384](https://github.com/containers/bubblewrap/issues/384). I'll need some help from the bubblewrap maintainers to land this change. Please, review this. I'm not completely sure does it break something or not. But seems like...