mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-20 14:01:36 +02:00
Merge pull request #824 from kinvolk/runc-1.0.0_rc93-main
Upgrade Runc in main from 1.0.0_rc92 to 1.0.0_rc93
This commit is contained in:
commit
ba8d038a68
@ -29,7 +29,7 @@ SLOT="0"
|
|||||||
IUSE="+btrfs hardened"
|
IUSE="+btrfs hardened"
|
||||||
|
|
||||||
DEPEND="btrfs? ( sys-fs/btrfs-progs )"
|
DEPEND="btrfs? ( sys-fs/btrfs-progs )"
|
||||||
RDEPEND="~app-emulation/docker-runc-1.0.0_rc92
|
RDEPEND="~app-emulation/docker-runc-1.0.0_rc93
|
||||||
sys-libs/libseccomp"
|
sys-libs/libseccomp"
|
||||||
|
|
||||||
S=${WORKDIR}/${P}/src/${COREOS_GO_PACKAGE}
|
S=${WORKDIR}/${P}/src/${COREOS_GO_PACKAGE}
|
||||||
|
@ -1,2 +1,2 @@
|
|||||||
DIST docker-runc-1.0.0_rc2_p136.tar.gz 561705 BLAKE2B 4dd5dc689db1ac632bf10a5060f5681c7e44716caf8d3730683aad9df29c7b2628fa9e7253d86d87e9dfd7d27b545713154fa0f2984ca52908b16ab089be5646 SHA512 6052b95042082c3345caf25d3646f47b82c151ff3aca2ca4510dbf72ee80056d8c4077f2a1b48a9f4178c41185835ff51461e52ad47969534ea6febf7cac74f1
|
DIST docker-runc-1.0.0_rc2_p136.tar.gz 561705 BLAKE2B 4dd5dc689db1ac632bf10a5060f5681c7e44716caf8d3730683aad9df29c7b2628fa9e7253d86d87e9dfd7d27b545713154fa0f2984ca52908b16ab089be5646 SHA512 6052b95042082c3345caf25d3646f47b82c151ff3aca2ca4510dbf72ee80056d8c4077f2a1b48a9f4178c41185835ff51461e52ad47969534ea6febf7cac74f1
|
||||||
DIST docker-runc-1.0.0_rc92.tar.gz 2063336 BLAKE2B ca28d520107ddf66f4657ab6b7c61f40a0d1e0eb9b926412cdc49ba40100de1487fdc89c756b703b6fafd66a6a8f730e1abeb39383c0a968f5240952e3831193 SHA512 ed3bd916656b6d5d2aa8c799a4e960b0986bf0925a837ee3d29cf970f0844030ba9786f9deb462cce921c423977a44cbfbe7bce6ed4ec2247e66951c9ac5466c
|
DIST docker-runc-1.0.0_rc93.tar.gz 2134218 BLAKE2B 95a35d3a60027545700d2c1983bf9e8b6adbdb1b5c1a0e1af0c2a023b49b67991a1b8135ead511f32c66f12992f008172281106f162224db93a052deb3330e5e SHA512 658c28d10f49fd3db4944eecf33772bf0eefab7af4f0c71917f7d660a29152d723fbbb13c1681efd5c3f5f6fb87705733d212b092a3e2b9b26d8506c32482523
|
||||||
|
@ -11,8 +11,8 @@ COREOS_GO_VERSION="go1.13"
|
|||||||
# Update the patch number when this commit is changed (i.e. the _p in the ebuild).
|
# Update the patch number when this commit is changed (i.e. the _p in the ebuild).
|
||||||
# The patch version is arbitrarily the number of commits since the tag version
|
# The patch version is arbitrarily the number of commits since the tag version
|
||||||
# specified in the ebuild name. For example:
|
# specified in the ebuild name. For example:
|
||||||
# $ git log --oneline v1.0.0-rc92..${COMMIT_ID} | wc -l
|
# $ git log --oneline v1.0.0-rc93..${COMMIT_ID} | wc -l
|
||||||
COMMIT_ID="3d68c79de7184b0eba97946d4f478736f46bf207"
|
COMMIT_ID="c0eb97855bea6ac7ded4bd6050a108d12f662418"
|
||||||
|
|
||||||
inherit eutils flag-o-matic coreos-go vcs-snapshot
|
inherit eutils flag-o-matic coreos-go vcs-snapshot
|
||||||
|
|
||||||
@ -42,7 +42,8 @@ src_unpack() {
|
|||||||
|
|
||||||
PATCHES=(
|
PATCHES=(
|
||||||
"${FILESDIR}/0001-Delay-unshare-of-clone-newipc-for-selinux.patch"
|
"${FILESDIR}/0001-Delay-unshare-of-clone-newipc-for-selinux.patch"
|
||||||
"${FILESDIR}/0001-temporarily-disable-selinux.GetEnabled-error-checks.patch"
|
"${FILESDIR}/0002-temporarily-disable-selinux.GetEnabled-error-checks.patch"
|
||||||
|
"${FILESDIR}/0003-libcontainer-disable-prctl-with-NoNewPrivileges.patch"
|
||||||
)
|
)
|
||||||
|
|
||||||
src_compile() {
|
src_compile() {
|
||||||
@ -60,7 +61,7 @@ src_compile() {
|
|||||||
)
|
)
|
||||||
|
|
||||||
GOPATH="${WORKDIR}/${P}" emake BUILDTAGS="${options[*]}" \
|
GOPATH="${WORKDIR}/${P}" emake BUILDTAGS="${options[*]}" \
|
||||||
VERSION=1.0.0-rc92+dev.docker-19.03 \
|
VERSION=1.0.0-rc93+dev.docker-19.03 \
|
||||||
COMMIT="${COMMIT_ID}"
|
COMMIT="${COMMIT_ID}"
|
||||||
}
|
}
|
||||||
|
|
@ -18,9 +18,9 @@ index 3b42f301..bace067d 100644
|
|||||||
"github.com/opencontainers/runc/libcontainer/configs"
|
"github.com/opencontainers/runc/libcontainer/configs"
|
||||||
"github.com/opencontainers/runc/libcontainer/intelrdt"
|
"github.com/opencontainers/runc/libcontainer/intelrdt"
|
||||||
- selinux "github.com/opencontainers/selinux/go-selinux"
|
- selinux "github.com/opencontainers/selinux/go-selinux"
|
||||||
|
"golang.org/x/sys/unix"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Validator interface {
|
|
||||||
@@ -99,9 +98,6 @@ func (v *ConfigValidator) security(config *configs.Config) error {
|
@@ -99,9 +98,6 @@ func (v *ConfigValidator) security(config *configs.Config) error {
|
||||||
!config.Namespaces.Contains(configs.NEWNS) {
|
!config.Namespaces.Contains(configs.NEWNS) {
|
||||||
return fmt.Errorf("unable to restrict sys entries without a private MNT namespace")
|
return fmt.Errorf("unable to restrict sys entries without a private MNT namespace")
|
@ -0,0 +1,55 @@
|
|||||||
|
From 657e01b0d909cce33bc5176e5ef618e039ba187f Mon Sep 17 00:00:00 2001
|
||||||
|
Message-Id: <657e01b0d909cce33bc5176e5ef618e039ba187f.1614603215.git.dongsu@kinvolk.io>
|
||||||
|
From: Dongsu Park <dongsu@kinvolk.io>
|
||||||
|
Date: Fri, 26 Feb 2021 15:51:04 +0100
|
||||||
|
Subject: [PATCH] libcontainer: disable prctl with NoNewPrivileges
|
||||||
|
|
||||||
|
Temporarily disable Prctl and InitSeccomp for NoNewPrivileges, to be able
|
||||||
|
to make docker/runc work with "--security-opt=no-new-privileges".
|
||||||
|
|
||||||
|
So far it has worked without disabling NoNewPrivileges until runc 1.0.0-rc92,
|
||||||
|
which allowed the "selinux" build tag. Since runc 1.0.0-rc93, however,
|
||||||
|
the selinux build tag is now gone, so selinux is always enabled.
|
||||||
|
That's why `docker run --security-opt=no-new-privileges` failed.
|
||||||
|
|
||||||
|
Until we could figure out its real reason, let's temporarily disable
|
||||||
|
NoNewPrivileges to make the CI pass.
|
||||||
|
|
||||||
|
---
|
||||||
|
libcontainer/standard_init_linux.go | 13 -------------
|
||||||
|
1 file changed, 13 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/libcontainer/standard_init_linux.go b/libcontainer/standard_init_linux.go
|
||||||
|
index 7ec506c4..fc4121a9 100644
|
||||||
|
--- a/libcontainer/standard_init_linux.go
|
||||||
|
+++ b/libcontainer/standard_init_linux.go
|
||||||
|
@@ -135,11 +135,6 @@ func (l *linuxStandardInit) Init() error {
|
||||||
|
if err != nil {
|
||||||
|
return errors.Wrap(err, "get pdeath signal")
|
||||||
|
}
|
||||||
|
- if l.config.NoNewPrivileges {
|
||||||
|
- if err := unix.Prctl(unix.PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); err != nil {
|
||||||
|
- return errors.Wrap(err, "set nonewprivileges")
|
||||||
|
- }
|
||||||
|
- }
|
||||||
|
// Tell our parent that we're ready to Execv. This must be done before the
|
||||||
|
// Seccomp rules have been applied, because we need to be able to read and
|
||||||
|
// write to a socket.
|
||||||
|
@@ -199,14 +194,6 @@ func (l *linuxStandardInit) Init() error {
|
||||||
|
// since been resolved.
|
||||||
|
// https://github.com/torvalds/linux/blob/v4.9/fs/exec.c#L1290-L1318
|
||||||
|
unix.Close(l.fifoFd)
|
||||||
|
- // Set seccomp as close to execve as possible, so as few syscalls take
|
||||||
|
- // place afterward (reducing the amount of syscalls that users need to
|
||||||
|
- // enable in their seccomp profiles).
|
||||||
|
- if l.config.Config.Seccomp != nil && l.config.NoNewPrivileges {
|
||||||
|
- if err := seccomp.InitSeccomp(l.config.Config.Seccomp); err != nil {
|
||||||
|
- return newSystemErrorWithCause(err, "init seccomp")
|
||||||
|
- }
|
||||||
|
- }
|
||||||
|
|
||||||
|
s := l.config.SpecState
|
||||||
|
s.Pid = unix.Getpid()
|
||||||
|
--
|
||||||
|
2.29.2
|
||||||
|
|
@ -65,7 +65,7 @@ RDEPEND="
|
|||||||
>=app-arch/xz-utils-4.9
|
>=app-arch/xz-utils-4.9
|
||||||
dev-libs/libltdl
|
dev-libs/libltdl
|
||||||
~app-emulation/containerd-1.1.2
|
~app-emulation/containerd-1.1.2
|
||||||
~app-emulation/docker-runc-1.0.0_rc92[apparmor?,seccomp?]
|
~app-emulation/docker-runc-1.0.0_rc93[apparmor?,seccomp?]
|
||||||
~app-emulation/docker-proxy-0.8.0_p20180709
|
~app-emulation/docker-proxy-0.8.0_p20180709
|
||||||
container-init? ( >=sys-process/tini-0.18.0 )
|
container-init? ( >=sys-process/tini-0.18.0 )
|
||||||
"
|
"
|
||||||
|
@ -14,7 +14,7 @@ RDEPEND="
|
|||||||
~app-emulation/docker-19.03.15
|
~app-emulation/docker-19.03.15
|
||||||
~app-emulation/containerd-1.4.3
|
~app-emulation/containerd-1.4.3
|
||||||
~app-emulation/docker-proxy-0.8.0_p20180709
|
~app-emulation/docker-proxy-0.8.0_p20180709
|
||||||
~app-emulation/docker-runc-1.0.0_rc92
|
~app-emulation/docker-runc-1.0.0_rc93
|
||||||
=dev-libs/libltdl-2.4.6
|
=dev-libs/libltdl-2.4.6
|
||||||
=sys-process/tini-0.18.0
|
=sys-process/tini-0.18.0
|
||||||
"
|
"
|
||||||
|
Loading…
x
Reference in New Issue
Block a user