]> git.ipfire.org Git - people/ms/pakfire.git/commit
execute: Mount all file systems only in namespace
authorMichael Tremer <michael.tremer@ipfire.org>
Sun, 17 Jul 2022 18:16:04 +0000 (18:16 +0000)
committerMichael Tremer <michael.tremer@ipfire.org>
Sun, 17 Jul 2022 18:16:04 +0000 (18:16 +0000)
commitf71c82d89a3b757ebe49262b18467db6d065e18d
tree395a9c1acde47bf8803430be6629ea0b1a4ec8e0
parentc7b9ea4f1febdb8f56dfe775c5c2d26963d72ecc
execute: Mount all file systems only in namespace

If Pakfire is running as an unprivileged user, we cannot call mount() in
the original namespace. However, it is difficult to spawn a new process
in a new namespace first and then perform loads of actions in there.
Embedded Pakfire would become more difficult.

At the cost of losing the option to create an environment in a
dynamically created ramdisk, we can only mount everything when we enter
the container.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
src/libpakfire/execute.c
src/libpakfire/include/pakfire/mount.h
src/libpakfire/mount.c
src/libpakfire/pakfire.c