snapd needs a way to control mount points

Bug #1582781 reported by Zygmunt Krynicki
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Snappy
Fix Released
Undecided
Michael Vogt
snap-confine
Fix Released
High
Zygmunt Krynicki

Bug Description

Certain interfaces, especially in a classic context, would like to take advantage of being able to control how various bind mounts are set up for application processes.

Currently ubuntu-core-launcher establishes a number of fixed bind mounts to "hide" the real filesystem and to expose "only" the OS snap. The same mechanism could be generalized to let snapd create "mount profiles" (the word profile is the for symmetry with apparmor and seccomp profiles) that the launcher honors and applies to the process.

I'd like to propose that u-c-l reads and applies fstab-like profiles stored in /var/lib/snapd/mount/profiles. The same "security tag" (1st and 2nd argument to u-c-l) should dictate which profile to read. While the actual syntax should be compatible with fstab (for easy parsing, due to availability of ready parser in glibc) the launcher should limit features to bare minimum required to avoid abuse.

Zygmunt Krynicki (zyga)
Changed in snappy:
assignee: nobody → Zygmunt Krynicki (zyga)
Tyler Hicks (tyhicks)
Changed in ubuntu-core-launcher:
assignee: nobody → Tyler Hicks (tyhicks)
Revision history for this message
Gustavo Niemeyer (niemeyer) wrote :

+1

Zygmunt Krynicki (zyga)
Changed in snappy:
status: New → In Progress
Zygmunt Krynicki (zyga)
Changed in snap-confine:
milestone: none → 1.0.34
status: New → In Progress
Changed in snappy:
assignee: Zygmunt Krynicki (zyga) → Michael Vogt (mvo)
Changed in snap-confine:
assignee: Tyler Hicks (tyhicks) → Zygmunt Krynicki (zyga)
Zygmunt Krynicki (zyga)
Changed in snap-confine:
status: In Progress → Fix Committed
importance: Undecided → High
Changed in snappy:
status: In Progress → Fix Released
Zygmunt Krynicki (zyga)
Changed in snap-confine:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.