Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Entering an existing sandbox created by bubblewrap without special privileges #253

Open
amtlib-dot-dll opened this issue Jan 22, 2018 · 1 comment

Comments

@amtlib-dot-dll
Copy link

bubblewrap creates namespaces without special privileges, but it can only create new ones. In order to enter those namespaces, nsenter should be run with CAP_SYS_ADMIN.

In the GNOME launcher we an launch new instances of an application. However, the two instances of the application are in two different namespaces, which confuses the application and wastes system resources.

One way is to implement some listener in the running bwrap process with authentication, and when the user requests to launch something new inside the sandbox, launch it.

PS: This would introduce many complex logic, and IMHO C++ may be a better tool for it.

@smtalk
Copy link

smtalk commented Apr 18, 2020

Nice idea!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants