You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@mesos.apache.org by "Jie Yu (JIRA)" <ji...@apache.org> on 2016/10/14 03:36:20 UTC

[jira] [Updated] (MESOS-6391) Command task's sandbox should not be owned by root if it uses container image.

     [ https://issues.apache.org/jira/browse/MESOS-6391?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Jie Yu updated MESOS-6391:
--------------------------
    Description: 
Currently, if the task defines a container image, the command executor will be run under root because it needs to perform pivot_root.

That means if the task wants to run under an unprivileged user, the sandbox of that task will not be writable because it's owned by root.

  was:
Currently, is the task defines a container image, the command executor will be run under root because it needs to perform pivot_root.

That means if the task wants to run under an unprivileged user, the sandbox of that task will not be writable because it's owned by root.


> Command task's sandbox should not be owned by root if it uses container image.
> ------------------------------------------------------------------------------
>
>                 Key: MESOS-6391
>                 URL: https://issues.apache.org/jira/browse/MESOS-6391
>             Project: Mesos
>          Issue Type: Bug
>    Affects Versions: 0.28.2, 1.0.1
>            Reporter: Jie Yu
>
> Currently, if the task defines a container image, the command executor will be run under root because it needs to perform pivot_root.
> That means if the task wants to run under an unprivileged user, the sandbox of that task will not be writable because it's owned by root.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)