Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(617)

Issue 881733002: Add namespace sandbox class. (Closed)

Created:
5 years, 11 months ago by rickyz (no longer on Chrome)
Modified:
5 years, 10 months ago
CC:
chromium-reviews, jln+watch_chromium.org
Base URL:
https://chromium.googlesource.com/chromium/src.git@master
Target Ref:
refs/pending/heads/master
Project:
chromium
Visibility:
Public.

Description

Add namespace sandbox class. BUG=312380 Committed: https://crrev.com/8f235daf6d29e05f8a1949864da493e910a3ddd1 Cr-Commit-Position: refs/heads/master@{#314284}

Patch Set 1 #

Total comments: 1

Patch Set 2 : Misc small changes #

Total comments: 14

Patch Set 3 : Embed LaunchOptions in NamespaceSandbox. #

Patch Set 4 : Add missing comment, fix includes. #

Total comments: 8

Patch Set 5 : Nested namespace sandboxes aren't supported. #

Total comments: 5

Patch Set 6 : Write the uid and gid maps in the pre_exec_delegate. #

Total comments: 8

Patch Set 7 : Rebase. #

Patch Set 8 : Bunch of cleanups after the uid/gid map writing move #

Total comments: 4

Patch Set 9 : Respond to comments. #

Patch Set 10 : Last round of comments. #

Unified diffs Side-by-side diffs Delta from patch set Stats (+329 lines, -12 lines) Patch
M sandbox/linux/BUILD.gn View 2 chunks +3 lines, -0 lines 0 comments Download
M sandbox/linux/sandbox_linux.gypi View 1 chunk +2 lines, -0 lines 0 comments Download
M sandbox/linux/sandbox_linux_test_sources.gypi View 1 chunk +1 line, -0 lines 0 comments Download
A sandbox/linux/services/namespace_sandbox.h View 1 2 3 4 5 6 7 8 9 1 chunk +58 lines, -0 lines 0 comments Download
A sandbox/linux/services/namespace_sandbox.cc View 1 2 3 4 5 6 7 8 9 1 chunk +112 lines, -0 lines 0 comments Download
A sandbox/linux/services/namespace_sandbox_unittest.cc View 1 2 3 4 5 6 7 8 9 1 chunk +121 lines, -0 lines 0 comments Download
M sandbox/linux/services/namespace_utils.h View 1 2 3 4 5 6 7 8 2 chunks +5 lines, -2 lines 0 comments Download
M sandbox/linux/services/namespace_utils.cc View 1 2 3 4 5 6 7 8 2 chunks +13 lines, -8 lines 0 comments Download
M sandbox/linux/services/namespace_utils_unittest.cc View 1 2 3 4 1 chunk +2 lines, -2 lines 0 comments Download
M sandbox/linux/tests/main.cc View 2 chunks +12 lines, -0 lines 0 comments Download

Messages

Total messages: 24 (6 generated)
rickyz (no longer on Chrome)
https://codereview.chromium.org/881733002/diff/1/sandbox/linux/services/namespace_sandbox.cc File sandbox/linux/services/namespace_sandbox.cc (right): https://codereview.chromium.org/881733002/diff/1/sandbox/linux/services/namespace_sandbox.cc#newcode60 sandbox/linux/services/namespace_sandbox.cc:60: SetEnvironForNamespaceType(environ, kSandboxUSERNSEnvironmentVarName, If environmental variables are a little ugly, ...
5 years, 11 months ago (2015-01-27 07:51:57 UTC) #2
jln (very slow on Chromium)
I had to rush this review a little, so I haven't fully made up my ...
5 years, 11 months ago (2015-01-28 02:34:39 UTC) #3
rickyz (no longer on Chrome)
https://codereview.chromium.org/881733002/diff/20001/sandbox/linux/services/namespace_sandbox.cc File sandbox/linux/services/namespace_sandbox.cc (right): https://codereview.chromium.org/881733002/diff/20001/sandbox/linux/services/namespace_sandbox.cc#newcode57 sandbox/linux/services/namespace_sandbox.cc:57: base::EnvironmentMap* environ = &options->environ; On 2015/01/28 02:34:39, jln wrote: ...
5 years, 10 months ago (2015-01-29 00:57:48 UTC) #5
rickyz (no longer on Chrome)
https://codereview.chromium.org/881733002/diff/20001/sandbox/linux/services/namespace_sandbox.h File sandbox/linux/services/namespace_sandbox.h (right): https://codereview.chromium.org/881733002/diff/20001/sandbox/linux/services/namespace_sandbox.h#newcode42 sandbox/linux/services/namespace_sandbox.h:42: void SetupLaunchOptions(base::LaunchOptions* options, On 2015/01/28 02:34:39, jln wrote: > ...
5 years, 10 months ago (2015-01-29 01:02:48 UTC) #6
jln (very slow on Chromium)
This looks pretty good. I think the ScopedFDs don't need to be part of the ...
5 years, 10 months ago (2015-01-30 20:12:28 UTC) #7
rickyz (no longer on Chrome)
This change also fixes a bug where I forgot to check the return value of ...
5 years, 10 months ago (2015-01-31 02:33:54 UTC) #8
jln (very slow on Chromium)
lgtm as this is a good step forward. But I think we need the nesting. ...
5 years, 10 months ago (2015-02-02 18:54:45 UTC) #9
rickyz (no longer on Chrome)
This is now writing the uid/gid in the pre_exec_delgate instead. Mind giving this another quick ...
5 years, 10 months ago (2015-02-02 21:35:31 UTC) #10
rickyz (no longer on Chrome)
Apologies, that last patch set was missing a bunch of cleanups enabled by moving the ...
5 years, 10 months ago (2015-02-02 22:02:58 UTC) #12
jln (very slow on Chromium)
https://chromiumcodereview.appspot.com/881733002/diff/100001/sandbox/linux/services/namespace_utils_unittest.cc File sandbox/linux/services/namespace_utils_unittest.cc (right): https://chromiumcodereview.appspot.com/881733002/diff/100001/sandbox/linux/services/namespace_utils_unittest.cc#newcode47 sandbox/linux/services/namespace_utils_unittest.cc:47: RAW_CHECK(getuid() != uid); On 2015/02/02 21:35:31, rickyz wrote: > ...
5 years, 10 months ago (2015-02-03 01:14:30 UTC) #13
rickyz (no longer on Chrome)
https://codereview.chromium.org/881733002/diff/140001/sandbox/linux/services/namespace_sandbox.cc File sandbox/linux/services/namespace_sandbox.cc (right): https://codereview.chromium.org/881733002/diff/140001/sandbox/linux/services/namespace_sandbox.cc#newcode30 sandbox/linux/services/namespace_sandbox.cc:30: explicit WriteUidGidMapDelegate() : uid_(getuid()), gid_(getgid()) {} On 2015/02/03 01:14:30, ...
5 years, 10 months ago (2015-02-03 01:27:22 UTC) #14
jln (very slow on Chromium)
lgtm https://chromiumcodereview.appspot.com/881733002/diff/130011/sandbox/linux/services/namespace_sandbox.h File sandbox/linux/services/namespace_sandbox.h (right): https://chromiumcodereview.appspot.com/881733002/diff/130011/sandbox/linux/services/namespace_sandbox.h#newcode30 sandbox/linux/services/namespace_sandbox.h:30: // Credentials::DropFileSystemAccess(). Add the call to DropAllCapabilities() as ...
5 years, 10 months ago (2015-02-03 01:27:46 UTC) #15
rickyz (no longer on Chrome)
https://chromiumcodereview.appspot.com/881733002/diff/130011/sandbox/linux/services/namespace_sandbox.h File sandbox/linux/services/namespace_sandbox.h (right): https://chromiumcodereview.appspot.com/881733002/diff/130011/sandbox/linux/services/namespace_sandbox.h#newcode30 sandbox/linux/services/namespace_sandbox.h:30: // Credentials::DropFileSystemAccess(). On 2015/02/03 01:27:46, jln wrote: > Add ...
5 years, 10 months ago (2015-02-03 01:35:39 UTC) #16
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/881733002/210001
5 years, 10 months ago (2015-02-03 01:37:01 UTC) #18
commit-bot: I haz the power
Try jobs failed on following builders: win8_chromium_rel on tryserver.chromium.win (None)
5 years, 10 months ago (2015-02-03 03:38:14 UTC) #20
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/881733002/210001
5 years, 10 months ago (2015-02-03 07:25:51 UTC) #22
commit-bot: I haz the power
Committed patchset #10 (id:210001)
5 years, 10 months ago (2015-02-03 07:26:46 UTC) #23
commit-bot: I haz the power
5 years, 10 months ago (2015-02-03 07:27:47 UTC) #24
Message was sent while issue was closed.
Patchset 10 (id:??) landed as
https://crrev.com/8f235daf6d29e05f8a1949864da493e910a3ddd1
Cr-Commit-Position: refs/heads/master@{#314284}

Powered by Google App Engine
This is Rietveld 408576698