podman/pkg/machine/shim
Brent Baude 5283f956a5 Disallow mounting to certain destination /dir paths
When certain directories, like /tmp, get mounted over, FCOS/Linux can
act in unexpected ways.  Added a sanity check for a list of directories
think might be impacted by this.  Also, moved the volume parsing earlier
in the init process so we can catch problems before the expensive
decompression of machine images.

The following destinations are forbidden for volumes:

`/bin`, `/boot`, `/dev`, `/etc`, `/home`, `/proc`, `/root`, `/run`, `/sbin`, `/sys`, `/tmp`, `/usr`, and `/var`. Subdirectories

Fixes: #18230

Signed-off-by: Brent Baude <bbaude@redhat.com>
2025-03-07 09:54:01 -06:00
..
diskpull Clean machine pull cache 2024-04-26 12:31:42 -04:00
claim_darwin.go Implement generic providers 2024-02-07 09:18:38 -06:00
claim_unsupported.go Fix Lint on Windows and enable the job 2024-02-20 08:06:18 -05:00
host.go Disallow mounting to certain destination /dir paths 2025-03-07 09:54:01 -06:00
host_test.go Disallow mounting to certain destination /dir paths 2025-03-07 09:54:01 -06:00
networking.go machine: Always use --log-file with gvproxy 2024-06-28 16:05:21 +02:00
networking_unix.go Change API socket to be machine name isolated 2024-03-13 13:28:14 -05:00
networking_windows.go Implement publishing API UNIX socket on Windows platforms 2024-08-31 17:27:05 +03:00
volume.go Implement disable default mounts via command line 2024-07-15 15:27:19 +03:00