1. 13 Jan, 2021 3 commits
    •  - even if the user is root, they might not have permission to mount
       - check for CAP_SYS_ADMIN and unshare --mount before proceeding
       - allow one to disable the check with --skip=check/canmount
       - this is useful in container environments like docker
      josch authored
    • josch authored
    •  - this is useful when you are already root and want the benefits of
         unsharing the mount namespace to prevent messing up your system
       - if the unshare mode is used as root, the user namespace is not unshared
         anymore and newuidmap, setuid and friends are not called anymore
       - if the unshare mode is used as non-root test if the user namespace can be
         unshared, otherwise test if the mount namespace can be unshared
      josch authored
  2. 11 Jan, 2021 1 commit
  3. 09 Jan, 2021 4 commits
  4. 06 Jan, 2021 6 commits
  5. 02 Dec, 2020 1 commit
  6. 01 Dec, 2020 5 commits
  7. 29 Nov, 2020 9 commits
  8. 28 Nov, 2020 3 commits
  9. 27 Nov, 2020 8 commits