> Fiona Ebner <f.eb...@proxmox.com> hat am 12.09.2024 15:38 CEST geschrieben: > > Am 12.09.24 um 14:43 schrieb Fabian Grünbichler: > > On August 13, 2024 3:28 pm, Fiona Ebner wrote: > >> + $info->{'firewall-config'} = $firewall_file if -e $firewall_file; > >> + $info->{'bandwidth-limit'} = $opts->{bwlimit} * 1024 if > >> $opts->{bwlimit}; > >> + $backup_provider->backup_container($vmid, $config_file, $id_map, > >> $findexcl, $info); > > > > it might be easier to hide the idmapping from the backup provider? e.g., > > hand it a idmapped bindmount or something like that? > > > > Yes, that would be nicer. But could that potentially lead to permission > issues? A mid/long term plan is to have the backup provider code run > with lower privileges. I suppose to later implement that, the subroutine > for the provider could run within a matching user namespace too?
yeah, I think there are a few options here - run the provider as root-in-user-ns, give it access to the mapped FS (this is how we do regular backups, but requires some glue code/forking) - run the provider as root-on-host, give it access to a reverse-mapped FS somehow (well, it would be nicer to run the backup code in the userns instead of as root) - run the provider as root-on-host, give it access to the mapped FS and let it handle the (un)mapping itself (if they are not familiar with namespaces, this might go wrong) so if we find a generic way to do the first variant, we are both closer to how we do backups, and err on the side of caution w.r.t. context of execution. _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel