Scroll to navigation

mkosi-sandbox(1) General Commands Manual mkosi-sandbox(1)

NAME

mkosi-sandbox — Run commands in a custom sandbox

SYNOPSIS

mkosi-sandbox [options...] command [arguments]

DESCRIPTION

mkosi-sandbox runs the given command in a custom sandbox. The sandbox is configured by specifying command line options that configure individual parts of the sandbox.

If no command is specified, mkosi-sandbox will start bash in the sandbox.

Note that this sandbox is not designed to be a security boundary. Its intended purpose is to allow running commands in an isolated environment so they are not affected by the host system.

It is possible to use mkosi-sandbox to create an in process sandbox for python applications by importing it as a module and invoking its main function with only options. No command line to execute is needed in this case. As an example:

import mkosi.sandbox
mkosi.sandbox.main(["--become-root"])
print(os.getuid())
    

Only the main function can be invoked. Invoking any other functions from mkosi.sandbox is not supported and may break in future versions.

OPTIONS

Mounts a new tmpfs at DST in the sandbox.
Sets up a private /dev at DST in the sandbox. This private /dev will only contain the basic device nodes required for a functioning sandbox (e.g. /dev/null) and no actual devices.
Mounts /proc from the host at DST in the sandbox.
Creates a directory and all missing parent directories at DST in the sandbox. All directories are created with mode 755 unless the path ends with /tmp or /var/tmp in which case it is created with mode 1777.
The source path SRC is recursively bind mounted to DST in the sandbox. The mountpoint is created in the sandbox if it does not yet exist. Any missing parent directories in the sandbox are created as well. The source path may optionally be prefixed with a + character. If so, the source path is interpreted relative to the sandbox root directory instead of the host root directory.
Like --bind, but doesn’t fail if the source path doesn’t exist.
Like --bind, but does a recursive readonly bind mount.
Like --bind-try, but does a recursive readonly bind mount.
Creates a symlink at DST in the sandbox pointing to SRC. If DST already exists and is a file or symlink, a temporary symlink is created and mounted on top of DST.
Writes the string from DATA to DST in the sandbox.
Adds DIR from the host as a new lower directory for the next overlayfs mount.
Sets the upper directory for the next overlayfs mount to DIR from the host. If set to tmpfs, the upperdir and workdir will be subdirectories of a fresh tmpfs mount.
Sets the working directory for the next overlayfs mount to DIR from the host.
Mounts a new overlay filesystem at DST in the sandbox. The lower directories, upper directory and working directory are specified using the --overlay-lowerdir, --overlay-upperdir and --overlay-workdir options respectively. After each --overlay option is parsed, the other overlay options are reset.
Unsets the NAME environment variable in the sandbox.
Sets the NAME environment variable to VALUE in the sandbox
Changes the working directory to DIR in the sandbox.
Changes to the working directory in the sandbox to the current working directory that mkosi-sandbox is invoked in on the host.
Maps the current user to the root user in the sandbox. If this option is not specified, the current user is mapped to itself in the sandbox. Regardless of whether this option is specified or not, the current user will have a full set of ambient capabilities in the sandbox. This includes CAP_SYS_ADMIN which means that the invoked process in the sandbox will be able to do bind mounts and other operations.
If mkosi-sandbox is invoked as the root user, this option won’t do anything.
Specifying this option causes all calls to chown() or similar system calls to become a noop in the sandbox. This is primarily useful when invoking package managers in the sandbox which might try to chown() files to different users or groups which would fail unless mkosi-sandbox is invoked by a privileged user.
Specifying this option causes all calls to sync() or similar system calls to become a noop in the sandbox. This is primarily useful when invoking package managers in the sandbox which might try to sync() files when extracting packages which is unnecessary when building images and slows down execution time significantly.
Specifying this option makes mkosi-sandbox unshare a network namespace if possible.
Specifying this option makes mkosi-sandbox unshare an IPC namespace if possible.
Make the mkosi-sandbox process suspend itself with SIGSTOP just before it calls execve(). This is useful to wait until all setup logic has completed before continuing execution in the parent process invoking mkosi-sandbox by using waitid() with the WNOWAIT AND WSTOPPED flags.
Pack inherited file descriptors together starting at file descriptor number 3 and set $LISTEN_FDS to the number of packed file descriptors and $LISTEN_PID to the current process pid.
Show package version.
Show brief usage information.

EXAMPLES

Start bash in the current working directory in its own network namespace as the current user.

mkosi-sandbox --bind / / --same-dir --unshare-net
    

Run id as the root user in a sandbox with only /usr from the host plus the necessary symlinks to be able to run commands.

mkosi-sandbox \

--ro-bind /usr /usr \
--symlink usr/bin /bin \
--symlink usr/lib /lib \
--symlink usr/lib64 /lib64 \
--symlink usr/sbin /sbin \
--dev /dev \
--proc /proc \
--tmpfs /tmp \
--become-root \
id

SEE ALSO

mkosi(1)