From: "'Jan Kiszka' via isar-users" <isar-users@googlegroups.com>
To: Felix Moessbauer <felix.moessbauer@siemens.com>,
isar-users@googlegroups.com
Cc: quirin.gylstorff@siemens.com
Subject: Re: [RFC 00/12] add support to build isar unprivileged
Date: Wed, 18 Feb 2026 19:20:42 +0100 [thread overview]
Message-ID: <cda4b0c2-3296-43df-ba0d-8e51c17495ea@siemens.com> (raw)
In-Reply-To: <20260218115827.3947145-1-felix.moessbauer@siemens.com>
On 18.02.26 12:58, 'Felix Moessbauer' via isar-users wrote:
> Dear isar-users,
>
> currently isar requires password-less sudo and an environment
> where mounting file systems is possible. This has proven problematic
> for security reasons, both when running in a privileged container or
> locally.
>
> To solve this, we implement fully rootless builds that rely on the
> unshare syscall which allows us to avoid sudo and instead operate in
> temporary kernel namespaces as a user that is just privileged within
> that namespace. This comes with some challenges regarding the handling
> of mounts (they are cleared when leaving the namespace), as well as
> cross namespace deployments (the outer user might not be able to access
> the inner data). For that, we rework the handling of mounts and artifact
> passing to make it compatible with both chroot modes (schroot and
> unshare).
>
> The patches 1-10 align the file permissions of deployments and artifacts
> to avoid the use of chown (which will not work anymore across uid
> boundaries). In addition, helpers are introduced to perform privileged
> operations, which simplifies the migration of existing layers.
>
> The patches 11 and 12 introduce the unshare mode, which can be executed
> as a normal user and does not require root. To enable this mode, set
> ISAR_ROOTLESS = "1".
>
> While the series is by far not complete yet, it already passes the DevTest
> CI. Know issues are currently:
>
> - no support for VM and container images
> - unprivileged cleanup of the build/tmp dir is non trivial
> - sporadic issues on partial rebuilds on rootfs_install_sstate_finalize
> - interfaces between kas and isar need to be defined
>
> Note, that this series can be tested on a custom kas-container build
> provided in [1]. Hints how to migrate downstream layers are provided
> in the API changelog.
>
> [1] https://groups.google.com/g/kas-devel/c/NWQFCU2aUHg
>
> Best regards,
> Felix Moessbauer
> Siemens AG
>
> Felix Moessbauer (12):
> refactor bootstrap: store rootfs tar with user permissions
> deb-dl-dir: export without root privileges
> download debs without locking
> introduce wrappers for privileged execution
> bootstrap: move cleanup trap to function
> rootfs: rework sstate caching of rootfs artifact
> rootfs_generate_initramfs: rework deployment to avoid chowning
> wic: rework image deploy logic to deploy under correct user
> use bitbake function to generate mounting scripts
> apt-fetcher: prepare for chroot specific fetching
> add support for fully rootless builds
> apt-fetcher: implement support for unshare backend
>
> Kconfig | 2 +-
> RECIPE-API-CHANGELOG.md | 57 +++++
> doc/user_manual.md | 2 +
> meta/classes-global/base.bbclass | 93 ++++++++
> meta/classes-recipe/deb-dl-dir.bbclass | 20 +-
> meta/classes-recipe/dpkg-base.bbclass | 20 +-
> meta/classes-recipe/dpkg-source.bbclass | 2 +-
> meta/classes-recipe/dpkg.bbclass | 16 +-
> .../image-account-extension.bbclass | 4 +-
> .../image-locales-extension.bbclass | 13 +-
> .../image-postproc-extension.bbclass | 30 +--
> .../image-tools-extension.bbclass | 96 +++++++-
> meta/classes-recipe/image.bbclass | 24 +-
> meta/classes-recipe/imagetypes.bbclass | 47 ++--
> .../imagetypes_container.bbclass | 26 +--
> meta/classes-recipe/imagetypes_wic.bbclass | 12 +-
> meta/classes-recipe/rootfs.bbclass | 221 ++++++++++--------
> meta/classes-recipe/sbuild.bbclass | 37 ++-
> meta/classes-recipe/sdk.bbclass | 23 +-
> meta/classes-recipe/squashfs.bbclass | 2 +-
> meta/classes/sbom.bbclass | 2 +-
> meta/conf/bitbake.conf | 7 +-
> meta/lib/aptsrc_fetcher.py | 90 ++++++-
> .../isar-mmdebstrap/isar-mmdebstrap.inc | 47 ++--
> .../sbuild-chroot/sbuild-chroot.inc | 24 +-
> .../unittests/test_image_account_extension.py | 9 +-
> 26 files changed, 691 insertions(+), 235 deletions(-)
>
Hmm, just testing xenomai-images with this and minimal changes for
itself (buildsystem update). It seems to build the kernel - put only on
a single core. This part looks still fine:
# $PARALLEL_MAKE
# set? /work/build/../isar/meta/conf/bitbake.conf:135
# "-j ${@bb.utils.cpu_count()}"
PARALLEL_MAKE="-j 16"
But the "-j 16" does not end up in the actually make call of the kernel
build. How could we possibly lose this?
I wanted to test if rootfull mode with your patches applied may answer
this, but:
...
ERROR: Unable to parse Var <UNSHARE_SUBUID_BASE[:=]>
Traceback (most recent call last):
File "Var <UNSHARE_SUBUID_BASE[:=]>", line 1, in <module>
File "/work/build/../isar/meta/classes-global/base.bbclass", line 396, in get_subid_range(idmap='/etc/subuid', d=<bb.data_smart.DataSmart object at 0x7f73357b7110>):
user, base, cnt = e.split(':')
> if user == os.getuid() or user == os.getlogin():
return base, cnt
bb.data_smart.ExpansionError: Failure expanding variable UNSHARE_SUBUID_BASE[:=], expression was ${@get_subid_range('/etc/subuid', d)[0]} which triggered exception OSError: [Errno -25] Unknown error -25
The variable dependency chain for the failure is: UNSHARE_SUBUID_BASE[:=]
2026-02-18 19:18:28 - ERROR - Command "/work/isar/bitbake/bin/bitbake -c build linux-xenomai-3" failed with error 1
I bet you can reproduce with plane Isar and a linux-mailine build as
well.
Jan
--
Siemens AG, Foundational Technologies
Linux Expert Center
--
You received this message because you are subscribed to the Google Groups "isar-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isar-users+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/isar-users/cda4b0c2-3296-43df-ba0d-8e51c17495ea%40siemens.com.
next prev parent reply other threads:[~2026-02-18 18:21 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-18 11:58 'Felix Moessbauer' via isar-users
2026-02-18 11:58 ` [RFC 01/12] refactor bootstrap: store rootfs tar with user permissions 'Felix Moessbauer' via isar-users
2026-02-18 11:58 ` [RFC 02/12] deb-dl-dir: export without root privileges 'Felix Moessbauer' via isar-users
2026-02-18 14:01 ` 'Jan Kiszka' via isar-users
2026-02-18 11:58 ` [RFC 03/12] download debs without locking 'Felix Moessbauer' via isar-users
2026-02-18 11:58 ` [RFC 04/12] introduce wrappers for privileged execution 'Felix Moessbauer' via isar-users
2026-02-18 14:11 ` 'Jan Kiszka' via isar-users
2026-02-18 11:58 ` [RFC 05/12] bootstrap: move cleanup trap to function 'Felix Moessbauer' via isar-users
2026-02-18 11:58 ` [RFC 06/12] rootfs: rework sstate caching of rootfs artifact 'Felix Moessbauer' via isar-users
2026-02-18 11:58 ` [RFC 07/12] rootfs_generate_initramfs: rework deployment to avoid chowning 'Felix Moessbauer' via isar-users
2026-02-18 11:58 ` [RFC 08/12] wic: rework image deploy logic to deploy under correct user 'Felix Moessbauer' via isar-users
2026-02-18 11:58 ` [RFC 09/12] use bitbake function to generate mounting scripts 'Felix Moessbauer' via isar-users
2026-02-18 11:58 ` [RFC 10/12] apt-fetcher: prepare for chroot specific fetching 'Felix Moessbauer' via isar-users
2026-02-18 11:58 ` [RFC 11/12] add support for fully rootless builds 'Felix Moessbauer' via isar-users
2026-02-18 16:09 ` 'Jan Kiszka' via isar-users
2026-02-18 16:50 ` 'Jan Kiszka' via isar-users
2026-02-18 11:58 ` [RFC 12/12] apt-fetcher: implement support for unshare backend 'Felix Moessbauer' via isar-users
2026-02-18 18:20 ` 'Jan Kiszka' via isar-users [this message]
2026-02-18 18:31 ` [RFC 00/12] add support to build isar unprivileged 'Jan Kiszka' via isar-users
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cda4b0c2-3296-43df-ba0d-8e51c17495ea@siemens.com \
--to=isar-users@googlegroups.com \
--cc=felix.moessbauer@siemens.com \
--cc=jan.kiszka@siemens.com \
--cc=quirin.gylstorff@siemens.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox