Skip to content

docs: Clarify that all jailer inputs must be trusted#5812

Open
ilstam wants to merge 1 commit intofirecracker-microvm:mainfrom
ilstam:jailer-docs
Open

docs: Clarify that all jailer inputs must be trusted#5812
ilstam wants to merge 1 commit intofirecracker-microvm:mainfrom
ilstam:jailer-docs

Conversation

@ilstam
Copy link
Copy Markdown
Contributor

@ilstam ilstam commented Apr 2, 2026

Document that the operator invoking the jailer is part of the trusted computing base and that all paths provided to the jailer are considered trusted. It is the operator's responsibility to ensure these paths and their parent directories have appropriate permissions to prevent unauthorized modification by other local users.

License Acceptance

By submitting this pull request, I confirm that my contribution is made under
the terms of the Apache 2.0 license. For more information on following Developer
Certificate of Origin and signing off your commits, please check
CONTRIBUTING.md.

PR Checklist

  • I have read and understand CONTRIBUTING.md.
  • I have run tools/devtool checkbuild --all to verify that the PR passes
    build checks on all supported architectures.
  • I have run tools/devtool checkstyle to verify that the PR passes the
    automated style checks.
  • I have described what is done in these changes, why they are needed, and
    how they are solving the problem in a clear and encompassing way.
  • I have updated any relevant documentation (both in code and in the docs)
    in the PR.
  • I have mentioned all user-facing changes in CHANGELOG.md.
  • If a specific issue led to this PR, this PR closes the issue.
  • When making API changes, I have followed the
    Runbook for Firecracker API changes.
  • I have tested all new and changed functionalities in unit tests and/or
    integration tests.
  • I have linked an issue to every new TODO.

  • This functionality cannot be added in rust-vmm.

Document that the operator invoking the jailer is part of the trusted
computing base and that all paths provided to the jailer are considered
trusted. It is the operator's responsibility to ensure these paths and
their parent directories have appropriate permissions to prevent
unauthorized modification by other local users.

Signed-off-by: Ilias Stamatis <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant