Move fsverity package to internal
This functionality is not directly related to containerd and could move to external package at some point. Signed-off-by: Derek McGowan <derek@mcg.dev>
This commit is contained in:
130
internal/fsverity/fsverity_linux.go
Normal file
130
internal/fsverity/fsverity_linux.go
Normal file
@@ -0,0 +1,130 @@
|
||||
/*
|
||||
Copyright The containerd Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package fsverity
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"syscall"
|
||||
"unsafe"
|
||||
|
||||
"github.com/containerd/containerd/v2/pkg/kernelversion"
|
||||
"golang.org/x/sys/unix"
|
||||
)
|
||||
|
||||
type fsverityEnableArg struct {
|
||||
version uint32
|
||||
hashAlgorithm uint32
|
||||
blockSize uint32
|
||||
saltSize uint32
|
||||
saltPtr uint64
|
||||
sigSize uint32
|
||||
reserved1 uint32
|
||||
sigPtr uint64
|
||||
reserved2 [11]uint64
|
||||
}
|
||||
|
||||
const (
|
||||
defaultBlockSize int = 4096
|
||||
maxDigestSize uint16 = 64
|
||||
)
|
||||
|
||||
func IsSupported(rootPath string) (bool, error) {
|
||||
minKernelVersion := kernelversion.KernelVersion{Kernel: 5, Major: 4}
|
||||
s, err := kernelversion.GreaterEqualThan(minKernelVersion)
|
||||
if err != nil {
|
||||
return s, err
|
||||
}
|
||||
|
||||
integrityDir, err := os.MkdirTemp(rootPath, ".fsverity-check-*")
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
defer os.RemoveAll(integrityDir)
|
||||
|
||||
digestPath := filepath.Join(integrityDir, "supported")
|
||||
digestFile, err := os.Create(digestPath)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
||||
digestFile.Close()
|
||||
|
||||
eerr := Enable(digestPath)
|
||||
if eerr != nil {
|
||||
return false, eerr
|
||||
}
|
||||
|
||||
return true, nil
|
||||
}
|
||||
|
||||
func IsEnabled(path string) (bool, error) {
|
||||
f, err := os.Open(path)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
defer f.Close()
|
||||
|
||||
var attr int
|
||||
|
||||
_, _, flagErr := unix.Syscall(syscall.SYS_IOCTL, f.Fd(), uintptr(unix.FS_IOC_GETFLAGS), uintptr(unsafe.Pointer(&attr)))
|
||||
if flagErr != 0 {
|
||||
return false, fmt.Errorf("error getting inode flags: %w", flagErr)
|
||||
}
|
||||
|
||||
if attr&unix.FS_VERITY_FL == unix.FS_VERITY_FL {
|
||||
return true, nil
|
||||
}
|
||||
|
||||
return false, nil
|
||||
}
|
||||
|
||||
func Enable(path string) error {
|
||||
f, err := os.Open(path)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
var args = &fsverityEnableArg{}
|
||||
args.version = 1
|
||||
args.hashAlgorithm = 1
|
||||
|
||||
// fsverity block size should be the minimum between the page size
|
||||
// and the file system block size
|
||||
// If neither value is retrieved successfully, set fsverity block size to the default value
|
||||
blockSize := unix.Getpagesize()
|
||||
|
||||
s := unix.Stat_t{}
|
||||
serr := unix.Stat(path, &s)
|
||||
if serr == nil && int(s.Blksize) < blockSize {
|
||||
blockSize = int(s.Blksize)
|
||||
}
|
||||
|
||||
if blockSize <= 0 {
|
||||
blockSize = defaultBlockSize
|
||||
}
|
||||
|
||||
args.blockSize = uint32(blockSize)
|
||||
|
||||
_, _, errno := unix.Syscall(syscall.SYS_IOCTL, f.Fd(), uintptr(unix.FS_IOC_ENABLE_VERITY), uintptr(unsafe.Pointer(args)))
|
||||
if errno != 0 {
|
||||
return fmt.Errorf("enable fsverity failed: %w", errno)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
33
internal/fsverity/fsverity_other.go
Normal file
33
internal/fsverity/fsverity_other.go
Normal file
@@ -0,0 +1,33 @@
|
||||
//go:build !linux
|
||||
|
||||
/*
|
||||
Copyright The containerd Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package fsverity
|
||||
|
||||
import "fmt"
|
||||
|
||||
func IsSupported(rootPath string) (bool, error) {
|
||||
return false, fmt.Errorf("fsverity is only supported on Linux systems")
|
||||
}
|
||||
|
||||
func IsEnabled(path string) (bool, error) {
|
||||
return false, fmt.Errorf("fsverity is only supported on Linux systems")
|
||||
}
|
||||
|
||||
func Enable(_ string) error {
|
||||
return fmt.Errorf("fsverity is only supported on Linux systems")
|
||||
}
|
||||
236
internal/fsverity/fsverity_test.go
Normal file
236
internal/fsverity/fsverity_test.go
Normal file
@@ -0,0 +1,236 @@
|
||||
//go:build linux
|
||||
|
||||
/*
|
||||
Copyright The containerd Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package fsverity
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"encoding/binary"
|
||||
"fmt"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
"syscall"
|
||||
"testing"
|
||||
|
||||
"github.com/containerd/containerd/v2/pkg/testutil"
|
||||
)
|
||||
|
||||
type superblockROFeatures struct {
|
||||
_ [100]byte
|
||||
Features uint32
|
||||
}
|
||||
|
||||
func TestEnable(t *testing.T) {
|
||||
|
||||
testutil.RequiresRoot(t)
|
||||
|
||||
rootDir := filepath.Join(t.TempDir(), "content")
|
||||
err := os.Mkdir(rootDir, 0755)
|
||||
if err != nil {
|
||||
t.Errorf("could not create temporary directory: %s", err.Error())
|
||||
}
|
||||
|
||||
device, err := resolveDevicePath(rootDir)
|
||||
if err != nil {
|
||||
t.Skipf("invalid device: %s", err.Error())
|
||||
}
|
||||
|
||||
var expected bool
|
||||
enabled, err := ext4IsVerity(device)
|
||||
if !enabled || err != nil {
|
||||
t.Logf("fsverity not enabled on ext4 file system: %s", err.Error())
|
||||
expected = false
|
||||
} else {
|
||||
t.Logf("fsverity enabled on ext4 file system")
|
||||
expected = true
|
||||
}
|
||||
|
||||
verityFile := filepath.Join(rootDir, "fsverityFile")
|
||||
f, err := os.Create(verityFile)
|
||||
if err != nil {
|
||||
t.Errorf("could not create fsverity test file: %s", err.Error())
|
||||
}
|
||||
|
||||
err = f.Close()
|
||||
if err != nil {
|
||||
t.Errorf("error closing fsverity test file: %s", err.Error())
|
||||
}
|
||||
|
||||
defer func() {
|
||||
err := os.Remove(verityFile)
|
||||
if err != nil {
|
||||
t.Logf("error removing fsverity test file: %s", err.Error())
|
||||
}
|
||||
}()
|
||||
|
||||
err = Enable(verityFile)
|
||||
if err != nil && expected {
|
||||
t.Errorf("fsverity Enable failed: %s", err.Error())
|
||||
}
|
||||
if err == nil && !expected {
|
||||
t.Errorf("fsverity Enable succeeded, expected Enable to fail")
|
||||
}
|
||||
}
|
||||
|
||||
func TestIsEnabled(t *testing.T) {
|
||||
|
||||
testDir := filepath.Join(t.TempDir(), "content")
|
||||
err := os.Mkdir(testDir, 0755)
|
||||
if err != nil {
|
||||
t.Errorf("could not create temporary directory: %s", err.Error())
|
||||
}
|
||||
|
||||
if supported, err := IsSupported(testDir); !supported || err != nil {
|
||||
t.Skipf("fsverity is not supported")
|
||||
}
|
||||
|
||||
verityFile := filepath.Join(testDir, "fsverityFile")
|
||||
f, err := os.Create(verityFile)
|
||||
if err != nil {
|
||||
t.Errorf("could not create fsverity test file: %s", err.Error())
|
||||
}
|
||||
|
||||
err = f.Close()
|
||||
if err != nil {
|
||||
t.Errorf("error closing fsverity test file: %s", err.Error())
|
||||
}
|
||||
|
||||
defer func() {
|
||||
err := os.Remove(verityFile)
|
||||
if err != nil {
|
||||
t.Logf("error removing fsverity test file: %s", err.Error())
|
||||
}
|
||||
}()
|
||||
|
||||
err = Enable(verityFile)
|
||||
if err != nil {
|
||||
t.Errorf("fsverity Enable failed: %s", err.Error())
|
||||
}
|
||||
|
||||
if enabled, err := IsEnabled(verityFile); !enabled || err != nil {
|
||||
t.Errorf("expected fsverity to be enabled on file, received enabled: %t; error: %s", enabled, err.Error())
|
||||
}
|
||||
}
|
||||
|
||||
func resolveDevicePath(path string) (_ string, e error) {
|
||||
var devicePath string
|
||||
|
||||
s, err := os.Stat(path)
|
||||
if err != nil {
|
||||
return devicePath, err
|
||||
}
|
||||
|
||||
sys := s.Sys()
|
||||
stat, ok := sys.(*syscall.Stat_t)
|
||||
if !ok {
|
||||
return devicePath, fmt.Errorf("type assert to syscall.Stat_t failed")
|
||||
}
|
||||
|
||||
// resolve to device path
|
||||
maj := (stat.Dev >> 8) & 0xff
|
||||
min := stat.Dev & 0xff
|
||||
|
||||
m, err := os.Open("/proc/self/mountinfo")
|
||||
if err != nil {
|
||||
return devicePath, err
|
||||
}
|
||||
|
||||
defer func() {
|
||||
err := m.Close()
|
||||
if err != nil {
|
||||
e = fmt.Errorf("could not close mountinfo: %v", err)
|
||||
}
|
||||
}()
|
||||
|
||||
// scan for major:minor id and get the device path
|
||||
scanner := bufio.NewScanner(m)
|
||||
|
||||
var entry string
|
||||
sub := fmt.Sprintf("%d:%d", maj, min)
|
||||
for scanner.Scan() {
|
||||
if strings.Contains(scanner.Text(), sub) {
|
||||
entry = scanner.Text()
|
||||
break
|
||||
}
|
||||
}
|
||||
if entry == "" {
|
||||
return devicePath, fmt.Errorf("device mount not found for device id %s", sub)
|
||||
}
|
||||
|
||||
entryReader := strings.NewReader(entry)
|
||||
extScan := bufio.NewScanner(entryReader)
|
||||
extScan.Split(bufio.ScanWords)
|
||||
|
||||
var word string
|
||||
for (word != "-") && extScan.Scan() {
|
||||
word = extScan.Text()
|
||||
}
|
||||
|
||||
if !extScan.Scan() {
|
||||
return devicePath, fmt.Errorf("scanning mounts failed: %w", extScan.Err())
|
||||
}
|
||||
fs := extScan.Text()
|
||||
|
||||
if fs != "ext4" {
|
||||
return devicePath, fmt.Errorf("not an ext4 file system, skipping device")
|
||||
}
|
||||
|
||||
if !extScan.Scan() {
|
||||
return devicePath, fmt.Errorf("scanning mounts failed: %w", extScan.Err())
|
||||
}
|
||||
devicePath = extScan.Text()
|
||||
|
||||
return devicePath, nil
|
||||
}
|
||||
|
||||
func ext4IsVerity(fpath string) (bool, error) {
|
||||
b := superblockROFeatures{}
|
||||
|
||||
r, err := os.Open(fpath)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
||||
defer func() {
|
||||
err := r.Close()
|
||||
if err != nil {
|
||||
fmt.Printf("failed to close %s: %s\n", fpath, err.Error())
|
||||
}
|
||||
}()
|
||||
|
||||
// seek to superblock
|
||||
_, err = r.Seek(1024, 0)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
||||
err = binary.Read(r, binary.LittleEndian, &b)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
||||
// extract fsverity flag
|
||||
var verityMask uint32 = 0x8000
|
||||
res := verityMask & b.Features
|
||||
if res > 0 {
|
||||
return true, nil
|
||||
}
|
||||
|
||||
return false, fmt.Errorf("fsverity not enabled on ext4 file system %s", fpath)
|
||||
}
|
||||
Reference in New Issue
Block a user