Merge pull request from GHSA-c2h3-6mxw-7mvq
v1 & v2 runtimes: reduce permissions for bundle dir
This commit is contained in:
commit
3f00006f72
@ -22,6 +22,7 @@ package linux
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"crypto/sha256"
|
"crypto/sha256"
|
||||||
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
@ -30,6 +31,7 @@ import (
|
|||||||
"github.com/containerd/containerd/runtime/linux/runctypes"
|
"github.com/containerd/containerd/runtime/linux/runctypes"
|
||||||
"github.com/containerd/containerd/runtime/v1/shim"
|
"github.com/containerd/containerd/runtime/v1/shim"
|
||||||
"github.com/containerd/containerd/runtime/v1/shim/client"
|
"github.com/containerd/containerd/runtime/v1/shim/client"
|
||||||
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -48,7 +50,7 @@ func newBundle(id, path, workDir string, spec []byte) (b *bundle, err error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
path = filepath.Join(path, id)
|
path = filepath.Join(path, id)
|
||||||
if err := os.Mkdir(path, 0711); err != nil {
|
if err := os.Mkdir(path, 0700); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
defer func() {
|
defer func() {
|
||||||
@ -56,6 +58,9 @@ func newBundle(id, path, workDir string, spec []byte) (b *bundle, err error) {
|
|||||||
os.RemoveAll(path)
|
os.RemoveAll(path)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
if err := prepareBundleDirectoryPermissions(path, spec); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
workDir = filepath.Join(workDir, id)
|
workDir = filepath.Join(workDir, id)
|
||||||
if err := os.MkdirAll(workDir, 0711); err != nil {
|
if err := os.MkdirAll(workDir, 0711); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -77,6 +82,55 @@ func newBundle(id, path, workDir string, spec []byte) (b *bundle, err error) {
|
|||||||
}, err
|
}, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// prepareBundleDirectoryPermissions prepares the permissions of the bundle
|
||||||
|
// directory. When user namespaces are enabled, the permissions are modified
|
||||||
|
// to allow the remapped root GID to access the bundle.
|
||||||
|
func prepareBundleDirectoryPermissions(path string, spec []byte) error {
|
||||||
|
gid, err := remappedGID(spec)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if gid == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if err := os.Chown(path, -1, int(gid)); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return os.Chmod(path, 0710)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ociSpecUserNS is a subset of specs.Spec used to reduce garbage during
|
||||||
|
// unmarshal.
|
||||||
|
type ociSpecUserNS struct {
|
||||||
|
Linux *linuxSpecUserNS
|
||||||
|
}
|
||||||
|
|
||||||
|
// linuxSpecUserNS is a subset of specs.Linux used to reduce garbage during
|
||||||
|
// unmarshal.
|
||||||
|
type linuxSpecUserNS struct {
|
||||||
|
GIDMappings []specs.LinuxIDMapping
|
||||||
|
}
|
||||||
|
|
||||||
|
// remappedGID reads the remapped GID 0 from the OCI spec, if it exists. If
|
||||||
|
// there is no remapping, remappedGID returns 0. If the spec cannot be parsed,
|
||||||
|
// remappedGID returns an error.
|
||||||
|
func remappedGID(spec []byte) (uint32, error) {
|
||||||
|
var ociSpec ociSpecUserNS
|
||||||
|
err := json.Unmarshal(spec, &ociSpec)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
if ociSpec.Linux == nil || len(ociSpec.Linux.GIDMappings) == 0 {
|
||||||
|
return 0, nil
|
||||||
|
}
|
||||||
|
for _, mapping := range ociSpec.Linux.GIDMappings {
|
||||||
|
if mapping.ContainerID == 0 {
|
||||||
|
return mapping.HostID, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0, nil
|
||||||
|
}
|
||||||
|
|
||||||
type bundle struct {
|
type bundle struct {
|
||||||
id string
|
id string
|
||||||
path string
|
path string
|
||||||
|
145
runtime/v1/linux/bundle_test.go
Normal file
145
runtime/v1/linux/bundle_test.go
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
//go:build linux
|
||||||
|
// +build linux
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright The containerd Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package linux
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
|
"syscall"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/containerd/containerd/oci"
|
||||||
|
"github.com/containerd/continuity/testutil"
|
||||||
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestNewBundle(t *testing.T) {
|
||||||
|
testutil.RequiresRoot(t)
|
||||||
|
tests := []struct {
|
||||||
|
userns bool
|
||||||
|
}{{
|
||||||
|
userns: false,
|
||||||
|
}, {
|
||||||
|
userns: true,
|
||||||
|
}}
|
||||||
|
const usernsGID = 4200
|
||||||
|
|
||||||
|
for i, tc := range tests {
|
||||||
|
t.Run(strconv.Itoa(i), func(t *testing.T) {
|
||||||
|
dir, err := ioutil.TempDir("", "test-new-bundle")
|
||||||
|
require.NoError(t, err, "failed to create test directory")
|
||||||
|
defer os.RemoveAll(dir)
|
||||||
|
work := filepath.Join(dir, "work")
|
||||||
|
state := filepath.Join(dir, "state")
|
||||||
|
id := fmt.Sprintf("new-bundle-%d", i)
|
||||||
|
spec := oci.Spec{}
|
||||||
|
if tc.userns {
|
||||||
|
spec.Linux = &specs.Linux{
|
||||||
|
GIDMappings: []specs.LinuxIDMapping{{ContainerID: 0, HostID: usernsGID}},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
specBytes, err := json.Marshal(&spec)
|
||||||
|
require.NoError(t, err, "failed to marshal spec")
|
||||||
|
|
||||||
|
b, err := newBundle(id, work, state, specBytes)
|
||||||
|
require.NoError(t, err, "newBundle should succeed")
|
||||||
|
require.NotNil(t, b, "bundle should not be nil")
|
||||||
|
|
||||||
|
fi, err := os.Stat(b.path)
|
||||||
|
assert.NoError(t, err, "should be able to stat bundle path")
|
||||||
|
if tc.userns {
|
||||||
|
assert.Equal(t, os.ModeDir|0710, fi.Mode(), "bundle path should be a directory with perm 0710")
|
||||||
|
} else {
|
||||||
|
assert.Equal(t, os.ModeDir|0700, fi.Mode(), "bundle path should be a directory with perm 0700")
|
||||||
|
}
|
||||||
|
stat, ok := fi.Sys().(*syscall.Stat_t)
|
||||||
|
require.True(t, ok, "should assert to *syscall.Stat_t")
|
||||||
|
expectedGID := uint32(0)
|
||||||
|
if tc.userns {
|
||||||
|
expectedGID = usernsGID
|
||||||
|
}
|
||||||
|
assert.Equal(t, expectedGID, stat.Gid, "gid should match")
|
||||||
|
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRemappedGID(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
spec oci.Spec
|
||||||
|
gid uint32
|
||||||
|
}{{
|
||||||
|
// empty spec
|
||||||
|
spec: oci.Spec{},
|
||||||
|
gid: 0,
|
||||||
|
}, {
|
||||||
|
// empty Linux section
|
||||||
|
spec: oci.Spec{
|
||||||
|
Linux: &specs.Linux{},
|
||||||
|
},
|
||||||
|
gid: 0,
|
||||||
|
}, {
|
||||||
|
// empty ID mappings
|
||||||
|
spec: oci.Spec{
|
||||||
|
Linux: &specs.Linux{
|
||||||
|
GIDMappings: make([]specs.LinuxIDMapping, 0),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
gid: 0,
|
||||||
|
}, {
|
||||||
|
// valid ID mapping
|
||||||
|
spec: oci.Spec{
|
||||||
|
Linux: &specs.Linux{
|
||||||
|
GIDMappings: []specs.LinuxIDMapping{{
|
||||||
|
ContainerID: 0,
|
||||||
|
HostID: 1000,
|
||||||
|
}},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
gid: 1000,
|
||||||
|
}, {
|
||||||
|
// missing ID mapping
|
||||||
|
spec: oci.Spec{
|
||||||
|
Linux: &specs.Linux{
|
||||||
|
GIDMappings: []specs.LinuxIDMapping{{
|
||||||
|
ContainerID: 100,
|
||||||
|
HostID: 1000,
|
||||||
|
}},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
gid: 0,
|
||||||
|
}}
|
||||||
|
|
||||||
|
for i, tc := range tests {
|
||||||
|
t.Run(strconv.Itoa(i), func(t *testing.T) {
|
||||||
|
s, err := json.Marshal(tc.spec)
|
||||||
|
require.NoError(t, err, "failed to marshal spec")
|
||||||
|
gid, err := remappedGID(s)
|
||||||
|
assert.NoError(t, err, "should unmarshal successfully")
|
||||||
|
assert.Equal(t, tc.gid, gid, "expected GID to match")
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
@ -71,7 +71,10 @@ func NewBundle(ctx context.Context, root, state, id string, spec []byte) (b *Bun
|
|||||||
if err := os.MkdirAll(filepath.Dir(b.Path), 0711); err != nil {
|
if err := os.MkdirAll(filepath.Dir(b.Path), 0711); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if err := os.Mkdir(b.Path, 0711); err != nil {
|
if err := os.Mkdir(b.Path, 0700); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if err := prepareBundleDirectoryPermissions(b.Path, spec); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
paths = append(paths, b.Path)
|
paths = append(paths, b.Path)
|
||||||
|
24
runtime/v2/bundle_default.go
Normal file
24
runtime/v2/bundle_default.go
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
//go:build !linux
|
||||||
|
// +build !linux
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright The containerd Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v2
|
||||||
|
|
||||||
|
// prepareBundleDirectoryPermissions prepares the permissions of the bundle
|
||||||
|
// directory according to the needs of the current platform.
|
||||||
|
func prepareBundleDirectoryPermissions(path string, spec []byte) error { return nil }
|
74
runtime/v2/bundle_linux.go
Normal file
74
runtime/v2/bundle_linux.go
Normal file
@ -0,0 +1,74 @@
|
|||||||
|
/*
|
||||||
|
Copyright The containerd Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v2
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
|
)
|
||||||
|
|
||||||
|
// prepareBundleDirectoryPermissions prepares the permissions of the bundle
|
||||||
|
// directory according to the needs of the current platform.
|
||||||
|
// On Linux when user namespaces are enabled, the permissions are modified to
|
||||||
|
// allow the remapped root GID to access the bundle.
|
||||||
|
func prepareBundleDirectoryPermissions(path string, spec []byte) error {
|
||||||
|
gid, err := remappedGID(spec)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if gid == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if err := os.Chown(path, -1, int(gid)); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return os.Chmod(path, 0710)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ociSpecUserNS is a subset of specs.Spec used to reduce garbage during
|
||||||
|
// unmarshal.
|
||||||
|
type ociSpecUserNS struct {
|
||||||
|
Linux *linuxSpecUserNS
|
||||||
|
}
|
||||||
|
|
||||||
|
// linuxSpecUserNS is a subset of specs.Linux used to reduce garbage during
|
||||||
|
// unmarshal.
|
||||||
|
type linuxSpecUserNS struct {
|
||||||
|
GIDMappings []specs.LinuxIDMapping
|
||||||
|
}
|
||||||
|
|
||||||
|
// remappedGID reads the remapped GID 0 from the OCI spec, if it exists. If
|
||||||
|
// there is no remapping, remappedGID returns 0. If the spec cannot be parsed,
|
||||||
|
// remappedGID returns an error.
|
||||||
|
func remappedGID(spec []byte) (uint32, error) {
|
||||||
|
var ociSpec ociSpecUserNS
|
||||||
|
err := json.Unmarshal(spec, &ociSpec)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
if ociSpec.Linux == nil || len(ociSpec.Linux.GIDMappings) == 0 {
|
||||||
|
return 0, nil
|
||||||
|
}
|
||||||
|
for _, mapping := range ociSpec.Linux.GIDMappings {
|
||||||
|
if mapping.ContainerID == 0 {
|
||||||
|
return mapping.HostID, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0, nil
|
||||||
|
}
|
145
runtime/v2/bundle_linux_test.go
Normal file
145
runtime/v2/bundle_linux_test.go
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
/*
|
||||||
|
Copyright The containerd Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v2
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
|
"syscall"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/containerd/containerd/namespaces"
|
||||||
|
"github.com/containerd/containerd/oci"
|
||||||
|
"github.com/containerd/containerd/pkg/testutil"
|
||||||
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestNewBundle(t *testing.T) {
|
||||||
|
testutil.RequiresRoot(t)
|
||||||
|
tests := []struct {
|
||||||
|
userns bool
|
||||||
|
}{{
|
||||||
|
userns: false,
|
||||||
|
}, {
|
||||||
|
userns: true,
|
||||||
|
}}
|
||||||
|
const usernsGID = 4200
|
||||||
|
|
||||||
|
for i, tc := range tests {
|
||||||
|
t.Run(strconv.Itoa(i), func(t *testing.T) {
|
||||||
|
dir, err := ioutil.TempDir("", "test-new-bundle")
|
||||||
|
require.NoError(t, err, "failed to create test directory")
|
||||||
|
defer os.RemoveAll(dir)
|
||||||
|
work := filepath.Join(dir, "work")
|
||||||
|
state := filepath.Join(dir, "state")
|
||||||
|
id := fmt.Sprintf("new-bundle-%d", i)
|
||||||
|
spec := oci.Spec{}
|
||||||
|
if tc.userns {
|
||||||
|
spec.Linux = &specs.Linux{
|
||||||
|
GIDMappings: []specs.LinuxIDMapping{{ContainerID: 0, HostID: usernsGID}},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
specBytes, err := json.Marshal(&spec)
|
||||||
|
require.NoError(t, err, "failed to marshal spec")
|
||||||
|
|
||||||
|
ctx := namespaces.WithNamespace(context.TODO(), namespaces.Default)
|
||||||
|
b, err := NewBundle(ctx, work, state, id, specBytes)
|
||||||
|
require.NoError(t, err, "NewBundle should succeed")
|
||||||
|
require.NotNil(t, b, "bundle should not be nil")
|
||||||
|
|
||||||
|
fi, err := os.Stat(b.Path)
|
||||||
|
assert.NoError(t, err, "should be able to stat bundle path")
|
||||||
|
if tc.userns {
|
||||||
|
assert.Equal(t, os.ModeDir|0710, fi.Mode(), "bundle path should be a directory with perm 0710")
|
||||||
|
} else {
|
||||||
|
assert.Equal(t, os.ModeDir|0700, fi.Mode(), "bundle path should be a directory with perm 0700")
|
||||||
|
}
|
||||||
|
stat, ok := fi.Sys().(*syscall.Stat_t)
|
||||||
|
require.True(t, ok, "should assert to *syscall.Stat_t")
|
||||||
|
expectedGID := uint32(0)
|
||||||
|
if tc.userns {
|
||||||
|
expectedGID = usernsGID
|
||||||
|
}
|
||||||
|
assert.Equal(t, expectedGID, stat.Gid, "gid should match")
|
||||||
|
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRemappedGID(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
spec oci.Spec
|
||||||
|
gid uint32
|
||||||
|
}{{
|
||||||
|
// empty spec
|
||||||
|
spec: oci.Spec{},
|
||||||
|
gid: 0,
|
||||||
|
}, {
|
||||||
|
// empty Linux section
|
||||||
|
spec: oci.Spec{
|
||||||
|
Linux: &specs.Linux{},
|
||||||
|
},
|
||||||
|
gid: 0,
|
||||||
|
}, {
|
||||||
|
// empty ID mappings
|
||||||
|
spec: oci.Spec{
|
||||||
|
Linux: &specs.Linux{
|
||||||
|
GIDMappings: make([]specs.LinuxIDMapping, 0),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
gid: 0,
|
||||||
|
}, {
|
||||||
|
// valid ID mapping
|
||||||
|
spec: oci.Spec{
|
||||||
|
Linux: &specs.Linux{
|
||||||
|
GIDMappings: []specs.LinuxIDMapping{{
|
||||||
|
ContainerID: 0,
|
||||||
|
HostID: 1000,
|
||||||
|
}},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
gid: 1000,
|
||||||
|
}, {
|
||||||
|
// missing ID mapping
|
||||||
|
spec: oci.Spec{
|
||||||
|
Linux: &specs.Linux{
|
||||||
|
GIDMappings: []specs.LinuxIDMapping{{
|
||||||
|
ContainerID: 100,
|
||||||
|
HostID: 1000,
|
||||||
|
}},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
gid: 0,
|
||||||
|
}}
|
||||||
|
|
||||||
|
for i, tc := range tests {
|
||||||
|
t.Run(strconv.Itoa(i), func(t *testing.T) {
|
||||||
|
s, err := json.Marshal(tc.spec)
|
||||||
|
require.NoError(t, err, "failed to marshal spec")
|
||||||
|
gid, err := remappedGID(s)
|
||||||
|
assert.NoError(t, err, "should unmarshal successfully")
|
||||||
|
assert.Equal(t, tc.gid, gid, "expected GID to match")
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
23
runtime/v2/bundle_test.go
Normal file
23
runtime/v2/bundle_test.go
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
/*
|
||||||
|
Copyright The containerd Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v2
|
||||||
|
|
||||||
|
import (
|
||||||
|
// When testutil is imported for one platform (bundle_linux_test.go) it
|
||||||
|
// should be imported for all platforms.
|
||||||
|
_ "github.com/containerd/containerd/pkg/testutil"
|
||||||
|
)
|
@ -51,11 +51,15 @@ type snapshotter struct {
|
|||||||
// root needs to be a mount point of btrfs.
|
// root needs to be a mount point of btrfs.
|
||||||
func NewSnapshotter(root string) (snapshots.Snapshotter, error) {
|
func NewSnapshotter(root string) (snapshots.Snapshotter, error) {
|
||||||
// If directory does not exist, create it
|
// If directory does not exist, create it
|
||||||
if _, err := os.Stat(root); err != nil {
|
if st, err := os.Stat(root); err != nil {
|
||||||
if !os.IsNotExist(err) {
|
if !os.IsNotExist(err) {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if err := os.Mkdir(root, 0755); err != nil {
|
if err := os.Mkdir(root, 0700); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
} else if st.Mode()&os.ModePerm != 0700 {
|
||||||
|
if err := os.Chmod(root, 0700); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user