148 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			148 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| //go:build !windows
 | |
| 
 | |
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package client
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"syscall"
 | |
| 
 | |
| 	"github.com/containerd/containerd/v2/core/containers"
 | |
| 	"github.com/containerd/containerd/v2/core/mount"
 | |
| 	"github.com/containerd/containerd/v2/internal/userns"
 | |
| 
 | |
| 	"github.com/containerd/errdefs"
 | |
| 	"github.com/opencontainers/image-spec/identity"
 | |
| 	"github.com/opencontainers/runtime-spec/specs-go"
 | |
| )
 | |
| 
 | |
| // WithRemappedSnapshot creates a new snapshot and remaps the uid/gid for the
 | |
| // filesystem to be used by a container with user namespaces
 | |
| func WithRemappedSnapshot(id string, i Image, uid, gid uint32) NewContainerOpts {
 | |
| 	uidmaps := []specs.LinuxIDMapping{{ContainerID: 0, HostID: uid, Size: 65536}}
 | |
| 	gidmaps := []specs.LinuxIDMapping{{ContainerID: 0, HostID: gid, Size: 65536}}
 | |
| 	return withRemappedSnapshotBase(id, i, uidmaps, gidmaps, false)
 | |
| }
 | |
| 
 | |
| // WithUserNSRemappedSnapshot creates a new snapshot and remaps the uid/gid for the
 | |
| // filesystem to be used by a container with user namespaces
 | |
| func WithUserNSRemappedSnapshot(id string, i Image, uidmaps, gidmaps []specs.LinuxIDMapping) NewContainerOpts {
 | |
| 	return withRemappedSnapshotBase(id, i, uidmaps, gidmaps, false)
 | |
| }
 | |
| 
 | |
| // WithRemappedSnapshotView is similar to WithRemappedSnapshot but rootfs is mounted as read-only.
 | |
| func WithRemappedSnapshotView(id string, i Image, uid, gid uint32) NewContainerOpts {
 | |
| 	uidmaps := []specs.LinuxIDMapping{{ContainerID: 0, HostID: uid, Size: 65536}}
 | |
| 	gidmaps := []specs.LinuxIDMapping{{ContainerID: 0, HostID: gid, Size: 65536}}
 | |
| 	return withRemappedSnapshotBase(id, i, uidmaps, gidmaps, true)
 | |
| }
 | |
| 
 | |
| // WithUserNSRemappedSnapshotView is similar to WithUserNSRemappedSnapshot but rootfs is mounted as read-only.
 | |
| func WithUserNSRemappedSnapshotView(id string, i Image, uidmaps, gidmaps []specs.LinuxIDMapping) NewContainerOpts {
 | |
| 	return withRemappedSnapshotBase(id, i, uidmaps, gidmaps, true)
 | |
| }
 | |
| 
 | |
| func withRemappedSnapshotBase(id string, i Image, uidmaps, gidmaps []specs.LinuxIDMapping, readonly bool) NewContainerOpts {
 | |
| 	return func(ctx context.Context, client *Client, c *containers.Container) error {
 | |
| 		diffIDs, err := i.(*image).i.RootFS(ctx, client.ContentStore(), client.platform)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		rsn := remappedSnapshot{
 | |
| 			Parent: identity.ChainID(diffIDs).String(),
 | |
| 			IDMap:  userns.IDMap{UidMap: uidmaps, GidMap: gidmaps},
 | |
| 		}
 | |
| 		usernsID, err := rsn.ID()
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("failed to remap snapshot: %w", err)
 | |
| 		}
 | |
| 
 | |
| 		c.Snapshotter, err = client.resolveSnapshotterName(ctx, c.Snapshotter)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		snapshotter, err := client.getSnapshotter(ctx, c.Snapshotter)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if _, err := snapshotter.Stat(ctx, usernsID); err == nil {
 | |
| 			if _, err := snapshotter.Prepare(ctx, id, usernsID); err == nil {
 | |
| 				c.SnapshotKey = id
 | |
| 				c.Image = i.Name()
 | |
| 				return nil
 | |
| 			} else if !errdefs.IsNotFound(err) {
 | |
| 				return err
 | |
| 			}
 | |
| 		}
 | |
| 		mounts, err := snapshotter.Prepare(ctx, usernsID+"-remap", rsn.Parent)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if err := remapRootFS(ctx, mounts, rsn.IDMap); err != nil {
 | |
| 			snapshotter.Remove(ctx, usernsID)
 | |
| 			return err
 | |
| 		}
 | |
| 		if err := snapshotter.Commit(ctx, usernsID, usernsID+"-remap"); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if readonly {
 | |
| 			_, err = snapshotter.View(ctx, id, usernsID)
 | |
| 		} else {
 | |
| 			_, err = snapshotter.Prepare(ctx, id, usernsID)
 | |
| 		}
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		c.SnapshotKey = id
 | |
| 		c.Image = i.Name()
 | |
| 		return nil
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func remapRootFS(ctx context.Context, mounts []mount.Mount, idMap userns.IDMap) error {
 | |
| 	return mount.WithTempMount(ctx, mounts, func(root string) error {
 | |
| 		return filepath.Walk(root, chown(root, idMap))
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func chown(root string, idMap userns.IDMap) filepath.WalkFunc {
 | |
| 	return func(path string, info os.FileInfo, err error) error {
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		stat := info.Sys().(*syscall.Stat_t)
 | |
| 		h, cerr := idMap.ToHost(userns.User{Uid: stat.Uid, Gid: stat.Gid})
 | |
| 		if cerr != nil {
 | |
| 			return cerr
 | |
| 		}
 | |
| 		// be sure the lchown the path as to not de-reference the symlink to a host file
 | |
| 		if cerr = os.Lchown(path, int(h.Uid), int(h.Gid)); cerr != nil {
 | |
| 			return cerr
 | |
| 		}
 | |
| 		// we must retain special permissions such as setuid, setgid and sticky bits
 | |
| 		if mode := info.Mode(); mode&os.ModeSymlink == 0 && mode&(os.ModeSetuid|os.ModeSetgid|os.ModeSticky) != 0 {
 | |
| 			return os.Chmod(path, mode)
 | |
| 		}
 | |
| 		return nil
 | |
| 	}
 | |
| }
 | 
