Commit 8437c567d8 migrated the use of the
userns package to the github.com/moby/sys/user module.
After further discussion with maintainers, it was decided to move the
userns package to a separate module, as it has no direct relation with
"user" operations (other than having "user" in its name).
This patch migrates our code to use the new module.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
		
	
		
			
				
	
	
		
			186 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			186 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
//go:build !windows
 | 
						|
 | 
						|
/*
 | 
						|
   Copyright The containerd Authors.
 | 
						|
 | 
						|
   Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
   you may not use this file except in compliance with the License.
 | 
						|
   You may obtain a copy of the License at
 | 
						|
 | 
						|
       http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
   Unless required by applicable law or agreed to in writing, software
 | 
						|
   distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
   See the License for the specific language governing permissions and
 | 
						|
   limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package oci
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"os"
 | 
						|
	"path/filepath"
 | 
						|
 | 
						|
	"github.com/moby/sys/userns"
 | 
						|
	specs "github.com/opencontainers/runtime-spec/specs-go"
 | 
						|
	"golang.org/x/sys/unix"
 | 
						|
)
 | 
						|
 | 
						|
// ErrNotADevice denotes that a file is not a valid linux device.
 | 
						|
// When checking this error, use errors.Is(err, oci.ErrNotADevice)
 | 
						|
var ErrNotADevice = errors.New("not a device node")
 | 
						|
 | 
						|
// Testing dependencies
 | 
						|
var (
 | 
						|
	osReadDir              = os.ReadDir
 | 
						|
	usernsRunningInUserNS  = userns.RunningInUserNS
 | 
						|
	overrideDeviceFromPath func(path string) error
 | 
						|
)
 | 
						|
 | 
						|
// HostDevices returns all devices that can be found under /dev directory.
 | 
						|
func HostDevices() ([]specs.LinuxDevice, error) {
 | 
						|
	return getDevices("/dev", "")
 | 
						|
}
 | 
						|
 | 
						|
func getDevices(path, containerPath string) ([]specs.LinuxDevice, error) {
 | 
						|
	stat, err := os.Stat(path)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("error stating device path: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if !stat.IsDir() {
 | 
						|
		dev, err := DeviceFromPath(path)
 | 
						|
		if err != nil {
 | 
						|
			// wrap error with detailed path and container path when it is ErrNotADevice
 | 
						|
			if err == ErrNotADevice {
 | 
						|
				return nil, fmt.Errorf("get device path: %q containerPath: %q error: %w", path, containerPath, err)
 | 
						|
			}
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		if containerPath != "" {
 | 
						|
			dev.Path = containerPath
 | 
						|
		}
 | 
						|
		return []specs.LinuxDevice{*dev}, nil
 | 
						|
	}
 | 
						|
 | 
						|
	files, err := osReadDir(path)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	var out []specs.LinuxDevice
 | 
						|
	for _, f := range files {
 | 
						|
		switch {
 | 
						|
		case f.IsDir():
 | 
						|
			switch f.Name() {
 | 
						|
			// ".lxc" & ".lxd-mounts" added to address https://github.com/lxc/lxd/issues/2825
 | 
						|
			// ".udev" added to address https://github.com/opencontainers/runc/issues/2093
 | 
						|
			case "pts", "shm", "fd", "mqueue", ".lxc", ".lxd-mounts", ".udev":
 | 
						|
				continue
 | 
						|
			default:
 | 
						|
				var cp string
 | 
						|
				if containerPath != "" {
 | 
						|
					cp = filepath.Join(containerPath, filepath.Base(f.Name()))
 | 
						|
				}
 | 
						|
				sub, err := getDevices(filepath.Join(path, f.Name()), cp)
 | 
						|
				if err != nil {
 | 
						|
					if errors.Is(err, os.ErrPermission) && usernsRunningInUserNS() {
 | 
						|
						// ignore the "permission denied" error if running in userns.
 | 
						|
						// This allows rootless containers to use devices that are
 | 
						|
						// accessible, ignoring devices / subdirectories that are not.
 | 
						|
						continue
 | 
						|
					}
 | 
						|
					return nil, err
 | 
						|
				}
 | 
						|
 | 
						|
				out = append(out, sub...)
 | 
						|
				continue
 | 
						|
			}
 | 
						|
		case f.Name() == "console":
 | 
						|
			continue
 | 
						|
		default:
 | 
						|
			device, err := DeviceFromPath(filepath.Join(path, f.Name()))
 | 
						|
			if err != nil {
 | 
						|
				if err == ErrNotADevice {
 | 
						|
					continue
 | 
						|
				}
 | 
						|
				if os.IsNotExist(err) {
 | 
						|
					continue
 | 
						|
				}
 | 
						|
				if errors.Is(err, os.ErrPermission) && usernsRunningInUserNS() {
 | 
						|
					// ignore the "permission denied" error if running in userns.
 | 
						|
					// This allows rootless containers to use devices that are
 | 
						|
					// accessible, ignoring devices that are not.
 | 
						|
					continue
 | 
						|
				}
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
			if device.Type == fifoDevice {
 | 
						|
				continue
 | 
						|
			}
 | 
						|
			if containerPath != "" {
 | 
						|
				device.Path = filepath.Join(containerPath, filepath.Base(f.Name()))
 | 
						|
			}
 | 
						|
			out = append(out, *device)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return out, nil
 | 
						|
}
 | 
						|
 | 
						|
// TODO consider adding these consts to the OCI runtime-spec.
 | 
						|
const (
 | 
						|
	wildcardDevice = "a" //nolint:nolintlint,unused,varcheck // currently unused, but should be included when upstreaming to OCI runtime-spec.
 | 
						|
	blockDevice    = "b"
 | 
						|
	charDevice     = "c" // or "u"
 | 
						|
	fifoDevice     = "p"
 | 
						|
)
 | 
						|
 | 
						|
// DeviceFromPath takes the path to a device to look up the information about a
 | 
						|
// linux device and returns that information as a LinuxDevice struct.
 | 
						|
func DeviceFromPath(path string) (*specs.LinuxDevice, error) {
 | 
						|
	if overrideDeviceFromPath != nil {
 | 
						|
		if err := overrideDeviceFromPath(path); err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var stat unix.Stat_t
 | 
						|
	if err := unix.Lstat(path, &stat); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	var (
 | 
						|
		devNumber = uint64(stat.Rdev) //nolint:nolintlint,unconvert // the type is 32bit on mips.
 | 
						|
		major     = unix.Major(devNumber)
 | 
						|
		minor     = unix.Minor(devNumber)
 | 
						|
	)
 | 
						|
 | 
						|
	var (
 | 
						|
		devType string
 | 
						|
		mode    = stat.Mode
 | 
						|
	)
 | 
						|
 | 
						|
	switch mode & unix.S_IFMT {
 | 
						|
	case unix.S_IFBLK:
 | 
						|
		devType = blockDevice
 | 
						|
	case unix.S_IFCHR:
 | 
						|
		devType = charDevice
 | 
						|
	case unix.S_IFIFO:
 | 
						|
		devType = fifoDevice
 | 
						|
	default:
 | 
						|
		return nil, ErrNotADevice
 | 
						|
	}
 | 
						|
	fm := os.FileMode(mode &^ unix.S_IFMT)
 | 
						|
	return &specs.LinuxDevice{
 | 
						|
		Type:     devType,
 | 
						|
		Path:     path,
 | 
						|
		Major:    int64(major),
 | 
						|
		Minor:    int64(minor),
 | 
						|
		FileMode: &fm,
 | 
						|
		UID:      &stat.Uid,
 | 
						|
		GID:      &stat.Gid,
 | 
						|
	}, nil
 | 
						|
}
 |