 23170e20df
			
		
	
	23170e20df
	
	
	
		
			
			This functionality is not directly related to containerd and could move to external package at some point. Signed-off-by: Derek McGowan <derek@mcg.dev>
		
			
				
	
	
		
			237 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			237 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| //go:build linux
 | |
| 
 | |
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package fsverity
 | |
| 
 | |
| import (
 | |
| 	"bufio"
 | |
| 	"encoding/binary"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"strings"
 | |
| 	"syscall"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/containerd/containerd/v2/pkg/testutil"
 | |
| )
 | |
| 
 | |
| type superblockROFeatures struct {
 | |
| 	_        [100]byte
 | |
| 	Features uint32
 | |
| }
 | |
| 
 | |
| func TestEnable(t *testing.T) {
 | |
| 
 | |
| 	testutil.RequiresRoot(t)
 | |
| 
 | |
| 	rootDir := filepath.Join(t.TempDir(), "content")
 | |
| 	err := os.Mkdir(rootDir, 0755)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("could not create temporary directory: %s", err.Error())
 | |
| 	}
 | |
| 
 | |
| 	device, err := resolveDevicePath(rootDir)
 | |
| 	if err != nil {
 | |
| 		t.Skipf("invalid device: %s", err.Error())
 | |
| 	}
 | |
| 
 | |
| 	var expected bool
 | |
| 	enabled, err := ext4IsVerity(device)
 | |
| 	if !enabled || err != nil {
 | |
| 		t.Logf("fsverity not enabled on ext4 file system: %s", err.Error())
 | |
| 		expected = false
 | |
| 	} else {
 | |
| 		t.Logf("fsverity enabled on ext4 file system")
 | |
| 		expected = true
 | |
| 	}
 | |
| 
 | |
| 	verityFile := filepath.Join(rootDir, "fsverityFile")
 | |
| 	f, err := os.Create(verityFile)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("could not create fsverity test file: %s", err.Error())
 | |
| 	}
 | |
| 
 | |
| 	err = f.Close()
 | |
| 	if err != nil {
 | |
| 		t.Errorf("error closing fsverity test file: %s", err.Error())
 | |
| 	}
 | |
| 
 | |
| 	defer func() {
 | |
| 		err := os.Remove(verityFile)
 | |
| 		if err != nil {
 | |
| 			t.Logf("error removing fsverity test file: %s", err.Error())
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	err = Enable(verityFile)
 | |
| 	if err != nil && expected {
 | |
| 		t.Errorf("fsverity Enable failed: %s", err.Error())
 | |
| 	}
 | |
| 	if err == nil && !expected {
 | |
| 		t.Errorf("fsverity Enable succeeded, expected Enable to fail")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestIsEnabled(t *testing.T) {
 | |
| 
 | |
| 	testDir := filepath.Join(t.TempDir(), "content")
 | |
| 	err := os.Mkdir(testDir, 0755)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("could not create temporary directory: %s", err.Error())
 | |
| 	}
 | |
| 
 | |
| 	if supported, err := IsSupported(testDir); !supported || err != nil {
 | |
| 		t.Skipf("fsverity is not supported")
 | |
| 	}
 | |
| 
 | |
| 	verityFile := filepath.Join(testDir, "fsverityFile")
 | |
| 	f, err := os.Create(verityFile)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("could not create fsverity test file: %s", err.Error())
 | |
| 	}
 | |
| 
 | |
| 	err = f.Close()
 | |
| 	if err != nil {
 | |
| 		t.Errorf("error closing fsverity test file: %s", err.Error())
 | |
| 	}
 | |
| 
 | |
| 	defer func() {
 | |
| 		err := os.Remove(verityFile)
 | |
| 		if err != nil {
 | |
| 			t.Logf("error removing fsverity test file: %s", err.Error())
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	err = Enable(verityFile)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("fsverity Enable failed: %s", err.Error())
 | |
| 	}
 | |
| 
 | |
| 	if enabled, err := IsEnabled(verityFile); !enabled || err != nil {
 | |
| 		t.Errorf("expected fsverity to be enabled on file, received enabled: %t; error: %s", enabled, err.Error())
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func resolveDevicePath(path string) (_ string, e error) {
 | |
| 	var devicePath string
 | |
| 
 | |
| 	s, err := os.Stat(path)
 | |
| 	if err != nil {
 | |
| 		return devicePath, err
 | |
| 	}
 | |
| 
 | |
| 	sys := s.Sys()
 | |
| 	stat, ok := sys.(*syscall.Stat_t)
 | |
| 	if !ok {
 | |
| 		return devicePath, fmt.Errorf("type assert to syscall.Stat_t failed")
 | |
| 	}
 | |
| 
 | |
| 	// resolve to device path
 | |
| 	maj := (stat.Dev >> 8) & 0xff
 | |
| 	min := stat.Dev & 0xff
 | |
| 
 | |
| 	m, err := os.Open("/proc/self/mountinfo")
 | |
| 	if err != nil {
 | |
| 		return devicePath, err
 | |
| 	}
 | |
| 
 | |
| 	defer func() {
 | |
| 		err := m.Close()
 | |
| 		if err != nil {
 | |
| 			e = fmt.Errorf("could not close mountinfo: %v", err)
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	// scan for major:minor id and get the device path
 | |
| 	scanner := bufio.NewScanner(m)
 | |
| 
 | |
| 	var entry string
 | |
| 	sub := fmt.Sprintf("%d:%d", maj, min)
 | |
| 	for scanner.Scan() {
 | |
| 		if strings.Contains(scanner.Text(), sub) {
 | |
| 			entry = scanner.Text()
 | |
| 			break
 | |
| 		}
 | |
| 	}
 | |
| 	if entry == "" {
 | |
| 		return devicePath, fmt.Errorf("device mount not found for device id %s", sub)
 | |
| 	}
 | |
| 
 | |
| 	entryReader := strings.NewReader(entry)
 | |
| 	extScan := bufio.NewScanner(entryReader)
 | |
| 	extScan.Split(bufio.ScanWords)
 | |
| 
 | |
| 	var word string
 | |
| 	for (word != "-") && extScan.Scan() {
 | |
| 		word = extScan.Text()
 | |
| 	}
 | |
| 
 | |
| 	if !extScan.Scan() {
 | |
| 		return devicePath, fmt.Errorf("scanning mounts failed: %w", extScan.Err())
 | |
| 	}
 | |
| 	fs := extScan.Text()
 | |
| 
 | |
| 	if fs != "ext4" {
 | |
| 		return devicePath, fmt.Errorf("not an ext4 file system, skipping device")
 | |
| 	}
 | |
| 
 | |
| 	if !extScan.Scan() {
 | |
| 		return devicePath, fmt.Errorf("scanning mounts failed: %w", extScan.Err())
 | |
| 	}
 | |
| 	devicePath = extScan.Text()
 | |
| 
 | |
| 	return devicePath, nil
 | |
| }
 | |
| 
 | |
| func ext4IsVerity(fpath string) (bool, error) {
 | |
| 	b := superblockROFeatures{}
 | |
| 
 | |
| 	r, err := os.Open(fpath)
 | |
| 	if err != nil {
 | |
| 		return false, err
 | |
| 	}
 | |
| 
 | |
| 	defer func() {
 | |
| 		err := r.Close()
 | |
| 		if err != nil {
 | |
| 			fmt.Printf("failed to close %s: %s\n", fpath, err.Error())
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	// seek to superblock
 | |
| 	_, err = r.Seek(1024, 0)
 | |
| 	if err != nil {
 | |
| 		return false, err
 | |
| 	}
 | |
| 
 | |
| 	err = binary.Read(r, binary.LittleEndian, &b)
 | |
| 	if err != nil {
 | |
| 		return false, err
 | |
| 	}
 | |
| 
 | |
| 	// extract fsverity flag
 | |
| 	var verityMask uint32 = 0x8000
 | |
| 	res := verityMask & b.Features
 | |
| 	if res > 0 {
 | |
| 		return true, nil
 | |
| 	}
 | |
| 
 | |
| 	return false, fmt.Errorf("fsverity not enabled on ext4 file system %s", fpath)
 | |
| }
 |