func setupRootfs(fsys *fs.Filesystem) error { if err := os.MkdirAll(fsys.Root(), 0755); err != nil { return fmt.Errorf("could not create rootfs path '%s': %v", fsys.Root(), err) } if err := syscall.Mount("", "/", "", syscall.MS_PRIVATE|syscall.MS_REC, ""); err != nil { return fmt.Errorf("failed to set MS_PRIVATE on '%s': %v", "/", err) } flags := uintptr(syscall.MS_NOSUID | syscall.MS_NOEXEC | syscall.MS_NODEV) if err := syscall.Mount("", fsys.Root(), "tmpfs", flags, "mode=755,gid=0"); err != nil { return fmt.Errorf("failed to mount tmpfs on '%s': %v", fsys.Root(), err) } if err := syscall.Mount("", fsys.Root(), "", syscall.MS_PRIVATE, ""); err != nil { return fmt.Errorf("failed to set MS_PRIVATE on '%s': %v", fsys.Root(), err) } for _, p := range basicBindDirs { if err := fsys.BindPath(p, fs.BindReadOnly, nil); err != nil { return fmt.Errorf("failed to bind directory '%s': %v", p, err) } } for _, p := range basicEmptyDirs { if err := fsys.CreateEmptyDir(p); err != nil { return fmt.Errorf("failed to create empty directory '%s': %v", p, err) } } dp := path.Join(fsys.Root(), "dev") if err := syscall.Mount("", dp, "tmpfs", syscall.MS_NOSUID|syscall.MS_NOEXEC, "mode=755"); err != nil { return err } for _, d := range basicDevices { if err := fsys.CreateDevice(d.path, d.dev, d.mode); err != nil { return err } } for _, sl := range append(basicSymlinks, deviceSymlinks...) { if err := fsys.CreateSymlink(sl[0], sl[1]); err != nil { return err } } if err := fsys.CreateBlacklistPaths(); err != nil { return err } for _, bl := range basicBlacklist { if err := fsys.BlacklistPath(bl, nil); err != nil { return err } } return nil }
func mount(fpath string, fsys *fs.Filesystem, log *logging.Logger) { if _, err := os.Stat(fpath); err == nil { //log.Notice("Adding file `%s`.", fpath) if err := fsys.BindPath(fpath, fs.BindCanCreate, nil); err != nil { log.Error("%v while adding `%s`!", err, fpath) os.Exit(1) } } }
func (st *initState) bindWhitelist(fsys *fs.Filesystem, wlist []oz.WhitelistItem) error { if wlist == nil { return nil } for _, wl := range wlist { flags := fs.BindCanCreate if wl.ReadOnly { flags |= fs.BindReadOnly } if err := fsys.BindPath(wl.Path, flags, st.user); err != nil { return err } } return nil }
func mount(fpath string, readonly bool, fsys *fs.Filesystem, log *logging.Logger) { //log.Notice("Adding file `%s`.", fpath) // TODO: Check if target is empty directory (and not a mountpoint) and allow the bind in that case if _, err := os.Stat(fpath); err != nil { log.Error("%v", err) os.Exit(1) } flags := 0 //fs.BindCanCreate if readonly { flags |= fs.BindReadOnly } if err := fsys.BindPath(fpath, flags, -1, nil); err != nil { log.Error("%v", err) os.Exit(1) } }
func setupRootfs(fsys *fs.Filesystem, uid, gid uint32, useFullDev bool) error { if err := os.MkdirAll(fsys.Root(), 0755); err != nil { return fmt.Errorf("could not create rootfs path '%s': %v", fsys.Root(), err) } if err := syscall.Mount("", "/", "", syscall.MS_PRIVATE|syscall.MS_REC, ""); err != nil { return fmt.Errorf("failed to set MS_PRIVATE on '%s': %v", "/", err) } flags := uintptr(syscall.MS_NOSUID | syscall.MS_NOEXEC | syscall.MS_NODEV) if err := syscall.Mount("", fsys.Root(), "tmpfs", flags, "mode=755,gid=0"); err != nil { return fmt.Errorf("failed to mount tmpfs on '%s': %v", fsys.Root(), err) } if err := syscall.Mount("", fsys.Root(), "", syscall.MS_PRIVATE, ""); err != nil { return fmt.Errorf("failed to set MS_PRIVATE on '%s': %v", fsys.Root(), err) } for _, p := range basicBindDirs { if err := fsys.BindPath(p, fs.BindReadOnly, nil); err != nil { return fmt.Errorf("failed to bind directory '%s': %v", p, err) } } for _, p := range basicEmptyDirs { if err := fsys.CreateEmptyDir(p); err != nil { return fmt.Errorf("failed to create empty directory '%s': %v", p, err) } } rup := path.Join(fsys.Root(), "/run/user", strconv.FormatUint(uint64(uid), 10)) if err := os.MkdirAll(rup, 0700); err != nil { return fmt.Errorf("failed to create user rundir: %v", err) } if err := os.Chown(rup, int(uid), int(gid)); err != nil { return fmt.Errorf("failed to chiwn user rundir: %v", err) } dp := path.Join(fsys.Root(), "dev") if err := syscall.Mount("", dp, "tmpfs", syscall.MS_NOSUID|syscall.MS_NOEXEC, "mode=755"); err != nil { return err } if !useFullDev { for _, d := range basicDevices { if err := fsys.CreateDevice(d.path, d.dev, d.mode, d.gid); err != nil { return err } } } tp := path.Join(fsys.Root(), "/tmp") tflags := uintptr(syscall.MS_NODEV | syscall.MS_NOSUID | syscall.MS_NOEXEC | syscall.MS_REC) if err := syscall.Mount("", tp, "tmpfs", tflags, "mode=777"); err != nil { return err } for _, sl := range append(basicSymlinks, deviceSymlinks...) { if err := fsys.CreateSymlink(sl[0], sl[1]); err != nil { return err } } if err := fsys.CreateBlacklistPaths(); err != nil { return err } for _, bl := range basicBlacklist { if err := fsys.BlacklistPath(bl, nil); err != nil { return err } } return nil }