user namespaces
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing

This commit is contained in:
Jake Hillion 2022-04-28 16:04:31 +01:00
parent a6bf4871f4
commit 5e7eba5f61
2 changed files with 52 additions and 16 deletions

View File

@ -10,7 +10,7 @@ To run this example:
cargo build
cargo build --example basic
sudo target/debug/clone-shim -s examples/basic/spec.json target/debug/examples/basic
target/debug/clone-shim -s examples/basic/spec.json target/debug/examples/basic
### examples/pipes
@ -20,7 +20,7 @@ To run this example:
cargo build
cargo build --example pipes
sudo target/debug/clone-shim -s examples/pipes/spec.json target/debug/examples/pipes
target/debug/clone-shim -s examples/pipes/spec.json target/debug/examples/pipes
## Debugging the shim

View File

@ -4,15 +4,16 @@ use crate::clone::{clone3, CloneArgs, CloneFlags};
use crate::{Error, Result};
use std::collections::{HashMap, HashSet};
use std::os::unix::io::{AsRawFd, RawFd};
use std::fmt;
use std::fs;
use std::io::Write;
use std::os::unix::io::{AsRawFd, IntoRawFd, RawFd};
use std::path::{Path, PathBuf};
use std::{fmt, fs};
use nix::fcntl::{FcntlArg, FdFlag};
use nix::mount::{mount, umount2, MntFlags, MsFlags};
use nix::sched::unshare;
use nix::sys::signal::{signal, SigHandler, Signal};
use nix::unistd::{pivot_root, Pid};
use nix::unistd::{close, getgid, getuid, pivot_root, Gid, Pid, Uid};
use close_fds::CloseFdsBuilder;
@ -56,10 +57,14 @@ impl VoidBuilder {
| CloneFlags::CLONE_NEWNET
| CloneFlags::CLONE_NEWNS
| CloneFlags::CLONE_NEWPID
| CloneFlags::CLONE_NEWUSER
| CloneFlags::CLONE_NEWUTS,
);
args.exit_signal = Some(Signal::SIGCHLD);
let parent_uid = getuid();
let parent_gid = getgid();
let child = clone3(args).map_err(|e| Error::Nix {
msg: "clone3",
src: e,
@ -74,9 +79,9 @@ impl VoidBuilder {
})?;
let result = {
self.void_user_namespace(parent_uid, parent_gid)?; // first to regain full capabilities
self.void_files()?;
self.void_mount_namespace()?;
self.void_user_namespace()?; // last to maintain permissions
Ok::<(), Error>(())
};
@ -101,6 +106,46 @@ impl VoidBuilder {
Ok(VoidHandle { pid: child })
}
fn void_user_namespace(&self, parent_uid: Uid, parent_gid: Gid) -> Result<()> {
debug!("mapping root uid to {} in the parent", parent_uid);
let mut uid_map = fs::OpenOptions::new()
.read(false)
.write(true)
.open("/proc/self/uid_map")?;
uid_map.write_all(format!("0 {} 1\n", parent_uid).as_ref())?;
close(uid_map.into_raw_fd()).map_err(|e| Error::Nix {
msg: "close",
src: e,
})?;
debug!("writing deny to setgroups");
let mut setgroups = fs::OpenOptions::new()
.read(false)
.write(true)
.open("/proc/self/setgroups")?;
setgroups.write_all("deny\n".as_bytes())?;
close(setgroups.into_raw_fd()).map_err(|e| Error::Nix {
msg: "close",
src: e,
})?;
debug!("mapping root gid to {} in the parent", parent_gid);
let mut gid_map = fs::OpenOptions::new()
.read(false)
.write(true)
.open("/proc/self/gid_map")?;
gid_map.write_all(format!("0 {} 1\n", parent_gid).as_ref())?;
close(gid_map.into_raw_fd()).map_err(|e| Error::Nix {
msg: "close",
src: e,
})?;
Ok(())
}
// per-namespace void creation
fn void_files(&self) -> Result<()> {
let mut closer = CloseFdsBuilder::new();
@ -243,13 +288,4 @@ impl VoidBuilder {
Ok(())
}
fn void_user_namespace(&self) -> Result<()> {
unshare(CloneFlags::CLONE_NEWUSER).map_err(|e| Error::Nix {
msg: "unshare",
src: e,
})?;
Ok(())
}
}