2015-02-07 04:48:57 +08:00
|
|
|
package validate
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2015-02-19 15:14:01 +08:00
|
|
|
"os"
|
2015-02-07 04:48:57 +08:00
|
|
|
"path/filepath"
|
2015-09-26 01:47:31 +08:00
|
|
|
"strings"
|
2015-02-07 04:48:57 +08:00
|
|
|
|
2015-06-22 10:29:59 +08:00
|
|
|
"github.com/opencontainers/runc/libcontainer/configs"
|
2016-03-22 22:20:16 +08:00
|
|
|
"github.com/opencontainers/runc/libcontainer/selinux"
|
2015-02-07 04:48:57 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
type Validator interface {
|
|
|
|
Validate(*configs.Config) error
|
|
|
|
}
|
|
|
|
|
|
|
|
func New() Validator {
|
|
|
|
return &ConfigValidator{}
|
|
|
|
}
|
|
|
|
|
|
|
|
type ConfigValidator struct {
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *ConfigValidator) Validate(config *configs.Config) error {
|
|
|
|
if err := v.rootfs(config); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.network(config); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.hostname(config); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.security(config); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-02-19 15:14:01 +08:00
|
|
|
if err := v.usernamespace(config); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-09-26 01:47:31 +08:00
|
|
|
if err := v.sysctl(config); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-02-07 04:48:57 +08:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-04-02 22:14:46 +08:00
|
|
|
// rootfs validates if the rootfs is an absolute path and is not a symlink
|
2015-02-07 04:48:57 +08:00
|
|
|
// to the container's root filesystem.
|
|
|
|
func (v *ConfigValidator) rootfs(config *configs.Config) error {
|
|
|
|
cleaned, err := filepath.Abs(config.Rootfs)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if cleaned, err = filepath.EvalSymlinks(cleaned); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-04-09 07:25:04 +08:00
|
|
|
if filepath.Clean(config.Rootfs) != cleaned {
|
2015-02-07 04:48:57 +08:00
|
|
|
return fmt.Errorf("%s is not an absolute path or is a symlink", config.Rootfs)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *ConfigValidator) network(config *configs.Config) error {
|
|
|
|
if !config.Namespaces.Contains(configs.NEWNET) {
|
|
|
|
if len(config.Networks) > 0 || len(config.Routes) > 0 {
|
|
|
|
return fmt.Errorf("unable to apply network settings without a private NET namespace")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *ConfigValidator) hostname(config *configs.Config) error {
|
|
|
|
if config.Hostname != "" && !config.Namespaces.Contains(configs.NEWUTS) {
|
|
|
|
return fmt.Errorf("unable to set hostname without a private UTS namespace")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *ConfigValidator) security(config *configs.Config) error {
|
|
|
|
// restrict sys without mount namespace
|
2015-02-13 08:23:05 +08:00
|
|
|
if (len(config.MaskPaths) > 0 || len(config.ReadonlyPaths) > 0) &&
|
|
|
|
!config.Namespaces.Contains(configs.NEWNS) {
|
2015-02-07 04:48:57 +08:00
|
|
|
return fmt.Errorf("unable to restrict sys entries without a private MNT namespace")
|
|
|
|
}
|
2016-03-22 22:20:16 +08:00
|
|
|
if config.ProcessLabel != "" && !selinux.SelinuxEnabled() {
|
|
|
|
return fmt.Errorf("selinux label is specified in config, but selinux is disabled or not supported")
|
|
|
|
}
|
|
|
|
|
2015-02-07 04:48:57 +08:00
|
|
|
return nil
|
|
|
|
}
|
2015-02-19 15:14:01 +08:00
|
|
|
|
|
|
|
func (v *ConfigValidator) usernamespace(config *configs.Config) error {
|
|
|
|
if config.Namespaces.Contains(configs.NEWUSER) {
|
|
|
|
if _, err := os.Stat("/proc/self/ns/user"); os.IsNotExist(err) {
|
|
|
|
return fmt.Errorf("USER namespaces aren't enabled in the kernel")
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if config.UidMappings != nil || config.GidMappings != nil {
|
|
|
|
return fmt.Errorf("User namespace mappings specified, but USER namespace isn't enabled in the config")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2015-09-26 01:47:31 +08:00
|
|
|
|
|
|
|
// sysctl validates that the specified sysctl keys are valid or not.
|
|
|
|
// /proc/sys isn't completely namespaced and depending on which namespaces
|
|
|
|
// are specified, a subset of sysctls are permitted.
|
|
|
|
func (v *ConfigValidator) sysctl(config *configs.Config) error {
|
2016-03-31 04:09:49 +08:00
|
|
|
validSysctlMap := map[string]bool{
|
|
|
|
"kernel.msgmax": true,
|
|
|
|
"kernel.msgmnb": true,
|
|
|
|
"kernel.msgmni": true,
|
|
|
|
"kernel.sem": true,
|
|
|
|
"kernel.shmall": true,
|
|
|
|
"kernel.shmmax": true,
|
|
|
|
"kernel.shmmni": true,
|
|
|
|
"kernel.shm_rmid_forced": true,
|
2015-09-26 01:47:31 +08:00
|
|
|
}
|
2016-03-31 04:09:49 +08:00
|
|
|
|
2015-09-26 01:47:31 +08:00
|
|
|
for s := range config.Sysctl {
|
2016-03-31 04:09:49 +08:00
|
|
|
if validSysctlMap[s] || strings.HasPrefix(s, "fs.mqueue.") {
|
|
|
|
if config.Namespaces.Contains(configs.NEWIPC) {
|
|
|
|
continue
|
|
|
|
} else {
|
|
|
|
return fmt.Errorf("sysctl %q is not allowed in the hosts ipc namespace", s)
|
2015-09-26 01:47:31 +08:00
|
|
|
}
|
|
|
|
}
|
2016-03-31 04:09:49 +08:00
|
|
|
if strings.HasPrefix(s, "net.") {
|
|
|
|
if config.Namespaces.Contains(configs.NEWNET) {
|
|
|
|
continue
|
|
|
|
} else {
|
|
|
|
return fmt.Errorf("sysctl %q is not allowed in the hosts network namespace", s)
|
|
|
|
}
|
2015-09-26 01:47:31 +08:00
|
|
|
}
|
2016-03-31 04:09:49 +08:00
|
|
|
return fmt.Errorf("sysctl %q is not in a separate kernel namespace", s)
|
2015-09-26 01:47:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|