Files
snapd/osutil/overlay_linux.go
Ian Johnson d33346c0e6 osutil: don't export ProcSelfMountInfo, use mocked string
Many tests currently implicitly rely on reading state from /proc/self/mountinfo
through the system-key or other various aspects that care about what's mounted
on the system. These tests currently suffer from leaking state from the host
system that the unit test is being run on into the test, exposing us to a
problem where we may have false positives if these tests are run on systems with
the state present and the state was not properly mocked.

To alleviate this, we make LoadMountInfo take no arguments and panic if it was
not properly mocked during tests. The proper way to mock mountinfo now is to use
MockMountInfo(), which is now exported and will do the right thing.

This does mean we have to eliminate a test in osutil which was testing about the
filename argument to LoadMountInfo which no longer is possible.

Signed-off-by: Ian Johnson <ian.johnson@canonical.com>
2020-04-07 09:31:42 -05:00

94 lines
3.3 KiB
Go

// -*- Mode: Go; indent-tabs-mode: t -*-
/*
* Copyright (C) 2016-2018 Canonical Ltd
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 3 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
package osutil
import (
"fmt"
"strings"
)
// IsRootWritableOverlay detects if the current '/' is a writable overlay
// (fstype is 'overlay' and 'upperdir' is specified) and returns upperdir or
// the empty string if not used.
//
// Debian-based LiveCD systems use 'casper' to setup the mounts, and part of
// this setup involves running mount commands to mount / on /cow as overlay and
// results in AppArmor seeing '/upper' as the upperdir rather than '/cow/upper'
// as seen in mountinfo. By the time snapd is run, we don't have enough
// information to discover /cow through mount parent ID or st_dev (maj:min).
// While overlay doesn't use the mount source for anything itself, casper sets
// the mount source ('/cow' with the above) for its own purposes and we can
// leverage this by stripping the mount source from the beginning of upperdir.
//
// https://www.kernel.org/doc/Documentation/filesystems/overlayfs.txt
// man 5 proc
//
// Currently uses variables and Mock functions from nfs.go
func IsRootWritableOverlay() (string, error) {
mountinfo, err := LoadMountInfo()
if err != nil {
return "", fmt.Errorf("cannot parse mountinfo: %s", err)
}
for _, entry := range mountinfo {
if entry.FsType == "overlay" && entry.MountDir == "/" {
if dir, ok := entry.SuperOptions["upperdir"]; ok {
// upperdir must be an absolute path without
// any AppArmor regular expression (AARE)
// characters or double quotes to be considered
if !strings.HasPrefix(dir, "/") || strings.ContainsAny(dir, `?*[]{}^"`) {
continue
}
// if mount source is path, strip it from dir
// (for casper)
if strings.HasPrefix(entry.MountSource, "/") {
dir = strings.TrimPrefix(dir, strings.TrimRight(entry.MountSource, "/"))
}
dir = strings.TrimRight(dir, "/")
// The resulting trimmed dir must be an
// absolute path that is not '/'
if len(dir) < 2 || !strings.HasPrefix(dir, "/") {
continue
}
switch dir {
case "/media/root-rw/overlay":
// On the Ubuntu server ephemeral image, '/' is setup via
// overlayroot (on at least 18.10), which uses a combination
// of overlayfs and chroot. This differs from the livecd setup
// so special case the detection logic to look for the known
// upperdir for this configuration, and return the required
// path. See LP: #1797218 for details.
return "/overlay", nil
case "/run/miso/overlay_root/upper":
// On the Manjaro ephemeral image, '/' is setup via
// overlayroot. This is similar to the workaround above.
return "/upper", nil
}
// Make sure trailing slashes are predictably missing
return dir, nil
}
}
}
return "", nil
}