mirror of
https://github.com/token2/snapd.git
synced 2026-03-13 11:15:47 -07:00
Go 1.19 includes some changes to gofmt which intend to make lists and heading clearer when rendered (https://go.dev/doc/go1.19). This commit is the result of running the new gofmt and manually fixing some of it. This was necessary because the new gofmt assumed lines beginning w/ tabs to start lists or examples. While this is often true in our codebase, we occasionally also use tabs to indent the lines after a TODO or FIXME prefix or in yaml (e.g., excerpts of a snap.yaml). This meant that a lot of the reformatted comments were broken and had to be fixed manually. Signed-off-by: Miguel Pires <miguel.pires@canonical.com>
154 lines
5.7 KiB
Go
154 lines
5.7 KiB
Go
// -*- Mode: Go; indent-tabs-mode: t -*-
|
|
|
|
/*
|
|
* Copyright (C) 2016-2017 Canonical Ltd
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 3 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
// Package mount implements mounts that get mapped into the snap
|
|
//
|
|
// Snappy creates fstab like configuration files that describe what
|
|
// directories from the system or from other snaps should get mapped
|
|
// into the snap.
|
|
//
|
|
// Each fstab like file looks like a regular fstab entry:
|
|
//
|
|
// /src/dir /dst/dir none bind 0 0
|
|
// /src/dir /dst/dir none bind,rw 0 0
|
|
//
|
|
// but only bind mounts are supported
|
|
package mount
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"os"
|
|
|
|
"github.com/snapcore/snapd/dirs"
|
|
"github.com/snapcore/snapd/interfaces"
|
|
"github.com/snapcore/snapd/osutil"
|
|
"github.com/snapcore/snapd/sandbox/cgroup"
|
|
"github.com/snapcore/snapd/snap"
|
|
"github.com/snapcore/snapd/timings"
|
|
)
|
|
|
|
// Backend is responsible for maintaining mount files for snap-confine
|
|
type Backend struct{}
|
|
|
|
// Initialize does nothing.
|
|
func (b *Backend) Initialize(*interfaces.SecurityBackendOptions) error {
|
|
return nil
|
|
}
|
|
|
|
// Name returns the name of the backend.
|
|
func (b *Backend) Name() interfaces.SecuritySystem {
|
|
return interfaces.SecurityMount
|
|
}
|
|
|
|
// Setup creates mount mount profile files specific to a given snap.
|
|
func (b *Backend) Setup(snapInfo *snap.Info, confinement interfaces.ConfinementOptions, repo *interfaces.Repository, tm timings.Measurer) error {
|
|
// Record all changes to the mount system for this snap.
|
|
snapName := snapInfo.InstanceName()
|
|
spec, err := repo.SnapSpecification(b.Name(), snapName)
|
|
if err != nil {
|
|
return fmt.Errorf("cannot obtain mount security snippets for snap %q: %s", snapName, err)
|
|
}
|
|
spec.(*Specification).AddOvername(snapInfo)
|
|
spec.(*Specification).AddLayout(snapInfo)
|
|
spec.(*Specification).AddExtraLayouts(confinement.ExtraLayouts)
|
|
content := deriveContent(spec.(*Specification), snapInfo)
|
|
// synchronize the content with the filesystem
|
|
glob := fmt.Sprintf("snap.%s.*fstab", snapName)
|
|
dir := dirs.SnapMountPolicyDir
|
|
if err := os.MkdirAll(dir, 0755); err != nil {
|
|
return fmt.Errorf("cannot create directory for mount configuration files %q: %s", dir, err)
|
|
}
|
|
if _, _, err := osutil.EnsureDirState(dir, glob, content); err != nil {
|
|
return fmt.Errorf("cannot synchronize mount configuration files for snap %q: %s", snapName, err)
|
|
}
|
|
if err := UpdateSnapNamespace(snapName); err != nil {
|
|
return fmt.Errorf("cannot update mount namespace of snap %q: %s", snapName, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Remove removes mount configuration files of a given snap.
|
|
//
|
|
// This method should be called after removing a snap.
|
|
func (b *Backend) Remove(snapName string) error {
|
|
glob := fmt.Sprintf("snap.%s.*fstab", snapName)
|
|
_, _, err := osutil.EnsureDirState(dirs.SnapMountPolicyDir, glob, nil)
|
|
if err != nil {
|
|
return fmt.Errorf("cannot synchronize mount configuration files for snap %q: %s", snapName, err)
|
|
}
|
|
return DiscardSnapNamespace(snapName)
|
|
}
|
|
|
|
// addMountProfile adds a mount profile with the given name, based on the given entries.
|
|
//
|
|
// If there are no entries no profile is generated.
|
|
func addMountProfile(content map[string]osutil.FileState, fname string, entries []osutil.MountEntry) {
|
|
if len(entries) == 0 {
|
|
return
|
|
}
|
|
var buffer bytes.Buffer
|
|
for _, entry := range entries {
|
|
fmt.Fprintf(&buffer, "%s\n", entry)
|
|
}
|
|
content[fname] = &osutil.MemoryFileState{Content: buffer.Bytes(), Mode: 0644}
|
|
}
|
|
|
|
// deriveContent computes .fstab tables based on requests made to the specification.
|
|
func deriveContent(spec *Specification, snapInfo *snap.Info) map[string]osutil.FileState {
|
|
content := make(map[string]osutil.FileState, 2)
|
|
snapName := snapInfo.InstanceName()
|
|
// Add the per-snap fstab file.
|
|
// This file is read by snap-update-ns in the global pass.
|
|
addMountProfile(content, fmt.Sprintf("snap.%s.fstab", snapName), spec.MountEntries())
|
|
// Add the per-snap user-fstab file.
|
|
// This file will be read by snap-update-ns in the per-user pass.
|
|
addMountProfile(content, fmt.Sprintf("snap.%s.user-fstab", snapName), spec.UserMountEntries())
|
|
return content
|
|
}
|
|
|
|
// NewSpecification returns a new mount specification.
|
|
func (b *Backend) NewSpecification() interfaces.Specification {
|
|
return &Specification{}
|
|
}
|
|
|
|
// SandboxFeatures returns the list of features supported by snapd for composing mount namespaces.
|
|
func (b *Backend) SandboxFeatures() []string {
|
|
commonFeatures := []string{
|
|
"layouts", /* Mount profiles take layout data into account */
|
|
"mount-namespace", /* Snapd creates a mount namespace for each snap */
|
|
"per-snap-persistency", /* Per-snap profiles are persisted across invocations */
|
|
"per-snap-profiles", /* Per-snap profiles allow changing mount namespace of a given snap */
|
|
"per-snap-updates", /* Changes to per-snap mount profiles are applied instantly */
|
|
"per-snap-user-profiles", /* Per-snap profiles allow changing mount namespace of a given snap for a given user */
|
|
"stale-base-invalidation", /* Mount namespaces that go stale because base snap changes are automatically invalidated */
|
|
}
|
|
cgroupv1Features := []string{
|
|
"freezer-cgroup-v1", /* Snapd creates a freezer cgroup (v1) for each snap */
|
|
}
|
|
|
|
if cgroup.IsUnified() {
|
|
// TODO: update we get feature parity on cgroup v2
|
|
return commonFeatures
|
|
}
|
|
|
|
features := append(commonFeatures, cgroupv1Features...)
|
|
return features
|
|
}
|