Files
snapd/interfaces/mount/backend.go
Miguel Pires d097436c1c many: fix formatting w/ gofmt 1.19
Go 1.19 includes some changes to gofmt which intend to make lists and
heading clearer when rendered (https://go.dev/doc/go1.19). This commit
is the result of running the new gofmt and manually fixing some of it.
This was necessary because the new gofmt assumed lines beginning w/ tabs
to start lists or examples. While this is often true in our codebase,
we occasionally also use tabs to indent the lines after a TODO or FIXME
prefix or in yaml (e.g., excerpts of a snap.yaml). This meant that a lot of the
reformatted comments were broken and had to be fixed manually.

Signed-off-by: Miguel Pires <miguel.pires@canonical.com>
2023-01-16 14:23:11 +01:00

154 lines
5.7 KiB
Go

// -*- Mode: Go; indent-tabs-mode: t -*-
/*
* Copyright (C) 2016-2017 Canonical Ltd
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 3 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
// Package mount implements mounts that get mapped into the snap
//
// Snappy creates fstab like configuration files that describe what
// directories from the system or from other snaps should get mapped
// into the snap.
//
// Each fstab like file looks like a regular fstab entry:
//
// /src/dir /dst/dir none bind 0 0
// /src/dir /dst/dir none bind,rw 0 0
//
// but only bind mounts are supported
package mount
import (
"bytes"
"fmt"
"os"
"github.com/snapcore/snapd/dirs"
"github.com/snapcore/snapd/interfaces"
"github.com/snapcore/snapd/osutil"
"github.com/snapcore/snapd/sandbox/cgroup"
"github.com/snapcore/snapd/snap"
"github.com/snapcore/snapd/timings"
)
// Backend is responsible for maintaining mount files for snap-confine
type Backend struct{}
// Initialize does nothing.
func (b *Backend) Initialize(*interfaces.SecurityBackendOptions) error {
return nil
}
// Name returns the name of the backend.
func (b *Backend) Name() interfaces.SecuritySystem {
return interfaces.SecurityMount
}
// Setup creates mount mount profile files specific to a given snap.
func (b *Backend) Setup(snapInfo *snap.Info, confinement interfaces.ConfinementOptions, repo *interfaces.Repository, tm timings.Measurer) error {
// Record all changes to the mount system for this snap.
snapName := snapInfo.InstanceName()
spec, err := repo.SnapSpecification(b.Name(), snapName)
if err != nil {
return fmt.Errorf("cannot obtain mount security snippets for snap %q: %s", snapName, err)
}
spec.(*Specification).AddOvername(snapInfo)
spec.(*Specification).AddLayout(snapInfo)
spec.(*Specification).AddExtraLayouts(confinement.ExtraLayouts)
content := deriveContent(spec.(*Specification), snapInfo)
// synchronize the content with the filesystem
glob := fmt.Sprintf("snap.%s.*fstab", snapName)
dir := dirs.SnapMountPolicyDir
if err := os.MkdirAll(dir, 0755); err != nil {
return fmt.Errorf("cannot create directory for mount configuration files %q: %s", dir, err)
}
if _, _, err := osutil.EnsureDirState(dir, glob, content); err != nil {
return fmt.Errorf("cannot synchronize mount configuration files for snap %q: %s", snapName, err)
}
if err := UpdateSnapNamespace(snapName); err != nil {
return fmt.Errorf("cannot update mount namespace of snap %q: %s", snapName, err)
}
return nil
}
// Remove removes mount configuration files of a given snap.
//
// This method should be called after removing a snap.
func (b *Backend) Remove(snapName string) error {
glob := fmt.Sprintf("snap.%s.*fstab", snapName)
_, _, err := osutil.EnsureDirState(dirs.SnapMountPolicyDir, glob, nil)
if err != nil {
return fmt.Errorf("cannot synchronize mount configuration files for snap %q: %s", snapName, err)
}
return DiscardSnapNamespace(snapName)
}
// addMountProfile adds a mount profile with the given name, based on the given entries.
//
// If there are no entries no profile is generated.
func addMountProfile(content map[string]osutil.FileState, fname string, entries []osutil.MountEntry) {
if len(entries) == 0 {
return
}
var buffer bytes.Buffer
for _, entry := range entries {
fmt.Fprintf(&buffer, "%s\n", entry)
}
content[fname] = &osutil.MemoryFileState{Content: buffer.Bytes(), Mode: 0644}
}
// deriveContent computes .fstab tables based on requests made to the specification.
func deriveContent(spec *Specification, snapInfo *snap.Info) map[string]osutil.FileState {
content := make(map[string]osutil.FileState, 2)
snapName := snapInfo.InstanceName()
// Add the per-snap fstab file.
// This file is read by snap-update-ns in the global pass.
addMountProfile(content, fmt.Sprintf("snap.%s.fstab", snapName), spec.MountEntries())
// Add the per-snap user-fstab file.
// This file will be read by snap-update-ns in the per-user pass.
addMountProfile(content, fmt.Sprintf("snap.%s.user-fstab", snapName), spec.UserMountEntries())
return content
}
// NewSpecification returns a new mount specification.
func (b *Backend) NewSpecification() interfaces.Specification {
return &Specification{}
}
// SandboxFeatures returns the list of features supported by snapd for composing mount namespaces.
func (b *Backend) SandboxFeatures() []string {
commonFeatures := []string{
"layouts", /* Mount profiles take layout data into account */
"mount-namespace", /* Snapd creates a mount namespace for each snap */
"per-snap-persistency", /* Per-snap profiles are persisted across invocations */
"per-snap-profiles", /* Per-snap profiles allow changing mount namespace of a given snap */
"per-snap-updates", /* Changes to per-snap mount profiles are applied instantly */
"per-snap-user-profiles", /* Per-snap profiles allow changing mount namespace of a given snap for a given user */
"stale-base-invalidation", /* Mount namespaces that go stale because base snap changes are automatically invalidated */
}
cgroupv1Features := []string{
"freezer-cgroup-v1", /* Snapd creates a freezer cgroup (v1) for each snap */
}
if cgroup.IsUnified() {
// TODO: update we get feature parity on cgroup v2
return commonFeatures
}
features := append(commonFeatures, cgroupv1Features...)
return features
}