github.com/containerd/Containerd@v1.4.13/oci/spec_opts.go (about)

     1  /*
     2     Copyright The containerd Authors.
     3  
     4     Licensed under the Apache License, Version 2.0 (the "License");
     5     you may not use this file except in compliance with the License.
     6     You may obtain a copy of the License at
     7  
     8         http://www.apache.org/licenses/LICENSE-2.0
     9  
    10     Unless required by applicable law or agreed to in writing, software
    11     distributed under the License is distributed on an "AS IS" BASIS,
    12     WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    13     See the License for the specific language governing permissions and
    14     limitations under the License.
    15  */
    16  
    17  package oci
    18  
    19  import (
    20  	"bufio"
    21  	"context"
    22  	"encoding/json"
    23  	"fmt"
    24  	"io/ioutil"
    25  	"os"
    26  	"path/filepath"
    27  	"strconv"
    28  	"strings"
    29  
    30  	"github.com/containerd/containerd/containers"
    31  	"github.com/containerd/containerd/content"
    32  	"github.com/containerd/containerd/images"
    33  	"github.com/containerd/containerd/mount"
    34  	"github.com/containerd/containerd/namespaces"
    35  	"github.com/containerd/containerd/platforms"
    36  	"github.com/containerd/continuity/fs"
    37  	v1 "github.com/opencontainers/image-spec/specs-go/v1"
    38  	"github.com/opencontainers/runc/libcontainer/user"
    39  	specs "github.com/opencontainers/runtime-spec/specs-go"
    40  	"github.com/pkg/errors"
    41  	"github.com/syndtr/gocapability/capability"
    42  )
    43  
    44  // SpecOpts sets spec specific information to a newly generated OCI spec
    45  type SpecOpts func(context.Context, Client, *containers.Container, *Spec) error
    46  
    47  // Compose converts a sequence of spec operations into a single operation
    48  func Compose(opts ...SpecOpts) SpecOpts {
    49  	return func(ctx context.Context, client Client, c *containers.Container, s *Spec) error {
    50  		for _, o := range opts {
    51  			if err := o(ctx, client, c, s); err != nil {
    52  				return err
    53  			}
    54  		}
    55  		return nil
    56  	}
    57  }
    58  
    59  // setProcess sets Process to empty if unset
    60  func setProcess(s *Spec) {
    61  	if s.Process == nil {
    62  		s.Process = &specs.Process{}
    63  	}
    64  }
    65  
    66  // setRoot sets Root to empty if unset
    67  func setRoot(s *Spec) {
    68  	if s.Root == nil {
    69  		s.Root = &specs.Root{}
    70  	}
    71  }
    72  
    73  // setLinux sets Linux to empty if unset
    74  func setLinux(s *Spec) {
    75  	if s.Linux == nil {
    76  		s.Linux = &specs.Linux{}
    77  	}
    78  }
    79  
    80  // nolint
    81  func setResources(s *Spec) {
    82  	if s.Linux != nil {
    83  		if s.Linux.Resources == nil {
    84  			s.Linux.Resources = &specs.LinuxResources{}
    85  		}
    86  	}
    87  	if s.Windows != nil {
    88  		if s.Windows.Resources == nil {
    89  			s.Windows.Resources = &specs.WindowsResources{}
    90  		}
    91  	}
    92  }
    93  
    94  // nolint
    95  func setCPU(s *Spec) {
    96  	setResources(s)
    97  	if s.Linux != nil {
    98  		if s.Linux.Resources.CPU == nil {
    99  			s.Linux.Resources.CPU = &specs.LinuxCPU{}
   100  		}
   101  	}
   102  	if s.Windows != nil {
   103  		if s.Windows.Resources.CPU == nil {
   104  			s.Windows.Resources.CPU = &specs.WindowsCPUResources{}
   105  		}
   106  	}
   107  }
   108  
   109  // setCapabilities sets Linux Capabilities to empty if unset
   110  func setCapabilities(s *Spec) {
   111  	setProcess(s)
   112  	if s.Process.Capabilities == nil {
   113  		s.Process.Capabilities = &specs.LinuxCapabilities{}
   114  	}
   115  }
   116  
   117  // WithDefaultSpec returns a SpecOpts that will populate the spec with default
   118  // values.
   119  //
   120  // Use as the first option to clear the spec, then apply options afterwards.
   121  func WithDefaultSpec() SpecOpts {
   122  	return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
   123  		return generateDefaultSpecWithPlatform(ctx, platforms.DefaultString(), c.ID, s)
   124  	}
   125  }
   126  
   127  // WithDefaultSpecForPlatform returns a SpecOpts that will populate the spec
   128  // with default values for a given platform.
   129  //
   130  // Use as the first option to clear the spec, then apply options afterwards.
   131  func WithDefaultSpecForPlatform(platform string) SpecOpts {
   132  	return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
   133  		return generateDefaultSpecWithPlatform(ctx, platform, c.ID, s)
   134  	}
   135  }
   136  
   137  // WithSpecFromBytes loads the spec from the provided byte slice.
   138  func WithSpecFromBytes(p []byte) SpecOpts {
   139  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   140  		*s = Spec{} // make sure spec is cleared.
   141  		if err := json.Unmarshal(p, s); err != nil {
   142  			return errors.Wrapf(err, "decoding spec config file failed, current supported OCI runtime-spec : v%s", specs.Version)
   143  		}
   144  		return nil
   145  	}
   146  }
   147  
   148  // WithSpecFromFile loads the specification from the provided filename.
   149  func WithSpecFromFile(filename string) SpecOpts {
   150  	return func(ctx context.Context, c Client, container *containers.Container, s *Spec) error {
   151  		p, err := ioutil.ReadFile(filename)
   152  		if err != nil {
   153  			return errors.Wrap(err, "cannot load spec config file")
   154  		}
   155  		return WithSpecFromBytes(p)(ctx, c, container, s)
   156  	}
   157  }
   158  
   159  // WithEnv appends environment variables
   160  func WithEnv(environmentVariables []string) SpecOpts {
   161  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   162  		if len(environmentVariables) > 0 {
   163  			setProcess(s)
   164  			s.Process.Env = replaceOrAppendEnvValues(s.Process.Env, environmentVariables)
   165  		}
   166  		return nil
   167  	}
   168  }
   169  
   170  // WithDefaultPathEnv sets the $PATH environment variable to the
   171  // default PATH defined in this package.
   172  func WithDefaultPathEnv(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   173  	s.Process.Env = replaceOrAppendEnvValues(s.Process.Env, defaultUnixEnv)
   174  	return nil
   175  }
   176  
   177  // replaceOrAppendEnvValues returns the defaults with the overrides either
   178  // replaced by env key or appended to the list
   179  func replaceOrAppendEnvValues(defaults, overrides []string) []string {
   180  	cache := make(map[string]int, len(defaults))
   181  	results := make([]string, 0, len(defaults))
   182  	for i, e := range defaults {
   183  		parts := strings.SplitN(e, "=", 2)
   184  		results = append(results, e)
   185  		cache[parts[0]] = i
   186  	}
   187  
   188  	for _, value := range overrides {
   189  		// Values w/o = means they want this env to be removed/unset.
   190  		if !strings.Contains(value, "=") {
   191  			if i, exists := cache[value]; exists {
   192  				results[i] = "" // Used to indicate it should be removed
   193  			}
   194  			continue
   195  		}
   196  
   197  		// Just do a normal set/update
   198  		parts := strings.SplitN(value, "=", 2)
   199  		if i, exists := cache[parts[0]]; exists {
   200  			results[i] = value
   201  		} else {
   202  			results = append(results, value)
   203  		}
   204  	}
   205  
   206  	// Now remove all entries that we want to "unset"
   207  	for i := 0; i < len(results); i++ {
   208  		if results[i] == "" {
   209  			results = append(results[:i], results[i+1:]...)
   210  			i--
   211  		}
   212  	}
   213  
   214  	return results
   215  }
   216  
   217  // WithProcessArgs replaces the args on the generated spec
   218  func WithProcessArgs(args ...string) SpecOpts {
   219  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   220  		setProcess(s)
   221  		s.Process.Args = args
   222  		return nil
   223  	}
   224  }
   225  
   226  // WithProcessCwd replaces the current working directory on the generated spec
   227  func WithProcessCwd(cwd string) SpecOpts {
   228  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   229  		setProcess(s)
   230  		s.Process.Cwd = cwd
   231  		return nil
   232  	}
   233  }
   234  
   235  // WithTTY sets the information on the spec as well as the environment variables for
   236  // using a TTY
   237  func WithTTY(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   238  	setProcess(s)
   239  	s.Process.Terminal = true
   240  	if s.Linux != nil {
   241  		s.Process.Env = append(s.Process.Env, "TERM=xterm")
   242  	}
   243  
   244  	return nil
   245  }
   246  
   247  // WithTTYSize sets the information on the spec as well as the environment variables for
   248  // using a TTY
   249  func WithTTYSize(width, height int) SpecOpts {
   250  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   251  		setProcess(s)
   252  		if s.Process.ConsoleSize == nil {
   253  			s.Process.ConsoleSize = &specs.Box{}
   254  		}
   255  		s.Process.ConsoleSize.Width = uint(width)
   256  		s.Process.ConsoleSize.Height = uint(height)
   257  		return nil
   258  	}
   259  }
   260  
   261  // WithHostname sets the container's hostname
   262  func WithHostname(name string) SpecOpts {
   263  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   264  		s.Hostname = name
   265  		return nil
   266  	}
   267  }
   268  
   269  // WithMounts appends mounts
   270  func WithMounts(mounts []specs.Mount) SpecOpts {
   271  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   272  		s.Mounts = append(s.Mounts, mounts...)
   273  		return nil
   274  	}
   275  }
   276  
   277  // WithHostNamespace allows a task to run inside the host's linux namespace
   278  func WithHostNamespace(ns specs.LinuxNamespaceType) SpecOpts {
   279  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   280  		setLinux(s)
   281  		for i, n := range s.Linux.Namespaces {
   282  			if n.Type == ns {
   283  				s.Linux.Namespaces = append(s.Linux.Namespaces[:i], s.Linux.Namespaces[i+1:]...)
   284  				return nil
   285  			}
   286  		}
   287  		return nil
   288  	}
   289  }
   290  
   291  // WithLinuxNamespace uses the passed in namespace for the spec. If a namespace of the same type already exists in the
   292  // spec, the existing namespace is replaced by the one provided.
   293  func WithLinuxNamespace(ns specs.LinuxNamespace) SpecOpts {
   294  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   295  		setLinux(s)
   296  		for i, n := range s.Linux.Namespaces {
   297  			if n.Type == ns.Type {
   298  				before := s.Linux.Namespaces[:i]
   299  				after := s.Linux.Namespaces[i+1:]
   300  				s.Linux.Namespaces = append(before, ns)
   301  				s.Linux.Namespaces = append(s.Linux.Namespaces, after...)
   302  				return nil
   303  			}
   304  		}
   305  		s.Linux.Namespaces = append(s.Linux.Namespaces, ns)
   306  		return nil
   307  	}
   308  }
   309  
   310  // WithNewPrivileges turns off the NoNewPrivileges feature flag in the spec
   311  func WithNewPrivileges(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   312  	setProcess(s)
   313  	s.Process.NoNewPrivileges = false
   314  
   315  	return nil
   316  }
   317  
   318  // WithImageConfig configures the spec to from the configuration of an Image
   319  func WithImageConfig(image Image) SpecOpts {
   320  	return WithImageConfigArgs(image, nil)
   321  }
   322  
   323  // WithImageConfigArgs configures the spec to from the configuration of an Image with additional args that
   324  // replaces the CMD of the image
   325  func WithImageConfigArgs(image Image, args []string) SpecOpts {
   326  	return func(ctx context.Context, client Client, c *containers.Container, s *Spec) error {
   327  		ic, err := image.Config(ctx)
   328  		if err != nil {
   329  			return err
   330  		}
   331  		var (
   332  			ociimage v1.Image
   333  			config   v1.ImageConfig
   334  		)
   335  		switch ic.MediaType {
   336  		case v1.MediaTypeImageConfig, images.MediaTypeDockerSchema2Config:
   337  			p, err := content.ReadBlob(ctx, image.ContentStore(), ic)
   338  			if err != nil {
   339  				return err
   340  			}
   341  
   342  			if err := json.Unmarshal(p, &ociimage); err != nil {
   343  				return err
   344  			}
   345  			config = ociimage.Config
   346  		default:
   347  			return fmt.Errorf("unknown image config media type %s", ic.MediaType)
   348  		}
   349  
   350  		setProcess(s)
   351  		if s.Linux != nil {
   352  			defaults := config.Env
   353  			if len(defaults) == 0 {
   354  				defaults = defaultUnixEnv
   355  			}
   356  			s.Process.Env = replaceOrAppendEnvValues(defaults, s.Process.Env)
   357  			cmd := config.Cmd
   358  			if len(args) > 0 {
   359  				cmd = args
   360  			}
   361  			s.Process.Args = append(config.Entrypoint, cmd...)
   362  
   363  			cwd := config.WorkingDir
   364  			if cwd == "" {
   365  				cwd = "/"
   366  			}
   367  			s.Process.Cwd = cwd
   368  			if config.User != "" {
   369  				if err := WithUser(config.User)(ctx, client, c, s); err != nil {
   370  					return err
   371  				}
   372  				return WithAdditionalGIDs(fmt.Sprintf("%d", s.Process.User.UID))(ctx, client, c, s)
   373  			}
   374  			// we should query the image's /etc/group for additional GIDs
   375  			// even if there is no specified user in the image config
   376  			return WithAdditionalGIDs("root")(ctx, client, c, s)
   377  		} else if s.Windows != nil {
   378  			s.Process.Env = replaceOrAppendEnvValues(config.Env, s.Process.Env)
   379  			cmd := config.Cmd
   380  			if len(args) > 0 {
   381  				cmd = args
   382  			}
   383  			s.Process.Args = append(config.Entrypoint, cmd...)
   384  
   385  			s.Process.Cwd = config.WorkingDir
   386  			s.Process.User = specs.User{
   387  				Username: config.User,
   388  			}
   389  		} else {
   390  			return errors.New("spec does not contain Linux or Windows section")
   391  		}
   392  		return nil
   393  	}
   394  }
   395  
   396  // WithRootFSPath specifies unmanaged rootfs path.
   397  func WithRootFSPath(path string) SpecOpts {
   398  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   399  		setRoot(s)
   400  		s.Root.Path = path
   401  		// Entrypoint is not set here (it's up to caller)
   402  		return nil
   403  	}
   404  }
   405  
   406  // WithRootFSReadonly sets specs.Root.Readonly to true
   407  func WithRootFSReadonly() SpecOpts {
   408  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   409  		setRoot(s)
   410  		s.Root.Readonly = true
   411  		return nil
   412  	}
   413  }
   414  
   415  // WithNoNewPrivileges sets no_new_privileges on the process for the container
   416  func WithNoNewPrivileges(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   417  	setProcess(s)
   418  	s.Process.NoNewPrivileges = true
   419  	return nil
   420  }
   421  
   422  // WithHostHostsFile bind-mounts the host's /etc/hosts into the container as readonly
   423  func WithHostHostsFile(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   424  	s.Mounts = append(s.Mounts, specs.Mount{
   425  		Destination: "/etc/hosts",
   426  		Type:        "bind",
   427  		Source:      "/etc/hosts",
   428  		Options:     []string{"rbind", "ro"},
   429  	})
   430  	return nil
   431  }
   432  
   433  // WithHostResolvconf bind-mounts the host's /etc/resolv.conf into the container as readonly
   434  func WithHostResolvconf(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   435  	s.Mounts = append(s.Mounts, specs.Mount{
   436  		Destination: "/etc/resolv.conf",
   437  		Type:        "bind",
   438  		Source:      "/etc/resolv.conf",
   439  		Options:     []string{"rbind", "ro"},
   440  	})
   441  	return nil
   442  }
   443  
   444  // WithHostLocaltime bind-mounts the host's /etc/localtime into the container as readonly
   445  func WithHostLocaltime(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   446  	s.Mounts = append(s.Mounts, specs.Mount{
   447  		Destination: "/etc/localtime",
   448  		Type:        "bind",
   449  		Source:      "/etc/localtime",
   450  		Options:     []string{"rbind", "ro"},
   451  	})
   452  	return nil
   453  }
   454  
   455  // WithUserNamespace sets the uid and gid mappings for the task
   456  // this can be called multiple times to add more mappings to the generated spec
   457  func WithUserNamespace(uidMap, gidMap []specs.LinuxIDMapping) SpecOpts {
   458  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   459  		var hasUserns bool
   460  		setLinux(s)
   461  		for _, ns := range s.Linux.Namespaces {
   462  			if ns.Type == specs.UserNamespace {
   463  				hasUserns = true
   464  				break
   465  			}
   466  		}
   467  		if !hasUserns {
   468  			s.Linux.Namespaces = append(s.Linux.Namespaces, specs.LinuxNamespace{
   469  				Type: specs.UserNamespace,
   470  			})
   471  		}
   472  		s.Linux.UIDMappings = append(s.Linux.UIDMappings, uidMap...)
   473  		s.Linux.GIDMappings = append(s.Linux.GIDMappings, gidMap...)
   474  		return nil
   475  	}
   476  }
   477  
   478  // WithCgroup sets the container's cgroup path
   479  func WithCgroup(path string) SpecOpts {
   480  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   481  		setLinux(s)
   482  		s.Linux.CgroupsPath = path
   483  		return nil
   484  	}
   485  }
   486  
   487  // WithNamespacedCgroup uses the namespace set on the context to create a
   488  // root directory for containers in the cgroup with the id as the subcgroup
   489  func WithNamespacedCgroup() SpecOpts {
   490  	return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
   491  		namespace, err := namespaces.NamespaceRequired(ctx)
   492  		if err != nil {
   493  			return err
   494  		}
   495  		setLinux(s)
   496  		s.Linux.CgroupsPath = filepath.Join("/", namespace, c.ID)
   497  		return nil
   498  	}
   499  }
   500  
   501  // WithUser sets the user to be used within the container.
   502  // It accepts a valid user string in OCI Image Spec v1.0.0:
   503  //   user, uid, user:group, uid:gid, uid:group, user:gid
   504  func WithUser(userstr string) SpecOpts {
   505  	return func(ctx context.Context, client Client, c *containers.Container, s *Spec) error {
   506  		setProcess(s)
   507  		parts := strings.Split(userstr, ":")
   508  		switch len(parts) {
   509  		case 1:
   510  			v, err := strconv.Atoi(parts[0])
   511  			if err != nil {
   512  				// if we cannot parse as a uint they try to see if it is a username
   513  				return WithUsername(userstr)(ctx, client, c, s)
   514  			}
   515  			return WithUserID(uint32(v))(ctx, client, c, s)
   516  		case 2:
   517  			var (
   518  				username  string
   519  				groupname string
   520  			)
   521  			var uid, gid uint32
   522  			v, err := strconv.Atoi(parts[0])
   523  			if err != nil {
   524  				username = parts[0]
   525  			} else {
   526  				uid = uint32(v)
   527  			}
   528  			if v, err = strconv.Atoi(parts[1]); err != nil {
   529  				groupname = parts[1]
   530  			} else {
   531  				gid = uint32(v)
   532  			}
   533  			if username == "" && groupname == "" {
   534  				s.Process.User.UID, s.Process.User.GID = uid, gid
   535  				return nil
   536  			}
   537  			f := func(root string) error {
   538  				if username != "" {
   539  					user, err := getUserFromPath(root, func(u user.User) bool {
   540  						return u.Name == username
   541  					})
   542  					if err != nil {
   543  						return err
   544  					}
   545  					uid = uint32(user.Uid)
   546  				}
   547  				if groupname != "" {
   548  					gid, err = getGIDFromPath(root, func(g user.Group) bool {
   549  						return g.Name == groupname
   550  					})
   551  					if err != nil {
   552  						return err
   553  					}
   554  				}
   555  				s.Process.User.UID, s.Process.User.GID = uid, gid
   556  				return nil
   557  			}
   558  			if c.Snapshotter == "" && c.SnapshotKey == "" {
   559  				if !isRootfsAbs(s.Root.Path) {
   560  					return errors.New("rootfs absolute path is required")
   561  				}
   562  				return f(s.Root.Path)
   563  			}
   564  			if c.Snapshotter == "" {
   565  				return errors.New("no snapshotter set for container")
   566  			}
   567  			if c.SnapshotKey == "" {
   568  				return errors.New("rootfs snapshot not created for container")
   569  			}
   570  			snapshotter := client.SnapshotService(c.Snapshotter)
   571  			mounts, err := snapshotter.Mounts(ctx, c.SnapshotKey)
   572  			if err != nil {
   573  				return err
   574  			}
   575  			return mount.WithTempMount(ctx, mounts, f)
   576  		default:
   577  			return fmt.Errorf("invalid USER value %s", userstr)
   578  		}
   579  	}
   580  }
   581  
   582  // WithUIDGID allows the UID and GID for the Process to be set
   583  func WithUIDGID(uid, gid uint32) SpecOpts {
   584  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   585  		setProcess(s)
   586  		s.Process.User.UID = uid
   587  		s.Process.User.GID = gid
   588  		return nil
   589  	}
   590  }
   591  
   592  // WithUserID sets the correct UID and GID for the container based
   593  // on the image's /etc/passwd contents. If /etc/passwd does not exist,
   594  // or uid is not found in /etc/passwd, it sets the requested uid,
   595  // additionally sets the gid to 0, and does not return an error.
   596  func WithUserID(uid uint32) SpecOpts {
   597  	return func(ctx context.Context, client Client, c *containers.Container, s *Spec) (err error) {
   598  		setProcess(s)
   599  		if c.Snapshotter == "" && c.SnapshotKey == "" {
   600  			if !isRootfsAbs(s.Root.Path) {
   601  				return errors.Errorf("rootfs absolute path is required")
   602  			}
   603  			user, err := getUserFromPath(s.Root.Path, func(u user.User) bool {
   604  				return u.Uid == int(uid)
   605  			})
   606  			if err != nil {
   607  				if os.IsNotExist(err) || err == errNoUsersFound {
   608  					s.Process.User.UID, s.Process.User.GID = uid, 0
   609  					return nil
   610  				}
   611  				return err
   612  			}
   613  			s.Process.User.UID, s.Process.User.GID = uint32(user.Uid), uint32(user.Gid)
   614  			return nil
   615  
   616  		}
   617  		if c.Snapshotter == "" {
   618  			return errors.Errorf("no snapshotter set for container")
   619  		}
   620  		if c.SnapshotKey == "" {
   621  			return errors.Errorf("rootfs snapshot not created for container")
   622  		}
   623  		snapshotter := client.SnapshotService(c.Snapshotter)
   624  		mounts, err := snapshotter.Mounts(ctx, c.SnapshotKey)
   625  		if err != nil {
   626  			return err
   627  		}
   628  		return mount.WithTempMount(ctx, mounts, func(root string) error {
   629  			user, err := getUserFromPath(root, func(u user.User) bool {
   630  				return u.Uid == int(uid)
   631  			})
   632  			if err != nil {
   633  				if os.IsNotExist(err) || err == errNoUsersFound {
   634  					s.Process.User.UID, s.Process.User.GID = uid, 0
   635  					return nil
   636  				}
   637  				return err
   638  			}
   639  			s.Process.User.UID, s.Process.User.GID = uint32(user.Uid), uint32(user.Gid)
   640  			return nil
   641  		})
   642  	}
   643  }
   644  
   645  // WithUsername sets the correct UID and GID for the container
   646  // based on the image's /etc/passwd contents. If /etc/passwd
   647  // does not exist, or the username is not found in /etc/passwd,
   648  // it returns error.
   649  func WithUsername(username string) SpecOpts {
   650  	return func(ctx context.Context, client Client, c *containers.Container, s *Spec) (err error) {
   651  		setProcess(s)
   652  		if s.Linux != nil {
   653  			if c.Snapshotter == "" && c.SnapshotKey == "" {
   654  				if !isRootfsAbs(s.Root.Path) {
   655  					return errors.Errorf("rootfs absolute path is required")
   656  				}
   657  				user, err := getUserFromPath(s.Root.Path, func(u user.User) bool {
   658  					return u.Name == username
   659  				})
   660  				if err != nil {
   661  					return err
   662  				}
   663  				s.Process.User.UID, s.Process.User.GID = uint32(user.Uid), uint32(user.Gid)
   664  				return nil
   665  			}
   666  			if c.Snapshotter == "" {
   667  				return errors.Errorf("no snapshotter set for container")
   668  			}
   669  			if c.SnapshotKey == "" {
   670  				return errors.Errorf("rootfs snapshot not created for container")
   671  			}
   672  			snapshotter := client.SnapshotService(c.Snapshotter)
   673  			mounts, err := snapshotter.Mounts(ctx, c.SnapshotKey)
   674  			if err != nil {
   675  				return err
   676  			}
   677  			return mount.WithTempMount(ctx, mounts, func(root string) error {
   678  				user, err := getUserFromPath(root, func(u user.User) bool {
   679  					return u.Name == username
   680  				})
   681  				if err != nil {
   682  					return err
   683  				}
   684  				s.Process.User.UID, s.Process.User.GID = uint32(user.Uid), uint32(user.Gid)
   685  				return nil
   686  			})
   687  		} else if s.Windows != nil {
   688  			s.Process.User.Username = username
   689  		} else {
   690  			return errors.New("spec does not contain Linux or Windows section")
   691  		}
   692  		return nil
   693  	}
   694  }
   695  
   696  // WithAdditionalGIDs sets the OCI spec's additionalGids array to any additional groups listed
   697  // for a particular user in the /etc/groups file of the image's root filesystem
   698  // The passed in user can be either a uid or a username.
   699  func WithAdditionalGIDs(userstr string) SpecOpts {
   700  	return func(ctx context.Context, client Client, c *containers.Container, s *Spec) (err error) {
   701  		// For LCOW additional GID's not supported
   702  		if s.Windows != nil {
   703  			return nil
   704  		}
   705  		setProcess(s)
   706  		setAdditionalGids := func(root string) error {
   707  			var username string
   708  			uid, err := strconv.Atoi(userstr)
   709  			if err == nil {
   710  				user, err := getUserFromPath(root, func(u user.User) bool {
   711  					return u.Uid == uid
   712  				})
   713  				if err != nil {
   714  					if os.IsNotExist(err) || err == errNoUsersFound {
   715  						return nil
   716  					}
   717  					return err
   718  				}
   719  				username = user.Name
   720  			} else {
   721  				username = userstr
   722  			}
   723  			gids, err := getSupplementalGroupsFromPath(root, func(g user.Group) bool {
   724  				// we only want supplemental groups
   725  				if g.Name == username {
   726  					return false
   727  				}
   728  				for _, entry := range g.List {
   729  					if entry == username {
   730  						return true
   731  					}
   732  				}
   733  				return false
   734  			})
   735  			if err != nil {
   736  				if os.IsNotExist(err) {
   737  					return nil
   738  				}
   739  				return err
   740  			}
   741  			s.Process.User.AdditionalGids = gids
   742  			return nil
   743  		}
   744  		if c.Snapshotter == "" && c.SnapshotKey == "" {
   745  			if !isRootfsAbs(s.Root.Path) {
   746  				return errors.Errorf("rootfs absolute path is required")
   747  			}
   748  			return setAdditionalGids(s.Root.Path)
   749  		}
   750  		if c.Snapshotter == "" {
   751  			return errors.Errorf("no snapshotter set for container")
   752  		}
   753  		if c.SnapshotKey == "" {
   754  			return errors.Errorf("rootfs snapshot not created for container")
   755  		}
   756  		snapshotter := client.SnapshotService(c.Snapshotter)
   757  		mounts, err := snapshotter.Mounts(ctx, c.SnapshotKey)
   758  		if err != nil {
   759  			return err
   760  		}
   761  		return mount.WithTempMount(ctx, mounts, setAdditionalGids)
   762  	}
   763  }
   764  
   765  // WithCapabilities sets Linux capabilities on the process
   766  func WithCapabilities(caps []string) SpecOpts {
   767  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   768  		setCapabilities(s)
   769  
   770  		s.Process.Capabilities.Bounding = caps
   771  		s.Process.Capabilities.Effective = caps
   772  		s.Process.Capabilities.Permitted = caps
   773  		s.Process.Capabilities.Inheritable = caps
   774  
   775  		return nil
   776  	}
   777  }
   778  
   779  // WithAllCapabilities sets all linux capabilities for the process
   780  var WithAllCapabilities = func(ctx context.Context, client Client, c *containers.Container, s *Spec) error {
   781  	return WithCapabilities(GetAllCapabilities())(ctx, client, c, s)
   782  }
   783  
   784  // GetAllCapabilities returns all caps up to CAP_LAST_CAP
   785  // or CAP_BLOCK_SUSPEND on RHEL6
   786  func GetAllCapabilities() []string {
   787  	last := capability.CAP_LAST_CAP
   788  	// hack for RHEL6 which has no /proc/sys/kernel/cap_last_cap
   789  	if last == capability.Cap(63) {
   790  		last = capability.CAP_BLOCK_SUSPEND
   791  	}
   792  	var caps []string
   793  	for _, cap := range capability.List() {
   794  		if cap > last {
   795  			continue
   796  		}
   797  		caps = append(caps, "CAP_"+strings.ToUpper(cap.String()))
   798  	}
   799  	return caps
   800  }
   801  
   802  func capsContain(caps []string, s string) bool {
   803  	for _, c := range caps {
   804  		if c == s {
   805  			return true
   806  		}
   807  	}
   808  	return false
   809  }
   810  
   811  func removeCap(caps *[]string, s string) {
   812  	var newcaps []string
   813  	for _, c := range *caps {
   814  		if c == s {
   815  			continue
   816  		}
   817  		newcaps = append(newcaps, c)
   818  	}
   819  	*caps = newcaps
   820  }
   821  
   822  // WithAddedCapabilities adds the provided capabilities
   823  func WithAddedCapabilities(caps []string) SpecOpts {
   824  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   825  		setCapabilities(s)
   826  		for _, c := range caps {
   827  			for _, cl := range []*[]string{
   828  				&s.Process.Capabilities.Bounding,
   829  				&s.Process.Capabilities.Effective,
   830  				&s.Process.Capabilities.Permitted,
   831  				&s.Process.Capabilities.Inheritable,
   832  			} {
   833  				if !capsContain(*cl, c) {
   834  					*cl = append(*cl, c)
   835  				}
   836  			}
   837  		}
   838  		return nil
   839  	}
   840  }
   841  
   842  // WithDroppedCapabilities removes the provided capabilities
   843  func WithDroppedCapabilities(caps []string) SpecOpts {
   844  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   845  		setCapabilities(s)
   846  		for _, c := range caps {
   847  			for _, cl := range []*[]string{
   848  				&s.Process.Capabilities.Bounding,
   849  				&s.Process.Capabilities.Effective,
   850  				&s.Process.Capabilities.Permitted,
   851  				&s.Process.Capabilities.Inheritable,
   852  			} {
   853  				removeCap(cl, c)
   854  			}
   855  		}
   856  		return nil
   857  	}
   858  }
   859  
   860  // WithAmbientCapabilities set the Linux ambient capabilities for the process
   861  // Ambient capabilities should only be set for non-root users or the caller should
   862  // understand how these capabilities are used and set
   863  func WithAmbientCapabilities(caps []string) SpecOpts {
   864  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   865  		setCapabilities(s)
   866  
   867  		s.Process.Capabilities.Ambient = caps
   868  		return nil
   869  	}
   870  }
   871  
   872  var errNoUsersFound = errors.New("no users found")
   873  
   874  func getUserFromPath(root string, filter func(user.User) bool) (user.User, error) {
   875  	ppath, err := fs.RootPath(root, "/etc/passwd")
   876  	if err != nil {
   877  		return user.User{}, err
   878  	}
   879  	users, err := user.ParsePasswdFileFilter(ppath, filter)
   880  	if err != nil {
   881  		return user.User{}, err
   882  	}
   883  	if len(users) == 0 {
   884  		return user.User{}, errNoUsersFound
   885  	}
   886  	return users[0], nil
   887  }
   888  
   889  var errNoGroupsFound = errors.New("no groups found")
   890  
   891  func getGIDFromPath(root string, filter func(user.Group) bool) (gid uint32, err error) {
   892  	gpath, err := fs.RootPath(root, "/etc/group")
   893  	if err != nil {
   894  		return 0, err
   895  	}
   896  	groups, err := user.ParseGroupFileFilter(gpath, filter)
   897  	if err != nil {
   898  		return 0, err
   899  	}
   900  	if len(groups) == 0 {
   901  		return 0, errNoGroupsFound
   902  	}
   903  	g := groups[0]
   904  	return uint32(g.Gid), nil
   905  }
   906  
   907  func getSupplementalGroupsFromPath(root string, filter func(user.Group) bool) ([]uint32, error) {
   908  	gpath, err := fs.RootPath(root, "/etc/group")
   909  	if err != nil {
   910  		return []uint32{}, err
   911  	}
   912  	groups, err := user.ParseGroupFileFilter(gpath, filter)
   913  	if err != nil {
   914  		return []uint32{}, err
   915  	}
   916  	if len(groups) == 0 {
   917  		// if there are no additional groups; just return an empty set
   918  		return []uint32{}, nil
   919  	}
   920  	addlGids := []uint32{}
   921  	for _, grp := range groups {
   922  		addlGids = append(addlGids, uint32(grp.Gid))
   923  	}
   924  	return addlGids, nil
   925  }
   926  
   927  func isRootfsAbs(root string) bool {
   928  	return filepath.IsAbs(root)
   929  }
   930  
   931  // WithMaskedPaths sets the masked paths option
   932  func WithMaskedPaths(paths []string) SpecOpts {
   933  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   934  		setLinux(s)
   935  		s.Linux.MaskedPaths = paths
   936  		return nil
   937  	}
   938  }
   939  
   940  // WithReadonlyPaths sets the read only paths option
   941  func WithReadonlyPaths(paths []string) SpecOpts {
   942  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   943  		setLinux(s)
   944  		s.Linux.ReadonlyPaths = paths
   945  		return nil
   946  	}
   947  }
   948  
   949  // WithWriteableSysfs makes any sysfs mounts writeable
   950  func WithWriteableSysfs(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   951  	for i, m := range s.Mounts {
   952  		if m.Type == "sysfs" {
   953  			var options []string
   954  			for _, o := range m.Options {
   955  				if o == "ro" {
   956  					o = "rw"
   957  				}
   958  				options = append(options, o)
   959  			}
   960  			s.Mounts[i].Options = options
   961  		}
   962  	}
   963  	return nil
   964  }
   965  
   966  // WithWriteableCgroupfs makes any cgroup mounts writeable
   967  func WithWriteableCgroupfs(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   968  	for i, m := range s.Mounts {
   969  		if m.Type == "cgroup" {
   970  			var options []string
   971  			for _, o := range m.Options {
   972  				if o == "ro" {
   973  					o = "rw"
   974  				}
   975  				options = append(options, o)
   976  			}
   977  			s.Mounts[i].Options = options
   978  		}
   979  	}
   980  	return nil
   981  }
   982  
   983  // WithSelinuxLabel sets the process SELinux label
   984  func WithSelinuxLabel(label string) SpecOpts {
   985  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   986  		setProcess(s)
   987  		s.Process.SelinuxLabel = label
   988  		return nil
   989  	}
   990  }
   991  
   992  // WithApparmorProfile sets the Apparmor profile for the process
   993  func WithApparmorProfile(profile string) SpecOpts {
   994  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
   995  		setProcess(s)
   996  		s.Process.ApparmorProfile = profile
   997  		return nil
   998  	}
   999  }
  1000  
  1001  // WithSeccompUnconfined clears the seccomp profile
  1002  func WithSeccompUnconfined(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1003  	setLinux(s)
  1004  	s.Linux.Seccomp = nil
  1005  	return nil
  1006  }
  1007  
  1008  // WithParentCgroupDevices uses the default cgroup setup to inherit the container's parent cgroup's
  1009  // allowed and denied devices
  1010  func WithParentCgroupDevices(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1011  	setLinux(s)
  1012  	if s.Linux.Resources == nil {
  1013  		s.Linux.Resources = &specs.LinuxResources{}
  1014  	}
  1015  	s.Linux.Resources.Devices = nil
  1016  	return nil
  1017  }
  1018  
  1019  // WithAllDevicesAllowed permits READ WRITE MKNOD on all devices nodes for the container
  1020  func WithAllDevicesAllowed(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1021  	setLinux(s)
  1022  	if s.Linux.Resources == nil {
  1023  		s.Linux.Resources = &specs.LinuxResources{}
  1024  	}
  1025  	s.Linux.Resources.Devices = []specs.LinuxDeviceCgroup{
  1026  		{
  1027  			Allow:  true,
  1028  			Access: rwm,
  1029  		},
  1030  	}
  1031  	return nil
  1032  }
  1033  
  1034  // WithDefaultUnixDevices adds the default devices for unix such as /dev/null, /dev/random to
  1035  // the container's resource cgroup spec
  1036  func WithDefaultUnixDevices(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1037  	setLinux(s)
  1038  	if s.Linux.Resources == nil {
  1039  		s.Linux.Resources = &specs.LinuxResources{}
  1040  	}
  1041  	intptr := func(i int64) *int64 {
  1042  		return &i
  1043  	}
  1044  	s.Linux.Resources.Devices = append(s.Linux.Resources.Devices, []specs.LinuxDeviceCgroup{
  1045  		{
  1046  			// "/dev/null",
  1047  			Type:   "c",
  1048  			Major:  intptr(1),
  1049  			Minor:  intptr(3),
  1050  			Access: rwm,
  1051  			Allow:  true,
  1052  		},
  1053  		{
  1054  			// "/dev/random",
  1055  			Type:   "c",
  1056  			Major:  intptr(1),
  1057  			Minor:  intptr(8),
  1058  			Access: rwm,
  1059  			Allow:  true,
  1060  		},
  1061  		{
  1062  			// "/dev/full",
  1063  			Type:   "c",
  1064  			Major:  intptr(1),
  1065  			Minor:  intptr(7),
  1066  			Access: rwm,
  1067  			Allow:  true,
  1068  		},
  1069  		{
  1070  			// "/dev/tty",
  1071  			Type:   "c",
  1072  			Major:  intptr(5),
  1073  			Minor:  intptr(0),
  1074  			Access: rwm,
  1075  			Allow:  true,
  1076  		},
  1077  		{
  1078  			// "/dev/zero",
  1079  			Type:   "c",
  1080  			Major:  intptr(1),
  1081  			Minor:  intptr(5),
  1082  			Access: rwm,
  1083  			Allow:  true,
  1084  		},
  1085  		{
  1086  			// "/dev/urandom",
  1087  			Type:   "c",
  1088  			Major:  intptr(1),
  1089  			Minor:  intptr(9),
  1090  			Access: rwm,
  1091  			Allow:  true,
  1092  		},
  1093  		{
  1094  			// "/dev/console",
  1095  			Type:   "c",
  1096  			Major:  intptr(5),
  1097  			Minor:  intptr(1),
  1098  			Access: rwm,
  1099  			Allow:  true,
  1100  		},
  1101  		// /dev/pts/ - pts namespaces are "coming soon"
  1102  		{
  1103  			Type:   "c",
  1104  			Major:  intptr(136),
  1105  			Access: rwm,
  1106  			Allow:  true,
  1107  		},
  1108  		{
  1109  			Type:   "c",
  1110  			Major:  intptr(5),
  1111  			Minor:  intptr(2),
  1112  			Access: rwm,
  1113  			Allow:  true,
  1114  		},
  1115  		{
  1116  			// tuntap
  1117  			Type:   "c",
  1118  			Major:  intptr(10),
  1119  			Minor:  intptr(200),
  1120  			Access: rwm,
  1121  			Allow:  true,
  1122  		},
  1123  	}...)
  1124  	return nil
  1125  }
  1126  
  1127  // WithPrivileged sets up options for a privileged container
  1128  var WithPrivileged = Compose(
  1129  	WithAllCapabilities,
  1130  	WithMaskedPaths(nil),
  1131  	WithReadonlyPaths(nil),
  1132  	WithWriteableSysfs,
  1133  	WithWriteableCgroupfs,
  1134  	WithSelinuxLabel(""),
  1135  	WithApparmorProfile(""),
  1136  	WithSeccompUnconfined,
  1137  )
  1138  
  1139  // WithWindowsHyperV sets the Windows.HyperV section for HyperV isolation of containers.
  1140  func WithWindowsHyperV(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1141  	if s.Windows == nil {
  1142  		s.Windows = &specs.Windows{}
  1143  	}
  1144  	if s.Windows.HyperV == nil {
  1145  		s.Windows.HyperV = &specs.WindowsHyperV{}
  1146  	}
  1147  	return nil
  1148  }
  1149  
  1150  // WithMemoryLimit sets the `Linux.LinuxResources.Memory.Limit` section to the
  1151  // `limit` specified if the `Linux` section is not `nil`. Additionally sets the
  1152  // `Windows.WindowsResources.Memory.Limit` section if the `Windows` section is
  1153  // not `nil`.
  1154  func WithMemoryLimit(limit uint64) SpecOpts {
  1155  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1156  		if s.Linux != nil {
  1157  			if s.Linux.Resources == nil {
  1158  				s.Linux.Resources = &specs.LinuxResources{}
  1159  			}
  1160  			if s.Linux.Resources.Memory == nil {
  1161  				s.Linux.Resources.Memory = &specs.LinuxMemory{}
  1162  			}
  1163  			l := int64(limit)
  1164  			s.Linux.Resources.Memory.Limit = &l
  1165  		}
  1166  		if s.Windows != nil {
  1167  			if s.Windows.Resources == nil {
  1168  				s.Windows.Resources = &specs.WindowsResources{}
  1169  			}
  1170  			if s.Windows.Resources.Memory == nil {
  1171  				s.Windows.Resources.Memory = &specs.WindowsMemoryResources{}
  1172  			}
  1173  			s.Windows.Resources.Memory.Limit = &limit
  1174  		}
  1175  		return nil
  1176  	}
  1177  }
  1178  
  1179  // WithAnnotations appends or replaces the annotations on the spec with the
  1180  // provided annotations
  1181  func WithAnnotations(annotations map[string]string) SpecOpts {
  1182  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1183  		if s.Annotations == nil {
  1184  			s.Annotations = make(map[string]string)
  1185  		}
  1186  		for k, v := range annotations {
  1187  			s.Annotations[k] = v
  1188  		}
  1189  		return nil
  1190  	}
  1191  }
  1192  
  1193  // WithLinuxDevices adds the provided linux devices to the spec
  1194  func WithLinuxDevices(devices []specs.LinuxDevice) SpecOpts {
  1195  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1196  		setLinux(s)
  1197  		s.Linux.Devices = append(s.Linux.Devices, devices...)
  1198  		return nil
  1199  	}
  1200  }
  1201  
  1202  var ErrNotADevice = errors.New("not a device node")
  1203  
  1204  // WithLinuxDevice adds the device specified by path to the spec
  1205  func WithLinuxDevice(path, permissions string) SpecOpts {
  1206  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1207  		setLinux(s)
  1208  		setResources(s)
  1209  
  1210  		dev, err := deviceFromPath(path, permissions)
  1211  		if err != nil {
  1212  			return err
  1213  		}
  1214  
  1215  		s.Linux.Devices = append(s.Linux.Devices, *dev)
  1216  
  1217  		s.Linux.Resources.Devices = append(s.Linux.Resources.Devices, specs.LinuxDeviceCgroup{
  1218  			Type:   dev.Type,
  1219  			Allow:  true,
  1220  			Major:  &dev.Major,
  1221  			Minor:  &dev.Minor,
  1222  			Access: permissions,
  1223  		})
  1224  
  1225  		return nil
  1226  	}
  1227  }
  1228  
  1229  // WithEnvFile adds environment variables from a file to the container's spec
  1230  func WithEnvFile(path string) SpecOpts {
  1231  	return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
  1232  		var vars []string
  1233  		f, err := os.Open(path)
  1234  		if err != nil {
  1235  			return err
  1236  		}
  1237  		defer f.Close()
  1238  
  1239  		sc := bufio.NewScanner(f)
  1240  		for sc.Scan() {
  1241  			vars = append(vars, sc.Text())
  1242  		}
  1243  		if err = sc.Err(); err != nil {
  1244  			return err
  1245  		}
  1246  		return WithEnv(vars)(nil, nil, nil, s)
  1247  	}
  1248  }
  1249  
  1250  // ErrNoShmMount is returned when there is no /dev/shm mount specified in the config
  1251  // and an Opts was trying to set a configuration value on the mount.
  1252  var ErrNoShmMount = errors.New("no /dev/shm mount specified")
  1253  
  1254  // WithDevShmSize sets the size of the /dev/shm mount for the container.
  1255  //
  1256  // The size value is specified in kb, kilobytes.
  1257  func WithDevShmSize(kb int64) SpecOpts {
  1258  	return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
  1259  		for _, m := range s.Mounts {
  1260  			if m.Source == "shm" && m.Type == "tmpfs" {
  1261  				for i, o := range m.Options {
  1262  					if strings.HasPrefix(o, "size=") {
  1263  						m.Options[i] = fmt.Sprintf("size=%dk", kb)
  1264  						return nil
  1265  					}
  1266  				}
  1267  				m.Options = append(m.Options, fmt.Sprintf("size=%dk", kb))
  1268  				return nil
  1269  			}
  1270  		}
  1271  		return ErrNoShmMount
  1272  	}
  1273  }