1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138
|
// Copyright (c) 2018-2021, Sylabs Inc. All rights reserved.
// This software is licensed under a 3-clause BSD license. Please consult the
// LICENSE.md file distributed with the sources of this project regarding your
// rights to use or distribute this software.
package singularity
import (
"fmt"
"io"
"os"
"syscall"
"github.com/sylabs/singularity/v4/internal/pkg/util/user"
"github.com/sylabs/singularity/v4/pkg/sylog"
"github.com/sylabs/singularity/v4/pkg/util/capabilities"
)
// CapManageConfig specifies what capability set to edit in the capability file
type CapManageConfig struct {
Caps string
User string
Group string
}
type manageType struct {
UserFn func(*capabilities.Config, string, []string) error
GroupFn func(*capabilities.Config, string, []string) error
}
// CapabilityAdd adds the specified capability set to the capability file
func CapabilityAdd(capFile string, c CapManageConfig) error {
addType := manageType{
UserFn: func(c *capabilities.Config, a string, b []string) error {
return c.AddUserCaps(a, b)
},
GroupFn: func(c *capabilities.Config, a string, b []string) error {
return c.AddGroupCaps(a, b)
},
}
return manageCaps(capFile, c, addType)
}
// CapabilityDrop drops the specified capability set from the capability file
func CapabilityDrop(capFile string, c CapManageConfig) error {
dropType := manageType{
UserFn: func(c *capabilities.Config, a string, b []string) error {
return c.DropUserCaps(a, b)
},
GroupFn: func(c *capabilities.Config, a string, b []string) error {
return c.DropGroupCaps(a, b)
},
}
return manageCaps(capFile, c, dropType)
}
func manageCaps(capFile string, c CapManageConfig, t manageType) error {
if os.Getuid() != 0 {
return fmt.Errorf("while managing capability file: only root user can manage capabilities")
}
oldmask := syscall.Umask(0)
defer syscall.Umask(oldmask)
file, err := os.OpenFile(capFile, os.O_RDWR|os.O_CREATE, 0o644)
if err != nil {
return fmt.Errorf("while opening capability config file: %s", err)
}
defer file.Close()
capConfig, err := capabilities.ReadFrom(file)
if err != nil {
return fmt.Errorf("while parsing capability config data: %s", err)
}
caps, ign := capabilities.Split(c.Caps)
if len(ign) > 0 {
sylog.Warningf("Ignoring unknown capabilities: %s", ign)
}
if c.User == "" && c.Group == "" {
return fmt.Errorf("no user or group specified")
}
if c.User != "" {
if !userExists(c.User) {
return fmt.Errorf("while setting capabilities for user %s: user does not exist", c.User)
}
if err := t.UserFn(capConfig, c.User, caps); err != nil {
return fmt.Errorf("while setting capabilities for user %s: %s", c.User, err)
}
}
if c.Group != "" {
if !groupExists(c.Group) {
return fmt.Errorf("while setting capabilities for group %s: group does not exist", c.Group)
}
if err := t.GroupFn(capConfig, c.Group, caps); err != nil {
return fmt.Errorf("while setting capabilities for group %s: %s", c.Group, err)
}
}
if err := file.Truncate(0); err != nil {
return fmt.Errorf("while truncating capability config file: %s", err)
}
if n, err := file.Seek(0, io.SeekStart); err != nil || n != 0 {
return fmt.Errorf("failed to reset %s cursor: %s", file.Name(), err)
}
if _, err := capConfig.WriteTo(file); err != nil {
return fmt.Errorf("while writing capability data to file: %s", err)
}
if err := file.Sync(); err != nil {
return fmt.Errorf("failed to flush capability config file %s: %s", file.Name(), err)
}
return nil
}
func userExists(usr string) bool {
if _, err := user.GetPwNam(usr); err != nil {
return false
}
return true
}
func groupExists(group string) bool {
if _, err := user.GetGrNam(group); err != nil {
return false
}
return true
}
|