forked from firecracker-microvm/firecracker-go-sdk
-
Notifications
You must be signed in to change notification settings - Fork 0
/
jailer.go
491 lines (406 loc) · 13.6 KB
/
jailer.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License"). You may
// not use this file except in compliance with the License. A copy of the
// License is located at
//
// http://aws.amazon.com/apache2.0/
//
// or in the "license" file accompanying this file. This file is distributed
// on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
// express or implied. See the License for the specific language governing
// permissions and limitations under the License.
package firecracker
import (
"context"
"fmt"
"io"
"io/ioutil"
"os"
"os/exec"
"path/filepath"
"strconv"
"strings"
)
const (
// defaultJailerPath is the default chroot base directory that the jailer
// will use if no other base directory was provided.
defaultJailerPath = "/srv/jailer"
defaultJailerBin = "jailer"
rootfsFolderName = "root"
defaultSocketPath = "/run/firecracker.socket"
)
var (
// ErrMissingJailerConfig will occur when entering jailer logic but the
// jailer config had not been specified.
ErrMissingJailerConfig = fmt.Errorf("jailer config was not set for use")
)
// JailerConfig is jailer specific configuration needed to execute the jailer.
type JailerConfig struct {
// GID the jailer switches to as it execs the target binary.
GID *int
// UID the jailer switches to as it execs the target binary.
UID *int
// ID is the unique VM identification string, which may contain alphanumeric
// characters and hyphens. The maximum id length is currently 64 characters
ID string
// NumaNode represents the NUMA node the process gets assigned to.
NumaNode *int
// ExecFile is the path to the Firecracker binary that will be exec-ed by
// the jailer. The user can provide a path to any binary, but the interaction
// with the jailer is mostly Firecracker specific.
ExecFile string
// JailerBinary specifies the jailer binary to be used for setting up the
// Firecracker VM jail. If the value contains no path separators, it will
// use the PATH environment variable to get the absolute path of the binary.
// If the value contains path separators, the value will be used directly
// to exec the jailer. This follows the same conventions as Golang's
// os/exec.Command.
//
// If not specified it defaults to "jailer".
JailerBinary string
// ChrootBaseDir represents the base folder where chroot jails are built. The
// default is /srv/jailer
ChrootBaseDir string
// Daemonize is set to true, call setsid() and redirect STDIN, STDOUT, and
// STDERR to /dev/null
Daemonize bool
// ChrootStrategy will dictate how files are transfered to the root drive.
ChrootStrategy HandlersAdapter
// CgroupVersion is the version of the cgroup filesystem to use.
CgroupVersion string
// Stdout specifies the IO writer for STDOUT to use when spawning the jailer.
Stdout io.Writer
// Stderr specifies the IO writer for STDERR to use when spawning the jailer.
Stderr io.Writer
// Stdin specifies the IO reader for STDIN to use when spawning the jailer.
Stdin io.Reader
}
// JailerCommandBuilder will build a jailer command. This can be used to
// specify that a jailed firecracker executable wants to be run on the Machine.
type JailerCommandBuilder struct {
bin string
id string
uid int
gid int
execFile string
node int
// optional params
chrootBaseDir string
netNS string
daemonize bool
firecrackerArgs []string
cgroupVersion string
stdin io.Reader
stdout io.Writer
stderr io.Writer
}
// NewJailerCommandBuilder will return a new jailer command builder with the
// proper default value initialized.
func NewJailerCommandBuilder() JailerCommandBuilder {
return JailerCommandBuilder{}.WithBin(defaultJailerBin)
}
// getNumaCpuset returns the CPU list assigned to a NUMA node
func getNumaCpuset(node int) string {
if cpus, err := ioutil.ReadFile(fmt.Sprintf("/sys/devices/system/node/node%d/cpulist", node)); err == nil {
return strings.TrimSuffix(string(cpus), "\n")
}
return ""
}
// Args returns the specified set of args to be used
// in command construction.
func (b JailerCommandBuilder) Args() []string {
args := []string{}
args = append(args, "--id", b.id)
args = append(args, "--uid", strconv.Itoa(b.uid))
args = append(args, "--gid", strconv.Itoa(b.gid))
args = append(args, "--exec-file", b.execFile)
if cpulist := getNumaCpuset(b.node); len(cpulist) > 0 {
args = append(args, "--cgroup", fmt.Sprintf("cpuset.mems=%d", b.node))
args = append(args, "--cgroup", fmt.Sprintf("cpuset.cpus=%s", cpulist))
}
if len(b.cgroupVersion) > 0 {
args = append(args, "--cgroup-version", b.cgroupVersion)
}
if len(b.chrootBaseDir) > 0 {
args = append(args, "--chroot-base-dir", b.chrootBaseDir)
}
if len(b.netNS) > 0 {
args = append(args, "--netns", b.netNS)
}
if b.daemonize {
args = append(args, "--daemonize")
}
if len(b.firecrackerArgs) > 0 {
args = append(args, "--")
args = append(args, b.firecrackerArgs...)
}
return args
}
// Bin returns the jailer bin path. If bin path is empty, then the default path
// will be returned.
func (b JailerCommandBuilder) Bin() string {
return b.bin
}
// WithBin will set the specific bin path to the builder.
func (b JailerCommandBuilder) WithBin(bin string) JailerCommandBuilder {
b.bin = bin
return b
}
// WithID will set the specified id to the builder.
func (b JailerCommandBuilder) WithID(id string) JailerCommandBuilder {
b.id = id
return b
}
// WithUID will set the specified uid to the builder.
func (b JailerCommandBuilder) WithUID(uid int) JailerCommandBuilder {
b.uid = uid
return b
}
// WithGID will set the specified gid to the builder.
func (b JailerCommandBuilder) WithGID(gid int) JailerCommandBuilder {
b.gid = gid
return b
}
// WithExecFile will set the specified path to the builder. This represents a
// firecracker binary used when calling the jailer.
func (b JailerCommandBuilder) WithExecFile(path string) JailerCommandBuilder {
b.execFile = path
return b
}
// WithNumaNode uses the specfied node for the jailer. This represents the numa
// node that the process will get assigned to.
func (b JailerCommandBuilder) WithNumaNode(node int) JailerCommandBuilder {
b.node = node
return b
}
// WithChrootBaseDir will set the given path as the chroot base directory. This
// specifies where chroot jails are built and defaults to /srv/jailer.
func (b JailerCommandBuilder) WithChrootBaseDir(path string) JailerCommandBuilder {
b.chrootBaseDir = path
return b
}
// WithNetNS will set the given path to the net namespace of the builder. This
// represents the path to a network namespace handle and will be used to join
// the associated network namepsace.
func (b JailerCommandBuilder) WithNetNS(path string) JailerCommandBuilder {
b.netNS = path
return b
}
// WithDaemonize will specify whether to set stdio to /dev/null
func (b JailerCommandBuilder) WithDaemonize(daemonize bool) JailerCommandBuilder {
b.daemonize = daemonize
return b
}
// Stdout will return the stdout that will be used when creating the
// firecracker exec.Command
func (b JailerCommandBuilder) Stdout() io.Writer {
return b.stdout
}
// WithStdout specifies which io.Writer to use in place of the os.Stdout in the
// firecracker exec.Command.
func (b JailerCommandBuilder) WithStdout(stdout io.Writer) JailerCommandBuilder {
b.stdout = stdout
return b
}
// Stderr will return the stderr that will be used when creating the
// firecracker exec.Command
func (b JailerCommandBuilder) Stderr() io.Writer {
return b.stderr
}
// WithStderr specifies which io.Writer to use in place of the os.Stderr in the
// firecracker exec.Command.
func (b JailerCommandBuilder) WithStderr(stderr io.Writer) JailerCommandBuilder {
b.stderr = stderr
return b
}
// Stdin will return the stdin that will be used when creating the firecracker
// exec.Command
func (b JailerCommandBuilder) Stdin() io.Reader {
return b.stdin
}
// WithStdin specifies which io.Reader to use in place of the os.Stdin in the
// firecracker exec.Command.
func (b JailerCommandBuilder) WithStdin(stdin io.Reader) JailerCommandBuilder {
b.stdin = stdin
return b
}
// WithFirecrackerArgs will adds these arguments to the end of the argument
// chain which the jailer will intepret to belonging to Firecracke
func (b JailerCommandBuilder) WithFirecrackerArgs(args ...string) JailerCommandBuilder {
b.firecrackerArgs = args
return b
}
// WithCgroupVersion specifies which cgroup version to use
func (b JailerCommandBuilder) WithCgroupVersion(version string) JailerCommandBuilder {
b.cgroupVersion = version
return b
}
// Build will build a jailer command.
func (b JailerCommandBuilder) Build(ctx context.Context) *exec.Cmd {
cmd := exec.CommandContext(
ctx,
b.Bin(),
b.Args()...,
)
if stdin := b.Stdin(); stdin != nil {
cmd.Stdin = stdin
}
if stdout := b.Stdout(); stdout != nil {
cmd.Stdout = stdout
}
if stderr := b.Stderr(); stderr != nil {
cmd.Stderr = stderr
}
return cmd
}
// Jail will set up proper handlers and remove configuration validation due to
// stating of files
func jail(ctx context.Context, m *Machine, cfg *Config) error {
jailerWorkspaceDir := ""
if len(cfg.JailerCfg.ChrootBaseDir) > 0 {
jailerWorkspaceDir = filepath.Join(cfg.JailerCfg.ChrootBaseDir, filepath.Base(cfg.JailerCfg.ExecFile), cfg.JailerCfg.ID, rootfsFolderName)
} else {
jailerWorkspaceDir = filepath.Join(defaultJailerPath, filepath.Base(cfg.JailerCfg.ExecFile), cfg.JailerCfg.ID, rootfsFolderName)
}
var machineSocketPath string
if cfg.SocketPath != "" {
machineSocketPath = cfg.SocketPath
} else {
machineSocketPath = defaultSocketPath
}
cfg.SocketPath = filepath.Join(jailerWorkspaceDir, machineSocketPath)
stdout := cfg.JailerCfg.Stdout
if stdout == nil {
stdout = os.Stdout
}
stderr := cfg.JailerCfg.Stderr
if stderr == nil {
stderr = os.Stderr
}
fcArgs := seccompArgs(cfg)
fcArgs = append(fcArgs, "--api-sock", machineSocketPath)
builder := NewJailerCommandBuilder().
WithID(cfg.JailerCfg.ID).
WithUID(*cfg.JailerCfg.UID).
WithGID(*cfg.JailerCfg.GID).
WithNumaNode(*cfg.JailerCfg.NumaNode).
WithExecFile(cfg.JailerCfg.ExecFile).
WithChrootBaseDir(cfg.JailerCfg.ChrootBaseDir).
WithDaemonize(cfg.JailerCfg.Daemonize).
WithCgroupVersion(cfg.JailerCfg.CgroupVersion).
WithFirecrackerArgs(fcArgs...).
WithStdout(stdout).
WithStderr(stderr)
if jailerBinary := cfg.JailerCfg.JailerBinary; jailerBinary != "" {
builder = builder.WithBin(jailerBinary)
}
if cfg.NetNS != "" {
builder = builder.WithNetNS(cfg.NetNS)
}
if stdin := cfg.JailerCfg.Stdin; stdin != nil {
builder = builder.WithStdin(stdin)
}
m.cmd = builder.Build(ctx)
if err := cfg.JailerCfg.ChrootStrategy.AdaptHandlers(&m.Handlers); err != nil {
return err
}
return nil
}
// LinkFilesHandler creates a new link files handler that will link files to
// the rootfs
func LinkFilesHandler(kernelImageFileName string) Handler {
return Handler{
Name: LinkFilesToRootFSHandlerName,
Fn: func(ctx context.Context, m *Machine) error {
if m.Cfg.JailerCfg == nil {
return ErrMissingJailerConfig
}
// assemble the path to the jailed root folder on the host
rootfs := filepath.Join(
m.Cfg.JailerCfg.ChrootBaseDir,
filepath.Base(m.Cfg.JailerCfg.ExecFile),
m.Cfg.JailerCfg.ID,
rootfsFolderName,
)
// copy kernel image to root fs
if err := os.Link(
m.Cfg.KernelImagePath,
filepath.Join(rootfs, kernelImageFileName),
); err != nil {
return err
}
initrdFilename := ""
if m.Cfg.InitrdPath != "" {
initrdFilename = filepath.Base(m.Cfg.InitrdPath)
// copy initrd to root fs
if err := os.Link(
m.Cfg.InitrdPath,
filepath.Join(rootfs, initrdFilename),
); err != nil {
return err
}
}
// copy all drives to the root fs
for i, drive := range m.Cfg.Drives {
hostPath := StringValue(drive.PathOnHost)
driveFileName := filepath.Base(hostPath)
if err := os.Link(
hostPath,
filepath.Join(rootfs, driveFileName),
); err != nil {
return err
}
m.Cfg.Drives[i].PathOnHost = String(driveFileName)
}
m.Cfg.KernelImagePath = kernelImageFileName
if m.Cfg.InitrdPath != "" {
m.Cfg.InitrdPath = initrdFilename
}
for _, fifoPath := range []*string{&m.Cfg.LogFifo, &m.Cfg.MetricsFifo} {
if fifoPath == nil || *fifoPath == "" {
continue
}
fileName := filepath.Base(*fifoPath)
if err := os.Link(
*fifoPath,
filepath.Join(rootfs, fileName),
); err != nil {
return err
}
if err := os.Chown(filepath.Join(rootfs, fileName), *m.Cfg.JailerCfg.UID, *m.Cfg.JailerCfg.GID); err != nil {
return err
}
// update fifoPath as jailer works relative to the chroot dir
*fifoPath = fileName
}
return nil
},
}
}
// NaiveChrootStrategy will simply hard link all files, drives and kernel
// image, to the root drive.
type NaiveChrootStrategy struct {
Rootfs string
KernelImagePath string
}
// NewNaiveChrootStrategy returns a new NaivceChrootStrategy
func NewNaiveChrootStrategy(kernelImagePath string) NaiveChrootStrategy {
return NaiveChrootStrategy{
KernelImagePath: kernelImagePath,
}
}
// ErrRequiredHandlerMissing occurs when a required handler is not present in
// the handler list.
var ErrRequiredHandlerMissing = fmt.Errorf("required handler is missing from FcInit's list")
// AdaptHandlers will inject the LinkFilesHandler into the handler list.
func (s NaiveChrootStrategy) AdaptHandlers(handlers *Handlers) error {
if !handlers.FcInit.Has(CreateLogFilesHandlerName) {
return ErrRequiredHandlerMissing
}
handlers.FcInit = handlers.FcInit.AppendAfter(
CreateLogFilesHandlerName,
LinkFilesHandler(filepath.Base(s.KernelImagePath)),
)
return nil
}