sandbox: move out of internal
Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
95
sandbox/mount.go
Normal file
95
sandbox/mount.go
Normal file
@@ -0,0 +1,95 @@
|
||||
package sandbox
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"os"
|
||||
"strings"
|
||||
"syscall"
|
||||
)
|
||||
|
||||
const (
|
||||
BindOptional = 1 << iota
|
||||
BindSource
|
||||
BindRecursive
|
||||
BindWritable
|
||||
BindDevices
|
||||
)
|
||||
|
||||
func bindMount(src, dest string, flags int) error {
|
||||
target := toSysroot(dest)
|
||||
var source string
|
||||
|
||||
if flags&BindSource == 0 {
|
||||
// this is what bwrap does, so the behaviour is kept for now,
|
||||
// however recursively resolving links might improve user experience
|
||||
if rp, err := realpathHost(src); err != nil {
|
||||
if os.IsNotExist(err) {
|
||||
if flags&BindOptional != 0 {
|
||||
return nil
|
||||
} else {
|
||||
return msg.WrapErr(err,
|
||||
fmt.Sprintf("path %q does not exist", src))
|
||||
}
|
||||
}
|
||||
return msg.WrapErr(err, err.Error())
|
||||
} else {
|
||||
source = toHost(rp)
|
||||
}
|
||||
} else if flags&BindOptional != 0 {
|
||||
return msg.WrapErr(syscall.EINVAL,
|
||||
"flag source excludes optional")
|
||||
} else {
|
||||
source = toHost(src)
|
||||
}
|
||||
|
||||
if fi, err := os.Stat(source); err != nil {
|
||||
return msg.WrapErr(err, err.Error())
|
||||
} else if fi.IsDir() {
|
||||
if err = os.MkdirAll(target, 0755); err != nil {
|
||||
return wrapErrSuffix(err,
|
||||
fmt.Sprintf("cannot create directory %q:", dest))
|
||||
}
|
||||
} else if err = ensureFile(target, 0444); err != nil {
|
||||
if errors.Is(err, syscall.EISDIR) {
|
||||
return msg.WrapErr(err,
|
||||
fmt.Sprintf("path %q is a directory", dest))
|
||||
}
|
||||
return wrapErrSuffix(err,
|
||||
fmt.Sprintf("cannot create %q:", dest))
|
||||
}
|
||||
|
||||
var mf uintptr = syscall.MS_SILENT | syscall.MS_BIND
|
||||
if flags&BindRecursive != 0 {
|
||||
mf |= syscall.MS_REC
|
||||
}
|
||||
if flags&BindWritable == 0 {
|
||||
mf |= syscall.MS_RDONLY
|
||||
}
|
||||
if flags&BindDevices == 0 {
|
||||
mf |= syscall.MS_NODEV
|
||||
}
|
||||
if msg.IsVerbose() {
|
||||
if strings.TrimPrefix(source, hostPath) == strings.TrimPrefix(target, sysrootPath) {
|
||||
msg.Verbosef("resolved %q flags %#x", target, mf)
|
||||
} else {
|
||||
msg.Verbosef("resolved %q on %q flags %#x", source, target, mf)
|
||||
}
|
||||
}
|
||||
return wrapErrSuffix(syscall.Mount(source, target, "", mf, ""),
|
||||
fmt.Sprintf("cannot bind %q on %q:", src, dest))
|
||||
}
|
||||
|
||||
func mountTmpfs(fsname, name string, size int, perm os.FileMode) error {
|
||||
target := toSysroot(name)
|
||||
if err := os.MkdirAll(target, perm); err != nil {
|
||||
return err
|
||||
}
|
||||
opt := fmt.Sprintf("mode=%#o", perm)
|
||||
if size > 0 {
|
||||
opt += fmt.Sprintf(",size=%d", size)
|
||||
}
|
||||
return wrapErrSuffix(syscall.Mount(fsname, target, "tmpfs",
|
||||
syscall.MS_NOSUID|syscall.MS_NODEV, opt),
|
||||
fmt.Sprintf("cannot mount tmpfs on %q:", name))
|
||||
}
|
||||
Reference in New Issue
Block a user