Merge pull request #24882 from giuseppe/keep-id-size

namespaces: allow configuring keep-id userns size
This commit is contained in:
openshift-merge-bot[bot]
2025-01-08 18:29:05 +00:00
committed by GitHub
6 changed files with 102 additions and 6 deletions

View File

@ -40,7 +40,7 @@ Podman allocates unique ranges of UIDs and GIDs from the `containers` subordinat
The option `--userns=keep-id` uses all the subuids and subgids of the user. The option `--userns=keep-id` uses all the subuids and subgids of the user.
The option `--userns=nomap` uses all the subuids and subgids of the user except the user's own ID. The option `--userns=nomap` uses all the subuids and subgids of the user except the user's own ID.
Using `--userns=auto` when starting new containers does not work as long as any containers exist that were started with `--userns=keep-id` or `--userns=nomap`. Using `--userns=auto` when starting new containers does not work as long as any containers exist that were started with `--userns=nomap` or `--userns=keep-id` without limiting the user namespace size.
Valid `auto` options: Valid `auto` options:
@ -62,6 +62,7 @@ For details see **--uidmap**.
- *uid*=UID: override the UID inside the container that is used to map the current user to. - *uid*=UID: override the UID inside the container that is used to map the current user to.
- *gid*=GID: override the GID inside the container that is used to map the current user to. - *gid*=GID: override the GID inside the container that is used to map the current user to.
- *size*=SIZE: override the size of the configured user namespace. It is useful to not saturate all the available IDs. Not supported when running as root.
**nomap**: creates a user namespace where the current rootless user's UID:GID are not mapped into the container. This option is not allowed for containers created by the root user. **nomap**: creates a user namespace where the current rootless user's UID:GID are not mapped into the container. This option is not allowed for containers created by the root user.

View File

@ -20,12 +20,14 @@ const (
pastaType = "pasta" pastaType = "pasta"
) )
// KeepIDUserNsOptions defines how to keepIDmatically create a user namespace. // KeepIDUserNsOptions defines how to create a user namespace using keep-id.
type KeepIDUserNsOptions struct { type KeepIDUserNsOptions struct {
// UID is the target uid in the user namespace. // UID is the target uid in the user namespace.
UID *uint32 UID *uint32
// GID is the target uid in the user namespace. // GID is the target uid in the user namespace.
GID *uint32 GID *uint32
// MaxSize is the maximum size of the user namespace.
MaxSize *uint32
} }
// CgroupMode represents cgroup mode in the container. // CgroupMode represents cgroup mode in the container.
@ -148,6 +150,13 @@ func (n UsernsMode) GetKeepIDOptions() (*KeepIDUserNsOptions, error) {
} }
v := uint32(s) v := uint32(s)
options.GID = &v options.GID = &v
case "size":
s, err := strconv.ParseUint(val, 10, 32)
if err != nil {
return nil, err
}
v := uint32(s)
options.MaxSize = &v
default: default:
return nil, fmt.Errorf("unknown option specified: %q", opt) return nil, fmt.Errorf("unknown option specified: %q", opt)
} }

View File

@ -12,6 +12,7 @@ import (
"github.com/containers/common/pkg/config" "github.com/containers/common/pkg/config"
"github.com/containers/podman/v5/libpod/define" "github.com/containers/podman/v5/libpod/define"
"github.com/containers/podman/v5/pkg/namespaces" "github.com/containers/podman/v5/pkg/namespaces"
"github.com/containers/podman/v5/pkg/rootless"
"github.com/containers/podman/v5/pkg/util" "github.com/containers/podman/v5/pkg/util"
"github.com/containers/storage/pkg/fileutils" "github.com/containers/storage/pkg/fileutils"
"github.com/containers/storage/pkg/unshare" "github.com/containers/storage/pkg/unshare"
@ -56,7 +57,7 @@ const (
// Pasta indicates that a pasta network stack should be used. // Pasta indicates that a pasta network stack should be used.
// Only used with the network namespace, invalid otherwise. // Only used with the network namespace, invalid otherwise.
Pasta NamespaceMode = "pasta" Pasta NamespaceMode = "pasta"
// KeepId indicates a user namespace to keep the owner uid inside // KeepID indicates a user namespace to keep the owner uid inside
// of the namespace itself. // of the namespace itself.
// Only used with the user namespace, invalid otherwise. // Only used with the user namespace, invalid otherwise.
KeepID NamespaceMode = "keep-id" KeepID NamespaceMode = "keep-id"
@ -514,6 +515,9 @@ func SetupUserNS(idmappings *storageTypes.IDMappingOptions, userns Namespace, g
if err != nil { if err != nil {
return user, err return user, err
} }
if opts.MaxSize != nil && !rootless.IsRootless() {
return user, fmt.Errorf("cannot set max size for user namespace when not running rootless")
}
mappings, uid, gid, err := util.GetKeepIDMapping(opts) mappings, uid, gid, err := util.GetKeepIDMapping(opts)
if err != nil { if err != nil {
return user, err return user, err

View File

@ -173,7 +173,7 @@ func ParseSignal(rawSignal string) (syscall.Signal, error) {
return sig, nil return sig, nil
} }
func getRootlessKeepIDMapping(uid, gid int, uids, gids []idtools.IDMap) (*stypes.IDMappingOptions, int, int, error) { func getRootlessKeepIDMapping(uid, gid int, uids, gids []idtools.IDMap, maxSize int) (*stypes.IDMappingOptions, int, int, error) {
options := stypes.IDMappingOptions{ options := stypes.IDMappingOptions{
HostUIDMapping: false, HostUIDMapping: false,
HostGIDMapping: false, HostGIDMapping: false,
@ -185,6 +185,11 @@ func getRootlessKeepIDMapping(uid, gid int, uids, gids []idtools.IDMap) (*stypes
for _, g := range gids { for _, g := range gids {
maxGID += g.Size maxGID += g.Size
} }
if maxSize > 0 {
// If maxSize is set, we need to ensure that the mappings are within the available range
maxUID = min(maxUID, maxSize-1)
maxGID = min(maxGID, maxSize-1)
}
options.UIDMap, options.GIDMap = nil, nil options.UIDMap, options.GIDMap = nil, nil
@ -240,13 +245,17 @@ func GetKeepIDMapping(opts *namespaces.KeepIDUserNsOptions) (*stypes.IDMappingOp
if opts.GID != nil { if opts.GID != nil {
gid = int(*opts.GID) gid = int(*opts.GID)
} }
maxSize := 0
if opts.MaxSize != nil {
maxSize = int(*opts.MaxSize)
}
uids, gids, err := rootless.GetConfiguredMappings(true) uids, gids, err := rootless.GetConfiguredMappings(true)
if err != nil { if err != nil {
return nil, -1, -1, fmt.Errorf("cannot read mappings: %w", err) return nil, -1, -1, fmt.Errorf("cannot read mappings: %w", err)
} }
return getRootlessKeepIDMapping(uid, gid, uids, gids) return getRootlessKeepIDMapping(uid, gid, uids, gids, maxSize)
} }
// GetNoMapMapping returns the mappings and the user to use when nomap is used // GetNoMapMapping returns the mappings and the user to use when nomap is used

View File

@ -595,6 +595,7 @@ func TestGetRootlessKeepIDMapping(t *testing.T) {
tests := []struct { tests := []struct {
uid, gid int uid, gid int
uids, gids []idtools.IDMap uids, gids []idtools.IDMap
size int
expectedOptions *stypes.IDMappingOptions expectedOptions *stypes.IDMappingOptions
expectedUID, expectedGID int expectedUID, expectedGID int
expectedError error expectedError error
@ -627,10 +628,70 @@ func TestGetRootlessKeepIDMapping(t *testing.T) {
expectedUID: 0, expectedUID: 0,
expectedGID: 0, expectedGID: 0,
}, },
{
uid: 0,
gid: 0,
uids: []idtools.IDMap{{ContainerID: 0, HostID: 100000, Size: 65536}},
gids: []idtools.IDMap{{ContainerID: 0, HostID: 100000, Size: 65536}},
expectedOptions: &stypes.IDMappingOptions{
HostUIDMapping: false,
HostGIDMapping: false,
UIDMap: []idtools.IDMap{{ContainerID: 0, HostID: 0, Size: 1}, {ContainerID: 1, HostID: 1, Size: 1023}},
GIDMap: []idtools.IDMap{{ContainerID: 0, HostID: 0, Size: 1}, {ContainerID: 1, HostID: 1, Size: 1023}},
},
expectedUID: 0,
expectedGID: 0,
size: 1024,
},
{
uid: 0,
gid: 0,
uids: []idtools.IDMap{{ContainerID: 0, HostID: 100000, Size: 65536}},
gids: []idtools.IDMap{{ContainerID: 0, HostID: 100000, Size: 65536}},
expectedOptions: &stypes.IDMappingOptions{
HostUIDMapping: false,
HostGIDMapping: false,
UIDMap: []idtools.IDMap{{ContainerID: 0, HostID: 0, Size: 1}},
GIDMap: []idtools.IDMap{{ContainerID: 0, HostID: 0, Size: 1}},
},
expectedUID: 0,
expectedGID: 0,
size: 1,
},
{
uid: 0,
gid: 0,
uids: []idtools.IDMap{{ContainerID: 0, HostID: 100000, Size: 65536}},
gids: []idtools.IDMap{{ContainerID: 0, HostID: 100000, Size: 65536}},
expectedOptions: &stypes.IDMappingOptions{
HostUIDMapping: false,
HostGIDMapping: false,
UIDMap: []idtools.IDMap{{ContainerID: 0, HostID: 0, Size: 1}, {ContainerID: 1, HostID: 1, Size: 1}},
GIDMap: []idtools.IDMap{{ContainerID: 0, HostID: 0, Size: 1}, {ContainerID: 1, HostID: 1, Size: 1}},
},
expectedUID: 0,
expectedGID: 0,
size: 2,
},
{
uid: 1000,
gid: 1000,
uids: []idtools.IDMap{},
gids: []idtools.IDMap{},
expectedOptions: &stypes.IDMappingOptions{
HostUIDMapping: false,
HostGIDMapping: false,
UIDMap: []idtools.IDMap{{ContainerID: 1000, HostID: 0, Size: 1}},
GIDMap: []idtools.IDMap{{ContainerID: 1000, HostID: 0, Size: 1}},
},
expectedUID: 1000,
expectedGID: 1000,
size: 1000000,
},
} }
for _, test := range tests { for _, test := range tests {
options, uid, gid, err := getRootlessKeepIDMapping(test.uid, test.gid, test.uids, test.gids) options, uid, gid, err := getRootlessKeepIDMapping(test.uid, test.gid, test.uids, test.gids, test.size)
assert.Nil(t, err) assert.Nil(t, err)
assert.Equal(t, test.expectedOptions, options) assert.Equal(t, test.expectedOptions, options)
assert.Equal(t, test.expectedUID, uid) assert.Equal(t, test.expectedUID, uid)

View File

@ -158,6 +158,18 @@ var _ = Describe("Podman UserNS support", func() {
Expect(session.OutputToString()).To(Equal("0")) Expect(session.OutputToString()).To(Equal("0"))
}) })
It("podman --userns=keep-id:size", func() {
session := podmanTest.Podman([]string{"run", "--userns=keep-id:size=10", ALPINE, "sh", "-c", "(awk 'BEGIN{SUM=0} {SUM += $3} END{print SUM}' < /proc/self/uid_map)"})
session.WaitWithDefaultTimeout()
if isRootless() {
Expect(session).Should(ExitCleanly())
Expect(session.OutputToString()).To(Equal("10"))
} else {
Expect(session).Should(ExitWithError(125, "cannot set max size for user namespace when not running rootless"))
}
})
It("podman --userns=keep-id --user root:root", func() { It("podman --userns=keep-id --user root:root", func() {
session := podmanTest.Podman([]string{"run", "--userns=keep-id", "--user", "root:root", "alpine", "id", "-u"}) session := podmanTest.Podman([]string{"run", "--userns=keep-id", "--user", "root:root", "alpine", "id", "-u"})
session.WaitWithDefaultTimeout() session.WaitWithDefaultTimeout()