mirror of
https://github.com/containers/podman.git
synced 2025-06-22 18:08:11 +08:00
Merge pull request #10407 from containers/dependabot/go_modules/github.com/opencontainers/runc-1.0.0-rc95
Bump github.com/opencontainers/runc from 1.0.0-rc94 to 1.0.0-rc95
This commit is contained in:
2
go.mod
2
go.mod
@ -46,7 +46,7 @@ require (
|
|||||||
github.com/onsi/gomega v1.12.0
|
github.com/onsi/gomega v1.12.0
|
||||||
github.com/opencontainers/go-digest v1.0.0
|
github.com/opencontainers/go-digest v1.0.0
|
||||||
github.com/opencontainers/image-spec v1.0.2-0.20190823105129-775207bd45b6
|
github.com/opencontainers/image-spec v1.0.2-0.20190823105129-775207bd45b6
|
||||||
github.com/opencontainers/runc v1.0.0-rc94
|
github.com/opencontainers/runc v1.0.0-rc95
|
||||||
github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417
|
github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417
|
||||||
github.com/opencontainers/runtime-tools v0.9.0
|
github.com/opencontainers/runtime-tools v0.9.0
|
||||||
github.com/opencontainers/selinux v1.8.1
|
github.com/opencontainers/selinux v1.8.1
|
||||||
|
3
go.sum
3
go.sum
@ -673,8 +673,9 @@ github.com/opencontainers/runc v1.0.0-rc8.0.20190926000215-3e425f80a8c9/go.mod h
|
|||||||
github.com/opencontainers/runc v1.0.0-rc9/go.mod h1:qT5XzbpPznkRYVz/mWwUaVBUv2rmF59PVA73FjuZG0U=
|
github.com/opencontainers/runc v1.0.0-rc9/go.mod h1:qT5XzbpPznkRYVz/mWwUaVBUv2rmF59PVA73FjuZG0U=
|
||||||
github.com/opencontainers/runc v1.0.0-rc91/go.mod h1:3Sm6Dt7OT8z88EbdQqqcRN2oCT54jbi72tT/HqgflT8=
|
github.com/opencontainers/runc v1.0.0-rc91/go.mod h1:3Sm6Dt7OT8z88EbdQqqcRN2oCT54jbi72tT/HqgflT8=
|
||||||
github.com/opencontainers/runc v1.0.0-rc93/go.mod h1:3NOsor4w32B2tC0Zbl8Knk4Wg84SM2ImC1fxBuqJ/H0=
|
github.com/opencontainers/runc v1.0.0-rc93/go.mod h1:3NOsor4w32B2tC0Zbl8Knk4Wg84SM2ImC1fxBuqJ/H0=
|
||||||
github.com/opencontainers/runc v1.0.0-rc94 h1:atqAFoBGp+Wkh9HKpYN3g/8NCbMzYG6SJrr+YgwamgM=
|
|
||||||
github.com/opencontainers/runc v1.0.0-rc94/go.mod h1:z+bZxa/+Tz/FmYVWkhUajJdzFeOqjc5vrqskhVyHGUM=
|
github.com/opencontainers/runc v1.0.0-rc94/go.mod h1:z+bZxa/+Tz/FmYVWkhUajJdzFeOqjc5vrqskhVyHGUM=
|
||||||
|
github.com/opencontainers/runc v1.0.0-rc95 h1:RMuWVfY3E1ILlVsC3RhIq38n4sJtlOFwU9gfFZSqrd0=
|
||||||
|
github.com/opencontainers/runc v1.0.0-rc95/go.mod h1:z+bZxa/+Tz/FmYVWkhUajJdzFeOqjc5vrqskhVyHGUM=
|
||||||
github.com/opencontainers/runtime-spec v0.1.2-0.20190507144316-5b71a03e2700/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
|
github.com/opencontainers/runtime-spec v0.1.2-0.20190507144316-5b71a03e2700/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
|
||||||
github.com/opencontainers/runtime-spec v1.0.1/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
|
github.com/opencontainers/runtime-spec v1.0.1/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
|
||||||
github.com/opencontainers/runtime-spec v1.0.2-0.20190207185410-29686dbc5559/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
|
github.com/opencontainers/runtime-spec v1.0.2-0.20190207185410-29686dbc5559/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
|
||||||
|
7
vendor/github.com/opencontainers/runc/libcontainer/configs/config.go
generated
vendored
7
vendor/github.com/opencontainers/runc/libcontainer/configs/config.go
generated
vendored
@ -31,9 +31,10 @@ type IDMap struct {
|
|||||||
// for syscalls. Additional architectures can be added by specifying them in
|
// for syscalls. Additional architectures can be added by specifying them in
|
||||||
// Architectures.
|
// Architectures.
|
||||||
type Seccomp struct {
|
type Seccomp struct {
|
||||||
DefaultAction Action `json:"default_action"`
|
DefaultAction Action `json:"default_action"`
|
||||||
Architectures []string `json:"architectures"`
|
Architectures []string `json:"architectures"`
|
||||||
Syscalls []*Syscall `json:"syscalls"`
|
Syscalls []*Syscall `json:"syscalls"`
|
||||||
|
DefaultErrnoRet *uint `json:"default_errno_ret"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Action is taken upon rule match in Seccomp
|
// Action is taken upon rule match in Seccomp
|
||||||
|
54
vendor/github.com/opencontainers/runc/libcontainer/utils/utils.go
generated
vendored
54
vendor/github.com/opencontainers/runc/libcontainer/utils/utils.go
generated
vendored
@ -3,12 +3,15 @@ package utils
|
|||||||
import (
|
import (
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"unsafe"
|
"unsafe"
|
||||||
|
|
||||||
|
"github.com/cyphar/filepath-securejoin"
|
||||||
"golang.org/x/sys/unix"
|
"golang.org/x/sys/unix"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -88,6 +91,57 @@ func CleanPath(path string) string {
|
|||||||
return filepath.Clean(path)
|
return filepath.Clean(path)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// stripRoot returns the passed path, stripping the root path if it was
|
||||||
|
// (lexicially) inside it. Note that both passed paths will always be treated
|
||||||
|
// as absolute, and the returned path will also always be absolute. In
|
||||||
|
// addition, the paths are cleaned before stripping the root.
|
||||||
|
func stripRoot(root, path string) string {
|
||||||
|
// Make the paths clean and absolute.
|
||||||
|
root, path = CleanPath("/"+root), CleanPath("/"+path)
|
||||||
|
switch {
|
||||||
|
case path == root:
|
||||||
|
path = "/"
|
||||||
|
case root == "/":
|
||||||
|
// do nothing
|
||||||
|
case strings.HasPrefix(path, root+"/"):
|
||||||
|
path = strings.TrimPrefix(path, root+"/")
|
||||||
|
}
|
||||||
|
return CleanPath("/" + path)
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithProcfd runs the passed closure with a procfd path (/proc/self/fd/...)
|
||||||
|
// corresponding to the unsafePath resolved within the root. Before passing the
|
||||||
|
// fd, this path is verified to have been inside the root -- so operating on it
|
||||||
|
// through the passed fdpath should be safe. Do not access this path through
|
||||||
|
// the original path strings, and do not attempt to use the pathname outside of
|
||||||
|
// the passed closure (the file handle will be freed once the closure returns).
|
||||||
|
func WithProcfd(root, unsafePath string, fn func(procfd string) error) error {
|
||||||
|
// Remove the root then forcefully resolve inside the root.
|
||||||
|
unsafePath = stripRoot(root, unsafePath)
|
||||||
|
path, err := securejoin.SecureJoin(root, unsafePath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("resolving path inside rootfs failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Open the target path.
|
||||||
|
fh, err := os.OpenFile(path, unix.O_PATH|unix.O_CLOEXEC, 0)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("open o_path procfd: %w", err)
|
||||||
|
}
|
||||||
|
defer fh.Close()
|
||||||
|
|
||||||
|
// Double-check the path is the one we expected.
|
||||||
|
procfd := "/proc/self/fd/" + strconv.Itoa(int(fh.Fd()))
|
||||||
|
if realpath, err := os.Readlink(procfd); err != nil {
|
||||||
|
return fmt.Errorf("procfd verification failed: %w", err)
|
||||||
|
} else if realpath != path {
|
||||||
|
return fmt.Errorf("possibly malicious path detected -- refusing to operate on %s", realpath)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Run the closure.
|
||||||
|
return fn(procfd)
|
||||||
|
}
|
||||||
|
|
||||||
// SearchLabels searches a list of key-value pairs for the provided key and
|
// SearchLabels searches a list of key-value pairs for the provided key and
|
||||||
// returns the corresponding value. The pairs must be separated with '='.
|
// returns the corresponding value. The pairs must be separated with '='.
|
||||||
func SearchLabels(labels []string, query string) string {
|
func SearchLabels(labels []string, query string) string {
|
||||||
|
2
vendor/modules.txt
vendored
2
vendor/modules.txt
vendored
@ -495,7 +495,7 @@ github.com/opencontainers/go-digest
|
|||||||
# github.com/opencontainers/image-spec v1.0.2-0.20190823105129-775207bd45b6
|
# github.com/opencontainers/image-spec v1.0.2-0.20190823105129-775207bd45b6
|
||||||
github.com/opencontainers/image-spec/specs-go
|
github.com/opencontainers/image-spec/specs-go
|
||||||
github.com/opencontainers/image-spec/specs-go/v1
|
github.com/opencontainers/image-spec/specs-go/v1
|
||||||
# github.com/opencontainers/runc v1.0.0-rc94
|
# github.com/opencontainers/runc v1.0.0-rc95
|
||||||
github.com/opencontainers/runc/libcontainer/apparmor
|
github.com/opencontainers/runc/libcontainer/apparmor
|
||||||
github.com/opencontainers/runc/libcontainer/cgroups
|
github.com/opencontainers/runc/libcontainer/cgroups
|
||||||
github.com/opencontainers/runc/libcontainer/cgroups/fscommon
|
github.com/opencontainers/runc/libcontainer/cgroups/fscommon
|
||||||
|
Reference in New Issue
Block a user