mirror of
https://github.com/containers/podman.git
synced 2025-06-19 00:06:43 +08:00

Lots of fixes for issues found by podman. overlay: propagate errors from mountProgram utils: root in a userns uses global conf file Fix handling of additional stores Correctly check permissions on rootless directory Fix possible integer overflow on 32bit builds Evaluate device path for lvm lockfile test: make concurrent RW test determinisitc lockfile test: make concurrent read tests deterministic Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
64 lines
1.6 KiB
Go
64 lines
1.6 KiB
Go
package idtools
|
|
|
|
import (
|
|
"fmt"
|
|
"math"
|
|
"math/bits"
|
|
"strconv"
|
|
"strings"
|
|
)
|
|
|
|
func nonDigitsToWhitespace(r rune) rune {
|
|
if !strings.ContainsRune("0123456789", r) {
|
|
return ' '
|
|
}
|
|
return r
|
|
}
|
|
|
|
func parseTriple(spec []string) (container, host, size uint32, err error) {
|
|
cid, err := strconv.ParseUint(spec[0], 10, 32)
|
|
if err != nil {
|
|
return 0, 0, 0, fmt.Errorf("error parsing id map value %q: %v", spec[0], err)
|
|
}
|
|
hid, err := strconv.ParseUint(spec[1], 10, 32)
|
|
if err != nil {
|
|
return 0, 0, 0, fmt.Errorf("error parsing id map value %q: %v", spec[1], err)
|
|
}
|
|
sz, err := strconv.ParseUint(spec[2], 10, 32)
|
|
if err != nil {
|
|
return 0, 0, 0, fmt.Errorf("error parsing id map value %q: %v", spec[2], err)
|
|
}
|
|
return uint32(cid), uint32(hid), uint32(sz), nil
|
|
}
|
|
|
|
// ParseIDMap parses idmap triples from string.
|
|
func ParseIDMap(mapSpec []string, mapSetting string) (idmap []IDMap, err error) {
|
|
stdErr := fmt.Errorf("error initializing ID mappings: %s setting is malformed", mapSetting)
|
|
for _, idMapSpec := range mapSpec {
|
|
idSpec := strings.Fields(strings.Map(nonDigitsToWhitespace, idMapSpec))
|
|
if len(idSpec)%3 != 0 {
|
|
return nil, stdErr
|
|
}
|
|
for i := range idSpec {
|
|
if i%3 != 0 {
|
|
continue
|
|
}
|
|
cid, hid, size, err := parseTriple(idSpec[i : i+3])
|
|
if err != nil {
|
|
return nil, stdErr
|
|
}
|
|
// Avoid possible integer overflow on 32bit builds
|
|
if bits.UintSize == 32 && (cid > math.MaxInt32 || hid > math.MaxInt32 || size > math.MaxInt32) {
|
|
return nil, stdErr
|
|
}
|
|
mapping := IDMap{
|
|
ContainerID: int(cid),
|
|
HostID: int(hid),
|
|
Size: int(size),
|
|
}
|
|
idmap = append(idmap, mapping)
|
|
}
|
|
}
|
|
return idmap, nil
|
|
}
|