/* SPDX-License-Identifier: LGPL-2.1-or-later */ #include "alloc-util.h" #include "cap-list.h" #include "conf-parser.h" #include "cpu-set-util.h" #include "hostname-util.h" #include "namespace-util.h" #include "nspawn-network.h" #include "nspawn-settings.h" #include "parse-util.h" #include "process-util.h" #include "rlimit-util.h" #include "socket-util.h" #include "string-table.h" #include "string-util.h" #include "strv.h" #include "user-util.h" #include "util.h" Settings *settings_new(void) { Settings *s; s = new(Settings, 1); if (!s) return NULL; *s = (Settings) { .start_mode = _START_MODE_INVALID, .ephemeral = -1, .personality = PERSONALITY_INVALID, .resolv_conf = _RESOLV_CONF_MODE_INVALID, .link_journal = _LINK_JOURNAL_INVALID, .timezone = _TIMEZONE_MODE_INVALID, .userns_mode = _USER_NAMESPACE_MODE_INVALID, .userns_ownership = _USER_NAMESPACE_OWNERSHIP_INVALID, .uid_shift = UID_INVALID, .uid_range = UID_INVALID, .no_new_privileges = -1, .read_only = -1, .volatile_mode = _VOLATILE_MODE_INVALID, .private_network = -1, .network_veth = -1, .full_capabilities = CAPABILITY_QUINTET_NULL, .uid = UID_INVALID, .gid = GID_INVALID, .console_mode = _CONSOLE_MODE_INVALID, .console_width = UINT_MAX, .console_height = UINT_MAX, .clone_ns_flags = ULONG_MAX, .use_cgns = -1, .notify_ready = -1, .suppress_sync = -1, }; return s; } int settings_load(FILE *f, const char *path, Settings **ret) { _cleanup_(settings_freep) Settings *s = NULL; int r; assert(path); assert(ret); s = settings_new(); if (!s) return -ENOMEM; r = config_parse(NULL, path, f, "Exec\0" "Network\0" "Files\0", config_item_perf_lookup, nspawn_gperf_lookup, CONFIG_PARSE_WARN, s, NULL); if (r < 0) return r; /* Make sure that if userns_mode is set, userns_chown is set to something appropriate, and vice versa. Either * both fields shall be initialized or neither. */ if (s->userns_mode >= 0 && s->userns_ownership < 0) s->userns_ownership = s->userns_mode == USER_NAMESPACE_PICK ? USER_NAMESPACE_OWNERSHIP_CHOWN : USER_NAMESPACE_OWNERSHIP_OFF; if (s->userns_ownership >= 0 && s->userns_mode < 0) s->userns_mode = USER_NAMESPACE_NO; *ret = TAKE_PTR(s); return 0; } static void free_oci_hooks(OciHook *h, size_t n) { size_t i; assert(h || n == 0); for (i = 0; i < n; i++) { free(h[i].path); strv_free(h[i].args); strv_free(h[i].env); } free(h); } void device_node_array_free(DeviceNode *node, size_t n) { size_t i; for (i = 0; i < n; i++) free(node[i].path); free(node); } Settings* settings_free(Settings *s) { if (!s) return NULL; strv_free(s->parameters); strv_free(s->environment); free(s->user); free(s->pivot_root_new); free(s->pivot_root_old); free(s->working_directory); strv_free(s->syscall_allow_list); strv_free(s->syscall_deny_list); rlimit_free_all(s->rlimit); free(s->hostname); cpu_set_reset(&s->cpu_set); strv_free(s->bind_user); strv_free(s->network_interfaces); strv_free(s->network_macvlan); strv_free(s->network_ipvlan); strv_free(s->network_veth_extra); free(s->network_bridge); free(s->network_zone); expose_port_free_all(s->expose_ports); custom_mount_free_all(s->custom_mounts, s->n_custom_mounts); free(s->bundle); free(s->root); free_oci_hooks(s->oci_hooks_prestart, s->n_oci_hooks_prestart); free_oci_hooks(s->oci_hooks_poststart, s->n_oci_hooks_poststart); free_oci_hooks(s->oci_hooks_poststop, s->n_oci_hooks_poststop); free(s->slice); sd_bus_message_unref(s->properties); free(s->supplementary_gids); device_node_array_free(s->extra_nodes, s->n_extra_nodes); free(s->network_namespace_path); strv_free(s->sysctl); #if HAVE_SECCOMP seccomp_release(s->seccomp); #endif return mfree(s); } bool settings_private_network(Settings *s) { assert(s); /* Determines whether we shall open up our own private network */ return s->private_network > 0 || s->network_veth > 0 || s->network_bridge || s->network_zone || s->network_interfaces || s->network_macvlan || s->network_ipvlan || s->network_veth_extra; } bool settings_network_veth(Settings *s) { assert(s); return s->network_veth > 0 || s->network_bridge || s->network_zone; } bool settings_network_configured(Settings *s) { assert(s); /* Determines whether any network configuration setting was used. (i.e. in contrast to * settings_private_network() above this might also indicate if private networking was explicitly * turned off.) */ return s->private_network >= 0 || s->network_veth >= 0 || s->network_bridge || s->network_zone || s->network_interfaces || s->network_macvlan || s->network_ipvlan || s->network_veth_extra || s->network_namespace_path; } int settings_allocate_properties(Settings *s) { _cleanup_(sd_bus_unrefp) sd_bus *bus = NULL; int r; assert(s); if (s->properties) return 0; r = sd_bus_default_system(&bus); if (r < 0) return r; r = sd_bus_message_new(bus, &s->properties, SD_BUS_MESSAGE_METHOD_CALL); if (r < 0) return r; return 0; } DEFINE_CONFIG_PARSE_ENUM(config_parse_volatile_mode, volatile_mode, VolatileMode, "Failed to parse volatile mode"); int config_parse_expose_port( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *s = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = expose_port_parse(&s->expose_ports, rvalue); if (r == -EEXIST) log_syntax(unit, LOG_WARNING, filename, line, r, "Duplicate port specification, ignoring: %s", rvalue); else if (r < 0) log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse host port %s: %m", rvalue); return 0; } int config_parse_capability( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { uint64_t u = 0, *result = data; int r; assert(filename); assert(lvalue); assert(rvalue); for (;;) { _cleanup_free_ char *word = NULL; r = extract_first_word(&rvalue, &word, NULL, 0); if (r == -ENOMEM) return log_oom(); if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to extract capability string, ignoring: %s", rvalue); return 0; } if (r == 0) break; if (streq(word, "all")) u = UINT64_MAX; else { r = capability_from_name(word); if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse capability, ignoring: %s", word); continue; } u |= UINT64_C(1) << r; } } *result |= u; return 0; } int config_parse_pivot_root( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = pivot_root_parse(&settings->pivot_root_new, &settings->pivot_root_old, rvalue); if (r < 0) log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid pivot root mount specification %s: %m", rvalue); return 0; } int config_parse_bind( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = bind_mount_parse(&settings->custom_mounts, &settings->n_custom_mounts, rvalue, ltype); if (r < 0) log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid bind mount specification %s: %m", rvalue); return 0; } int config_parse_tmpfs( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = tmpfs_mount_parse(&settings->custom_mounts, &settings->n_custom_mounts, rvalue); if (r < 0) log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid temporary file system specification %s: %m", rvalue); return 0; } int config_parse_inaccessible( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = inaccessible_mount_parse(&settings->custom_mounts, &settings->n_custom_mounts, rvalue); if (r < 0) log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid inaccessible file system specification %s: %m", rvalue); return 0; } int config_parse_overlay( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = overlay_mount_parse(&settings->custom_mounts, &settings->n_custom_mounts, rvalue, ltype); if (r < 0) log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid overlay file system specification %s, ignoring: %m", rvalue); return 0; } int config_parse_veth_extra( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = veth_extra_parse(&settings->network_veth_extra, rvalue); if (r < 0) log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid extra virtual Ethernet link specification %s: %m", rvalue); return 0; } int config_parse_network_zone( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; _cleanup_free_ char *j = NULL; assert(filename); assert(lvalue); assert(rvalue); j = strjoin("vz-", rvalue); if (!ifname_valid(j)) { log_syntax(unit, LOG_WARNING, filename, line, 0, "Invalid network zone name, ignoring: %s", rvalue); return 0; } return free_and_replace(settings->network_zone, j); } int config_parse_boot( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = parse_boolean(rvalue); if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse Boot= parameter %s, ignoring: %m", rvalue); return 0; } if (r) { if (settings->start_mode == START_PID2) goto conflict; settings->start_mode = START_BOOT; } else { if (settings->start_mode == START_BOOT) goto conflict; if (settings->start_mode < 0) settings->start_mode = START_PID1; } return 0; conflict: log_syntax(unit, LOG_WARNING, filename, line, 0, "Conflicting Boot= or ProcessTwo= setting found. Ignoring."); return 0; } int config_parse_pid2( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = parse_boolean(rvalue); if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse ProcessTwo= parameter %s, ignoring: %m", rvalue); return 0; } if (r) { if (settings->start_mode == START_BOOT) goto conflict; settings->start_mode = START_PID2; } else { if (settings->start_mode == START_PID2) goto conflict; if (settings->start_mode < 0) settings->start_mode = START_PID1; } return 0; conflict: log_syntax(unit, LOG_WARNING, filename, line, 0, "Conflicting Boot= or ProcessTwo= setting found. Ignoring."); return 0; } int config_parse_private_users( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(filename); assert(lvalue); assert(rvalue); r = parse_boolean(rvalue); if (r == 0) { /* no: User namespacing off */ settings->userns_mode = USER_NAMESPACE_NO; settings->uid_shift = UID_INVALID; settings->uid_range = UINT32_C(0x10000); } else if (r > 0) { /* yes: User namespacing on, UID range is read from root dir */ settings->userns_mode = USER_NAMESPACE_FIXED; settings->uid_shift = UID_INVALID; settings->uid_range = UINT32_C(0x10000); } else if (streq(rvalue, "pick")) { /* pick: User namespacing on, UID range is picked randomly */ settings->userns_mode = USER_NAMESPACE_PICK; settings->uid_shift = UID_INVALID; settings->uid_range = UINT32_C(0x10000); } else { const char *range, *shift; uid_t sh, rn; /* anything else: User namespacing on, UID range is explicitly configured */ range = strchr(rvalue, ':'); if (range) { shift = strndupa_safe(rvalue, range - rvalue); range++; r = safe_atou32(range, &rn); if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "UID/GID range invalid, ignoring: %s", range); return 0; } } else { shift = rvalue; rn = UINT32_C(0x10000); } r = parse_uid(shift, &sh); if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "UID/GID shift invalid, ignoring: %s", range); return 0; } if (!userns_shift_range_valid(sh, rn)) { log_syntax(unit, LOG_WARNING, filename, line, 0, "UID/GID shift and range combination invalid, ignoring: %s", range); return 0; } settings->userns_mode = USER_NAMESPACE_FIXED; settings->uid_shift = sh; settings->uid_range = rn; } return 0; } int config_parse_syscall_filter( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; bool negative; const char *items; int r; assert(filename); assert(lvalue); assert(rvalue); negative = rvalue[0] == '~'; items = negative ? rvalue + 1 : rvalue; for (;;) { _cleanup_free_ char *word = NULL; r = extract_first_word(&items, &word, NULL, 0); if (r == 0) return 0; if (r == -ENOMEM) return log_oom(); if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse SystemCallFilter= parameter %s, ignoring: %m", rvalue); return 0; } if (negative) r = strv_extend(&settings->syscall_deny_list, word); else r = strv_extend(&settings->syscall_allow_list, word); if (r < 0) return log_oom(); } } int config_parse_oom_score_adjust( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int oa, r; assert(rvalue); assert(settings); if (isempty(rvalue)) { settings->oom_score_adjust_set = false; return 0; } r = parse_oom_score_adjust(rvalue, &oa); if (r == -ERANGE) { log_syntax(unit, LOG_WARNING, filename, line, r, "OOM score adjust value out of range, ignoring: %s", rvalue); return 0; } if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse the OOM score adjust value, ignoring: %s", rvalue); return 0; } settings->oom_score_adjust = oa; settings->oom_score_adjust_set = true; return 0; } int config_parse_cpu_affinity( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; assert(rvalue); assert(settings); return parse_cpu_set_extend(rvalue, &settings->cpu_set, true, unit, filename, line, lvalue); } DEFINE_CONFIG_PARSE_ENUM(config_parse_resolv_conf, resolv_conf_mode, ResolvConfMode, "Failed to parse resolv.conf mode"); static const char *const resolv_conf_mode_table[_RESOLV_CONF_MODE_MAX] = { [RESOLV_CONF_OFF] = "off", [RESOLV_CONF_COPY_HOST] = "copy-host", [RESOLV_CONF_COPY_STATIC] = "copy-static", [RESOLV_CONF_COPY_UPLINK] = "copy-uplink", [RESOLV_CONF_COPY_STUB] = "copy-stub", [RESOLV_CONF_REPLACE_HOST] = "replace-host", [RESOLV_CONF_REPLACE_STATIC] = "replace-static", [RESOLV_CONF_REPLACE_UPLINK] = "replace-uplink", [RESOLV_CONF_REPLACE_STUB] = "replace-stub", [RESOLV_CONF_BIND_HOST] = "bind-host", [RESOLV_CONF_BIND_STATIC] = "bind-static", [RESOLV_CONF_BIND_UPLINK] = "bind-uplink", [RESOLV_CONF_BIND_STUB] = "bind-stub", [RESOLV_CONF_DELETE] = "delete", [RESOLV_CONF_AUTO] = "auto", }; DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(resolv_conf_mode, ResolvConfMode, RESOLV_CONF_AUTO); int parse_link_journal(const char *s, LinkJournal *ret_mode, bool *ret_try) { int r; assert(s); assert(ret_mode); assert(ret_try); if (streq(s, "auto")) { *ret_mode = LINK_AUTO; *ret_try = false; } else if (streq(s, "guest")) { *ret_mode = LINK_GUEST; *ret_try = false; } else if (streq(s, "host")) { *ret_mode = LINK_HOST; *ret_try = false; } else if (streq(s, "try-guest")) { *ret_mode = LINK_GUEST; *ret_try = true; } else if (streq(s, "try-host")) { *ret_mode = LINK_HOST; *ret_try = true; } else { /* Also support boolean values, to make things less confusing. */ r = parse_boolean(s); if (r < 0) return r; /* Let's consider "true" to be equivalent to "auto". */ *ret_mode = r ? LINK_AUTO : LINK_NO; *ret_try = false; } return 0; } int config_parse_link_journal( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { Settings *settings = data; int r; assert(rvalue); assert(settings); r = parse_link_journal(rvalue, &settings->link_journal, &settings->link_journal_try); if (r < 0) log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse link journal mode, ignoring: %s", rvalue); return 0; } DEFINE_CONFIG_PARSE_ENUM(config_parse_timezone, timezone_mode, TimezoneMode, "Failed to parse timezone mode"); static const char *const timezone_mode_table[_TIMEZONE_MODE_MAX] = { [TIMEZONE_OFF] = "off", [TIMEZONE_COPY] = "copy", [TIMEZONE_BIND] = "bind", [TIMEZONE_SYMLINK] = "symlink", [TIMEZONE_DELETE] = "delete", [TIMEZONE_AUTO] = "auto", }; DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(timezone_mode, TimezoneMode, TIMEZONE_AUTO); DEFINE_CONFIG_PARSE_ENUM(config_parse_userns_ownership, user_namespace_ownership, UserNamespaceOwnership, "Failed to parse user namespace ownership mode"); static const char *const user_namespace_ownership_table[_USER_NAMESPACE_OWNERSHIP_MAX] = { [USER_NAMESPACE_OWNERSHIP_OFF] = "off", [USER_NAMESPACE_OWNERSHIP_CHOWN] = "chown", [USER_NAMESPACE_OWNERSHIP_MAP] = "map", [USER_NAMESPACE_OWNERSHIP_AUTO] = "auto", }; DEFINE_STRING_TABLE_LOOKUP(user_namespace_ownership, UserNamespaceOwnership); int config_parse_userns_chown( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { UserNamespaceOwnership *ownership = data; int r; assert(rvalue); assert(ownership); /* Compatibility support for UserNamespaceChown=, whose job has been taken over by UserNamespaceOwnership= */ r = parse_boolean(rvalue); if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse user namespace ownership mode, ignoring: %s", rvalue); return 0; } *ownership = r ? USER_NAMESPACE_OWNERSHIP_CHOWN : USER_NAMESPACE_OWNERSHIP_OFF; return 0; } int config_parse_bind_user( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { char ***bind_user = data; int r; assert(rvalue); assert(bind_user); if (isempty(rvalue)) { *bind_user = strv_free(*bind_user); return 0; } for (const char* p = rvalue;;) { _cleanup_free_ char *word = NULL; r = extract_first_word(&p, &word, NULL, 0); if (r == -ENOMEM) return log_oom(); if (r < 0) { log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse BindUser= list, ignoring: %s", rvalue); return 0; } if (r == 0) break; if (!valid_user_group_name(word, 0)) { log_syntax(unit, LOG_WARNING, filename, line, 0, "User name '%s' not valid, ignoring.", word); return 0; } if (strv_consume(bind_user, TAKE_PTR(word)) < 0) return log_oom(); } return 0; }