2021-08-23 09:14:53 -04:00
|
|
|
//go:build !windows
|
2016-02-18 02:57:42 -05:00
|
|
|
// +build !windows
|
|
|
|
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"os"
|
2019-10-21 11:06:20 -04:00
|
|
|
"os/exec"
|
2016-02-18 02:57:42 -05:00
|
|
|
"path/filepath"
|
2016-12-28 17:00:32 -05:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
2019-09-09 17:06:12 -04:00
|
|
|
"testing"
|
2016-02-18 02:57:42 -05:00
|
|
|
|
|
|
|
"github.com/docker/docker/pkg/system"
|
2020-02-07 08:39:24 -05:00
|
|
|
"gotest.tools/v3/assert"
|
2016-02-18 02:57:42 -05:00
|
|
|
)
|
|
|
|
|
2022-06-16 17:32:10 -04:00
|
|
|
func (s *DockerCLICpSuite) TestCpToContainerWithPermissions(c *testing.T) {
|
2018-12-24 07:25:53 -05:00
|
|
|
testRequires(c, testEnv.IsLocalDaemon, DaemonIsLinux)
|
2016-11-14 08:37:08 -05:00
|
|
|
|
|
|
|
tmpDir := getTestDir(c, "test-cp-to-host-with-permissions")
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
makeTestContentInDir(c, tmpDir)
|
|
|
|
|
|
|
|
containerName := "permtest"
|
|
|
|
|
2020-06-29 23:06:03 -04:00
|
|
|
_, exc := dockerCmd(c, "create", "--name", containerName, "busybox", "/bin/sh", "-c", "stat -c '%u %g %a' /permdirtest /permdirtest/permtest")
|
2019-04-04 09:23:19 -04:00
|
|
|
assert.Equal(c, exc, 0)
|
2016-11-14 08:37:08 -05:00
|
|
|
defer dockerCmd(c, "rm", "-f", containerName)
|
|
|
|
|
|
|
|
srcPath := cpPath(tmpDir, "permdirtest")
|
|
|
|
dstPath := containerCpPath(containerName, "/")
|
|
|
|
|
2019-10-21 11:06:20 -04:00
|
|
|
args := []string{"cp", "-a", srcPath, dstPath}
|
|
|
|
out, _, err := runCommandWithOutput(exec.Command(dockerBinary, args...))
|
|
|
|
assert.NilError(c, err, "output: %v", out)
|
|
|
|
|
|
|
|
out, err = startContainerGetOutput(c, containerName)
|
2019-04-04 09:23:19 -04:00
|
|
|
assert.NilError(c, err, "output: %v", out)
|
|
|
|
assert.Equal(c, strings.TrimSpace(out), "2 2 700\n65534 65534 400", "output: %v", out)
|
2016-11-14 08:37:08 -05:00
|
|
|
}
|
|
|
|
|
2016-02-18 02:57:42 -05:00
|
|
|
// Check ownership is root, both in non-userns and userns enabled modes
|
2022-06-16 17:32:10 -04:00
|
|
|
func (s *DockerCLICpSuite) TestCpCheckDestOwnership(c *testing.T) {
|
2018-12-24 07:25:53 -05:00
|
|
|
testRequires(c, DaemonIsLinux, testEnv.IsLocalDaemon)
|
2016-02-18 02:57:42 -05:00
|
|
|
tmpVolDir := getTestDir(c, "test-cp-tmpvol")
|
|
|
|
containerID := makeTestContainer(c,
|
|
|
|
testContainerOptions{volumes: []string{fmt.Sprintf("%s:/tmpvol", tmpVolDir)}})
|
|
|
|
|
|
|
|
tmpDir := getTestDir(c, "test-cp-to-check-ownership")
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
makeTestContentInDir(c, tmpDir)
|
|
|
|
|
|
|
|
srcPath := cpPath(tmpDir, "file1")
|
|
|
|
dstPath := containerCpPath(containerID, "/tmpvol", "file1")
|
|
|
|
|
2019-10-21 11:06:20 -04:00
|
|
|
assert.NilError(c, runDockerCp(c, srcPath, dstPath))
|
2016-02-18 02:57:42 -05:00
|
|
|
|
|
|
|
stat, err := system.Stat(filepath.Join(tmpVolDir, "file1"))
|
2019-04-04 09:23:19 -04:00
|
|
|
assert.NilError(c, err)
|
2016-02-18 02:57:42 -05:00
|
|
|
uid, gid, err := getRootUIDGID()
|
2019-04-04 09:23:19 -04:00
|
|
|
assert.NilError(c, err)
|
|
|
|
assert.Equal(c, stat.UID(), uint32(uid), "Copied file not owned by container root UID")
|
|
|
|
assert.Equal(c, stat.GID(), uint32(gid), "Copied file not owned by container root GID")
|
2016-02-18 02:57:42 -05:00
|
|
|
}
|
2016-12-28 17:00:32 -05:00
|
|
|
|
|
|
|
func getRootUIDGID() (int, int, error) {
|
2018-01-15 09:28:10 -05:00
|
|
|
uidgid := strings.Split(filepath.Base(testEnv.DaemonInfo.DockerRootDir), ".")
|
2016-12-28 17:00:32 -05:00
|
|
|
if len(uidgid) == 1 {
|
2019-10-21 11:06:20 -04:00
|
|
|
// user namespace remapping is not turned on; return 0
|
2016-12-28 17:00:32 -05:00
|
|
|
return 0, 0, nil
|
|
|
|
}
|
|
|
|
uid, err := strconv.Atoi(uidgid[0])
|
|
|
|
if err != nil {
|
|
|
|
return 0, 0, err
|
|
|
|
}
|
|
|
|
gid, err := strconv.Atoi(uidgid[1])
|
|
|
|
if err != nil {
|
|
|
|
return 0, 0, err
|
|
|
|
}
|
|
|
|
return uid, gid, nil
|
|
|
|
}
|