mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
Allow containerd shim refs in default-runtime
Since runtimes can now just be containerd shims, we need to check if the reference is possibly a containerd shim. Signed-off-by: Brian Goff <cpuguy83@gmail.com>
This commit is contained in:
parent
ff1b933d96
commit
e6ee27a541
6 changed files with 83 additions and 70 deletions
|
@ -11,7 +11,6 @@ import (
|
|||
"strings"
|
||||
|
||||
v2runcoptions "github.com/containerd/containerd/runtime/v2/runc/options"
|
||||
"github.com/containerd/containerd/runtime/v2/shim"
|
||||
"github.com/docker/docker/api/types"
|
||||
"github.com/docker/docker/daemon/config"
|
||||
"github.com/docker/docker/errdefs"
|
||||
|
@ -117,7 +116,7 @@ func (daemon *Daemon) rewriteRuntimePath(name, p string, args []string) (string,
|
|||
func (daemon *Daemon) getRuntime(name string) (*types.Runtime, error) {
|
||||
rt := daemon.configStore.GetRuntime(name)
|
||||
if rt == nil {
|
||||
if !isPermissibleC8dRuntimeName(name) {
|
||||
if !config.IsPermissibleC8dRuntimeName(name) {
|
||||
return nil, errdefs.InvalidParameter(errors.Errorf("unknown or invalid runtime name: %s", name))
|
||||
}
|
||||
return &types.Runtime{Shim: &types.ShimConfig{Binary: name}}, nil
|
||||
|
@ -138,37 +137,3 @@ func (daemon *Daemon) getRuntime(name string) (*types.Runtime, error) {
|
|||
|
||||
return rt, nil
|
||||
}
|
||||
|
||||
// isPermissibleC8dRuntimeName tests whether name is safe to pass into
|
||||
// containerd as a runtime name, and whether the name is well-formed.
|
||||
// It does not check if the runtime is installed.
|
||||
//
|
||||
// A runtime name containing slash characters is interpreted by containerd as
|
||||
// the path to a runtime binary. If we allowed this, anyone with Engine API
|
||||
// access could get containerd to execute an arbitrary binary as root. Although
|
||||
// Engine API access is already equivalent to root on the host, the runtime name
|
||||
// has not historically been a vector to run arbitrary code as root so users are
|
||||
// not expecting it to become one.
|
||||
//
|
||||
// This restriction is not configurable. There are viable workarounds for
|
||||
// legitimate use cases: administrators and runtime developers can make runtimes
|
||||
// available for use with Docker by installing them onto PATH following the
|
||||
// [binary naming convention] for containerd Runtime v2.
|
||||
//
|
||||
// [binary naming convention]: https://github.com/containerd/containerd/blob/main/runtime/v2/README.md#binary-naming
|
||||
func isPermissibleC8dRuntimeName(name string) bool {
|
||||
// containerd uses a rather permissive test to validate runtime names:
|
||||
//
|
||||
// - Any name for which filepath.IsAbs(name) is interpreted as the absolute
|
||||
// path to a shim binary. We want to block this behaviour.
|
||||
// - Any name which contains at least one '.' character and no '/' characters
|
||||
// and does not begin with a '.' character is a valid runtime name. The shim
|
||||
// binary name is derived from the final two components of the name and
|
||||
// searched for on the PATH. The name "a.." is technically valid per
|
||||
// containerd's implementation: it would resolve to a binary named
|
||||
// "containerd-shim---".
|
||||
//
|
||||
// https://github.com/containerd/containerd/blob/11ded166c15f92450958078cd13c6d87131ec563/runtime/v2/manager.go#L297-L317
|
||||
// https://github.com/containerd/containerd/blob/11ded166c15f92450958078cd13c6d87131ec563/runtime/v2/shim/util.go#L83-L93
|
||||
return !filepath.IsAbs(name) && !strings.ContainsRune(name, '/') && shim.BinaryName(name) != ""
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue