diff options
| author | OpenShift Merge Robot <openshift-merge-robot@users.noreply.github.com> | 2020-09-29 14:59:16 +0000 | 
|---|---|---|
| committer | GitHub <noreply@github.com> | 2020-09-29 14:59:16 +0000 | 
| commit | bf10168614b35dbcfefff01ed63ee90b39cae8d7 (patch) | |
| tree | 7dd5af66ff89ad60a8481f9e97e7eb50fcbcf06d | |
| parent | 84dede4452d4f85ad6dacf2c66e00500685c24af (diff) | |
| parent | 0d70df119539d818224b0d014602aaad2bd1b95e (diff) | |
| download | podman-bf10168614b35dbcfefff01ed63ee90b39cae8d7.tar.gz podman-bf10168614b35dbcfefff01ed63ee90b39cae8d7.tar.bz2 podman-bf10168614b35dbcfefff01ed63ee90b39cae8d7.zip  | |
Merge pull request #7811 from rhatdan/sysctls
Ignore containers.conf sysctl when namespaces set to host
| -rw-r--r-- | cmd/podman/common/create.go | 2 | ||||
| -rw-r--r-- | pkg/specgen/generate/security.go | 46 | ||||
| -rw-r--r-- | test/e2e/containers_conf_test.go | 6 | ||||
| -rw-r--r-- | test/e2e/run_test.go | 5 | 
4 files changed, 58 insertions, 1 deletions
diff --git a/cmd/podman/common/create.go b/cmd/podman/common/create.go index bb4726817..4efdf1164 100644 --- a/cmd/podman/common/create.go +++ b/cmd/podman/common/create.go @@ -448,7 +448,7 @@ func GetCreateFlags(cf *ContainerCLIOpts) *pflag.FlagSet {  	createFlags.StringSliceVar(  		&cf.Sysctl, -		"sysctl", containerConfig.Sysctls(), +		"sysctl", []string{},  		"Sysctl options",  	)  	createFlags.StringVar( diff --git a/pkg/specgen/generate/security.go b/pkg/specgen/generate/security.go index 87e8029a7..7c818cf62 100644 --- a/pkg/specgen/generate/security.go +++ b/pkg/specgen/generate/security.go @@ -7,6 +7,7 @@ import (  	"github.com/containers/common/pkg/capabilities"  	"github.com/containers/common/pkg/config"  	"github.com/containers/podman/v2/libpod" +	"github.com/containers/podman/v2/libpod/define"  	"github.com/containers/podman/v2/libpod/image"  	"github.com/containers/podman/v2/pkg/specgen"  	"github.com/containers/podman/v2/pkg/util" @@ -167,7 +168,52 @@ func securityConfigureGenerator(s *specgen.SpecGenerator, g *generate.Generator,  	}  	g.SetRootReadonly(s.ReadOnlyFilesystem) + +	// Add default sysctls +	defaultSysctls, err := util.ValidateSysctls(rtc.Sysctls()) +	if err != nil { +		return err +	} +	for sysctlKey, sysctlVal := range defaultSysctls { + +		// Ignore mqueue sysctls if --ipc=host +		if s.IpcNS.IsHost() && strings.HasPrefix(sysctlKey, "fs.mqueue.") { +			logrus.Infof("Sysctl %s=%s ignored in containers.conf, since IPC Namespace set to host", sysctlKey, sysctlVal) + +			continue +		} + +		// Ignore net sysctls if --net=host +		if s.NetNS.IsHost() && strings.HasPrefix(sysctlKey, "net.") { +			logrus.Infof("Sysctl %s=%s ignored in containers.conf, since Network Namespace set to host", sysctlKey, sysctlVal) +			continue +		} + +		// Ignore uts sysctls if --uts=host +		if s.UtsNS.IsHost() && (strings.HasPrefix(sysctlKey, "kernel.domainname") || strings.HasPrefix(sysctlKey, "kernel.hostname")) { +			logrus.Infof("Sysctl %s=%s ignored in containers.conf, since UTS Namespace set to host", sysctlKey, sysctlVal) +			continue +		} + +		g.AddLinuxSysctl(sysctlKey, sysctlVal) +	} +  	for sysctlKey, sysctlVal := range s.Sysctl { + +		if s.IpcNS.IsHost() && strings.HasPrefix(sysctlKey, "fs.mqueue.") { +			return errors.Wrapf(define.ErrInvalidArg, "sysctl %s=%s can't be set since IPC Namespace set to host", sysctlKey, sysctlVal) +		} + +		// Ignore net sysctls if --net=host +		if s.NetNS.IsHost() && strings.HasPrefix(sysctlKey, "net.") { +			return errors.Wrapf(define.ErrInvalidArg, "sysctl %s=%s can't be set since Host Namespace set to host", sysctlKey, sysctlVal) +		} + +		// Ignore uts sysctls if --uts=host +		if s.UtsNS.IsHost() && (strings.HasPrefix(sysctlKey, "kernel.domainname") || strings.HasPrefix(sysctlKey, "kernel.hostname")) { +			return errors.Wrapf(define.ErrInvalidArg, "sysctl %s=%s can't be set since UTS Namespace set to host", sysctlKey, sysctlVal) +		} +  		g.AddLinuxSysctl(sysctlKey, sysctlVal)  	} diff --git a/test/e2e/containers_conf_test.go b/test/e2e/containers_conf_test.go index 02c5d1428..ddb62c327 100644 --- a/test/e2e/containers_conf_test.go +++ b/test/e2e/containers_conf_test.go @@ -179,6 +179,12 @@ var _ = Describe("Podman run", func() {  		session.WaitWithDefaultTimeout()  		Expect(session.ExitCode()).To(Equal(0))  		Expect(session.OutputToString()).To(ContainSubstring("1000")) + +		// Ignore containers.conf setting if --net=host +		session = podmanTest.Podman([]string{"run", "--rm", "--net", "host", fedoraMinimal, "cat", "/proc/sys/net/ipv4/ping_group_range"}) +		session.WaitWithDefaultTimeout() +		Expect(session.ExitCode()).To(Equal(0)) +		Expect(session.OutputToString()).ToNot((ContainSubstring("1000")))  	})  	It("podman run containers.conf search domain", func() { diff --git a/test/e2e/run_test.go b/test/e2e/run_test.go index 5c28f18f2..5617f50b7 100644 --- a/test/e2e/run_test.go +++ b/test/e2e/run_test.go @@ -373,6 +373,11 @@ USER bin`  		session.WaitWithDefaultTimeout()  		Expect(session.ExitCode()).To(Equal(0))  		Expect(session.OutputToString()).To(ContainSubstring("net.core.somaxconn = 65535")) + +		// network sysctls should fail if --net=host is set +		session = podmanTest.Podman([]string{"run", "--net", "host", "--rm", "--sysctl", "net.core.somaxconn=65535", ALPINE, "sysctl", "net.core.somaxconn"}) +		session.WaitWithDefaultTimeout() +		Expect(session.ExitCode()).To(Equal(125))  	})  	It("podman run blkio-weight test", func() {  | 
