mirror of
https://github.com/kemko/nomad.git
synced 2026-01-02 00:15:43 +03:00
* Move task directory destroy logic from alloc_dir to task_dir * Update errors to wrap error cause * Use constants for file permissions * Make multierror handling consistent. * Make helpers for directory creation * Move mount dir unlink to task_dir Unlink method * Make constant for file mode 710 Co-authored-by: Tim Gross <tgross@hashicorp.com> Co-authored-by: Michael Schurter <mschurter@hashicorp.com>
107 lines
2.6 KiB
Go
107 lines
2.6 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
//go:build linux
|
|
|
|
package allocdir
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"syscall"
|
|
|
|
"golang.org/x/sys/unix"
|
|
)
|
|
|
|
const (
|
|
// secretDirTmpfsSize is the size of the tmpfs per task in MBs
|
|
secretDirTmpfsSize = 1
|
|
|
|
// secretMarker is the filename of the marker created so Nomad doesn't
|
|
// try to mount the secrets tmpfs more than once
|
|
secretMarker = ".nomad-mount"
|
|
)
|
|
|
|
// linkDir bind mounts src to dst as Linux doesn't support hardlinking
|
|
// directories.
|
|
func linkDir(src, dst string) error {
|
|
if err := os.MkdirAll(dst, fileMode777); err != nil {
|
|
return err
|
|
}
|
|
|
|
return syscall.Mount(src, dst, "", syscall.MS_BIND, "")
|
|
}
|
|
|
|
// mountDir bind mounts old to next using the given file mode.
|
|
func mountDir(old, next string, uid, gid int, mode os.FileMode) error {
|
|
if err := os.MkdirAll(next, mode); err != nil {
|
|
return err
|
|
}
|
|
opts := unix.MS_BIND | unix.MS_NOSUID | unix.MS_NOATIME
|
|
if err := unix.Mount(old, next, "", uintptr(opts), ""); err != nil {
|
|
return err
|
|
}
|
|
return os.Chown(next, uid, gid)
|
|
}
|
|
|
|
// unlinkDir unmounts a bind mounted directory as Linux doesn't support
|
|
// hardlinking directories. If the dir is already unmounted no error is
|
|
// returned.
|
|
func unlinkDir(dir string) error {
|
|
if err := syscall.Unmount(dir, 0); err != nil {
|
|
if err != syscall.EINVAL {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// createSecretDir creates the secrets dir folder at the given path using a
|
|
// tmpfs
|
|
func createSecretDir(dir string) error {
|
|
// Only mount the tmpfs if we are root
|
|
if unix.Geteuid() == 0 {
|
|
if err := os.MkdirAll(dir, fileMode777); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Check for marker file and skip mounting if it exists
|
|
marker := filepath.Join(dir, secretMarker)
|
|
if _, err := os.Stat(marker); err == nil {
|
|
return nil
|
|
}
|
|
|
|
flags := uintptr(syscall.MS_NOEXEC)
|
|
options := fmt.Sprintf("size=%dm", secretDirTmpfsSize)
|
|
if err := syscall.Mount("tmpfs", dir, "tmpfs", flags, options); err != nil {
|
|
return os.NewSyscallError("mount", err)
|
|
}
|
|
|
|
// Create the marker file so we don't try to mount more than once
|
|
f, err := os.OpenFile(marker, os.O_RDWR|os.O_CREATE, fileMode666)
|
|
if err != nil {
|
|
// Hard fail since if this fails something is really wrong
|
|
return err
|
|
}
|
|
f.Close()
|
|
return nil
|
|
}
|
|
|
|
return os.MkdirAll(dir, fileMode777)
|
|
}
|
|
|
|
// createSecretDir removes the secrets dir folder
|
|
func removeSecretDir(dir string) error {
|
|
if unix.Geteuid() == 0 {
|
|
if err := unlinkDir(dir); err != nil {
|
|
// Ignore invalid path errors
|
|
if err != syscall.ENOENT {
|
|
return os.NewSyscallError("unmount", err)
|
|
}
|
|
}
|
|
|
|
}
|
|
return os.RemoveAll(dir)
|
|
}
|