Skip to content

Commit 9d7189f

Browse files
committed
imagebuildah: try to rein in use of transport names in image specs
Try to limit which image transports we accept in stages, and scope the ones that use path names to the context directory. At some point anything that isn't an image ID or pullable spec should start being rejected. Signed-off-by: Nalin Dahyabhai <[email protected]>
1 parent 7c4bbac commit 9d7189f

File tree

6 files changed

+106
-9
lines changed

6 files changed

+106
-9
lines changed

imagebuildah/stage_executor.go

+76-1
Original file line numberDiff line numberDiff line change
@@ -21,19 +21,28 @@ import (
2121
"github.com/containers/buildah/internal"
2222
"github.com/containers/buildah/internal/tmpdir"
2323
internalUtil "github.com/containers/buildah/internal/util"
24+
"github.com/containers/buildah/internal/volumes"
2425
"github.com/containers/buildah/pkg/parse"
2526
"github.com/containers/buildah/pkg/rusage"
2627
"github.com/containers/buildah/util"
2728
config "github.com/containers/common/pkg/config"
2829
cp "github.com/containers/image/v5/copy"
30+
directoryTransport "github.com/containers/image/v5/directory"
31+
dockerTransport "github.com/containers/image/v5/docker"
2932
imagedocker "github.com/containers/image/v5/docker"
33+
dockerArchiveTransport "github.com/containers/image/v5/docker/archive"
3034
"github.com/containers/image/v5/docker/reference"
3135
"github.com/containers/image/v5/manifest"
36+
ociArchiveTransport "github.com/containers/image/v5/oci/archive"
37+
ociLayoutTransport "github.com/containers/image/v5/oci/layout"
38+
openshiftTransport "github.com/containers/image/v5/openshift"
3239
is "github.com/containers/image/v5/storage"
3340
"github.com/containers/image/v5/transports"
41+
"github.com/containers/image/v5/transports/alltransports"
3442
"github.com/containers/image/v5/types"
3543
"github.com/containers/storage"
3644
"github.com/containers/storage/pkg/chrootarchive"
45+
"github.com/containers/storage/pkg/mount"
3746
"github.com/containers/storage/pkg/unshare"
3847
docker "github.com/fsouza/go-dockerclient"
3948
buildkitparser "github.com/moby/buildkit/frontend/dockerfile/parser"
@@ -920,6 +929,58 @@ func (s *StageExecutor) UnrecognizedInstruction(step *imagebuilder.Step) error {
920929
return errors.New(err)
921930
}
922931

932+
// do our best to ensure that image specifiers that include a transport that
933+
// uses path names are scoped to the build context directory
934+
func (s *StageExecutor) sanitizeFrom(from, tmpdir string) (string, string, error) {
935+
ref, err := alltransports.ParseImageName(from)
936+
if err != nil {
937+
if _, err = reference.ParseNormalizedNamed(from); err == nil {
938+
// this is a normal-looking image-in-a-registry-or-named-in-storage name
939+
return from, "", nil
940+
}
941+
if img, err := s.executor.store.Image(from); img != nil && err == nil {
942+
// this is an image ID
943+
return from, "", nil
944+
}
945+
return "", "", fmt.Errorf("parsing image name %q: %w", from, err)
946+
}
947+
// TODO: drop this switch block and just return an error... someday
948+
switch ref.Transport().Name() {
949+
case dockerTransport.Transport.Name(), "docker-daemon", openshiftTransport.Transport.Name():
950+
return from, "", nil
951+
case dockerArchiveTransport.Transport.Name(), ociLayoutTransport.Transport.Name(), ociArchiveTransport.Transport.Name():
952+
// these all take the form path[:stuff]
953+
transportRef := ref.StringWithinTransport()
954+
parts := strings.Split(transportRef, ":")
955+
// the current directory is the root directory is the context directory
956+
boundRef, err := volumes.BindFromChroot(s.executor.contextDir, parts[0], tmpdir)
957+
if err != nil {
958+
return "", "", fmt.Errorf("ensuring that %q is in the context directory: %w", ref.StringWithinTransport(), err)
959+
}
960+
parts[0] = boundRef
961+
transportRef = strings.Join(parts, ":")
962+
newRef, err := ref.Transport().ParseReference(transportRef)
963+
if err != nil {
964+
return "", "", fmt.Errorf("parsing %q as an image name using %q: %w", transportRef, ref.Transport().Name(), err)
965+
}
966+
return transports.ImageName(newRef), boundRef, nil
967+
case directoryTransport.Transport.Name():
968+
// this takes the form of just a path
969+
// the current directory is the root directory is the context directory
970+
transportRef := ref.StringWithinTransport()
971+
boundRef, err := volumes.BindFromChroot(s.executor.contextDir, ref.StringWithinTransport(), tmpdir)
972+
if err != nil {
973+
return "", "", fmt.Errorf("ensuring that %q is in the context directory: %w", ref.StringWithinTransport(), err)
974+
}
975+
newRef, err := ref.Transport().ParseReference(boundRef)
976+
if err != nil {
977+
return "", "", fmt.Errorf("parsing %q as an image name using %q: %w", transportRef, ref.Transport().Name(), err)
978+
}
979+
return transports.ImageName(newRef), boundRef, nil
980+
}
981+
return "", "", fmt.Errorf("unexpected container image transport %q", ref.Transport().Name())
982+
}
983+
923984
// prepare creates a working container based on the specified image, or if one
924985
// isn't specified, the first argument passed to the first FROM instruction we
925986
// can find in the stage's parsed tree.
@@ -936,6 +997,20 @@ func (s *StageExecutor) prepare(ctx context.Context, from string, initializeIBCo
936997
}
937998
from = base
938999
}
1000+
sanitizedFrom, intermediateMount, err := s.sanitizeFrom(from, tmpdir.GetTempDir())
1001+
if err != nil {
1002+
return nil, fmt.Errorf("invalid base image specification %q: %w", from, err)
1003+
}
1004+
if intermediateMount != "" {
1005+
defer func() {
1006+
if err := mount.Unmount(intermediateMount); err != nil {
1007+
logrus.Debugf("unmounting bound version of %q: %v", from, err)
1008+
}
1009+
if err := os.Remove(intermediateMount); err != nil {
1010+
logrus.Debugf("removing dummy version of %q: %v", from, err)
1011+
}
1012+
}()
1013+
}
9391014
displayFrom := from
9401015
if ib.Platform != "" {
9411016
displayFrom = "--platform=" + ib.Platform + " " + displayFrom
@@ -974,7 +1049,7 @@ func (s *StageExecutor) prepare(ctx context.Context, from string, initializeIBCo
9741049

9751050
builderOptions := buildah.BuilderOptions{
9761051
Args: ib.Args,
977-
FromImage: from,
1052+
FromImage: sanitizedFrom,
9781053
GroupAdd: s.executor.groupAdd,
9791054
PullPolicy: pullPolicy,
9801055
ContainerSuffix: s.executor.containerSuffix,

internal/volumes/bind_linux.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,12 @@ import (
1111
"golang.org/x/sys/unix"
1212
)
1313

14-
// bindFromChroot opens "path" inside of "root" using a chrooted subprocess
14+
// BindFromChroot opens "path" inside of "root" using a chrooted subprocess
1515
// that returns a descriptor, then creates a uniquely-named temporary directory
1616
// or file under "tmp" and bind-mounts the opened descriptor to it, returning
1717
// the path of the temporary file or directory. The caller is responsible for
1818
// unmounting and removing the temporary.
19-
func bindFromChroot(root, path, tmp string) (string, error) {
19+
func BindFromChroot(root, path, tmp string) (string, error) {
2020
fd, _, err := open.InChroot(root, "", path, unix.O_DIRECTORY|unix.O_RDONLY, 0)
2121
if err != nil {
2222
if !errors.Is(err, unix.ENOTDIR) {

internal/volumes/bind_linux_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,11 @@ func TestBindFromChroot(t *testing.T) {
2121
require.NoError(t, os.Mkdir(filepath.Join(rootdir, "subdirectory"), 0o700), "creating bind mount source directory")
2222
require.NoError(t, os.WriteFile(filepath.Join(rootdir, "subdirectory", "file"), []byte(contents1), 0o600))
2323
require.NoError(t, os.WriteFile(filepath.Join(rootdir, "file"), []byte(contents2), 0o600))
24-
subdir, err := bindFromChroot(rootdir, "subdirectory", destdir)
24+
subdir, err := BindFromChroot(rootdir, "subdirectory", destdir)
2525
require.NoError(t, err, "bind mounting from a directory")
2626
bytes1, err := os.ReadFile(filepath.Join(subdir, "file"))
2727
require.NoError(t, err, "reading file from bind-mounted directory")
28-
subfile, err := bindFromChroot(rootdir, "file", destdir)
28+
subfile, err := BindFromChroot(rootdir, "file", destdir)
2929
require.NoError(t, err, "bind mounting from a file")
3030
bytes2, err := os.ReadFile(subfile)
3131
require.NoError(t, err, "reading file from bind mounted file")

internal/volumes/bind_notlinux.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ package volumes
44

55
import "errors"
66

7-
// bindFromChroot would open "path" inside of "root" using a chrooted
7+
// BindFromChroot would open "path" inside of "root" using a chrooted
88
// subprocess that returns a descriptor, then would create a uniquely-named
99
// temporary directory or file under "tmp" and bind-mount the opened descriptor
1010
// to it, returning the path of the temporary file or directory. The caller
1111
// would be responsible for unmounting and removing the temporary. For now,
1212
// this just returns an error because it is not implemented for this platform.
13-
func bindFromChroot(root, path, tmp string) (string, error) {
13+
func BindFromChroot(root, path, tmp string) (string, error) {
1414
return "", errors.New("not available on this system")
1515
}

internal/volumes/volumes.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -327,7 +327,7 @@ func GetBindMount(sys *types.SystemContext, args []string, contextDir string, st
327327
return newMount, "", "", "", fmt.Errorf("computing pathname of bind subdirectory: %w", err)
328328
}
329329
if rel != "." && rel != "/" {
330-
mnt, err := bindFromChroot(contextDir, rel, tmpDir)
330+
mnt, err := BindFromChroot(contextDir, rel, tmpDir)
331331
if err != nil {
332332
return newMount, "", "", "", fmt.Errorf("sanitizing bind subdirectory %q: %w", newMount.Source, err)
333333
}
@@ -655,7 +655,7 @@ func GetCacheMount(sys *types.SystemContext, args []string, store storage.Store,
655655
return newMount, "", "", "", nil, fmt.Errorf("computing pathname of cache subdirectory: %w", err)
656656
}
657657
if rel != "." && rel != "/" {
658-
mnt, err := bindFromChroot(thisCacheRoot, rel, tmpDir)
658+
mnt, err := BindFromChroot(thisCacheRoot, rel, tmpDir)
659659
if err != nil {
660660
return newMount, "", "", "", nil, fmt.Errorf("sanitizing cache subdirectory %q: %w", newMount.Source, err)
661661
}

tests/bud.bats

+22
Original file line numberDiff line numberDiff line change
@@ -7340,3 +7340,25 @@ EOF
73407340
find ${TEST_SCRATCH_DIR}/buildcontext -ls
73417341
expect_output "" "build should not be able to write to build context"
73427342
}
7343+
7344+
@test "build-oci-archive-switch" {
7345+
base=busybox
7346+
_prefetch $base
7347+
run_buildah from -q $base
7348+
run_buildah inspect --format '{{.FromImageID}}' "$output"
7349+
imageID="$output"
7350+
mkdir -p ${TEST_SCRATCH_DIR}/buildcontext
7351+
copy containers-storage:$imageID oci-archive:${TEST_SCRATCH_DIR}/buildcontext/archive1.tar
7352+
cat > ${TEST_SCRATCH_DIR}/buildcontext/Dockerfile << EOF
7353+
FROM $base
7354+
COPY archive1.tar /
7355+
RUN --mount=type=bind,rw,target=/bc cp /archive1.tar /bc/archive2.tar
7356+
RUN --mount=type=bind,rw,target=/bc mkdir /bc/archive3
7357+
RUN --mount=type=bind,rw,target=/bc tar x -C /bc/archive3 -f /bc/archive2.tar
7358+
FROM oci-archive:archive2.tar
7359+
RUN --mount=type=bind,from=0,target=/var/empty :
7360+
FROM oci:./archive3
7361+
RUN --mount=type=bind,from=0,target=/var/empty --mount=type=bind,from=1,target=/var/empty2 :
7362+
EOF
7363+
run_buildah build ${TEST_SCRATCH_DIR}/buildcontext
7364+
}

0 commit comments

Comments
 (0)