@@ -21,19 +21,28 @@ import (
21
21
"github.com/containers/buildah/internal"
22
22
"github.com/containers/buildah/internal/tmpdir"
23
23
internalUtil "github.com/containers/buildah/internal/util"
24
+ "github.com/containers/buildah/internal/volumes"
24
25
"github.com/containers/buildah/pkg/parse"
25
26
"github.com/containers/buildah/pkg/rusage"
26
27
"github.com/containers/buildah/util"
27
28
config "github.com/containers/common/pkg/config"
28
29
cp "github.com/containers/image/v5/copy"
30
+ directoryTransport "github.com/containers/image/v5/directory"
31
+ dockerTransport "github.com/containers/image/v5/docker"
29
32
imagedocker "github.com/containers/image/v5/docker"
33
+ dockerArchiveTransport "github.com/containers/image/v5/docker/archive"
30
34
"github.com/containers/image/v5/docker/reference"
31
35
"github.com/containers/image/v5/manifest"
36
+ ociArchiveTransport "github.com/containers/image/v5/oci/archive"
37
+ ociLayoutTransport "github.com/containers/image/v5/oci/layout"
38
+ openshiftTransport "github.com/containers/image/v5/openshift"
32
39
is "github.com/containers/image/v5/storage"
33
40
"github.com/containers/image/v5/transports"
41
+ "github.com/containers/image/v5/transports/alltransports"
34
42
"github.com/containers/image/v5/types"
35
43
"github.com/containers/storage"
36
44
"github.com/containers/storage/pkg/chrootarchive"
45
+ "github.com/containers/storage/pkg/mount"
37
46
"github.com/containers/storage/pkg/unshare"
38
47
docker "github.com/fsouza/go-dockerclient"
39
48
buildkitparser "github.com/moby/buildkit/frontend/dockerfile/parser"
@@ -920,6 +929,58 @@ func (s *StageExecutor) UnrecognizedInstruction(step *imagebuilder.Step) error {
920
929
return errors .New (err )
921
930
}
922
931
932
+ // do our best to ensure that image specifiers that include a transport that
933
+ // uses path names are scoped to the build context directory
934
+ func (s * StageExecutor ) sanitizeFrom (from , tmpdir string ) (string , string , error ) {
935
+ ref , err := alltransports .ParseImageName (from )
936
+ if err != nil {
937
+ if _ , err = reference .ParseNormalizedNamed (from ); err == nil {
938
+ // this is a normal-looking image-in-a-registry-or-named-in-storage name
939
+ return from , "" , nil
940
+ }
941
+ if img , err := s .executor .store .Image (from ); img != nil && err == nil {
942
+ // this is an image ID
943
+ return from , "" , nil
944
+ }
945
+ return "" , "" , fmt .Errorf ("parsing image name %q: %w" , from , err )
946
+ }
947
+ // TODO: drop this switch block and just return an error... someday
948
+ switch ref .Transport ().Name () {
949
+ case dockerTransport .Transport .Name (), "docker-daemon" , openshiftTransport .Transport .Name ():
950
+ return from , "" , nil
951
+ case dockerArchiveTransport .Transport .Name (), ociLayoutTransport .Transport .Name (), ociArchiveTransport .Transport .Name ():
952
+ // these all take the form path[:stuff]
953
+ transportRef := ref .StringWithinTransport ()
954
+ parts := strings .Split (transportRef , ":" )
955
+ // the current directory is the root directory is the context directory
956
+ boundRef , err := volumes .BindFromChroot (s .executor .contextDir , parts [0 ], tmpdir )
957
+ if err != nil {
958
+ return "" , "" , fmt .Errorf ("ensuring that %q is in the context directory: %w" , ref .StringWithinTransport (), err )
959
+ }
960
+ parts [0 ] = boundRef
961
+ transportRef = strings .Join (parts , ":" )
962
+ newRef , err := ref .Transport ().ParseReference (transportRef )
963
+ if err != nil {
964
+ return "" , "" , fmt .Errorf ("parsing %q as an image name using %q: %w" , transportRef , ref .Transport ().Name (), err )
965
+ }
966
+ return transports .ImageName (newRef ), boundRef , nil
967
+ case directoryTransport .Transport .Name ():
968
+ // this takes the form of just a path
969
+ // the current directory is the root directory is the context directory
970
+ transportRef := ref .StringWithinTransport ()
971
+ boundRef , err := volumes .BindFromChroot (s .executor .contextDir , ref .StringWithinTransport (), tmpdir )
972
+ if err != nil {
973
+ return "" , "" , fmt .Errorf ("ensuring that %q is in the context directory: %w" , ref .StringWithinTransport (), err )
974
+ }
975
+ newRef , err := ref .Transport ().ParseReference (boundRef )
976
+ if err != nil {
977
+ return "" , "" , fmt .Errorf ("parsing %q as an image name using %q: %w" , transportRef , ref .Transport ().Name (), err )
978
+ }
979
+ return transports .ImageName (newRef ), boundRef , nil
980
+ }
981
+ return "" , "" , fmt .Errorf ("unexpected container image transport %q" , ref .Transport ().Name ())
982
+ }
983
+
923
984
// prepare creates a working container based on the specified image, or if one
924
985
// isn't specified, the first argument passed to the first FROM instruction we
925
986
// can find in the stage's parsed tree.
@@ -936,6 +997,20 @@ func (s *StageExecutor) prepare(ctx context.Context, from string, initializeIBCo
936
997
}
937
998
from = base
938
999
}
1000
+ sanitizedFrom , intermediateMount , err := s .sanitizeFrom (from , tmpdir .GetTempDir ())
1001
+ if err != nil {
1002
+ return nil , fmt .Errorf ("invalid base image specification %q: %w" , from , err )
1003
+ }
1004
+ if intermediateMount != "" {
1005
+ defer func () {
1006
+ if err := mount .Unmount (intermediateMount ); err != nil {
1007
+ logrus .Debugf ("unmounting bound version of %q: %v" , from , err )
1008
+ }
1009
+ if err := os .Remove (intermediateMount ); err != nil {
1010
+ logrus .Debugf ("removing dummy version of %q: %v" , from , err )
1011
+ }
1012
+ }()
1013
+ }
939
1014
displayFrom := from
940
1015
if ib .Platform != "" {
941
1016
displayFrom = "--platform=" + ib .Platform + " " + displayFrom
@@ -974,7 +1049,7 @@ func (s *StageExecutor) prepare(ctx context.Context, from string, initializeIBCo
974
1049
975
1050
builderOptions := buildah.BuilderOptions {
976
1051
Args : ib .Args ,
977
- FromImage : from ,
1052
+ FromImage : sanitizedFrom ,
978
1053
GroupAdd : s .executor .groupAdd ,
979
1054
PullPolicy : pullPolicy ,
980
1055
ContainerSuffix : s .executor .containerSuffix ,
0 commit comments