Commit Graph

146 Commits

Author SHA1 Message Date
OpenShift Merge Robot 67c2219bf1
Merge pull request #4015 from rhatdan/codespell
Fix codespell errors
2022-05-25 10:32:48 -04:00
Daniel J Walsh 0986de4036
Fix codespell errors
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-05-25 05:51:47 -04:00
Aditya R b3fbb59827
buildah: add support for renaming a device in rootless setups
Buildah now supports renaming devices while performing a build using
`--device <some-name>:<new-name>`. Implementation is similar to `podman`
where we prefer using `bind-mount` for devices instead of `mknod` in
`rootless` setups.

Usage
```console
buildah build -t test --device /dev/null:/test/dev/null .
```

Closes: https://github.com/containers/buildah/issues/4002

Signed-off-by: Aditya R <arajan@redhat.com>
2022-05-25 13:53:37 +05:30
Aditya R 45bd47b4e3
run: allow resuing secret twice in different RUN steps
If a secret is used in a RUN step it is created on host but we had a
check which expects a secret to not exist on the host however same
secret can be remounted on another step so it can already exists on host
so remove the check since a secret can be mounted again from host in
another RUN step.

Closes: https://github.com/containers/buildah/issues/3993

Signed-off-by: Aditya R <arajan@redhat.com>
2022-05-17 14:53:07 +05:30
OpenShift Merge Robot d93a4eb313
Merge pull request #3917 from Luap99/hosts
use etchosts package from c/common
2022-04-21 15:01:12 -04:00
Paul Holzinger 5de32ade7c
use etchosts package from c/common
Use the new etchosts package to generate the hosts file.
This will ensure that we use the same logic in podman and buildah.

New features are:
- no duplicated entries
- adds entries for the network/slirp4netns ips
- configure the host.containers.internal entry in containers.conf
- configure the base hosts file in containers.conf

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-04-21 18:05:30 +02:00
Aditya R c147bb2b9a
run: set actual hostname in /etc/hostname to match docker parity
Following commit ensure the buildah run populates /etc/hostname with
actual hostname instead of `localhost`. This matches parity with docker.

See discussion here: https://github.com/containers/buildah/issues/3914
Closes: https://github.com/containers/buildah/issues/3914

Signed-off-by: Aditya R <arajan@redhat.com>
2022-04-21 19:13:52 +05:30
Paul Holzinger 8e299da770
oci spec: change special mount points for namespaces
The current logic in setupRootlessSpecChanges has quite a few problems.
First of this logic is a noop for rootful and when we have a netns.
However pid and ipc could still need special mounts.

In Podman we have already working code for this so this reuses the same
logic and adapts it to buildah.
4ba71f955a/pkg/specgen/generate/oci.go (L178)

Since there is already logic to handle these mounts in buildah we will
add it there and also handle the special rootless case there.

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-04-08 10:50:01 +02:00
Paul Holzinger 216117c2d8
buildah: actually use containers.conf settings
Buildah ignores the container.conf settings. Commit 05d5d22dc6 tried
to fix this but I cannot see how this would have worked, there were also
no test added related to containers.conf.

The code below were we read the default just overwrites everything we
already set so the config settings are ignored.

Also there are many weird places were settings are just overwritten for
no particular reason. The namespaces code path looks like mess to me.
Namespaces are added/changed/removed in many different places and there
is no explanation why. Maybe I am just not familar enough with this code
base but I cannot really understand this. Hopefully a maintainer can
take a closer look to see if my changes are indeed correct.

Fixes containers/podman#13294

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-04-08 10:50:00 +02:00
Nalin Dahyabhai 7b0718950f Remove a stray `\` from .containerenv
Start .containerenv with a blank line rather than a stray backslash.

[NO NEW TESTS NEEDED]

Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
2022-04-04 17:29:49 -04:00
Paul Holzinger f4ebdc160f
fix hang when oci runtime fails
When the run child process exits early the parent still tries to read
from the ready pipe. Reading from the pipe should end when all writers
are closed. The problem is that the parent kept the writer open as well.
To fix the hang we just need to close the writer before we try to read
and after we gave it to the child.

To prevent closing the fd twice with defer I added a new fileCloser type
to store if the file was already closed.

This problem was noticed in the podman CI:
https://storage.googleapis.com/cirrus-ci-6707778565701632-fcae48/artifacts/containers/podman/6624611893772288/html/sys-podman-fedora-35-root-host-netavark.log.html

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-03-31 13:51:21 +02:00
Nalin Dahyabhai 8b0f5be4b8 run: set parent-death signals and forward SIGHUP/SIGINT/SIGTERM
Restore setting of the parent-death signal when we're running
subprocesses in Run(), so that if we get killed, the child processes
will also get killed.

While a child process is running, if we receive SIGHUP, SIGINT, or
SIGTERM, forward the signal to our child process unless it's the command
we're executing, which we SIGKILL without mercy, and finish the current
routine, which will then notice that the child process has exited and
return an error to its caller.

Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
2022-03-30 13:54:38 -04:00
Giuseppe Scrivano 08613ccd6b
buildah: create WORKDIR with USER permissions
Closes: https://github.com/containers/buildah/issues/3620

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
2022-03-30 16:23:56 +02:00
Giuseppe Scrivano 6ad9ec3912
Merge pull request from GHSA-c3g4-w6cv-6v7h
do not set the inheritable capabilities
2022-03-24 17:00:48 +01:00
Paul Holzinger 33f61f667d
network setup: increase timeout to 4 minutes
Podman waits for 4 minutes to wait for conmon/oci runtime to create the
container[1]. Since this value seems to work we should use the same one
here.

[1] b4b8b8b537/libpod/define/runtime.go (L27)

[NO NEW TESTS NEEDED]

Fixes containers/podman#13327

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-03-23 11:31:15 +01:00
Giuseppe Scrivano e7e55c988c
do not set the inheritable capabilities
The kernel never sets the inheritable capabilities for a process, they
are only set by userspace.  Emulate the same behavior.

Closes: CVE-2022-27651

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
2022-03-23 09:09:39 +01:00
Aditya R a4c57068fa
buildkit: mount=type=cache support locking external cache store
A shared cache on host must support locking so other parallel/concurrent builds
will wait for current executing RUN statement to finish.

* Locks the cache store as soon as RUN is triggered.
* Locked target is added to cleanup list so it can be unlocked as soon
  as RUN step is completed.

Signed-off-by: Aditya R <arajan@redhat.com>
2022-03-21 10:02:00 +05:30
Daniel J Walsh deb9c69efe
Add --no-hosts flag to eliminate use of /etc/hosts within containers
Users want to turn off addition of /etc/hosts file while building
container images, this would allow them to customize the /etc/hosts
file within the image.

Fixes: https://github.com/containers/buildah/issues/3808

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-03-10 08:52:28 -05:00
Giuseppe Scrivano 3fb7522dc3
run_linux: use --systemd-cgroup
when the configured cgroup manager is set to "systemd", use the
--systemd-cgroup option to the OCI runtime.  It is understood both by
crun and runc.

Closes: https://github.com/containers/buildah/issues/3700

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
2022-02-14 16:00:17 +01:00
Nalin Dahyabhai 38f60a3114 imagebuildah.BuildDockerfiles(): create the jobs semaphore
Make sure that, if we're given neither a concurrent jobs count nor a
semaphore to use, we create a semaphore.  Otherwise, each platform in a
multi-platform build will run with maximum concurrency, which isn't the
desired default.  Our CLI always passes in a Jobs count, so it hasn't
been affected by this problem.

[NO NEW TESTS NEEDED]

Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
2022-01-28 09:42:35 -05:00
Paul Holzinger 08d636a28b
buildah bud --network add support for custom networks
The backend logic already supports specifying custom network names. This
only adds the support for the frontend parsing.

Fixes containers/podman#12282

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-01-25 21:02:43 +01:00
OpenShift Merge Robot 2189882aeb
Merge pull request #3732 from rhatdan/codespell
Run codespell on code
2022-01-21 13:23:27 -05:00
OpenShift Merge Robot b6f6306231
Merge pull request #3715 from flouthoc/overlay-extend-api
overlay, mount: add support for non-volatile `upperdir`, `workdir` for overlay volumes
2022-01-21 07:37:26 -05:00
Daniel J Walsh 1267508918
Run codespell on code
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-01-21 06:59:49 -05:00
Aditya R 316e34d268
mount: add support for custom upper and workdir with overlay mounts
Allow users to specify non-volatile `upper` and `workdir` with overlay
mounts.

Usage

```console
buildah from alpine
buildah run -v /something/lower:/test:z,O,upperdir=/somewhere/upperdir,workdir=/somwhere/workdir alpine-working-container cat /test/hello
```

Signed-off-by: Aditya R <arajan@redhat.com>
2022-01-20 21:35:34 +05:30
Giuseppe Scrivano e02e273820
linux: fix lookup for runtime
lookup the full runtime path instead of using its name.

Closes: https://github.com/containers/buildah/issues/3721

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
2022-01-20 10:53:36 +01:00
Daniel J Walsh e94e07e383
Fix permissions on secrets directory
The permission on this directory will prevent user namespaces from using
secrets.  Should be world searchable

[NO TESTS NEEDED]

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-01-11 14:18:57 -05:00
Paul Holzinger d7ccff3edb
Fix default CNI paths
We need to use the default from containers.conf and not hardcode them in
buildah. This fixes an issue with the cni network backend since it would
try to access /etc/cni/net.d/ even as rootless user. This regression was
introduced in commit f9cff07b81.

Also hide the cni flags as we do not expect users to change this. The
recommended way is to change them in containers.conf.

[NO NEW TESTS NEEDED]

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-01-10 15:49:43 +01:00
Aditya Rajan 719b660462
buildkit: add from field to bind and cache mounts so images can be used as source
Following commit adds buildkit like support for `from` field to `--mount=type=bind`
and `--mount=type=cache` so images and stage can be used as mount source.

Usage looks like
```dockerfile
RUN --mount=type=bind,source=.,from=<your-image>,target=/path ls /path
```
and
```dockerfile
RUN --mount=type=cache,from=<your-image>,target=/path ls /path
```

Signed-off-by: Aditya Rajan <arajan@redhat.com>
2022-01-08 16:58:38 +05:30
Daniel J Walsh 1c67aad88f
Use config.ProxyEnv from containers/common
This table is being used in multiple different places, so consolidating
it in containers/common

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-01-07 14:31:16 -05:00
Paul Holzinger f9cff07b81
use libnetwork from c/common for networking
Podman uses the new netavark network stack. Buildah should be able to do
the same. Both projects should use the same networking code which was
move to c/common/libnetwork. The new network interface can use either
CNI or netvavark. Using the same code for podman and buildah is
important to ensure that both use the same backend. Mixing CNI and
netavark is not supported.

This also fixes some outstanding CNI issues, e.g. buildah trying to
connect all cni networks.

[NO NEW TESTS NEEDED]

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-01-07 18:10:26 +01:00
Paul Holzinger 5e11770c19
setup the netns in the buildah parent process
Do not configure the netns in the runtime child process, this removes
the need to send the network options to the child. This will be needed
for the new libnetwork network interface which cannot be transfered as
json.

To synchronize this between the child and parent we use two pipe pairs.

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-01-07 15:05:08 +01:00
Daniel J Walsh 300d9d1de1
Allow rootless buildah to set resource limits on cgroup V2
First move podman/pkg/cgroups into Buildah.
Only set resources to nil on non cgroupsv2 systems in rootless mode.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2021-12-14 12:36:03 -05:00
Daniel J Walsh 05d5d22dc6
Grab all of the containers.conf settings for namespaces.
Buildah is mainly building with Host Namespaces, this changes most
namespaces to be private matching Podman and using containers.conf

Fixes: https://github.com/containers/buildah/issues/3634

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2021-11-30 10:24:00 -05:00
Daniel J Walsh 1d74137908
Make LocalIP public function so Podman can use it
[NO NEW TESTS NEEDED]

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2021-11-22 10:00:50 -05:00
Nalin Dahyabhai 9b6a02f3af run: ensure that stdio pipes are labeled correctly
Label stdio pipes to ensure that processes we run can read through
/dev/stdin and write through the /dev/stdout and /dev/stderr links.

Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
2021-11-19 10:55:50 -05:00
Giuseppe Scrivano b798e6a21a
rootless: do not bind mount /sys if not needed
if the container is using a private network namespace, we can mount a
fresh /sys.

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
2021-11-04 14:34:21 +01:00
OpenShift Merge Robot ecd74746cc
Merge pull request #3598 from ashley-cui/envs
Add support for env var secret sources
2021-10-31 09:58:44 +00:00
Aditya Rajan 37377e6827
run: honor --network=none from builder if nothing specified
This commit makes sure we honor NetworkDisabled in `runs` if
`--network=none` was specified while building the container and no
configuration was specified in while running the container.

Signed-off-by: Aditya Rajan <arajan@redhat.com>
2021-10-27 14:50:11 +05:30
Ashley Cui 326edb312e Add support for env var secret sources
Run secrets can now be created from an environment variable. The
environment variable is read and is briefly stored as a file on /dev/shm
when it's being used, and the file is removed after the RUN command is
finished.

Fixes: #3524

Signed-off-by: Ashley Cui <acui@redhat.com>
2021-10-26 13:18:00 -04:00
OpenShift Merge Robot d6b04349fe
Merge pull request #3593 from rhatdan/group
Rootless containers users should use additional groups
2021-10-21 17:45:42 +00:00
Daniel J Walsh 08b55f91cc
Rootless containers users should use additional groups
Fixes https://github.com/containers/buildah/issues/3592

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2021-10-20 14:22:42 -04:00
chenk008 03186a3307 Support overlayfs path contains colon
In linux, directory can contains colon.
Add support to mount path contains colon.

buildah run --volume /root/a\\🅱️/root/test:O

Signed-off-by: chenk008 <kongchen28@gmail.com>
2021-10-20 14:40:38 +08:00
OpenShift Merge Robot e4a4f2c0d4
Merge pull request #3586 from rhatdan/docs
Add support for host.containers.internal in the /etc/hosts
2021-10-15 01:08:56 +02:00
Daniel J Walsh f8c152694c
Add support for host.containers.internal in the /etc/hosts
Also switch default hostname from truncated ContainerID to Container
name.

It makes more sense that a user would know the name of the container
versus the generated id, so we should use this as a default.

Fixes: https://github.com/containers/buildah/issues/3509

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2021-10-14 13:21:25 -04:00
Aditya Rajan fc69aa68c2
buildkit: add support for mount=type=cache
Following PR inroduces a new mount type=cache in parity to buildkit
which allows users to share persistant cache between different builds.

Allowing users to cache content generated by bussiness logic or enhance
build performance by caching components across builds.

Signed-off-by: Aditya Rajan <arajan@redhat.com>
2021-10-14 16:07:11 +05:30
Ashley Cui b9b3184632 Default secret mode to 400
Fixed a bug where buildah bud mounted secrets permissions were incorrect due to a decimal/octal conversion error. buildah bud mounted secrets now have a default permission of 400. Fixes #3557

Signed-off-by: Ashley Cui <acui@redhat.com>
2021-10-12 16:00:23 -04:00
Aditya Rajan e96df7060c
buildkit: Add support for --mount=type=tmpfs
Following PR adds supports for buildkit like `--mount=type=tmpfs` which
allows end users to mount a chunk of volatile memory instead of a persistent storage device.

Signed-off-by: Aditya Rajan <arajan@redhat.com>
2021-10-08 13:29:57 +05:30
Aditya Rajan f0d3140e5a
build: Add support for buildkit like --mount=type=bind
Following commit adds support for using buildkit like
`--mount=type=bind` with `RUN` statements. Mounts created by `--mount`
are transient in nature and only scoped to current RUN statements.

Signed-off-by: Aditya Rajan <arajan@redhat.com>
2021-10-06 13:45:53 +05:30
OpenShift Merge Robot bc718ca758
Merge pull request #3540 from rhatdan/log-level
Plumb the remote logger throughut Buildah
2021-09-30 03:52:31 -04:00