mirror of
				https://github.com/edera-dev/krata.git
				synced 2025-11-03 23:29:39 +00:00 
			
		
		
		
	krata: rework into daemon / controller structure
This commit is contained in:
		
							
								
								
									
										53
									
								
								guest/src/background.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										53
									
								
								guest/src/background.rs
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,53 @@
 | 
			
		||||
use std::time::Duration;
 | 
			
		||||
 | 
			
		||||
use crate::childwait::{ChildEvent, ChildWait};
 | 
			
		||||
use anyhow::Result;
 | 
			
		||||
use nix::{libc::c_int, unistd::Pid};
 | 
			
		||||
use tokio::{select, time::sleep};
 | 
			
		||||
use xenstore::client::{XsdClient, XsdInterface};
 | 
			
		||||
 | 
			
		||||
pub struct ContainerBackground {
 | 
			
		||||
    child: Pid,
 | 
			
		||||
    wait: ChildWait,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
impl ContainerBackground {
 | 
			
		||||
    pub async fn new(child: Pid) -> Result<ContainerBackground> {
 | 
			
		||||
        Ok(ContainerBackground {
 | 
			
		||||
            child,
 | 
			
		||||
            wait: ChildWait::new()?,
 | 
			
		||||
        })
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    pub async fn run(&mut self) -> Result<()> {
 | 
			
		||||
        loop {
 | 
			
		||||
            select! {
 | 
			
		||||
                event = self.wait.recv() => match event {
 | 
			
		||||
                    Some(event) => self.child_event(event).await?,
 | 
			
		||||
                    None => {
 | 
			
		||||
                        break;
 | 
			
		||||
                    }
 | 
			
		||||
                }
 | 
			
		||||
            };
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async fn child_event(&mut self, event: ChildEvent) -> Result<()> {
 | 
			
		||||
        if event.pid == self.child {
 | 
			
		||||
            self.death(event.status).await?;
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async fn death(&mut self, code: c_int) -> Result<()> {
 | 
			
		||||
        let mut store = XsdClient::open().await?;
 | 
			
		||||
        store
 | 
			
		||||
            .write_string("krata/guest/exit-code", &code.to_string())
 | 
			
		||||
            .await?;
 | 
			
		||||
        drop(store);
 | 
			
		||||
        loop {
 | 
			
		||||
            sleep(Duration::from_secs(1)).await;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										84
									
								
								guest/src/childwait.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										84
									
								
								guest/src/childwait.rs
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,84 @@
 | 
			
		||||
use std::{
 | 
			
		||||
    ptr::addr_of_mut,
 | 
			
		||||
    sync::{
 | 
			
		||||
        atomic::{AtomicBool, Ordering},
 | 
			
		||||
        Arc,
 | 
			
		||||
    },
 | 
			
		||||
    thread::{self, JoinHandle},
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
use anyhow::Result;
 | 
			
		||||
use log::warn;
 | 
			
		||||
use nix::{
 | 
			
		||||
    libc::{c_int, wait},
 | 
			
		||||
    unistd::Pid,
 | 
			
		||||
};
 | 
			
		||||
use tokio::sync::mpsc::{channel, Receiver, Sender};
 | 
			
		||||
 | 
			
		||||
const CHILD_WAIT_QUEUE_LEN: usize = 10;
 | 
			
		||||
 | 
			
		||||
#[derive(Clone, Copy, Debug)]
 | 
			
		||||
pub struct ChildEvent {
 | 
			
		||||
    pub pid: Pid,
 | 
			
		||||
    pub status: c_int,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub struct ChildWait {
 | 
			
		||||
    receiver: Receiver<ChildEvent>,
 | 
			
		||||
    signal: Arc<AtomicBool>,
 | 
			
		||||
    _task: JoinHandle<()>,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
impl ChildWait {
 | 
			
		||||
    pub fn new() -> Result<ChildWait> {
 | 
			
		||||
        let (sender, receiver) = channel(CHILD_WAIT_QUEUE_LEN);
 | 
			
		||||
        let signal = Arc::new(AtomicBool::new(false));
 | 
			
		||||
        let mut processor = ChildWaitTask {
 | 
			
		||||
            sender,
 | 
			
		||||
            signal: signal.clone(),
 | 
			
		||||
        };
 | 
			
		||||
        let task = thread::spawn(move || {
 | 
			
		||||
            if let Err(error) = processor.process() {
 | 
			
		||||
                warn!("failed to process child updates: {}", error);
 | 
			
		||||
            }
 | 
			
		||||
        });
 | 
			
		||||
        Ok(ChildWait {
 | 
			
		||||
            receiver,
 | 
			
		||||
            signal,
 | 
			
		||||
            _task: task,
 | 
			
		||||
        })
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    pub async fn recv(&mut self) -> Option<ChildEvent> {
 | 
			
		||||
        self.receiver.recv().await
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
struct ChildWaitTask {
 | 
			
		||||
    sender: Sender<ChildEvent>,
 | 
			
		||||
    signal: Arc<AtomicBool>,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
impl ChildWaitTask {
 | 
			
		||||
    fn process(&mut self) -> Result<()> {
 | 
			
		||||
        loop {
 | 
			
		||||
            let mut status: c_int = 0;
 | 
			
		||||
            let pid = unsafe { wait(addr_of_mut!(status)) };
 | 
			
		||||
            let event = ChildEvent {
 | 
			
		||||
                pid: Pid::from_raw(pid),
 | 
			
		||||
                status,
 | 
			
		||||
            };
 | 
			
		||||
            let _ = self.sender.try_send(event);
 | 
			
		||||
 | 
			
		||||
            if self.signal.load(Ordering::Acquire) {
 | 
			
		||||
                return Ok(());
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
impl Drop for ChildWait {
 | 
			
		||||
    fn drop(&mut self) {
 | 
			
		||||
        self.signal.store(true, Ordering::Release);
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										523
									
								
								guest/src/init.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										523
									
								
								guest/src/init.rs
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,523 @@
 | 
			
		||||
use anyhow::{anyhow, Result};
 | 
			
		||||
use futures::stream::TryStreamExt;
 | 
			
		||||
use ipnetwork::IpNetwork;
 | 
			
		||||
use krata::ethtool::EthtoolHandle;
 | 
			
		||||
use krata::launchcfg::{LaunchInfo, LaunchNetwork};
 | 
			
		||||
use log::{trace, warn};
 | 
			
		||||
use nix::libc::{dup2, ioctl};
 | 
			
		||||
use nix::unistd::{execve, fork, ForkResult, Pid};
 | 
			
		||||
use oci_spec::image::{Config, ImageConfiguration};
 | 
			
		||||
use path_absolutize::Absolutize;
 | 
			
		||||
use std::collections::HashMap;
 | 
			
		||||
use std::ffi::CString;
 | 
			
		||||
use std::fs::{File, OpenOptions, Permissions};
 | 
			
		||||
use std::net::{Ipv4Addr, Ipv6Addr};
 | 
			
		||||
use std::os::fd::AsRawFd;
 | 
			
		||||
use std::os::linux::fs::MetadataExt;
 | 
			
		||||
use std::os::unix::ffi::OsStrExt;
 | 
			
		||||
use std::os::unix::fs::{chroot, PermissionsExt};
 | 
			
		||||
use std::path::{Path, PathBuf};
 | 
			
		||||
use std::str::FromStr;
 | 
			
		||||
use std::{fs, io};
 | 
			
		||||
use sys_mount::{FilesystemType, Mount, MountFlags};
 | 
			
		||||
use walkdir::WalkDir;
 | 
			
		||||
 | 
			
		||||
use crate::background::ContainerBackground;
 | 
			
		||||
 | 
			
		||||
const IMAGE_BLOCK_DEVICE_PATH: &str = "/dev/xvda";
 | 
			
		||||
const CONFIG_BLOCK_DEVICE_PATH: &str = "/dev/xvdb";
 | 
			
		||||
 | 
			
		||||
const IMAGE_MOUNT_PATH: &str = "/image";
 | 
			
		||||
const CONFIG_MOUNT_PATH: &str = "/config";
 | 
			
		||||
const OVERLAY_MOUNT_PATH: &str = "/overlay";
 | 
			
		||||
 | 
			
		||||
const OVERLAY_IMAGE_BIND_PATH: &str = "/overlay/image";
 | 
			
		||||
const OVERLAY_WORK_PATH: &str = "/overlay/work";
 | 
			
		||||
const OVERLAY_UPPER_PATH: &str = "/overlay/upper";
 | 
			
		||||
 | 
			
		||||
const SYS_PATH: &str = "/sys";
 | 
			
		||||
const PROC_PATH: &str = "/proc";
 | 
			
		||||
const DEV_PATH: &str = "/dev";
 | 
			
		||||
 | 
			
		||||
const NEW_ROOT_PATH: &str = "/newroot";
 | 
			
		||||
const NEW_ROOT_SYS_PATH: &str = "/newroot/sys";
 | 
			
		||||
const NEW_ROOT_PROC_PATH: &str = "/newroot/proc";
 | 
			
		||||
const NEW_ROOT_DEV_PATH: &str = "/newroot/dev";
 | 
			
		||||
 | 
			
		||||
const IMAGE_CONFIG_JSON_PATH: &str = "/config/image/config.json";
 | 
			
		||||
const LAUNCH_CONFIG_JSON_PATH: &str = "/config/launch.json";
 | 
			
		||||
 | 
			
		||||
pub struct GuestInit {}
 | 
			
		||||
 | 
			
		||||
impl Default for GuestInit {
 | 
			
		||||
    fn default() -> Self {
 | 
			
		||||
        Self::new()
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
impl GuestInit {
 | 
			
		||||
    pub fn new() -> GuestInit {
 | 
			
		||||
        GuestInit {}
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    pub async fn init(&mut self) -> Result<()> {
 | 
			
		||||
        self.early_init()?;
 | 
			
		||||
 | 
			
		||||
        trace!("opening console descriptor");
 | 
			
		||||
        match OpenOptions::new()
 | 
			
		||||
            .read(true)
 | 
			
		||||
            .write(true)
 | 
			
		||||
            .open("/dev/console")
 | 
			
		||||
        {
 | 
			
		||||
            Ok(console) => self.map_console(&console)?,
 | 
			
		||||
            Err(error) => warn!("failed to open console: {}", error),
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        self.mount_squashfs_images()?;
 | 
			
		||||
        let config = self.parse_image_config()?;
 | 
			
		||||
        let launch = self.parse_launch_config()?;
 | 
			
		||||
        self.mount_new_root()?;
 | 
			
		||||
        self.nuke_initrd()?;
 | 
			
		||||
        self.bind_new_root()?;
 | 
			
		||||
 | 
			
		||||
        if let Some(network) = &launch.network {
 | 
			
		||||
            if let Err(error) = self.network_setup(network).await {
 | 
			
		||||
                warn!("failed to initialize network: {}", error);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if let Some(cfg) = config.config() {
 | 
			
		||||
            self.run(cfg, &launch).await?;
 | 
			
		||||
        } else {
 | 
			
		||||
            return Err(anyhow!(
 | 
			
		||||
                "unable to determine what to execute, image config doesn't tell us"
 | 
			
		||||
            ));
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn early_init(&mut self) -> Result<()> {
 | 
			
		||||
        trace!("early init");
 | 
			
		||||
        self.create_dir("/dev", Some(0o0755))?;
 | 
			
		||||
        self.create_dir("/proc", None)?;
 | 
			
		||||
        self.create_dir("/sys", None)?;
 | 
			
		||||
        self.create_dir("/root", Some(0o0700))?;
 | 
			
		||||
        self.create_dir("/tmp", None)?;
 | 
			
		||||
        self.mount_kernel_fs("devtmpfs", "/dev", "mode=0755")?;
 | 
			
		||||
        self.mount_kernel_fs("proc", "/proc", "")?;
 | 
			
		||||
        self.mount_kernel_fs("sysfs", "/sys", "")?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn create_dir(&mut self, path: &str, mode: Option<u32>) -> Result<()> {
 | 
			
		||||
        let path = Path::new(path);
 | 
			
		||||
        if !path.is_dir() {
 | 
			
		||||
            trace!("creating directory {:?}", path);
 | 
			
		||||
            fs::create_dir(path)?;
 | 
			
		||||
        }
 | 
			
		||||
        if let Some(mode) = mode {
 | 
			
		||||
            let permissions = Permissions::from_mode(mode);
 | 
			
		||||
            trace!("setting directory {:?} permissions to {:?}", path, mode);
 | 
			
		||||
            fs::set_permissions(path, permissions)?;
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn mount_kernel_fs(&mut self, fstype: &str, path: &str, data: &str) -> Result<()> {
 | 
			
		||||
        let metadata = fs::metadata(path)?;
 | 
			
		||||
        if metadata.st_dev() == fs::metadata("/")?.st_dev() {
 | 
			
		||||
            trace!("mounting kernel fs {} to {}", fstype, path);
 | 
			
		||||
            Mount::builder()
 | 
			
		||||
                .fstype(FilesystemType::Manual(fstype))
 | 
			
		||||
                .flags(MountFlags::NOEXEC | MountFlags::NOSUID)
 | 
			
		||||
                .data(data)
 | 
			
		||||
                .mount(fstype, path)?;
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn map_console(&mut self, console: &File) -> Result<()> {
 | 
			
		||||
        trace!("mapping console");
 | 
			
		||||
        unsafe {
 | 
			
		||||
            dup2(console.as_raw_fd(), 0);
 | 
			
		||||
            dup2(console.as_raw_fd(), 1);
 | 
			
		||||
            dup2(console.as_raw_fd(), 2);
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn mount_squashfs_images(&mut self) -> Result<()> {
 | 
			
		||||
        trace!("mounting squashfs images");
 | 
			
		||||
        let image_mount_path = Path::new(IMAGE_MOUNT_PATH);
 | 
			
		||||
        let config_mount_path = Path::new(CONFIG_MOUNT_PATH);
 | 
			
		||||
        self.mount_squashfs(Path::new(IMAGE_BLOCK_DEVICE_PATH), image_mount_path)?;
 | 
			
		||||
        self.mount_squashfs(Path::new(CONFIG_BLOCK_DEVICE_PATH), config_mount_path)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn mount_squashfs(&mut self, from: &Path, to: &Path) -> Result<()> {
 | 
			
		||||
        trace!("mounting squashfs image {:?} to {:?}", from, to);
 | 
			
		||||
        if !to.is_dir() {
 | 
			
		||||
            fs::create_dir(to)?;
 | 
			
		||||
        }
 | 
			
		||||
        Mount::builder()
 | 
			
		||||
            .fstype(FilesystemType::Manual("squashfs"))
 | 
			
		||||
            .flags(MountFlags::RDONLY)
 | 
			
		||||
            .mount(from, to)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn mount_move_subtree(&mut self, from: &Path, to: &Path) -> Result<()> {
 | 
			
		||||
        trace!("moving subtree {:?} to {:?}", from, to);
 | 
			
		||||
        if !to.is_dir() {
 | 
			
		||||
            fs::create_dir(to)?;
 | 
			
		||||
        }
 | 
			
		||||
        Mount::builder()
 | 
			
		||||
            .fstype(FilesystemType::Manual("none"))
 | 
			
		||||
            .flags(MountFlags::MOVE)
 | 
			
		||||
            .mount(from, to)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn mount_new_root(&mut self) -> Result<()> {
 | 
			
		||||
        trace!("mounting new root");
 | 
			
		||||
        self.mount_overlay_tmpfs()?;
 | 
			
		||||
        self.bind_image_to_overlay_tmpfs()?;
 | 
			
		||||
        self.mount_overlay_to_new_root()?;
 | 
			
		||||
        std::env::set_current_dir(NEW_ROOT_PATH)?;
 | 
			
		||||
        trace!("mounted new root");
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn mount_overlay_tmpfs(&mut self) -> Result<()> {
 | 
			
		||||
        fs::create_dir(OVERLAY_MOUNT_PATH)?;
 | 
			
		||||
        Mount::builder()
 | 
			
		||||
            .fstype(FilesystemType::Manual("tmpfs"))
 | 
			
		||||
            .mount("tmpfs", OVERLAY_MOUNT_PATH)?;
 | 
			
		||||
        fs::create_dir(OVERLAY_UPPER_PATH)?;
 | 
			
		||||
        fs::create_dir(OVERLAY_WORK_PATH)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn bind_image_to_overlay_tmpfs(&mut self) -> Result<()> {
 | 
			
		||||
        fs::create_dir(OVERLAY_IMAGE_BIND_PATH)?;
 | 
			
		||||
        Mount::builder()
 | 
			
		||||
            .fstype(FilesystemType::Manual("none"))
 | 
			
		||||
            .flags(MountFlags::BIND | MountFlags::RDONLY)
 | 
			
		||||
            .mount(IMAGE_MOUNT_PATH, OVERLAY_IMAGE_BIND_PATH)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn mount_overlay_to_new_root(&mut self) -> Result<()> {
 | 
			
		||||
        fs::create_dir(NEW_ROOT_PATH)?;
 | 
			
		||||
        Mount::builder()
 | 
			
		||||
            .fstype(FilesystemType::Manual("overlay"))
 | 
			
		||||
            .flags(MountFlags::NOATIME)
 | 
			
		||||
            .data(&format!(
 | 
			
		||||
                "lowerdir={},upperdir={},workdir={}",
 | 
			
		||||
                OVERLAY_IMAGE_BIND_PATH, OVERLAY_UPPER_PATH, OVERLAY_WORK_PATH
 | 
			
		||||
            ))
 | 
			
		||||
            .mount(format!("overlayfs:{}", OVERLAY_MOUNT_PATH), NEW_ROOT_PATH)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn parse_image_config(&mut self) -> Result<ImageConfiguration> {
 | 
			
		||||
        trace!("parsing image config");
 | 
			
		||||
        let image_config_path = Path::new(IMAGE_CONFIG_JSON_PATH);
 | 
			
		||||
        let config = ImageConfiguration::from_file(image_config_path)?;
 | 
			
		||||
        Ok(config)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn parse_launch_config(&mut self) -> Result<LaunchInfo> {
 | 
			
		||||
        trace!("parsing launch config");
 | 
			
		||||
        let launch_config = Path::new(LAUNCH_CONFIG_JSON_PATH);
 | 
			
		||||
        Ok(serde_json::from_str(&fs::read_to_string(launch_config)?)?)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn nuke_initrd(&mut self) -> Result<()> {
 | 
			
		||||
        trace!("nuking initrd");
 | 
			
		||||
        let initrd_dev = fs::metadata("/")?.st_dev();
 | 
			
		||||
        for item in WalkDir::new("/")
 | 
			
		||||
            .same_file_system(true)
 | 
			
		||||
            .follow_links(false)
 | 
			
		||||
            .contents_first(true)
 | 
			
		||||
        {
 | 
			
		||||
            if item.is_err() {
 | 
			
		||||
                continue;
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            let item = item?;
 | 
			
		||||
            let metadata = match item.metadata() {
 | 
			
		||||
                Ok(value) => value,
 | 
			
		||||
                Err(_) => continue,
 | 
			
		||||
            };
 | 
			
		||||
 | 
			
		||||
            if metadata.st_dev() != initrd_dev {
 | 
			
		||||
                continue;
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            if metadata.is_symlink() || metadata.is_file() {
 | 
			
		||||
                let _ = fs::remove_file(item.path());
 | 
			
		||||
                trace!("deleting file {:?}", item.path());
 | 
			
		||||
            } else if metadata.is_dir() {
 | 
			
		||||
                let _ = fs::remove_dir(item.path());
 | 
			
		||||
                trace!("deleting directory {:?}", item.path());
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        trace!("nuked initrd");
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn bind_new_root(&mut self) -> Result<()> {
 | 
			
		||||
        self.mount_move_subtree(Path::new(SYS_PATH), Path::new(NEW_ROOT_SYS_PATH))?;
 | 
			
		||||
        self.mount_move_subtree(Path::new(PROC_PATH), Path::new(NEW_ROOT_PROC_PATH))?;
 | 
			
		||||
        self.mount_move_subtree(Path::new(DEV_PATH), Path::new(NEW_ROOT_DEV_PATH))?;
 | 
			
		||||
        trace!("binding new root");
 | 
			
		||||
        Mount::builder()
 | 
			
		||||
            .fstype(FilesystemType::Manual("none"))
 | 
			
		||||
            .flags(MountFlags::BIND)
 | 
			
		||||
            .mount(".", "/")?;
 | 
			
		||||
        trace!("chrooting into new root");
 | 
			
		||||
        chroot(".")?;
 | 
			
		||||
        trace!("setting root as current directory");
 | 
			
		||||
        std::env::set_current_dir("/")?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async fn network_setup(&mut self, network: &LaunchNetwork) -> Result<()> {
 | 
			
		||||
        trace!("setting up network for link");
 | 
			
		||||
 | 
			
		||||
        let etc = PathBuf::from_str("/etc")?;
 | 
			
		||||
        if !etc.exists() {
 | 
			
		||||
            fs::create_dir(etc)?;
 | 
			
		||||
        }
 | 
			
		||||
        let resolv = PathBuf::from_str("/etc/resolv.conf")?;
 | 
			
		||||
        let mut lines = vec!["# krata resolver configuration".to_string()];
 | 
			
		||||
        for nameserver in &network.resolver.nameservers {
 | 
			
		||||
            lines.push(format!("nameserver {}", nameserver));
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        let mut conf = lines.join("\n");
 | 
			
		||||
        conf.push('\n');
 | 
			
		||||
        fs::write(resolv, conf)?;
 | 
			
		||||
        self.network_configure_ethtool(network).await?;
 | 
			
		||||
        self.network_configure_link(network).await?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async fn network_configure_link(&mut self, network: &LaunchNetwork) -> Result<()> {
 | 
			
		||||
        let (connection, handle, _) = rtnetlink::new_connection()?;
 | 
			
		||||
        tokio::spawn(connection);
 | 
			
		||||
 | 
			
		||||
        let ipv4_network: IpNetwork = network.ipv4.address.parse()?;
 | 
			
		||||
        let ipv4_gateway: Ipv4Addr = network.ipv4.gateway.parse()?;
 | 
			
		||||
        let ipv6_network: IpNetwork = network.ipv6.address.parse()?;
 | 
			
		||||
        let ipv6_gateway: Ipv6Addr = network.ipv6.gateway.parse()?;
 | 
			
		||||
 | 
			
		||||
        let mut links = handle
 | 
			
		||||
            .link()
 | 
			
		||||
            .get()
 | 
			
		||||
            .match_name(network.link.clone())
 | 
			
		||||
            .execute();
 | 
			
		||||
        let Some(link) = links.try_next().await? else {
 | 
			
		||||
            warn!("unable to find link named {}", network.link);
 | 
			
		||||
            return Ok(());
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        handle
 | 
			
		||||
            .address()
 | 
			
		||||
            .add(link.header.index, ipv4_network.ip(), ipv4_network.prefix())
 | 
			
		||||
            .execute()
 | 
			
		||||
            .await?;
 | 
			
		||||
 | 
			
		||||
        let ipv6_result = handle
 | 
			
		||||
            .address()
 | 
			
		||||
            .add(link.header.index, ipv6_network.ip(), ipv6_network.prefix())
 | 
			
		||||
            .execute()
 | 
			
		||||
            .await;
 | 
			
		||||
 | 
			
		||||
        let ipv6_ready = match ipv6_result {
 | 
			
		||||
            Ok(()) => true,
 | 
			
		||||
            Err(error) => {
 | 
			
		||||
                warn!("unable to setup ipv6 network: {}", error);
 | 
			
		||||
                false
 | 
			
		||||
            }
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        handle.link().set(link.header.index).up().execute().await?;
 | 
			
		||||
 | 
			
		||||
        handle
 | 
			
		||||
            .route()
 | 
			
		||||
            .add()
 | 
			
		||||
            .v4()
 | 
			
		||||
            .destination_prefix(Ipv4Addr::UNSPECIFIED, 0)
 | 
			
		||||
            .output_interface(link.header.index)
 | 
			
		||||
            .gateway(ipv4_gateway)
 | 
			
		||||
            .execute()
 | 
			
		||||
            .await?;
 | 
			
		||||
 | 
			
		||||
        if ipv6_ready {
 | 
			
		||||
            let ipv6_gw_result = handle
 | 
			
		||||
                .route()
 | 
			
		||||
                .add()
 | 
			
		||||
                .v6()
 | 
			
		||||
                .destination_prefix(Ipv6Addr::UNSPECIFIED, 0)
 | 
			
		||||
                .output_interface(link.header.index)
 | 
			
		||||
                .gateway(ipv6_gateway)
 | 
			
		||||
                .execute()
 | 
			
		||||
                .await;
 | 
			
		||||
 | 
			
		||||
            if let Err(error) = ipv6_gw_result {
 | 
			
		||||
                warn!("failed to add ipv6 gateway route: {}", error);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async fn network_configure_ethtool(&mut self, network: &LaunchNetwork) -> Result<()> {
 | 
			
		||||
        let mut handle = EthtoolHandle::new()?;
 | 
			
		||||
        handle.set_gso(&network.link, false)?;
 | 
			
		||||
        handle.set_tso(&network.link, false)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async fn run(&mut self, config: &Config, launch: &LaunchInfo) -> Result<()> {
 | 
			
		||||
        let mut cmd = match config.cmd() {
 | 
			
		||||
            None => vec![],
 | 
			
		||||
            Some(value) => value.clone(),
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        if launch.run.is_some() {
 | 
			
		||||
            cmd = launch.run.as_ref().unwrap().clone();
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if cmd.is_empty() {
 | 
			
		||||
            cmd.push("/bin/sh".to_string());
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        let path = cmd.remove(0);
 | 
			
		||||
 | 
			
		||||
        let mut env = vec!["KRATA_CONTAINER=1".to_string(), "TERM=vt100".to_string()];
 | 
			
		||||
 | 
			
		||||
        if let Some(config_env) = config.env() {
 | 
			
		||||
            env.extend_from_slice(config_env);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if let Some(extra_env) = &launch.env {
 | 
			
		||||
            env.extend_from_slice(extra_env.as_slice());
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        let env = GuestInit::env_map(env);
 | 
			
		||||
        let path = GuestInit::resolve_executable(&env, path.into())?;
 | 
			
		||||
        let Some(file_name) = path.file_name() else {
 | 
			
		||||
            return Err(anyhow!("cannot get file name of command path"));
 | 
			
		||||
        };
 | 
			
		||||
        let Some(file_name) = file_name.to_str() else {
 | 
			
		||||
            return Err(anyhow!("cannot get file name of command path as str"));
 | 
			
		||||
        };
 | 
			
		||||
        cmd.insert(0, file_name.to_string());
 | 
			
		||||
        let env = GuestInit::env_list(env);
 | 
			
		||||
 | 
			
		||||
        trace!("running container command: {}", cmd.join(" "));
 | 
			
		||||
 | 
			
		||||
        let path = CString::new(path.as_os_str().as_bytes())?;
 | 
			
		||||
        let cmd = GuestInit::strings_as_cstrings(cmd)?;
 | 
			
		||||
        let env = GuestInit::strings_as_cstrings(env)?;
 | 
			
		||||
        let mut working_dir = config
 | 
			
		||||
            .working_dir()
 | 
			
		||||
            .as_ref()
 | 
			
		||||
            .map(|x| x.to_string())
 | 
			
		||||
            .unwrap_or("/".to_string());
 | 
			
		||||
 | 
			
		||||
        if working_dir.is_empty() {
 | 
			
		||||
            working_dir = "/".to_string();
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        std::env::set_current_dir(&working_dir)?;
 | 
			
		||||
        self.fork_and_exec(path, cmd, env).await?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn strings_as_cstrings(values: Vec<String>) -> Result<Vec<CString>> {
 | 
			
		||||
        let mut results: Vec<CString> = vec![];
 | 
			
		||||
        for value in values {
 | 
			
		||||
            results.push(CString::new(value.as_bytes().to_vec())?);
 | 
			
		||||
        }
 | 
			
		||||
        Ok(results)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn env_map(env: Vec<String>) -> HashMap<String, String> {
 | 
			
		||||
        let mut map = HashMap::<String, String>::new();
 | 
			
		||||
        for item in env {
 | 
			
		||||
            if let Some((key, value)) = item.split_once('=') {
 | 
			
		||||
                map.insert(key.to_string(), value.to_string());
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        map
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn resolve_executable(env: &HashMap<String, String>, path: PathBuf) -> Result<PathBuf> {
 | 
			
		||||
        if path.is_absolute() {
 | 
			
		||||
            return Ok(path);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if path.is_file() {
 | 
			
		||||
            return Ok(path.absolutize()?.to_path_buf());
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if let Some(path_var) = env.get("PATH") {
 | 
			
		||||
            for item in path_var.split(':') {
 | 
			
		||||
                let mut exe_path: PathBuf = item.into();
 | 
			
		||||
                exe_path.push(&path);
 | 
			
		||||
                if exe_path.is_file() {
 | 
			
		||||
                    return Ok(exe_path);
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        Ok(path)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn env_list(env: HashMap<String, String>) -> Vec<String> {
 | 
			
		||||
        env.iter()
 | 
			
		||||
            .map(|(key, value)| format!("{}={}", key, value))
 | 
			
		||||
            .collect::<Vec<String>>()
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async fn fork_and_exec(
 | 
			
		||||
        &mut self,
 | 
			
		||||
        path: CString,
 | 
			
		||||
        cmd: Vec<CString>,
 | 
			
		||||
        env: Vec<CString>,
 | 
			
		||||
    ) -> Result<()> {
 | 
			
		||||
        match unsafe { fork()? } {
 | 
			
		||||
            ForkResult::Parent { child } => self.background(child).await,
 | 
			
		||||
            ForkResult::Child => self.foreground(path, cmd, env).await,
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async fn foreground(
 | 
			
		||||
        &mut self,
 | 
			
		||||
        path: CString,
 | 
			
		||||
        cmd: Vec<CString>,
 | 
			
		||||
        env: Vec<CString>,
 | 
			
		||||
    ) -> Result<()> {
 | 
			
		||||
        GuestInit::set_controlling_terminal()?;
 | 
			
		||||
        execve(&path, &cmd, &env)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fn set_controlling_terminal() -> Result<()> {
 | 
			
		||||
        unsafe { nix::libc::setsid() };
 | 
			
		||||
        let result = unsafe { ioctl(io::stdin().as_raw_fd(), nix::libc::TIOCSCTTY, 0) };
 | 
			
		||||
        if result != 0 {
 | 
			
		||||
            warn!("failed to set controlling terminal, result={}", result);
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async fn background(&mut self, executed: Pid) -> Result<()> {
 | 
			
		||||
        let mut background = ContainerBackground::new(executed).await?;
 | 
			
		||||
        background.run().await?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										3
									
								
								guest/src/lib.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								guest/src/lib.rs
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,3 @@
 | 
			
		||||
pub mod background;
 | 
			
		||||
pub mod childwait;
 | 
			
		||||
pub mod init;
 | 
			
		||||
		Reference in New Issue
	
	Block a user