]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/core/namespace.h
Merge pull request #18007 from fw-strlen/ipv6_masq_and_dnat
[thirdparty/systemd.git] / src / core / namespace.h
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2 #pragma once
3
4 /***
5 Copyright © 2016 Djalal Harouni
6 ***/
7
8 typedef struct NamespaceInfo NamespaceInfo;
9 typedef struct BindMount BindMount;
10 typedef struct TemporaryFileSystem TemporaryFileSystem;
11 typedef struct MountImage MountImage;
12
13 #include <stdbool.h>
14
15 #include "dissect-image.h"
16 #include "fs-util.h"
17 #include "macro.h"
18 #include "string-util.h"
19
20 typedef enum ProtectHome {
21 PROTECT_HOME_NO,
22 PROTECT_HOME_YES,
23 PROTECT_HOME_READ_ONLY,
24 PROTECT_HOME_TMPFS,
25 _PROTECT_HOME_MAX,
26 _PROTECT_HOME_INVALID = -EINVAL,
27 } ProtectHome;
28
29 typedef enum NamespaceType {
30 NAMESPACE_MOUNT,
31 NAMESPACE_CGROUP,
32 NAMESPACE_UTS,
33 NAMESPACE_IPC,
34 NAMESPACE_USER,
35 NAMESPACE_PID,
36 NAMESPACE_NET,
37 _NAMESPACE_TYPE_MAX,
38 _NAMESPACE_TYPE_INVALID = -EINVAL,
39 } NamespaceType;
40
41 typedef enum ProtectSystem {
42 PROTECT_SYSTEM_NO,
43 PROTECT_SYSTEM_YES,
44 PROTECT_SYSTEM_FULL,
45 PROTECT_SYSTEM_STRICT,
46 _PROTECT_SYSTEM_MAX,
47 _PROTECT_SYSTEM_INVALID = -EINVAL,
48 } ProtectSystem;
49
50 typedef enum ProtectProc {
51 PROTECT_PROC_DEFAULT,
52 PROTECT_PROC_NOACCESS, /* hidepid=noaccess */
53 PROTECT_PROC_INVISIBLE, /* hidepid=invisible */
54 PROTECT_PROC_PTRACEABLE, /* hidepid=ptraceable */
55 _PROTECT_PROC_MAX,
56 _PROTECT_PROC_INVALID = -EINVAL,
57 } ProtectProc;
58
59 typedef enum ProcSubset {
60 PROC_SUBSET_ALL,
61 PROC_SUBSET_PID, /* subset=pid */
62 _PROC_SUBSET_MAX,
63 _PROC_SUBSET_INVALID = -EINVAL,
64 } ProcSubset;
65
66 struct NamespaceInfo {
67 bool ignore_protect_paths;
68 bool private_dev;
69 bool private_mounts;
70 bool protect_control_groups;
71 bool protect_kernel_tunables;
72 bool protect_kernel_modules;
73 bool protect_kernel_logs;
74 bool mount_apivfs;
75 bool protect_hostname;
76 ProtectHome protect_home;
77 ProtectSystem protect_system;
78 ProtectProc protect_proc;
79 ProcSubset proc_subset;
80 };
81
82 struct BindMount {
83 char *source;
84 char *destination;
85 bool read_only;
86 bool nosuid;
87 bool recursive;
88 bool ignore_enoent;
89 };
90
91 struct TemporaryFileSystem {
92 char *path;
93 char *options;
94 };
95
96 struct MountImage {
97 char *source;
98 char *destination;
99 LIST_HEAD(MountOptions, mount_options);
100 bool ignore_enoent;
101 };
102
103 int setup_namespace(
104 const char *root_directory,
105 const char *root_image,
106 const MountOptions *root_image_options,
107 const NamespaceInfo *ns_info,
108 char **read_write_paths,
109 char **read_only_paths,
110 char **inaccessible_paths,
111 char **exec_paths,
112 char **no_exec_paths,
113 char **empty_directories,
114 const BindMount *bind_mounts,
115 size_t n_bind_mounts,
116 const TemporaryFileSystem *temporary_filesystems,
117 size_t n_temporary_filesystems,
118 const MountImage *mount_images,
119 size_t n_mount_images,
120 const char *tmp_dir,
121 const char *var_tmp_dir,
122 const char *creds_path,
123 const char *log_namespace,
124 unsigned long mount_flags,
125 const void *root_hash,
126 size_t root_hash_size,
127 const char *root_hash_path,
128 const void *root_hash_sig,
129 size_t root_hash_sig_size,
130 const char *root_hash_sig_path,
131 const char *root_verity,
132 const char *propagate_dir,
133 const char *incoming_dir,
134 const char *notify_socket,
135 DissectImageFlags dissected_image_flags,
136 char **error_path);
137
138 #define RUN_SYSTEMD_EMPTY "/run/systemd/empty"
139
140 static inline char* namespace_cleanup_tmpdir(char *p) {
141 PROTECT_ERRNO;
142 if (!streq_ptr(p, RUN_SYSTEMD_EMPTY))
143 (void) rmdir(p);
144 return mfree(p);
145 }
146 DEFINE_TRIVIAL_CLEANUP_FUNC(char*, namespace_cleanup_tmpdir);
147
148 int setup_tmp_dirs(
149 const char *id,
150 char **tmp_dir,
151 char **var_tmp_dir);
152
153 int setup_netns(const int netns_storage_socket[static 2]);
154 int open_netns_path(const int netns_storage_socket[static 2], const char *path);
155
156 const char* protect_home_to_string(ProtectHome p) _const_;
157 ProtectHome protect_home_from_string(const char *s) _pure_;
158
159 const char* protect_system_to_string(ProtectSystem p) _const_;
160 ProtectSystem protect_system_from_string(const char *s) _pure_;
161
162 const char* protect_proc_to_string(ProtectProc i) _const_;
163 ProtectProc protect_proc_from_string(const char *s) _pure_;
164
165 const char* proc_subset_to_string(ProcSubset i) _const_;
166 ProcSubset proc_subset_from_string(const char *s) _pure_;
167
168 void bind_mount_free_many(BindMount *b, size_t n);
169 int bind_mount_add(BindMount **b, size_t *n, const BindMount *item);
170
171 void temporary_filesystem_free_many(TemporaryFileSystem *t, size_t n);
172 int temporary_filesystem_add(TemporaryFileSystem **t, size_t *n,
173 const char *path, const char *options);
174
175 MountImage* mount_image_free_many(MountImage *m, size_t *n);
176 int mount_image_add(MountImage **m, size_t *n, const MountImage *item);
177
178 const char* namespace_type_to_string(NamespaceType t) _const_;
179 NamespaceType namespace_type_from_string(const char *s) _pure_;
180
181 bool ns_type_supported(NamespaceType type);