Skip to content

Commit

Permalink
Add cleanstack and chroot utilities
Browse files Browse the repository at this point in the history
This commits adds the chroot and cleanstack utilities
from former Elemental Toolkit.

Signed-off-by: David Cassany <dcassany@suse.com>
  • Loading branch information
davidcassany committed Mar 5, 2025
1 parent ecf35c1 commit 94d8be7
Show file tree
Hide file tree
Showing 4 changed files with 659 additions and 0 deletions.
245 changes: 245 additions & 0 deletions pkg/utils/chroot/chroot.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,245 @@
/*
Copyright © 2022-2025 SUSE LLC
SPDX-License-Identifier: Apache-2.0
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package chroot

import (
"errors"
"fmt"
"os"
"path/filepath"
"sort"
"strings"

"github.com/suse/elemental/v3/pkg/log"
"github.com/suse/elemental/v3/pkg/sys"
)

// Chroot represents the struct that will allow us to run commands inside a given chroot
type Chroot struct {
path string
defaultMounts []string
extraMounts map[string]string
activeMounts []string
fs sys.FS
mounter sys.Mounter
logger log.Logger
runner sys.Runner
syscall sys.Syscall
}

func NewChroot(s *sys.System, path string) *Chroot {
return &Chroot{
path: path,
defaultMounts: []string{"/dev", "/dev/pts", "/proc", "/sys"},
extraMounts: map[string]string{},
activeMounts: []string{},
runner: s.Runner(),
logger: s.Logger(),
mounter: s.Mounter(),
fs: s.FS(),
syscall: s.Syscall(),
}
}

// ChrootedCallback runs the given callback in a chroot environment
func ChrootedCallback(s *sys.System, path string, bindMounts map[string]string, callback func() error) error {
chroot := NewChroot(s, path)
if bindMounts == nil {
bindMounts = map[string]string{}
}
chroot.SetExtraMounts(bindMounts)
return chroot.RunCallback(callback)
}

// Sets additional bind mounts for the chroot enviornment. They are represented
// in a map where the key is the path outside the chroot and the value is the
// path inside the chroot.
func (c *Chroot) SetExtraMounts(extraMounts map[string]string) {
c.extraMounts = extraMounts
}

// Prepare will mount the defaultMounts as bind mounts, to be ready when we run chroot
func (c *Chroot) Prepare() error {
var err error
keys := []string{}
mountOptions := []string{"bind"}

if len(c.activeMounts) > 0 {
return errors.New("There are already active mountpoints for this instance")
}

defer func() {
if err != nil {
c.Close()
}
}()

for _, mnt := range c.defaultMounts {
mountPoint := fmt.Sprintf("%s%s", strings.TrimSuffix(c.path, "/"), mnt)
err = sys.MkdirAll(c.fs, mountPoint, sys.DirPerm)
if err != nil {
return err
}
c.logger.Debug("Mounting %s to chroot", mountPoint)
err = c.mounter.Mount(mnt, mountPoint, "bind", mountOptions)
if err != nil {
return err
}
c.activeMounts = append(c.activeMounts, mountPoint)
}

for k := range c.extraMounts {
keys = append(keys, k)
}
sort.Strings(keys)
for _, k := range keys {
mountPoint := fmt.Sprintf("%s%s", strings.TrimSuffix(c.path, "/"), c.extraMounts[k])
err = sys.MkdirAll(c.fs, mountPoint, sys.DirPerm)
if err != nil {
return err
}
c.logger.Debug("Mounting %s to chroot", mountPoint)
err = c.mounter.Mount(k, mountPoint, "bind", mountOptions)
if err != nil {
return err
}
c.activeMounts = append(c.activeMounts, mountPoint)
}

return nil
}

// Close will unmount all active mounts created in Prepare on reverse order
func (c *Chroot) Close() error {
failures := []string{}
// syncing before unmounting chroot paths as it has been noted that on
// empty, trivial or super fast callbacks unmounting fails with a device busy error.
// Having lazy unmount could also fix it, but continuing without being sure they were
// really unmounted is dangerous.
_, _ = c.runner.Run("sync")
for len(c.activeMounts) > 0 {
curr := c.activeMounts[len(c.activeMounts)-1]
c.logger.Debug("Unmounting %s from chroot", curr)
c.activeMounts = c.activeMounts[:len(c.activeMounts)-1]
err := c.mounter.Unmount(curr)
if err != nil {
c.logger.Error("Error unmounting %s: %s", curr, err)
failures = append(failures, curr)
}
}
if len(failures) > 0 {
c.activeMounts = failures
return fmt.Errorf("failed closing chroot environment. Unmount failures: %v", failures)
}
return nil
}

// RunCallback runs the given callback in a chroot environment
func (c *Chroot) RunCallback(callback func() error) (err error) {
var currentPath string
var oldRootF *os.File

// Store current path
currentPath, err = os.Getwd()
if err != nil {
c.logger.Error("Failed to get current path")
return err
}
defer func() {
tmpErr := os.Chdir(currentPath)
if err == nil && tmpErr != nil {
err = tmpErr
}
}()

// Chroot to an absolute path
if !filepath.IsAbs(c.path) {
oldPath := c.path
c.path = filepath.Clean(filepath.Join(currentPath, c.path))
c.logger.Warn("Requested chroot path %s is not absolute, changing it to %s", oldPath, c.path)
}

// Store current root
oldRootF, err = c.fs.OpenFile("/", os.O_RDONLY, sys.DirPerm)
if err != nil {
c.logger.Error("Can't open current root")
return err
}
defer oldRootF.Close()

if len(c.activeMounts) == 0 {
err = c.Prepare()
if err != nil {
c.logger.Error("Can't mount default mounts")
return err
}
defer func() {
tmpErr := c.Close()
if err == nil {
err = tmpErr
}
}()
}
// Change to new dir before running chroot!
err = c.syscall.Chdir(c.path)
if err != nil {
c.logger.Error("Can't chdir %s: %s", c.path, err)
return err
}

err = c.syscall.Chroot(c.path)
if err != nil {
c.logger.Error("Can't chroot %s: %s", c.path, err)
return err
}

// Restore to old root
defer func() {
tmpErr := oldRootF.Chdir()
if tmpErr != nil {
c.logger.Error("Can't change to old root dir")
if err == nil {
err = tmpErr
}
} else {
tmpErr = c.syscall.Chroot(".")
if tmpErr != nil {
c.logger.Error("Can't chroot back to old root")
if err == nil {
err = tmpErr
}
}
}
}()

return callback()
}

// Run executes a command inside a chroot
func (c *Chroot) Run(command string, args ...string) (out []byte, err error) {
callback := func() error {
out, err = c.runner.Run(command, args...)
return err
}
err = c.RunCallback(callback)
if err != nil {
c.logger.Error("Can't run command %s with args %v on chroot: %s", command, args, err)
c.logger.Debug("Output from command: %s", out)
}
return out, err
}
148 changes: 148 additions & 0 deletions pkg/utils/chroot/chroot_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,148 @@
/*
Copyright © 2022-2025 SUSE LLC
SPDX-License-Identifier: Apache-2.0
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package chroot_test

import (
"errors"
"fmt"
"testing"

. "github.com/onsi/ginkgo/v2"
. "github.com/onsi/gomega"
"github.com/suse/elemental/v3/pkg/sys"
sysmock "github.com/suse/elemental/v3/pkg/sys/mock"
"github.com/suse/elemental/v3/pkg/utils/chroot"
)

func TestChrootSuite(t *testing.T) {
RegisterFailHandler(Fail)
RunSpecs(t, "Chroot test suite")
}

var _ = Describe("Chroot", Label("chroot"), func() {
var runner *sysmock.Runner
var mounter *sysmock.Mounter
var syscall *sysmock.Syscall
var fs sys.FS
var s *sys.System
var cleanup func()
var chr *chroot.Chroot
BeforeEach(func() {
var err error
runner = sysmock.NewRunner()
mounter = sysmock.NewMounter()
syscall = &sysmock.Syscall{}
fs, cleanup, err = sysmock.TestFS(nil)
Expect(err).ToNot(HaveOccurred())
s, err = sys.NewSystem(
sys.WithMounter(mounter), sys.WithRunner(runner),
sys.WithFS(fs), sys.WithSyscall(syscall),
)
Expect(err).NotTo(HaveOccurred())
chr = chroot.NewChroot(s, "/whatever")
})
AfterEach(func() {
cleanup()
})

Describe("ChrootedCallback method", func() {
It("runs a callback in a chroot", func() {
err := chroot.ChrootedCallback(s, "/somepath", nil, func() error {
return nil
})
Expect(err).ShouldNot(HaveOccurred())
err = chroot.ChrootedCallback(s, "/somepath", nil, func() error {
return fmt.Errorf("callback error")
})
Expect(err).Should(HaveOccurred())
Expect(err.Error()).To(ContainSubstring("callback error"))
})
})
Describe("on success", func() {
It("command should be called in the chroot", func() {
_, err := chr.Run("chroot-command")
Expect(err).To(BeNil())
Expect(syscall.WasChrootCalledWith("/whatever")).To(BeTrue())
})
It("commands should be called with a customized chroot", func() {
chr.SetExtraMounts(map[string]string{"/real/path": "/in/chroot/path"})
Expect(chr.Prepare()).To(BeNil())
defer chr.Close()
_, err := chr.Run("chroot-command")
Expect(err).To(BeNil())
Expect(syscall.WasChrootCalledWith("/whatever")).To(BeTrue())
_, err = chr.Run("chroot-another-command")
Expect(err).To(BeNil())
})
It("runs a callback in a custom chroot", func() {
called := false
callback := func() error {
called = true
return nil
}
err := chr.RunCallback(callback)
Expect(err).To(BeNil())
Expect(syscall.WasChrootCalledWith("/whatever")).To(BeTrue())
Expect(called).To(BeTrue())
})
})
Describe("on failure", func() {
It("should return error if chroot-command fails", func() {
runner.ReturnError = errors.New("run error")
_, err := chr.Run("chroot-command")
Expect(err).NotTo(BeNil())
Expect(syscall.WasChrootCalledWith("/whatever")).To(BeTrue())
})
It("should return error if callback fails", func() {
called := false
callback := func() error {
called = true
return errors.New("Callback error")
}
err := chr.RunCallback(callback)
Expect(err).NotTo(BeNil())
Expect(syscall.WasChrootCalledWith("/whatever")).To(BeTrue())
Expect(called).To(BeTrue())
})
It("should return error if preparing twice before closing", func() {
Expect(chr.Prepare()).To(BeNil())
defer chr.Close()
Expect(chr.Prepare()).NotTo(BeNil())
Expect(chr.Close()).To(BeNil())
Expect(chr.Prepare()).To(BeNil())
})
It("should return error if failed to chroot", func() {
syscall.ErrorOnChroot = true
_, err := chr.Run("chroot-command")
Expect(err).ToNot(BeNil())
Expect(syscall.WasChrootCalledWith("/whatever")).To(BeTrue())
Expect(err.Error()).To(ContainSubstring("chroot error"))
})
It("should return error if failed to mount on prepare", Label("mount"), func() {
mounter.ErrorOnMount = true
_, err := chr.Run("chroot-command")
Expect(err).ToNot(BeNil())
Expect(err.Error()).To(ContainSubstring("mount error"))
})
It("should return error if failed to unmount on close", Label("unmount"), func() {
mounter.ErrorOnUnmount = true
_, err := chr.Run("chroot-command")
Expect(err).ToNot(BeNil())
Expect(err.Error()).To(ContainSubstring("failed closing chroot"))
})
})
})
Loading

0 comments on commit 94d8be7

Please sign in to comment.