mirror of
https://github.com/morgan9e/systemd
synced 2026-04-14 16:37:19 +09:00
1016 lines
30 KiB
C
1016 lines
30 KiB
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
|
|
#include "alloc-util.h"
|
|
#include "cap-list.h"
|
|
#include "conf-parser.h"
|
|
#include "cpu-set-util.h"
|
|
#include "hostname-util.h"
|
|
#include "namespace-util.h"
|
|
#include "nspawn-network.h"
|
|
#include "nspawn-settings.h"
|
|
#include "parse-util.h"
|
|
#include "process-util.h"
|
|
#include "rlimit-util.h"
|
|
#include "socket-util.h"
|
|
#include "string-table.h"
|
|
#include "string-util.h"
|
|
#include "strv.h"
|
|
#include "user-util.h"
|
|
|
|
Settings *settings_new(void) {
|
|
Settings *s;
|
|
|
|
s = new(Settings, 1);
|
|
if (!s)
|
|
return NULL;
|
|
|
|
*s = (Settings) {
|
|
.start_mode = _START_MODE_INVALID,
|
|
.ephemeral = -1,
|
|
.personality = PERSONALITY_INVALID,
|
|
|
|
.resolv_conf = _RESOLV_CONF_MODE_INVALID,
|
|
.link_journal = _LINK_JOURNAL_INVALID,
|
|
.timezone = _TIMEZONE_MODE_INVALID,
|
|
|
|
.userns_mode = _USER_NAMESPACE_MODE_INVALID,
|
|
.userns_ownership = _USER_NAMESPACE_OWNERSHIP_INVALID,
|
|
.uid_shift = UID_INVALID,
|
|
.uid_range = UID_INVALID,
|
|
|
|
.no_new_privileges = -1,
|
|
|
|
.read_only = -1,
|
|
.volatile_mode = _VOLATILE_MODE_INVALID,
|
|
|
|
.private_network = -1,
|
|
.network_veth = -1,
|
|
|
|
.full_capabilities = CAPABILITY_QUINTET_NULL,
|
|
|
|
.uid = UID_INVALID,
|
|
.gid = GID_INVALID,
|
|
|
|
.console_mode = _CONSOLE_MODE_INVALID,
|
|
.console_width = UINT_MAX,
|
|
.console_height = UINT_MAX,
|
|
|
|
.clone_ns_flags = ULONG_MAX,
|
|
.use_cgns = -1,
|
|
|
|
.notify_ready = -1,
|
|
.suppress_sync = -1,
|
|
};
|
|
|
|
return s;
|
|
}
|
|
|
|
int settings_load(FILE *f, const char *path, Settings **ret) {
|
|
_cleanup_(settings_freep) Settings *s = NULL;
|
|
int r;
|
|
|
|
assert(path);
|
|
assert(ret);
|
|
|
|
s = settings_new();
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
r = config_parse(NULL, path, f,
|
|
"Exec\0"
|
|
"Network\0"
|
|
"Files\0",
|
|
config_item_perf_lookup, nspawn_gperf_lookup,
|
|
CONFIG_PARSE_WARN,
|
|
s, NULL);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
/* Make sure that if userns_mode is set, userns_chown is set to something appropriate, and vice versa. Either
|
|
* both fields shall be initialized or neither. */
|
|
if (s->userns_mode >= 0 && s->userns_ownership < 0)
|
|
s->userns_ownership = s->userns_mode == USER_NAMESPACE_PICK ? USER_NAMESPACE_OWNERSHIP_CHOWN : USER_NAMESPACE_OWNERSHIP_OFF;
|
|
if (s->userns_ownership >= 0 && s->userns_mode < 0)
|
|
s->userns_mode = USER_NAMESPACE_NO;
|
|
|
|
*ret = TAKE_PTR(s);
|
|
return 0;
|
|
}
|
|
|
|
static void free_oci_hooks(OciHook *hooks, size_t n) {
|
|
assert(hooks || n == 0);
|
|
|
|
FOREACH_ARRAY(hook, hooks, n) {
|
|
free(hook->path);
|
|
strv_free(hook->args);
|
|
strv_free(hook->env);
|
|
}
|
|
|
|
free(hooks);
|
|
}
|
|
|
|
void device_node_array_free(DeviceNode *nodes, size_t n) {
|
|
assert(nodes || n == 0);
|
|
|
|
FOREACH_ARRAY(node, nodes, n)
|
|
free(node->path);
|
|
|
|
free(nodes);
|
|
}
|
|
|
|
Settings* settings_free(Settings *s) {
|
|
if (!s)
|
|
return NULL;
|
|
|
|
strv_free(s->parameters);
|
|
strv_free(s->environment);
|
|
free(s->user);
|
|
free(s->pivot_root_new);
|
|
free(s->pivot_root_old);
|
|
free(s->working_directory);
|
|
strv_free(s->syscall_allow_list);
|
|
strv_free(s->syscall_deny_list);
|
|
rlimit_free_all(s->rlimit);
|
|
free(s->hostname);
|
|
cpu_set_reset(&s->cpu_set);
|
|
strv_free(s->bind_user);
|
|
|
|
strv_free(s->network_interfaces);
|
|
strv_free(s->network_macvlan);
|
|
strv_free(s->network_ipvlan);
|
|
strv_free(s->network_veth_extra);
|
|
free(s->network_bridge);
|
|
free(s->network_zone);
|
|
expose_port_free_all(s->expose_ports);
|
|
|
|
custom_mount_free_all(s->custom_mounts, s->n_custom_mounts);
|
|
|
|
free(s->bundle);
|
|
free(s->root);
|
|
|
|
free_oci_hooks(s->oci_hooks_prestart, s->n_oci_hooks_prestart);
|
|
free_oci_hooks(s->oci_hooks_poststart, s->n_oci_hooks_poststart);
|
|
free_oci_hooks(s->oci_hooks_poststop, s->n_oci_hooks_poststop);
|
|
|
|
free(s->slice);
|
|
sd_bus_message_unref(s->properties);
|
|
|
|
free(s->supplementary_gids);
|
|
device_node_array_free(s->extra_nodes, s->n_extra_nodes);
|
|
free(s->network_namespace_path);
|
|
|
|
strv_free(s->sysctl);
|
|
|
|
#if HAVE_SECCOMP
|
|
seccomp_release(s->seccomp);
|
|
#endif
|
|
|
|
return mfree(s);
|
|
}
|
|
|
|
bool settings_private_network(Settings *s) {
|
|
assert(s);
|
|
|
|
/* Determines whether we shall open up our own private network */
|
|
|
|
return
|
|
s->private_network > 0 ||
|
|
s->network_veth > 0 ||
|
|
s->network_bridge ||
|
|
s->network_zone ||
|
|
s->network_interfaces ||
|
|
s->network_macvlan ||
|
|
s->network_ipvlan ||
|
|
s->network_veth_extra;
|
|
}
|
|
|
|
bool settings_network_veth(Settings *s) {
|
|
assert(s);
|
|
|
|
return
|
|
s->network_veth > 0 ||
|
|
s->network_bridge ||
|
|
s->network_zone;
|
|
}
|
|
|
|
bool settings_network_configured(Settings *s) {
|
|
assert(s);
|
|
|
|
/* Determines whether any network configuration setting was used. (i.e. in contrast to
|
|
* settings_private_network() above this might also indicate if private networking was explicitly
|
|
* turned off.) */
|
|
|
|
return
|
|
s->private_network >= 0 ||
|
|
s->network_veth >= 0 ||
|
|
s->network_bridge ||
|
|
s->network_zone ||
|
|
s->network_interfaces ||
|
|
s->network_macvlan ||
|
|
s->network_ipvlan ||
|
|
s->network_veth_extra ||
|
|
s->network_namespace_path;
|
|
}
|
|
|
|
int settings_allocate_properties(Settings *s) {
|
|
_cleanup_(sd_bus_unrefp) sd_bus *bus = NULL;
|
|
int r;
|
|
|
|
assert(s);
|
|
|
|
if (s->properties)
|
|
return 0;
|
|
|
|
r = sd_bus_default_system(&bus);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_new(bus, &s->properties, SD_BUS_MESSAGE_METHOD_CALL);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
return 0;
|
|
}
|
|
|
|
DEFINE_CONFIG_PARSE_ENUM(config_parse_volatile_mode, volatile_mode, VolatileMode, "Failed to parse volatile mode");
|
|
|
|
int config_parse_expose_port(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *s = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = expose_port_parse(&s->expose_ports, rvalue);
|
|
if (r == -EEXIST)
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Duplicate port specification, ignoring: %s", rvalue);
|
|
else if (r < 0)
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse host port %s: %m", rvalue);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_capability(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
uint64_t u = 0, *result = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
for (;;) {
|
|
_cleanup_free_ char *word = NULL;
|
|
|
|
r = extract_first_word(&rvalue, &word, NULL, 0);
|
|
if (r == -ENOMEM)
|
|
return log_oom();
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to extract capability string, ignoring: %s", rvalue);
|
|
return 0;
|
|
}
|
|
if (r == 0)
|
|
break;
|
|
|
|
if (streq(word, "all"))
|
|
u = UINT64_MAX;
|
|
else {
|
|
r = capability_from_name(word);
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse capability, ignoring: %s", word);
|
|
continue;
|
|
}
|
|
|
|
u |= UINT64_C(1) << r;
|
|
}
|
|
}
|
|
|
|
*result |= u;
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_pivot_root(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = pivot_root_parse(&settings->pivot_root_new, &settings->pivot_root_old, rvalue);
|
|
if (r < 0)
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid pivot root mount specification %s: %m", rvalue);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_bind(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = bind_mount_parse(&settings->custom_mounts, &settings->n_custom_mounts, rvalue, ltype);
|
|
if (r < 0)
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid bind mount specification %s: %m", rvalue);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_tmpfs(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = tmpfs_mount_parse(&settings->custom_mounts, &settings->n_custom_mounts, rvalue);
|
|
if (r < 0)
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid temporary file system specification %s: %m", rvalue);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_inaccessible(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = inaccessible_mount_parse(&settings->custom_mounts, &settings->n_custom_mounts, rvalue);
|
|
if (r < 0)
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid inaccessible file system specification %s: %m", rvalue);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_overlay(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = overlay_mount_parse(&settings->custom_mounts, &settings->n_custom_mounts, rvalue, ltype);
|
|
if (r < 0)
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid overlay file system specification %s, ignoring: %m", rvalue);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_veth_extra(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = veth_extra_parse(&settings->network_veth_extra, rvalue);
|
|
if (r < 0)
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid extra virtual Ethernet link specification %s: %m", rvalue);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_network_iface_pair(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
char*** l = data;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
return interface_pair_parse(l, rvalue);
|
|
}
|
|
|
|
int config_parse_macvlan_iface_pair(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
char*** l = data;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
return macvlan_pair_parse(l, rvalue);
|
|
}
|
|
|
|
int config_parse_ipvlan_iface_pair(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
char*** l = data;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
return ipvlan_pair_parse(l, rvalue);
|
|
}
|
|
|
|
int config_parse_network_zone(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
_cleanup_free_ char *j = NULL;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
j = strjoin("vz-", rvalue);
|
|
if (!ifname_valid(j)) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0, "Invalid network zone name, ignoring: %s", rvalue);
|
|
return 0;
|
|
}
|
|
|
|
return free_and_replace(settings->network_zone, j);
|
|
}
|
|
|
|
int config_parse_boot(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = parse_boolean(rvalue);
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse Boot= parameter %s, ignoring: %m", rvalue);
|
|
return 0;
|
|
}
|
|
|
|
if (r) {
|
|
if (settings->start_mode == START_PID2)
|
|
goto conflict;
|
|
|
|
settings->start_mode = START_BOOT;
|
|
} else {
|
|
if (settings->start_mode == START_BOOT)
|
|
goto conflict;
|
|
|
|
if (settings->start_mode < 0)
|
|
settings->start_mode = START_PID1;
|
|
}
|
|
|
|
return 0;
|
|
|
|
conflict:
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0, "Conflicting Boot= or ProcessTwo= setting found. Ignoring.");
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_pid2(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = parse_boolean(rvalue);
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse ProcessTwo= parameter %s, ignoring: %m", rvalue);
|
|
return 0;
|
|
}
|
|
|
|
if (r) {
|
|
if (settings->start_mode == START_BOOT)
|
|
goto conflict;
|
|
|
|
settings->start_mode = START_PID2;
|
|
} else {
|
|
if (settings->start_mode == START_PID2)
|
|
goto conflict;
|
|
|
|
if (settings->start_mode < 0)
|
|
settings->start_mode = START_PID1;
|
|
}
|
|
|
|
return 0;
|
|
|
|
conflict:
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0, "Conflicting Boot= or ProcessTwo= setting found. Ignoring.");
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_private_users(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
r = parse_boolean(rvalue);
|
|
if (r == 0) {
|
|
/* no: User namespacing off */
|
|
settings->userns_mode = USER_NAMESPACE_NO;
|
|
settings->uid_shift = UID_INVALID;
|
|
settings->uid_range = UINT32_C(0x10000);
|
|
} else if (r > 0) {
|
|
/* yes: User namespacing on, UID range is read from root dir */
|
|
settings->userns_mode = USER_NAMESPACE_FIXED;
|
|
settings->uid_shift = UID_INVALID;
|
|
settings->uid_range = UINT32_C(0x10000);
|
|
} else if (streq(rvalue, "pick")) {
|
|
/* pick: User namespacing on, UID range is picked randomly */
|
|
settings->userns_mode = USER_NAMESPACE_PICK;
|
|
settings->uid_shift = UID_INVALID;
|
|
settings->uid_range = UINT32_C(0x10000);
|
|
} else if (streq(rvalue, "identity")) {
|
|
/* identity: User namespacing on, UID range is 0:65536 */
|
|
settings->userns_mode = USER_NAMESPACE_FIXED;
|
|
settings->uid_shift = 0;
|
|
settings->uid_range = UINT32_C(0x10000);
|
|
} else {
|
|
const char *range, *shift;
|
|
uid_t sh, rn;
|
|
|
|
/* anything else: User namespacing on, UID range is explicitly configured */
|
|
|
|
range = strchr(rvalue, ':');
|
|
if (range) {
|
|
shift = strndupa_safe(rvalue, range - rvalue);
|
|
range++;
|
|
|
|
r = safe_atou32(range, &rn);
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "UID/GID range invalid, ignoring: %s", range);
|
|
return 0;
|
|
}
|
|
} else {
|
|
shift = rvalue;
|
|
rn = UINT32_C(0x10000);
|
|
}
|
|
|
|
r = parse_uid(shift, &sh);
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "UID/GID shift invalid, ignoring: %s", range);
|
|
return 0;
|
|
}
|
|
|
|
if (!userns_shift_range_valid(sh, rn)) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0, "UID/GID shift and range combination invalid, ignoring: %s", range);
|
|
return 0;
|
|
}
|
|
|
|
settings->userns_mode = USER_NAMESPACE_FIXED;
|
|
settings->uid_shift = sh;
|
|
settings->uid_range = rn;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_syscall_filter(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = data;
|
|
bool negative;
|
|
const char *items;
|
|
int r;
|
|
|
|
assert(filename);
|
|
assert(lvalue);
|
|
assert(rvalue);
|
|
|
|
negative = rvalue[0] == '~';
|
|
items = negative ? rvalue + 1 : rvalue;
|
|
|
|
for (;;) {
|
|
_cleanup_free_ char *word = NULL;
|
|
|
|
r = extract_first_word(&items, &word, NULL, 0);
|
|
if (r == 0)
|
|
return 0;
|
|
if (r == -ENOMEM)
|
|
return log_oom();
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
"Failed to parse SystemCallFilter= parameter %s, ignoring: %m", rvalue);
|
|
return 0;
|
|
}
|
|
|
|
if (negative)
|
|
r = strv_extend(&settings->syscall_deny_list, word);
|
|
else
|
|
r = strv_extend(&settings->syscall_allow_list, word);
|
|
if (r < 0)
|
|
return log_oom();
|
|
}
|
|
}
|
|
|
|
int config_parse_oom_score_adjust(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = ASSERT_PTR(data);
|
|
int oa, r;
|
|
|
|
assert(rvalue);
|
|
|
|
if (isempty(rvalue)) {
|
|
settings->oom_score_adjust_set = false;
|
|
return 0;
|
|
}
|
|
|
|
r = parse_oom_score_adjust(rvalue, &oa);
|
|
if (r == -ERANGE) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "OOM score adjust value out of range, ignoring: %s", rvalue);
|
|
return 0;
|
|
}
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse the OOM score adjust value, ignoring: %s", rvalue);
|
|
return 0;
|
|
}
|
|
|
|
settings->oom_score_adjust = oa;
|
|
settings->oom_score_adjust_set = true;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_cpu_affinity(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = ASSERT_PTR(data);
|
|
|
|
assert(rvalue);
|
|
|
|
return parse_cpu_set_extend(rvalue, &settings->cpu_set, true, unit, filename, line, lvalue);
|
|
}
|
|
|
|
DEFINE_CONFIG_PARSE_ENUM(config_parse_resolv_conf, resolv_conf_mode, ResolvConfMode, "Failed to parse resolv.conf mode");
|
|
|
|
static const char *const resolv_conf_mode_table[_RESOLV_CONF_MODE_MAX] = {
|
|
[RESOLV_CONF_OFF] = "off",
|
|
[RESOLV_CONF_COPY_HOST] = "copy-host",
|
|
[RESOLV_CONF_COPY_STATIC] = "copy-static",
|
|
[RESOLV_CONF_COPY_UPLINK] = "copy-uplink",
|
|
[RESOLV_CONF_COPY_STUB] = "copy-stub",
|
|
[RESOLV_CONF_REPLACE_HOST] = "replace-host",
|
|
[RESOLV_CONF_REPLACE_STATIC] = "replace-static",
|
|
[RESOLV_CONF_REPLACE_UPLINK] = "replace-uplink",
|
|
[RESOLV_CONF_REPLACE_STUB] = "replace-stub",
|
|
[RESOLV_CONF_BIND_HOST] = "bind-host",
|
|
[RESOLV_CONF_BIND_STATIC] = "bind-static",
|
|
[RESOLV_CONF_BIND_UPLINK] = "bind-uplink",
|
|
[RESOLV_CONF_BIND_STUB] = "bind-stub",
|
|
[RESOLV_CONF_DELETE] = "delete",
|
|
[RESOLV_CONF_AUTO] = "auto",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(resolv_conf_mode, ResolvConfMode, RESOLV_CONF_AUTO);
|
|
|
|
int parse_link_journal(const char *s, LinkJournal *ret_mode, bool *ret_try) {
|
|
int r;
|
|
|
|
assert(s);
|
|
assert(ret_mode);
|
|
assert(ret_try);
|
|
|
|
if (streq(s, "auto")) {
|
|
*ret_mode = LINK_AUTO;
|
|
*ret_try = false;
|
|
} else if (streq(s, "guest")) {
|
|
*ret_mode = LINK_GUEST;
|
|
*ret_try = false;
|
|
} else if (streq(s, "host")) {
|
|
*ret_mode = LINK_HOST;
|
|
*ret_try = false;
|
|
} else if (streq(s, "try-guest")) {
|
|
*ret_mode = LINK_GUEST;
|
|
*ret_try = true;
|
|
} else if (streq(s, "try-host")) {
|
|
*ret_mode = LINK_HOST;
|
|
*ret_try = true;
|
|
} else {
|
|
/* Also support boolean values, to make things less confusing. */
|
|
r = parse_boolean(s);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
/* Let's consider "true" to be equivalent to "auto". */
|
|
*ret_mode = r ? LINK_AUTO : LINK_NO;
|
|
*ret_try = false;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_link_journal(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
Settings *settings = ASSERT_PTR(data);
|
|
int r;
|
|
|
|
assert(rvalue);
|
|
|
|
r = parse_link_journal(rvalue, &settings->link_journal, &settings->link_journal_try);
|
|
if (r < 0)
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse link journal mode, ignoring: %s", rvalue);
|
|
|
|
return 0;
|
|
}
|
|
|
|
DEFINE_CONFIG_PARSE_ENUM(config_parse_timezone, timezone_mode, TimezoneMode, "Failed to parse timezone mode");
|
|
|
|
static const char *const timezone_mode_table[_TIMEZONE_MODE_MAX] = {
|
|
[TIMEZONE_OFF] = "off",
|
|
[TIMEZONE_COPY] = "copy",
|
|
[TIMEZONE_BIND] = "bind",
|
|
[TIMEZONE_SYMLINK] = "symlink",
|
|
[TIMEZONE_DELETE] = "delete",
|
|
[TIMEZONE_AUTO] = "auto",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(timezone_mode, TimezoneMode, TIMEZONE_AUTO);
|
|
|
|
DEFINE_CONFIG_PARSE_ENUM(config_parse_userns_ownership, user_namespace_ownership, UserNamespaceOwnership, "Failed to parse user namespace ownership mode");
|
|
|
|
static const char *const user_namespace_ownership_table[_USER_NAMESPACE_OWNERSHIP_MAX] = {
|
|
[USER_NAMESPACE_OWNERSHIP_OFF] = "off",
|
|
[USER_NAMESPACE_OWNERSHIP_CHOWN] = "chown",
|
|
[USER_NAMESPACE_OWNERSHIP_MAP] = "map",
|
|
[USER_NAMESPACE_OWNERSHIP_AUTO] = "auto",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP(user_namespace_ownership, UserNamespaceOwnership);
|
|
|
|
int config_parse_userns_chown(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
UserNamespaceOwnership *ownership = ASSERT_PTR(data);
|
|
int r;
|
|
|
|
assert(rvalue);
|
|
|
|
/* Compatibility support for UserNamespaceChown=, whose job has been taken over by UserNamespaceOwnership= */
|
|
|
|
r = parse_boolean(rvalue);
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse user namespace ownership mode, ignoring: %s", rvalue);
|
|
return 0;
|
|
}
|
|
|
|
*ownership = r ? USER_NAMESPACE_OWNERSHIP_CHOWN : USER_NAMESPACE_OWNERSHIP_OFF;
|
|
return 0;
|
|
}
|
|
|
|
int config_parse_bind_user(
|
|
const char *unit,
|
|
const char *filename,
|
|
unsigned line,
|
|
const char *section,
|
|
unsigned section_line,
|
|
const char *lvalue,
|
|
int ltype,
|
|
const char *rvalue,
|
|
void *data,
|
|
void *userdata) {
|
|
|
|
char ***bind_user = ASSERT_PTR(data);
|
|
int r;
|
|
|
|
assert(rvalue);
|
|
|
|
if (isempty(rvalue)) {
|
|
*bind_user = strv_free(*bind_user);
|
|
return 0;
|
|
}
|
|
|
|
for (const char* p = rvalue;;) {
|
|
_cleanup_free_ char *word = NULL;
|
|
|
|
r = extract_first_word(&p, &word, NULL, 0);
|
|
if (r == -ENOMEM)
|
|
return log_oom();
|
|
if (r < 0) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse BindUser= list, ignoring: %s", rvalue);
|
|
return 0;
|
|
}
|
|
if (r == 0)
|
|
break;
|
|
|
|
if (!valid_user_group_name(word, 0)) {
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0, "User name '%s' not valid, ignoring.", word);
|
|
return 0;
|
|
}
|
|
|
|
if (strv_consume(bind_user, TAKE_PTR(word)) < 0)
|
|
return log_oom();
|
|
}
|
|
|
|
return 0;
|
|
}
|