From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9]) by lore.proxmox.com (Postfix) with ESMTPS id 41D9E1FF15E for ; Wed, 21 Jan 2026 17:02:54 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 8843A3ECA; Wed, 21 Jan 2026 17:03:12 +0100 (CET) From: Filip Schauer To: pve-devel@lists.proxmox.com Date: Wed, 21 Jan 2026 17:00:18 +0100 Message-ID: <20260121160020.280888-3-f.schauer@proxmox.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20260121160020.280888-1-f.schauer@proxmox.com> References: <20260121160020.280888-1-f.schauer@proxmox.com> MIME-Version: 1.0 X-Bm-Milter-Handled: 55990f41-d878-4baa-be0a-ee34c49e34d2 X-Bm-Transport-Timestamp: 1769011303229 X-SPAM-LEVEL: Spam detection results: 0 AWL 0.000 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pve-devel] [PATCH container v2 2/2] oci create: honor User from OCI image config X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Proxmox VE development discussion Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: pve-devel-bounces@lists.proxmox.com Sender: "pve-devel" Honor a custom user and group specified for the entrypoint via the OCI image config `User` field instead of ignoring it. User and group name lookups, including supplementary groups, are resolved from /etc/passwd and /etc/group in the container file system. This behaviour matches the OCI image spec. [0] [0] https://specs.opencontainers.org/image-spec/config/?v=v1.1.1#properties Signed-off-by: Filip Schauer Tested-by: Maximiliano Sandoval --- This requires the following patch for LXC in order to work properly: https://github.com/lxc/lxc/pull/4626 Changes since v1: * Move OCI User resolving code to separate sub * chomp $line before interpreting fields * Prevent rootfs escape when following /etc/passwd & /etc/group symlinks * Fix $username search in get_supplementary_groups src/PVE/LXC/Create.pm | 82 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 82 insertions(+) diff --git a/src/PVE/LXC/Create.pm b/src/PVE/LXC/Create.pm index 9956cf9..5ed1c29 100644 --- a/src/PVE/LXC/Create.pm +++ b/src/PVE/LXC/Create.pm @@ -3,6 +3,7 @@ package PVE::LXC::Create; use strict; use warnings; +use Cwd qw(abs_path); use File::Basename; use File::Path qw(make_path); use Fcntl; @@ -768,6 +769,13 @@ sub restore_oci_archive { } } + if (my $userstr = $oci_config_get_checked_scalar->('User')) { + my ($uid, $gid, $groups) = resolve_oci_user($userstr, $rootdir); + push $conf->{lxc}->@*, ['lxc.init.uid', $uid] if defined($uid); + push $conf->{lxc}->@*, ['lxc.init.gid', $gid] if defined($gid); + push $conf->{lxc}->@*, ['lxc.init.groups', $groups] if defined($groups); + } + if (my $working_dir = $oci_config_get_checked_scalar->('WorkingDir')) { push $conf->{lxc}->@*, ['lxc.init.cwd', $working_dir]; } @@ -782,4 +790,78 @@ sub restore_oci_archive { return $conf; # it's a reference anyway, so return mostly for convenience. } +sub resolve_oci_user { + my ($userstr, $rootdir) = @_; + + my ($user, $group) = $userstr =~ /^([^:]+)(?::([^:]+))?$/ + or die "OCI config value for 'User' has an invalid format\n"; + + my ($etc_passwd, $etc_group) = @{ + PVE::Tools::run_fork(sub { + # Prevent symlinks from escaping out of container rootdir + chroot($rootdir) or die "failed to change root to: $rootdir: $!\n"; + chdir('/') or die "failed to change to root directory\n"; + my $etc_passwd = abs_path('/etc/passwd') + or die "cannot resolve /etc/passwd path in container rootfs\n"; + my $etc_group = abs_path('/etc/group') + or die "cannot resolve /etc/group path in container rootfs\n"; + + return [$rootdir . $etc_passwd, $rootdir . $etc_group]; + }) + }; + + # Scan file, match column $match_index against $match_val, return value at $ret_index + my $lookup_field = sub { + my ($file, $match_index, $match_val, $ret_index) = @_; + + open(my $fh, '<', $file) or return undef; + while (my $line = <$fh>) { + chomp $line; + my @fields = split(/:/, $line); + if (defined($fields[$match_index]) && $fields[$match_index] eq $match_val) { + return $fields[$ret_index]; + } + } + return undef; + }; + + my $get_supplementary_groups = sub { + my ($username) = @_; + + my @groups; + open(my $fh, '<', $etc_group) or return undef; + while (my $line = <$fh>) { + chomp $line; + my (undef, undef, $gid, $user_list) = split(/:/, $line); + next if !defined($gid) || !defined($user_list); + my @users = split(/,/, $user_list); + push @groups, $gid if grep { $_ eq $username } @users; + } + return join(',', @groups); + }; + + my ($uid, $username, $gid, $groups); + + if ($user =~ /^\d+$/) { + $uid = $user; + $username = $lookup_field->($etc_passwd, 2, $uid, 0); + } else { + $username = $user; + $uid = $lookup_field->($etc_passwd, 0, $username, 2); + } + + if (defined($group)) { + if ($group =~ /^\d+$/) { + $gid = $group; + } else { + $gid = $lookup_field->($etc_group, 0, $group, 2); + } + } else { + $gid = $lookup_field->($etc_passwd, 2, $uid, 3) if defined($uid); + $groups = $get_supplementary_groups->($username) if defined($username); + } + + return ($uid, $gid, $groups); +} + 1; -- 2.47.3 _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel