mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
Merge pull request #6527 from subhraveti/cap-whitelist
Maintain a whitelist of capabilities rather than droplist
This commit is contained in:
commit
7ba8788919
5 changed files with 66 additions and 72 deletions
|
@ -19,7 +19,6 @@ import (
|
||||||
"github.com/docker/libcontainer/label"
|
"github.com/docker/libcontainer/label"
|
||||||
"github.com/docker/libcontainer/mount/nodes"
|
"github.com/docker/libcontainer/mount/nodes"
|
||||||
"github.com/dotcloud/docker/daemon/execdriver"
|
"github.com/dotcloud/docker/daemon/execdriver"
|
||||||
"github.com/dotcloud/docker/pkg/system"
|
|
||||||
"github.com/dotcloud/docker/utils"
|
"github.com/dotcloud/docker/utils"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -37,16 +36,7 @@ func init() {
|
||||||
if err := setupNetworking(args); err != nil {
|
if err := setupNetworking(args); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if err := setupCapabilities(args); err != nil {
|
if err := finalizeNamespace(args); err != nil {
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err := setupWorkingDirectory(args); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err := system.CloseFdsFrom(3); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err := changeUser(args); err != nil {
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -11,8 +11,6 @@ import (
|
||||||
|
|
||||||
"github.com/docker/libcontainer/netlink"
|
"github.com/docker/libcontainer/netlink"
|
||||||
"github.com/dotcloud/docker/daemon/execdriver"
|
"github.com/dotcloud/docker/daemon/execdriver"
|
||||||
"github.com/dotcloud/docker/pkg/user"
|
|
||||||
"github.com/syndtr/gocapability/capability"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// Clear environment pollution introduced by lxc-start
|
// Clear environment pollution introduced by lxc-start
|
||||||
|
@ -107,65 +105,6 @@ func setupWorkingDirectory(args *execdriver.InitArgs) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Takes care of dropping privileges to the desired user
|
|
||||||
func changeUser(args *execdriver.InitArgs) error {
|
|
||||||
uid, gid, suppGids, err := user.GetUserGroupSupplementary(
|
|
||||||
args.User,
|
|
||||||
syscall.Getuid(), syscall.Getgid(),
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := syscall.Setgroups(suppGids); err != nil {
|
|
||||||
return fmt.Errorf("Setgroups failed: %v", err)
|
|
||||||
}
|
|
||||||
if err := syscall.Setgid(gid); err != nil {
|
|
||||||
return fmt.Errorf("Setgid failed: %v", err)
|
|
||||||
}
|
|
||||||
if err := syscall.Setuid(uid); err != nil {
|
|
||||||
return fmt.Errorf("Setuid failed: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func setupCapabilities(args *execdriver.InitArgs) error {
|
|
||||||
if args.Privileged {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
drop := []capability.Cap{
|
|
||||||
capability.CAP_SETPCAP,
|
|
||||||
capability.CAP_SYS_MODULE,
|
|
||||||
capability.CAP_SYS_RAWIO,
|
|
||||||
capability.CAP_SYS_PACCT,
|
|
||||||
capability.CAP_SYS_ADMIN,
|
|
||||||
capability.CAP_SYS_NICE,
|
|
||||||
capability.CAP_SYS_RESOURCE,
|
|
||||||
capability.CAP_SYS_TIME,
|
|
||||||
capability.CAP_SYS_TTY_CONFIG,
|
|
||||||
capability.CAP_AUDIT_WRITE,
|
|
||||||
capability.CAP_AUDIT_CONTROL,
|
|
||||||
capability.CAP_MAC_OVERRIDE,
|
|
||||||
capability.CAP_MAC_ADMIN,
|
|
||||||
capability.CAP_NET_ADMIN,
|
|
||||||
capability.CAP_SYSLOG,
|
|
||||||
}
|
|
||||||
|
|
||||||
c, err := capability.NewPid(os.Getpid())
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
c.Unset(capability.CAPS|capability.BOUNDS, drop...)
|
|
||||||
|
|
||||||
if err := c.Apply(capability.CAPS | capability.BOUNDS); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func getEnv(args *execdriver.InitArgs, key string) string {
|
func getEnv(args *execdriver.InitArgs, key string) string {
|
||||||
for _, kv := range args.Env {
|
for _, kv := range args.Env {
|
||||||
parts := strings.SplitN(kv, "=", 2)
|
parts := strings.SplitN(kv, "=", 2)
|
||||||
|
|
|
@ -3,9 +3,60 @@
|
||||||
package lxc
|
package lxc
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
"syscall"
|
"syscall"
|
||||||
|
|
||||||
|
"github.com/docker/libcontainer/namespaces"
|
||||||
|
"github.com/docker/libcontainer/security/capabilities"
|
||||||
|
"github.com/docker/libcontainer/utils"
|
||||||
|
"github.com/dotcloud/docker/daemon/execdriver"
|
||||||
|
"github.com/dotcloud/docker/daemon/execdriver/native/template"
|
||||||
|
"github.com/dotcloud/docker/pkg/system"
|
||||||
)
|
)
|
||||||
|
|
||||||
func setHostname(hostname string) error {
|
func setHostname(hostname string) error {
|
||||||
return syscall.Sethostname([]byte(hostname))
|
return syscall.Sethostname([]byte(hostname))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func finalizeNamespace(args *execdriver.InitArgs) error {
|
||||||
|
if err := utils.CloseExecFrom(3); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// We use the native drivers default template so that things like caps are consistent
|
||||||
|
// across both drivers
|
||||||
|
container := template.New()
|
||||||
|
|
||||||
|
if !args.Privileged {
|
||||||
|
// drop capabilities in bounding set before changing user
|
||||||
|
if err := capabilities.DropBoundingSet(container); err != nil {
|
||||||
|
return fmt.Errorf("drop bounding set %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// preserve existing capabilities while we change users
|
||||||
|
if err := system.SetKeepCaps(); err != nil {
|
||||||
|
return fmt.Errorf("set keep caps %s", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := namespaces.SetupUser(args.User); err != nil {
|
||||||
|
return fmt.Errorf("setup user %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !args.Privileged {
|
||||||
|
if err := system.ClearKeepCaps(); err != nil {
|
||||||
|
return fmt.Errorf("clear keep caps %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// drop all other capabilities
|
||||||
|
if err := capabilities.DropCapabilities(container); err != nil {
|
||||||
|
return fmt.Errorf("drop capabilities %s", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := setupWorkingDirectory(args); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
|
@ -2,6 +2,12 @@
|
||||||
|
|
||||||
package lxc
|
package lxc
|
||||||
|
|
||||||
|
import "github.com/dotcloud/docker/daemon/execdriver"
|
||||||
|
|
||||||
func setHostname(hostname string) error {
|
func setHostname(hostname string) error {
|
||||||
panic("Not supported on darwin")
|
panic("Not supported on darwin")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func finalizeNamespace(args *execdriver.InitArgs) error {
|
||||||
|
panic("Not supported on darwin")
|
||||||
|
}
|
||||||
|
|
|
@ -28,3 +28,11 @@ func GetClockTicks() int {
|
||||||
func CreateMasterAndConsole() (*os.File, string, error) {
|
func CreateMasterAndConsole() (*os.File, string, error) {
|
||||||
return nil, "", ErrNotSupportedPlatform
|
return nil, "", ErrNotSupportedPlatform
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func SetKeepCaps() error {
|
||||||
|
return ErrNotSupportedPlatform
|
||||||
|
}
|
||||||
|
|
||||||
|
func ClearKeepCaps() error {
|
||||||
|
return ErrNotSupportedPlatform
|
||||||
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue