Skip to content

Commit 507d3a7

Browse files
pweil-smarterclayton
pweil-
authored andcommitted
UPSTREAM: <carry>: SCC seccomp support
:100644 100644 91fc2f2... b7714d3... M api/swagger-spec/v1.json :100644 100644 21100a6... da0acb3... M pkg/api/deep_copy_generated.go :100644 100644 9db4614... 6939e04... M pkg/api/types.go :100644 100644 67eff6d... 421cc88... M pkg/api/v1/conversion_generated.go :100644 100644 ea1f301... beaae9e... M pkg/api/v1/deep_copy_generated.go :100644 100644 841f0f9... 6284a88... M pkg/api/v1/generated.pb.go :100644 100644 c2c5f52... 1ff0493... M pkg/api/v1/generated.proto :100644 100644 7a52060... 90e90c0... M pkg/api/v1/types.go :100644 100644 5adbb1e... dc5a8bb... M pkg/api/v1/types_swagger_doc_generated.go :100644 100644 face966... 14a6a4c... M pkg/securitycontextconstraints/provider.go :100644 100644 caf017f... c9f7526... M pkg/securitycontextconstraints/provider_test.go :000000 100644 0000000... ce8d2c6... A pkg/securitycontextconstraints/seccomp/types.go :000000 100644 0000000... 029dc7a... A pkg/securitycontextconstraints/seccomp/withseccomp.go :000000 100644 0000000... f75e33d... A pkg/securitycontextconstraints/seccomp/withseccomp_test.go :100644 100644 4fe4ee2... 2fd9310... M pkg/securitycontextconstraints/types.go
1 parent f0fe2a3 commit 507d3a7

15 files changed

+674
-7
lines changed

api/swagger-spec/v1.json

+7
Original file line numberDiff line numberDiff line change
@@ -20351,6 +20351,13 @@
2035120351
"type": "string"
2035220352
},
2035320353
"description": "The groups that have permission to use this security context constraints"
20354+
},
20355+
"seccompProfiles": {
20356+
"type": "array",
20357+
"items": {
20358+
"type": "string"
20359+
},
20360+
"description": "SeccompProfiles lists the allowed profiles that may be set for the pod or container's seccomp annotations. An unset (nil) or empty value means that no profiles may be specifid by the pod or container.\tThe wildcard '*' may be used to allow all profiles. When used to generate a value for a pod the first non-wildcard profile will be used as the default."
2035420361
}
2035520362
}
2035620363
},

pkg/api/deep_copy_generated.go

+7
Original file line numberDiff line numberDiff line change
@@ -3032,6 +3032,13 @@ func DeepCopy_api_SecurityContextConstraints(in SecurityContextConstraints, out
30323032
return err
30333033
}
30343034
out.ReadOnlyRootFilesystem = in.ReadOnlyRootFilesystem
3035+
if in.SeccompProfiles != nil {
3036+
in, out := in.SeccompProfiles, &out.SeccompProfiles
3037+
*out = make([]string, len(in))
3038+
copy(*out, in)
3039+
} else {
3040+
out.SeccompProfiles = nil
3041+
}
30353042
if in.Users != nil {
30363043
in, out := in.Users, &out.Users
30373044
*out = make([]string, len(in))

pkg/api/types.go

+6
Original file line numberDiff line numberDiff line change
@@ -2936,6 +2936,12 @@ type SecurityContextConstraints struct {
29362936
// If set to false the container may run with a read only root file system if it wishes but it
29372937
// will not be forced to.
29382938
ReadOnlyRootFilesystem bool
2939+
// SeccompProfiles lists the allowed profiles that may be set for the pod or
2940+
// container's seccomp annotations. An unset (nil) or empty value means that no profiles may
2941+
// be specifid by the pod or container. The wildcard '*' may be used to allow all profiles. When
2942+
// used to generate a value for a pod the first non-wildcard profile will be used as
2943+
// the default.
2944+
SeccompProfiles []string
29392945

29402946
// The users who have permissions to use this security context constraints
29412947
Users []string

pkg/api/v1/conversion_generated.go

+2
Original file line numberDiff line numberDiff line change
@@ -6040,6 +6040,7 @@ func autoConvert_v1_SecurityContextConstraints_To_api_SecurityContextConstraints
60406040
out.ReadOnlyRootFilesystem = in.ReadOnlyRootFilesystem
60416041
out.Users = in.Users
60426042
out.Groups = in.Groups
6043+
out.SeccompProfiles = in.SeccompProfiles
60436044
return nil
60446045
}
60456046

@@ -6105,6 +6106,7 @@ func autoConvert_api_SecurityContextConstraints_To_v1_SecurityContextConstraints
61056106
return err
61066107
}
61076108
out.ReadOnlyRootFilesystem = in.ReadOnlyRootFilesystem
6109+
out.SeccompProfiles = in.SeccompProfiles
61086110
out.Users = in.Users
61096111
out.Groups = in.Groups
61106112
return nil

pkg/api/v1/deep_copy_generated.go

+7
Original file line numberDiff line numberDiff line change
@@ -3042,6 +3042,13 @@ func DeepCopy_v1_SecurityContextConstraints(in SecurityContextConstraints, out *
30423042
} else {
30433043
out.Groups = nil
30443044
}
3045+
if in.SeccompProfiles != nil {
3046+
in, out := in.SeccompProfiles, &out.SeccompProfiles
3047+
*out = make([]string, len(in))
3048+
copy(*out, in)
3049+
} else {
3050+
out.SeccompProfiles = nil
3051+
}
30453052
return nil
30463053
}
30473054

pkg/api/v1/generated.pb.go

+52
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pkg/api/v1/generated.proto

+7
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pkg/api/v1/types.go

+7
Original file line numberDiff line numberDiff line change
@@ -3405,6 +3405,13 @@ type SecurityContextConstraints struct {
34053405
Users []string `json:"users,omitempty" description:"users allowed to use this SecurityContextConstraints" protobuf:"bytes,18,rep,name=users"`
34063406
// The groups that have permission to use this security context constraints
34073407
Groups []string `json:"groups,omitempty" description:"groups allowed to use this SecurityContextConstraints" protobuf:"bytes,19,rep,name=groups"`
3408+
3409+
// SeccompProfiles lists the allowed profiles that may be set for the pod or
3410+
// container's seccomp annotations. An unset (nil) or empty value means that no profiles may
3411+
// be specifid by the pod or container. The wildcard '*' may be used to allow all profiles. When
3412+
// used to generate a value for a pod the first non-wildcard profile will be used as
3413+
// the default.
3414+
SeccompProfiles []string `json:"seccompProfiles,omitempty" description:"seccomp profiles allowed to be used by pods and containers" protobuf:"bytes,20,opt,name=seccompProfiles"`
34083415
}
34093416

34103417
// FS Type gives strong typing to different file systems that are used by volumes.

pkg/api/v1/types_swagger_doc_generated.go

+1
Original file line numberDiff line numberDiff line change
@@ -1621,6 +1621,7 @@ var map_SecurityContextConstraints = map[string]string{
16211621
"readOnlyRootFilesystem": "ReadOnlyRootFilesystem when set to true will force containers to run with a read only root file system. If the container specifically requests to run with a non-read only root file system the SCC should deny the pod. If set to false the container may run with a read only root file system if it wishes but it will not be forced to.",
16221622
"users": "The users who have permissions to use this security context constraints",
16231623
"groups": "The groups that have permission to use this security context constraints",
1624+
"seccompProfiles": "SeccompProfiles lists the allowed profiles that may be set for the pod or container's seccomp annotations. An unset (nil) or empty value means that no profiles may be specifid by the pod or container.\tThe wildcard '*' may be used to allow all profiles. When used to generate a value for a pod the first non-wildcard profile will be used as the default.",
16241625
}
16251626

16261627
func (SecurityContextConstraints) SwaggerDoc() map[string]string {

pkg/securitycontextconstraints/provider.go

+46-5
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ import (
2222
"k8s.io/kubernetes/pkg/api"
2323
"k8s.io/kubernetes/pkg/securitycontextconstraints/capabilities"
2424
"k8s.io/kubernetes/pkg/securitycontextconstraints/group"
25+
"k8s.io/kubernetes/pkg/securitycontextconstraints/seccomp"
2526
"k8s.io/kubernetes/pkg/securitycontextconstraints/selinux"
2627
"k8s.io/kubernetes/pkg/securitycontextconstraints/user"
2728
sccutil "k8s.io/kubernetes/pkg/securitycontextconstraints/util"
@@ -43,6 +44,7 @@ type simpleProvider struct {
4344
fsGroupStrategy group.GroupSecurityContextConstraintsStrategy
4445
supplementalGroupStrategy group.GroupSecurityContextConstraintsStrategy
4546
capabilitiesStrategy capabilities.CapabilitiesSecurityContextConstraintsStrategy
47+
seccompStrategy seccomp.SeccompStrategy
4648
}
4749

4850
// ensure we implement the interface correctly.
@@ -79,13 +81,19 @@ func NewSimpleProvider(scc *api.SecurityContextConstraints) (SecurityContextCons
7981
return nil, err
8082
}
8183

84+
seccompStrat, err := createSeccompStrategy(scc.SeccompProfiles)
85+
if err != nil {
86+
return nil, err
87+
}
88+
8289
return &simpleProvider{
8390
scc: scc,
8491
runAsUserStrategy: userStrat,
8592
seLinuxStrategy: seLinuxStrat,
8693
fsGroupStrategy: fsGroupStrat,
8794
supplementalGroupStrategy: supGroupStrat,
8895
capabilitiesStrategy: capStrat,
96+
seccompStrategy: seccompStrat,
8997
}, nil
9098
}
9199

@@ -95,7 +103,7 @@ func NewSimpleProvider(scc *api.SecurityContextConstraints) (SecurityContextCons
95103
//
96104
// NOTE: this method works on a copy of the PodSecurityContext. It is up to the caller to
97105
// apply the PSC if validation passes.
98-
func (s *simpleProvider) CreatePodSecurityContext(pod *api.Pod) (*api.PodSecurityContext, error) {
106+
func (s *simpleProvider) CreatePodSecurityContext(pod *api.Pod) (*api.PodSecurityContext, map[string]string, error) {
99107
var sc *api.PodSecurityContext = nil
100108
if pod.Spec.SecurityContext != nil {
101109
// work with a copy
@@ -105,31 +113,57 @@ func (s *simpleProvider) CreatePodSecurityContext(pod *api.Pod) (*api.PodSecurit
105113
sc = &api.PodSecurityContext{}
106114
}
107115

116+
var annotationsCopy map[string]string = nil
117+
if pod.Annotations != nil {
118+
annotationsCopy = make(map[string]string, len(pod.Annotations))
119+
for k, v := range pod.Annotations {
120+
annotationsCopy[k] = v
121+
}
122+
}
123+
108124
if len(sc.SupplementalGroups) == 0 {
109125
supGroups, err := s.supplementalGroupStrategy.Generate(pod)
110126
if err != nil {
111-
return nil, err
127+
return nil, nil, err
112128
}
113129
sc.SupplementalGroups = supGroups
114130
}
115131

116132
if sc.FSGroup == nil {
117133
fsGroup, err := s.fsGroupStrategy.GenerateSingle(pod)
118134
if err != nil {
119-
return nil, err
135+
return nil, nil, err
120136
}
121137
sc.FSGroup = fsGroup
122138
}
123139

124140
if sc.SELinuxOptions == nil {
125141
seLinux, err := s.seLinuxStrategy.Generate(pod, nil)
126142
if err != nil {
127-
return nil, err
143+
return nil, nil, err
128144
}
129145
sc.SELinuxOptions = seLinux
130146
}
131147

132-
return sc, nil
148+
// we only generate a seccomp annotation for the entire pod. Validation
149+
// will catch any container annotations that are invalid and containers
150+
// will inherit the pod annotation.
151+
_, hasPodProfile := pod.Annotations[api.SeccompPodAnnotationKey]
152+
if !hasPodProfile {
153+
profile, err := s.seccompStrategy.Generate(pod)
154+
if err != nil {
155+
return nil, nil, err
156+
}
157+
158+
if profile != "" {
159+
if annotationsCopy == nil {
160+
annotationsCopy = map[string]string{}
161+
}
162+
annotationsCopy[api.SeccompPodAnnotationKey] = profile
163+
}
164+
}
165+
166+
return sc, annotationsCopy, nil
133167
}
134168

135169
// Create a SecurityContext based on the given constraints. If a setting is already set on the
@@ -207,6 +241,7 @@ func (s *simpleProvider) ValidatePodSecurityContext(pod *api.Pod, fldPath *field
207241
}
208242
allErrs = append(allErrs, s.fsGroupStrategy.Validate(pod, fsGroups)...)
209243
allErrs = append(allErrs, s.supplementalGroupStrategy.Validate(pod, pod.Spec.SecurityContext.SupplementalGroups)...)
244+
allErrs = append(allErrs, s.seccompStrategy.ValidatePod(pod)...)
210245

211246
// make a dummy container context to reuse the selinux strategies
212247
container := &api.Container{
@@ -244,6 +279,7 @@ func (s *simpleProvider) ValidateContainerSecurityContext(pod *api.Pod, containe
244279
sc := container.SecurityContext
245280
allErrs = append(allErrs, s.runAsUserStrategy.Validate(pod, container)...)
246281
allErrs = append(allErrs, s.seLinuxStrategy.Validate(pod, container)...)
282+
allErrs = append(allErrs, s.seccompStrategy.ValidateContainer(pod, container)...)
247283

248284
if !s.scc.AllowPrivilegedContainer && *sc.Privileged {
249285
allErrs = append(allErrs, field.Invalid(fldPath.Child("privileged"), *sc.Privileged, "Privileged containers are not allowed"))
@@ -377,3 +413,8 @@ func createSupplementalGroupStrategy(opts *api.SupplementalGroupsStrategyOptions
377413
func createCapabilitiesStrategy(defaultAddCaps, requiredDropCaps, allowedCaps []api.Capability) (capabilities.CapabilitiesSecurityContextConstraintsStrategy, error) {
378414
return capabilities.NewDefaultCapabilities(defaultAddCaps, requiredDropCaps, allowedCaps)
379415
}
416+
417+
// createSeccompStrategy creates a new seccomp strategy
418+
func createSeccompStrategy(allowedProfiles []string) (seccomp.SeccompStrategy, error) {
419+
return seccomp.NewWithSeccompProfile(allowedProfiles)
420+
}

0 commit comments

Comments
 (0)