Skip to content

Commit 07bf572

Browse files
committed
Make SCC with less capabilities more restrictive.
1 parent 070a3de commit 07bf572

File tree

2 files changed

+130
-6
lines changed

2 files changed

+130
-6
lines changed

pkg/security/scc/byrestrictions.go

+49
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
package scc
22

33
import (
4+
kapi "k8s.io/kubernetes/pkg/api"
45
securityapi "github.com/openshift/origin/pkg/security/apis/security"
56
)
67

@@ -30,6 +31,15 @@ const runAsNonRootWeight int = 30000
3031
const runAsRangeWeight int = 20000
3132
const runAsUserWeight int = 10000
3233

34+
const runCapsDefaultWeight int = 5000
35+
const runCapsAddOneWeight int = 300
36+
const runCapsAllowAllWeight int = 4000
37+
const runCapsAllowOneWeight int = 10
38+
const runCapsDropAllWeight int = -3000
39+
const runCapsDropOneWeight int = -50
40+
const runCapsMaxWeight int = 10000
41+
const runCapsMinWeight int = 0
42+
3343
// pointValue places a value on the SCC based on the settings of the SCC that can be used
3444
// to determine how restrictive it is. The lower the number, the more restrictive it is.
3545
func pointValue(constraint *securityapi.SecurityContextConstraints) int {
@@ -42,6 +52,9 @@ func pointValue(constraint *securityapi.SecurityContextConstraints) int {
4252
// add points based on volume requests
4353
points += volumePointValue(constraint)
4454

55+
// add points based on capabilities
56+
points += capabilitiesPointValue(constraint)
57+
4558
// strategies in order of least restrictive to most restrictive
4659
switch constraint.SELinuxContext.Type {
4760
case securityapi.SELinuxStrategyRunAsAny:
@@ -96,3 +109,39 @@ func volumePointValue(scc *securityapi.SecurityContextConstraints) int {
96109
}
97110
return 0
98111
}
112+
113+
// hasCap checks for needle in haystack.
114+
func hasCap(needle kapi.Capability, haystack []kapi.Capability) bool {
115+
for _, c := range haystack {
116+
if needle == c {
117+
return true
118+
}
119+
}
120+
return false
121+
}
122+
123+
// capabilitiesPointValue returns a score based on the capabilities allowed,
124+
// added, or removed by the SCC. This allow us to prefer the more restrictive
125+
// SCC.
126+
func capabilitiesPointValue(scc *securityapi.SecurityContextConstraints) int {
127+
points := runCapsDefaultWeight
128+
points += runCapsAddOneWeight * len(scc.DefaultAddCapabilities)
129+
if hasCap(kapi.CapabilityAll, scc.AllowedCapabilities) {
130+
points += runCapsAllowAllWeight
131+
} else if hasCap("ALL", scc.AllowedCapabilities) {
132+
points += runCapsAllowAllWeight
133+
} else {
134+
points += runCapsAllowOneWeight * len(scc.AllowedCapabilities)
135+
}
136+
if hasCap("ALL", scc.RequiredDropCapabilities) {
137+
points += runCapsDropAllWeight
138+
} else {
139+
points += runCapsDropOneWeight * len(scc.RequiredDropCapabilities)
140+
}
141+
if (points > runCapsMaxWeight) {
142+
return runCapsMaxWeight
143+
} else if (points < runCapsMinWeight) {
144+
return runCapsMinWeight
145+
}
146+
return points
147+
}

pkg/security/scc/byrestrictions_test.go

+81-6
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ package scc
33
import (
44
"testing"
55

6+
kapi "k8s.io/kubernetes/pkg/api"
67
securityapi "github.com/openshift/origin/pkg/security/apis/security"
78
)
89

@@ -33,15 +34,15 @@ func TestPointValue(t *testing.T) {
3334
// run through all combos of user strategy + seLinux strategy + priv
3435
for userStrategy, userStrategyPoints := range userStrategies {
3536
for seLinuxStrategy, seLinuxStrategyPoints := range seLinuxStrategies {
36-
expectedPoints := privilegedWeight + userStrategyPoints + seLinuxStrategyPoints
37+
expectedPoints := privilegedWeight + userStrategyPoints + seLinuxStrategyPoints + runCapsDefaultWeight
3738
scc := newSCC(true, seLinuxStrategy, userStrategy)
3839
actualPoints := pointValue(scc)
3940

4041
if actualPoints != expectedPoints {
4142
t.Errorf("privileged, user: %v, seLinux %v expected %d score but got %d", userStrategy, seLinuxStrategy, expectedPoints, actualPoints)
4243
}
4344

44-
expectedPoints = userStrategyPoints + seLinuxStrategyPoints
45+
expectedPoints = userStrategyPoints + seLinuxStrategyPoints + runCapsDefaultWeight
4546
scc = newSCC(false, seLinuxStrategy, userStrategy)
4647
actualPoints = pointValue(scc)
4748

@@ -51,14 +52,15 @@ func TestPointValue(t *testing.T) {
5152
}
5253
}
5354

54-
// sanity check to ensure volume score is added (specific volumes scores are tested below
55+
// sanity check to ensure volume and capabilities scores are added (specific volumes
56+
// and capabilities scores are tested below)
5557
scc := newSCC(false, securityapi.SELinuxStrategyMustRunAs, securityapi.RunAsUserStrategyMustRunAs)
5658
scc.Volumes = []securityapi.FSType{securityapi.FSTypeHostPath}
5759
actualPoints := pointValue(scc)
58-
// SELinux + User + host path volume
59-
expectedPoints := runAsUserWeight + runAsUserWeight + hostVolumeWeight
60+
// SELinux + User + host path volume + default capabilities
61+
expectedPoints := runAsUserWeight + runAsUserWeight + hostVolumeWeight + runCapsDefaultWeight
6062
if actualPoints != expectedPoints {
61-
t.Errorf("volume score was not added to the scc point value correctly!")
63+
t.Errorf("volume score was not added to the scc point value correctly, got %d!", actualPoints)
6264
}
6365
}
6466

@@ -168,3 +170,76 @@ func TestVolumePointValue(t *testing.T) {
168170
}
169171
}
170172
}
173+
174+
func TestCapabilitiesPointValue(t *testing.T) {
175+
newSCC := func(def []kapi.Capability, allow []kapi.Capability, drop []kapi.Capability) *securityapi.SecurityContextConstraints {
176+
return &securityapi.SecurityContextConstraints{
177+
DefaultAddCapabilities: def,
178+
AllowedCapabilities: allow,
179+
RequiredDropCapabilities: drop,
180+
}
181+
}
182+
183+
tests := map[string]struct {
184+
defaultAdd []kapi.Capability
185+
allowed []kapi.Capability
186+
requiredDrop []kapi.Capability
187+
expectedPoints int
188+
}{
189+
"nothing specified": {
190+
defaultAdd: nil,
191+
allowed: nil,
192+
requiredDrop: nil,
193+
expectedPoints: runCapsDefaultWeight,
194+
},
195+
"default": {
196+
defaultAdd: []kapi.Capability{"KILL", "MKNOD"},
197+
allowed: nil,
198+
requiredDrop: nil,
199+
expectedPoints: runCapsDefaultWeight + 2 * runCapsAddOneWeight,
200+
},
201+
"allow": {
202+
defaultAdd: nil,
203+
allowed: []kapi.Capability{"KILL", "MKNOD"},
204+
requiredDrop: nil,
205+
expectedPoints: runCapsDefaultWeight + 2 * runCapsAllowOneWeight,
206+
},
207+
"allow star": {
208+
defaultAdd: nil,
209+
allowed: []kapi.Capability{"*"},
210+
requiredDrop: nil,
211+
expectedPoints: runCapsDefaultWeight + runCapsAllowAllWeight,
212+
},
213+
"allow all": {
214+
defaultAdd: nil,
215+
allowed: []kapi.Capability{"ALL"},
216+
requiredDrop: nil,
217+
expectedPoints: runCapsDefaultWeight + runCapsAllowAllWeight,
218+
},
219+
"drop": {
220+
defaultAdd: nil,
221+
allowed: nil,
222+
requiredDrop: []kapi.Capability{"KILL", "MKNOD"},
223+
expectedPoints: runCapsDefaultWeight + 2 * runCapsDropOneWeight,
224+
},
225+
"drop all": {
226+
defaultAdd: nil,
227+
allowed: nil,
228+
requiredDrop: []kapi.Capability{"ALL"},
229+
expectedPoints: runCapsDefaultWeight + runCapsDropAllWeight,
230+
},
231+
"mixture": {
232+
defaultAdd: []kapi.Capability{"SETUID", "SETGID"},
233+
allowed: []kapi.Capability{"*"},
234+
requiredDrop: []kapi.Capability{"SYS_CHROOT"},
235+
expectedPoints: runCapsDefaultWeight + 2 * runCapsAddOneWeight + runCapsAllowAllWeight + runCapsDropOneWeight,
236+
},
237+
}
238+
for k, v := range tests {
239+
scc := newSCC(v.defaultAdd, v.allowed, v.requiredDrop)
240+
actualPoints := capabilitiesPointValue(scc)
241+
if actualPoints != v.expectedPoints {
242+
t.Errorf("%s expected %d capability score but got %d", k, v.expectedPoints, actualPoints)
243+
}
244+
}
245+
}

0 commit comments

Comments
 (0)