Skip to content

Commit 0cda30e

Browse files
committed
Validate pod's volumes only once and also fix field path in the error message.
This is the same change as kubernetes/kubernetes#31927 but for the SecurityContextConstraints.
1 parent 3616a5b commit 0cda30e

File tree

2 files changed

+37
-35
lines changed

2 files changed

+37
-35
lines changed

pkg/security/securitycontextconstraints/provider.go

+19-17
Original file line numberDiff line numberDiff line change
@@ -269,6 +269,25 @@ func (s *simpleProvider) ValidatePodSecurityContext(pod *api.Pod, fldPath *field
269269

270270
allErrs = append(allErrs, s.sysctlsStrategy.Validate(pod)...)
271271

272+
// TODO(timstclair): ValidatePodSecurityContext should be renamed to ValidatePod since its scope
273+
// is not limited to the PodSecurityContext.
274+
if len(pod.Spec.Volumes) > 0 && !sccutil.SCCAllowsAllVolumes(s.scc) {
275+
allowedVolumes := sccutil.FSTypeToStringSet(s.scc.Volumes)
276+
for i, v := range pod.Spec.Volumes {
277+
fsType, err := sccutil.GetVolumeFSType(v)
278+
if err != nil {
279+
allErrs = append(allErrs, field.Invalid(field.NewPath("spec", "volumes").Index(i), string(fsType), err.Error()))
280+
continue
281+
}
282+
283+
if !allowedVolumes.Has(string(fsType)) {
284+
allErrs = append(allErrs, field.Invalid(
285+
field.NewPath("spec", "volumes").Index(i), string(fsType),
286+
fmt.Sprintf("%s volumes are not allowed to be used", string(fsType))))
287+
}
288+
}
289+
}
290+
272291
return allErrs
273292
}
274293

@@ -292,23 +311,6 @@ func (s *simpleProvider) ValidateContainerSecurityContext(pod *api.Pod, containe
292311

293312
allErrs = append(allErrs, s.capabilitiesStrategy.Validate(pod, container)...)
294313

295-
if len(pod.Spec.Volumes) > 0 && !sccutil.SCCAllowsAllVolumes(s.scc) {
296-
allowedVolumes := sccutil.FSTypeToStringSet(s.scc.Volumes)
297-
for i, v := range pod.Spec.Volumes {
298-
fsType, err := sccutil.GetVolumeFSType(v)
299-
if err != nil {
300-
allErrs = append(allErrs, field.Invalid(fldPath.Child("volumes").Index(i), string(fsType), err.Error()))
301-
continue
302-
}
303-
304-
if !allowedVolumes.Has(string(fsType)) {
305-
allErrs = append(allErrs, field.Invalid(
306-
fldPath.Child("volumes").Index(i), string(fsType),
307-
fmt.Sprintf("%s volumes are not allowed to be used", string(fsType))))
308-
}
309-
}
310-
}
311-
312314
if !s.scc.AllowHostNetwork && pod.Spec.SecurityContext.HostNetwork {
313315
allErrs = append(allErrs, field.Invalid(fldPath.Child("hostNetwork"), pod.Spec.SecurityContext.HostNetwork, "Host network is not allowed to be used"))
314316
}

pkg/security/securitycontextconstraints/provider_test.go

+18-18
Original file line numberDiff line numberDiff line change
@@ -220,6 +220,16 @@ func TestValidatePodSecurityContextFailures(t *testing.T) {
220220
failUnsafeSysctlFooPod := defaultPod()
221221
failUnsafeSysctlFooPod.Annotations[api.UnsafeSysctlsPodAnnotationKey] = "foo=1"
222222

223+
failHostDirPod := defaultPod()
224+
failHostDirPod.Spec.Volumes = []api.Volume{
225+
{
226+
Name: "bad volume",
227+
VolumeSource: api.VolumeSource{
228+
HostPath: &api.HostPathVolumeSource{},
229+
},
230+
},
231+
}
232+
223233
errorCases := map[string]struct {
224234
pod *api.Pod
225235
scc *securityapi.SecurityContextConstraints
@@ -300,6 +310,11 @@ func TestValidatePodSecurityContextFailures(t *testing.T) {
300310
scc: failOtherSysctlsAllowedSCC,
301311
expectedError: "sysctl \"foo\" is not allowed",
302312
},
313+
"failHostDirSCC": {
314+
pod: failHostDirPod,
315+
scc: defaultSCC(),
316+
expectedError: "hostPath volumes are not allowed to be used",
317+
},
303318
}
304319
for k, v := range errorCases {
305320
provider, err := NewSimpleProvider(v.scc)
@@ -351,16 +366,6 @@ func TestValidateContainerSecurityContextFailures(t *testing.T) {
351366
Add: []api.Capability{"foo"},
352367
}
353368

354-
failHostDirPod := defaultPod()
355-
failHostDirPod.Spec.Volumes = []api.Volume{
356-
{
357-
Name: "bad volume",
358-
VolumeSource: api.VolumeSource{
359-
HostPath: &api.HostPathVolumeSource{},
360-
},
361-
},
362-
}
363-
364369
failHostPortPod := defaultPod()
365370
failHostPortPod.Spec.Containers[0].Ports = []api.ContainerPort{{HostPort: 1}}
366371

@@ -406,11 +411,6 @@ func TestValidateContainerSecurityContextFailures(t *testing.T) {
406411
scc: defaultSCC(),
407412
expectedError: "capability may not be added",
408413
},
409-
"failHostDirSCC": {
410-
pod: failHostDirPod,
411-
scc: defaultSCC(),
412-
expectedError: "hostPath volumes are not allowed to be used",
413-
},
414414
"failHostPortSCC": {
415415
pod: failHostPortPod,
416416
scc: defaultSCC(),
@@ -926,7 +926,7 @@ func TestValidateAllowedVolumes(t *testing.T) {
926926
}
927927

928928
// expect a denial for this SCC and test the error message to ensure it's related to the volumesource
929-
errs := provider.ValidateContainerSecurityContext(pod, &pod.Spec.Containers[0], field.NewPath(""))
929+
errs := provider.ValidatePodSecurityContext(pod, field.NewPath(""))
930930
if len(errs) != 1 {
931931
t.Errorf("expected exactly 1 error for %s but got %v", fieldVal.Name, errs)
932932
} else {
@@ -937,14 +937,14 @@ func TestValidateAllowedVolumes(t *testing.T) {
937937

938938
// now add the fstype directly to the scc and it should validate
939939
scc.Volumes = []securityapi.FSType{fsType}
940-
errs = provider.ValidateContainerSecurityContext(pod, &pod.Spec.Containers[0], field.NewPath(""))
940+
errs = provider.ValidatePodSecurityContext(pod, field.NewPath(""))
941941
if len(errs) != 0 {
942942
t.Errorf("directly allowing volume expected no errors for %s but got %v", fieldVal.Name, errs)
943943
}
944944

945945
// now change the scc to allow any volumes and the pod should still validate
946946
scc.Volumes = []securityapi.FSType{securityapi.FSTypeAll}
947-
errs = provider.ValidateContainerSecurityContext(pod, &pod.Spec.Containers[0], field.NewPath(""))
947+
errs = provider.ValidatePodSecurityContext(pod, field.NewPath(""))
948948
if len(errs) != 0 {
949949
t.Errorf("wildcard volume expected no errors for %s but got %v", fieldVal.Name, errs)
950950
}

0 commit comments

Comments
 (0)