Skip to content

Commit 25f4554

Browse files
committed
Make SCC with less capabilities more restrictive.
1 parent 2ed96eb commit 25f4554

File tree

2 files changed

+118
-5
lines changed

2 files changed

+118
-5
lines changed

pkg/security/scc/byrestrictions.go

+39
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,9 @@ func pointValue(constraint *kapi.SecurityContextConstraints) int {
2828
// add points based on volume requests
2929
points += volumePointValue(constraint)
3030

31+
// add points based on capabilities
32+
points += capabilitiesPointValue(constraint)
33+
3134
// strategies in order of least restrictive to most restrictive
3235
switch constraint.SELinuxContext.Type {
3336
case kapi.SELinuxStrategyRunAsAny:
@@ -82,3 +85,39 @@ func volumePointValue(scc *kapi.SecurityContextConstraints) int {
8285
}
8386
return 0
8487
}
88+
89+
// hasCap checks for needle in haystack.
90+
func hasCap(needle kapi.Capability, haystack []kapi.Capability) bool {
91+
for _, c := range haystack {
92+
if needle == c {
93+
return true
94+
}
95+
}
96+
return false
97+
}
98+
99+
// capabilitiesPointValue returns a score based on the capabilities allowed,
100+
// added, or removed by the SCC. This allow us to prefer the more restrictive
101+
// SCC.
102+
func capabilitiesPointValue(scc *kapi.SecurityContextConstraints) int {
103+
points := 5000
104+
points += 300 * len(scc.DefaultAddCapabilities)
105+
if hasCap(kapi.CapabilityAll, scc.AllowedCapabilities) {
106+
points += 4000
107+
} else if hasCap("ALL", scc.AllowedCapabilities) {
108+
points += 4000
109+
} else {
110+
points += 10 * len(scc.AllowedCapabilities)
111+
}
112+
if hasCap("ALL", scc.RequiredDropCapabilities) {
113+
points -= 3000
114+
} else {
115+
points -= 50 * len(scc.RequiredDropCapabilities)
116+
}
117+
if (points > 10000) {
118+
return 10000
119+
} else if (points < 0) {
120+
return 0
121+
}
122+
return points
123+
}

pkg/security/scc/byrestrictions_test.go

+79-5
Original file line numberDiff line numberDiff line change
@@ -39,15 +39,15 @@ func TestPointValue(t *testing.T) {
3939
// run through all combos of user strategy + seLinux strategy + priv
4040
for userStrategy, userStrategyPoints := range userStrategies {
4141
for seLinuxStrategy, seLinuxStrategyPoints := range seLinuxStrategies {
42-
expectedPoints := privilegedPoints + userStrategyPoints + seLinuxStrategyPoints
42+
expectedPoints := 5000 + privilegedPoints + userStrategyPoints + seLinuxStrategyPoints
4343
scc := newSCC(true, seLinuxStrategy, userStrategy)
4444
actualPoints := pointValue(scc)
4545

4646
if actualPoints != expectedPoints {
4747
t.Errorf("privileged, user: %v, seLinux %v expected %d score but got %d", userStrategy, seLinuxStrategy, expectedPoints, actualPoints)
4848
}
4949

50-
expectedPoints = userStrategyPoints + seLinuxStrategyPoints
50+
expectedPoints = 5000 + userStrategyPoints + seLinuxStrategyPoints
5151
scc = newSCC(false, seLinuxStrategy, userStrategy)
5252
actualPoints = pointValue(scc)
5353

@@ -57,12 +57,13 @@ func TestPointValue(t *testing.T) {
5757
}
5858
}
5959

60-
// sanity check to ensure volume score is added (specific volumes scores are tested below
60+
// sanity check to ensure volume and capabilities scores are added (specific volumes
61+
// and capabilities scores are tested below
6162
scc := newSCC(false, kapi.SELinuxStrategyMustRunAs, kapi.RunAsUserStrategyMustRunAs)
6263
scc.Volumes = []kapi.FSType{kapi.FSTypeHostPath}
6364
actualPoints := pointValue(scc)
64-
if actualPoints != 120000 { //10000 (SELinux) + 10000 (User) + 100000 (host path volume)
65-
t.Errorf("volume score was not added to the scc point value correctly!")
65+
if actualPoints != 125000 { //10000 (SELinux) + 10000 (User) + 100000 (host path volume) + 5000 capabilities
66+
t.Errorf("volume score was not added to the scc point value correctly, got %d!", actualPoints)
6667
}
6768
}
6869

@@ -172,3 +173,76 @@ func TestVolumePointValue(t *testing.T) {
172173
}
173174
}
174175
}
176+
177+
func TestCapabilitiesPointValue(t *testing.T) {
178+
newSCC := func(def []kapi.Capability, allow []kapi.Capability, drop []kapi.Capability) *kapi.SecurityContextConstraints {
179+
return &kapi.SecurityContextConstraints{
180+
DefaultAddCapabilities: def,
181+
AllowedCapabilities: allow,
182+
RequiredDropCapabilities: drop,
183+
}
184+
}
185+
186+
tests := map[string]struct {
187+
defaultAdd []kapi.Capability
188+
allowed []kapi.Capability
189+
requiredDrop []kapi.Capability
190+
expectedPoints int
191+
}{
192+
"nothing specified": {
193+
defaultAdd: nil,
194+
allowed: nil,
195+
requiredDrop: nil,
196+
expectedPoints: 5000,
197+
},
198+
"default": {
199+
defaultAdd: []kapi.Capability{"KILL", "MKNOD"},
200+
allowed: nil,
201+
requiredDrop: nil,
202+
expectedPoints: 5600,
203+
},
204+
"allow": {
205+
defaultAdd: nil,
206+
allowed: []kapi.Capability{"KILL", "MKNOD"},
207+
requiredDrop: nil,
208+
expectedPoints: 5020,
209+
},
210+
"allow star": {
211+
defaultAdd: nil,
212+
allowed: []kapi.Capability{"*"},
213+
requiredDrop: nil,
214+
expectedPoints: 9000,
215+
},
216+
"allow all": {
217+
defaultAdd: nil,
218+
allowed: []kapi.Capability{"ALL"},
219+
requiredDrop: nil,
220+
expectedPoints: 9000,
221+
},
222+
"drop": {
223+
defaultAdd: nil,
224+
allowed: nil,
225+
requiredDrop: []kapi.Capability{"KILL", "MKNOD"},
226+
expectedPoints: 4900,
227+
},
228+
"drop all": {
229+
defaultAdd: nil,
230+
allowed: nil,
231+
requiredDrop: []kapi.Capability{"ALL"},
232+
expectedPoints: 2000,
233+
},
234+
"mixture": {
235+
defaultAdd: []kapi.Capability{"SETUID", "SETGID"},
236+
allowed: []kapi.Capability{"*"},
237+
requiredDrop: []kapi.Capability{"SYS_CHROOT"},
238+
expectedPoints: 9550,
239+
},
240+
}
241+
for k, v := range tests {
242+
scc := newSCC(v.defaultAdd, v.allowed, v.requiredDrop)
243+
actualPoints := capabilitiesPointValue(scc)
244+
if actualPoints != v.expectedPoints {
245+
t.Errorf("%s expected %d capability score but got %d", k, v.expectedPoints, actualPoints)
246+
}
247+
}
248+
}

0 commit comments

Comments
 (0)