Skip to content

Commit 99c756d

Browse files
committed
Make SCC with less capabilities more restrictive.
1 parent 404b670 commit 99c756d

File tree

2 files changed

+120
-5
lines changed

2 files changed

+120
-5
lines changed

pkg/security/scc/byrestrictions.go

+40
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
package scc
22

33
import (
4+
kapi "k8s.io/kubernetes/pkg/api"
45
securityapi "github.com/openshift/origin/pkg/security/apis/security"
56
)
67

@@ -28,6 +29,9 @@ func pointValue(constraint *securityapi.SecurityContextConstraints) int {
2829
// add points based on volume requests
2930
points += volumePointValue(constraint)
3031

32+
// add points based on capabilities
33+
points += capabilitiesPointValue(constraint)
34+
3135
// strategies in order of least restrictive to most restrictive
3236
switch constraint.SELinuxContext.Type {
3337
case securityapi.SELinuxStrategyRunAsAny:
@@ -82,3 +86,39 @@ func volumePointValue(scc *securityapi.SecurityContextConstraints) int {
8286
}
8387
return 0
8488
}
89+
90+
// hasCap checks for needle in haystack.
91+
func hasCap(needle kapi.Capability, haystack []kapi.Capability) bool {
92+
for _, c := range haystack {
93+
if needle == c {
94+
return true
95+
}
96+
}
97+
return false
98+
}
99+
100+
// capabilitiesPointValue returns a score based on the capabilities allowed,
101+
// added, or removed by the SCC. This allow us to prefer the more restrictive
102+
// SCC.
103+
func capabilitiesPointValue(scc *securityapi.SecurityContextConstraints) int {
104+
points := 5000
105+
points += 300 * len(scc.DefaultAddCapabilities)
106+
if hasCap(kapi.CapabilityAll, scc.AllowedCapabilities) {
107+
points += 4000
108+
} else if hasCap("ALL", scc.AllowedCapabilities) {
109+
points += 4000
110+
} else {
111+
points += 10 * len(scc.AllowedCapabilities)
112+
}
113+
if hasCap("ALL", scc.RequiredDropCapabilities) {
114+
points -= 3000
115+
} else {
116+
points -= 50 * len(scc.RequiredDropCapabilities)
117+
}
118+
if (points > 10000) {
119+
return 10000
120+
} else if (points < 0) {
121+
return 0
122+
}
123+
return points
124+
}

pkg/security/scc/byrestrictions_test.go

+80-5
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ package scc
33
import (
44
"testing"
55

6+
kapi "k8s.io/kubernetes/pkg/api"
67
securityapi "github.com/openshift/origin/pkg/security/apis/security"
78
)
89

@@ -39,15 +40,15 @@ func TestPointValue(t *testing.T) {
3940
// run through all combos of user strategy + seLinux strategy + priv
4041
for userStrategy, userStrategyPoints := range userStrategies {
4142
for seLinuxStrategy, seLinuxStrategyPoints := range seLinuxStrategies {
42-
expectedPoints := privilegedPoints + userStrategyPoints + seLinuxStrategyPoints
43+
expectedPoints := 5000 + privilegedPoints + userStrategyPoints + seLinuxStrategyPoints
4344
scc := newSCC(true, seLinuxStrategy, userStrategy)
4445
actualPoints := pointValue(scc)
4546

4647
if actualPoints != expectedPoints {
4748
t.Errorf("privileged, user: %v, seLinux %v expected %d score but got %d", userStrategy, seLinuxStrategy, expectedPoints, actualPoints)
4849
}
4950

50-
expectedPoints = userStrategyPoints + seLinuxStrategyPoints
51+
expectedPoints = 5000 + userStrategyPoints + seLinuxStrategyPoints
5152
scc = newSCC(false, seLinuxStrategy, userStrategy)
5253
actualPoints = pointValue(scc)
5354

@@ -57,12 +58,13 @@ func TestPointValue(t *testing.T) {
5758
}
5859
}
5960

60-
// sanity check to ensure volume score is added (specific volumes scores are tested below
61+
// sanity check to ensure volume and capabilities scores are added (specific volumes
62+
// and capabilities scores are tested below
6163
scc := newSCC(false, securityapi.SELinuxStrategyMustRunAs, securityapi.RunAsUserStrategyMustRunAs)
6264
scc.Volumes = []securityapi.FSType{securityapi.FSTypeHostPath}
6365
actualPoints := pointValue(scc)
64-
if actualPoints != 120000 { //10000 (SELinux) + 10000 (User) + 100000 (host path volume)
65-
t.Errorf("volume score was not added to the scc point value correctly!")
66+
if actualPoints != 125000 { //10000 (SELinux) + 10000 (User) + 100000 (host path volume) + 5000 capabilities
67+
t.Errorf("volume score was not added to the scc point value correctly, got %d!", actualPoints)
6668
}
6769
}
6870

@@ -172,3 +174,76 @@ func TestVolumePointValue(t *testing.T) {
172174
}
173175
}
174176
}
177+
178+
func TestCapabilitiesPointValue(t *testing.T) {
179+
newSCC := func(def []kapi.Capability, allow []kapi.Capability, drop []kapi.Capability) *securityapi.SecurityContextConstraints {
180+
return &securityapi.SecurityContextConstraints{
181+
DefaultAddCapabilities: def,
182+
AllowedCapabilities: allow,
183+
RequiredDropCapabilities: drop,
184+
}
185+
}
186+
187+
tests := map[string]struct {
188+
defaultAdd []kapi.Capability
189+
allowed []kapi.Capability
190+
requiredDrop []kapi.Capability
191+
expectedPoints int
192+
}{
193+
"nothing specified": {
194+
defaultAdd: nil,
195+
allowed: nil,
196+
requiredDrop: nil,
197+
expectedPoints: 5000,
198+
},
199+
"default": {
200+
defaultAdd: []kapi.Capability{"KILL", "MKNOD"},
201+
allowed: nil,
202+
requiredDrop: nil,
203+
expectedPoints: 5600,
204+
},
205+
"allow": {
206+
defaultAdd: nil,
207+
allowed: []kapi.Capability{"KILL", "MKNOD"},
208+
requiredDrop: nil,
209+
expectedPoints: 5020,
210+
},
211+
"allow star": {
212+
defaultAdd: nil,
213+
allowed: []kapi.Capability{"*"},
214+
requiredDrop: nil,
215+
expectedPoints: 9000,
216+
},
217+
"allow all": {
218+
defaultAdd: nil,
219+
allowed: []kapi.Capability{"ALL"},
220+
requiredDrop: nil,
221+
expectedPoints: 9000,
222+
},
223+
"drop": {
224+
defaultAdd: nil,
225+
allowed: nil,
226+
requiredDrop: []kapi.Capability{"KILL", "MKNOD"},
227+
expectedPoints: 4900,
228+
},
229+
"drop all": {
230+
defaultAdd: nil,
231+
allowed: nil,
232+
requiredDrop: []kapi.Capability{"ALL"},
233+
expectedPoints: 2000,
234+
},
235+
"mixture": {
236+
defaultAdd: []kapi.Capability{"SETUID", "SETGID"},
237+
allowed: []kapi.Capability{"*"},
238+
requiredDrop: []kapi.Capability{"SYS_CHROOT"},
239+
expectedPoints: 9550,
240+
},
241+
}
242+
for k, v := range tests {
243+
scc := newSCC(v.defaultAdd, v.allowed, v.requiredDrop)
244+
actualPoints := capabilitiesPointValue(scc)
245+
if actualPoints != v.expectedPoints {
246+
t.Errorf("%s expected %d capability score but got %d", k, v.expectedPoints, actualPoints)
247+
}
248+
}
249+
}

0 commit comments

Comments
 (0)