Skip to content

Commit d36ab40

Browse files
committed
Make SCC with less capabilities more restrictive.
1 parent 92b409f commit d36ab40

File tree

2 files changed

+150
-6
lines changed

2 files changed

+150
-6
lines changed

pkg/security/securitycontextconstraints/byrestrictions.go

+51
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,12 @@
11
package securitycontextconstraints
22

33
import (
4+
"strings"
5+
46
"github.com/golang/glog"
57

68
securityapi "github.com/openshift/origin/pkg/security/apis/security"
9+
kapi "k8s.io/kubernetes/pkg/api"
710
)
811

912
// ByRestrictions is a helper to sort SCCs in order of most restrictive to least restrictive.
@@ -35,6 +38,15 @@ const (
3538
runAsRangePoints points = 20000
3639
runAsUserPoints points = 10000
3740

41+
capDefaultPoints points = 5000
42+
capAddOnePoints points = 300
43+
capAllowAllPoints points = 4000
44+
capAllowOnePoints points = 10
45+
capDropAllPoints points = -3000
46+
capDropOnePoints points = -50
47+
capMaxPoints points = 9999
48+
capMinPoints points = 0
49+
3850
noPoints points = 0
3951
)
4052

@@ -50,6 +62,9 @@ func pointValue(constraint *securityapi.SecurityContextConstraints) points {
5062
// add points based on volume requests
5163
totalPoints += volumePointValue(constraint)
5264

65+
// add points based on capabilities
66+
totalPoints += capabilitiesPointValue(constraint)
67+
5368
// the map contains points for both RunAsUser and SELinuxContext
5469
// strategies by taking advantage that they have identical strategy names
5570
strategiesPoints := map[string]points{
@@ -111,3 +126,39 @@ func volumePointValue(scc *securityapi.SecurityContextConstraints) points {
111126
}
112127
return noPoints
113128
}
129+
130+
// hasCap checks for needle in haystack.
131+
func hasCap(needle string, haystack []kapi.Capability) bool {
132+
for _, c := range haystack {
133+
if needle == strings.ToUpper(string(c)) {
134+
return true
135+
}
136+
}
137+
return false
138+
}
139+
140+
// capabilitiesPointValue returns a score based on the capabilities allowed,
141+
// added, or removed by the SCC. This allow us to prefer the more restrictive
142+
// SCC.
143+
func capabilitiesPointValue(scc *securityapi.SecurityContextConstraints) points {
144+
capsPoints := capDefaultPoints
145+
capsPoints += capAddOnePoints * points(len(scc.DefaultAddCapabilities))
146+
if hasCap(string(securityapi.AllowAllCapabilities), scc.AllowedCapabilities) {
147+
capsPoints += capAllowAllPoints
148+
} else if hasCap("ALL", scc.AllowedCapabilities) {
149+
capsPoints += capAllowAllPoints
150+
} else {
151+
capsPoints += capAllowOnePoints * points(len(scc.AllowedCapabilities))
152+
}
153+
if hasCap("ALL", scc.RequiredDropCapabilities) {
154+
capsPoints += capDropAllPoints
155+
} else {
156+
capsPoints += capDropOnePoints * points(len(scc.RequiredDropCapabilities))
157+
}
158+
if capsPoints > capMaxPoints {
159+
return capMaxPoints
160+
} else if capsPoints < capMinPoints {
161+
return capMinPoints
162+
}
163+
return capsPoints
164+
}

pkg/security/securitycontextconstraints/byrestrictions_test.go

+99-6
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ import (
44
"testing"
55

66
securityapi "github.com/openshift/origin/pkg/security/apis/security"
7+
kapi "k8s.io/kubernetes/pkg/api"
78
)
89

910
func TestPointValue(t *testing.T) {
@@ -33,15 +34,15 @@ func TestPointValue(t *testing.T) {
3334
// run through all combos of user strategy + seLinux strategy + priv
3435
for userStrategy, userStrategyPoints := range userStrategies {
3536
for seLinuxStrategy, seLinuxStrategyPoints := range seLinuxStrategies {
36-
expectedPoints := privilegedPoints + userStrategyPoints + seLinuxStrategyPoints
37+
expectedPoints := privilegedPoints + userStrategyPoints + seLinuxStrategyPoints + capDefaultPoints
3738
scc := newSCC(true, seLinuxStrategy, userStrategy)
3839
actualPoints := pointValue(scc)
3940

4041
if actualPoints != expectedPoints {
4142
t.Errorf("privileged, user: %v, seLinux %v expected %d score but got %d", userStrategy, seLinuxStrategy, expectedPoints, actualPoints)
4243
}
4344

44-
expectedPoints = userStrategyPoints + seLinuxStrategyPoints
45+
expectedPoints = userStrategyPoints + seLinuxStrategyPoints + capDefaultPoints
4546
scc = newSCC(false, seLinuxStrategy, userStrategy)
4647
actualPoints = pointValue(scc)
4748

@@ -51,14 +52,15 @@ func TestPointValue(t *testing.T) {
5152
}
5253
}
5354

54-
// sanity check to ensure volume score is added (specific volumes scores are tested below
55+
// sanity check to ensure volume and capabilities scores are added (specific volumes
56+
// and capabilities scores are tested below)
5557
scc := newSCC(false, securityapi.SELinuxStrategyMustRunAs, securityapi.RunAsUserStrategyMustRunAs)
5658
scc.Volumes = []securityapi.FSType{securityapi.FSTypeHostPath}
5759
actualPoints := pointValue(scc)
58-
// SELinux + User + host path volume
59-
expectedPoints := runAsUserPoints + runAsUserPoints + hostVolumePoints
60+
// SELinux + User + host path volume + default capabilities
61+
expectedPoints := runAsUserPoints + runAsUserPoints + hostVolumePoints + capDefaultPoints
6062
if actualPoints != expectedPoints {
61-
t.Errorf("volume score was not added to the scc point value correctly!")
63+
t.Errorf("volume score was not added to the scc point value correctly, got %d!", actualPoints)
6264
}
6365
}
6466

@@ -168,3 +170,94 @@ func TestVolumePointValue(t *testing.T) {
168170
}
169171
}
170172
}
173+
174+
func TestCapabilitiesPointValue(t *testing.T) {
175+
newSCC := func(def []kapi.Capability, allow []kapi.Capability, drop []kapi.Capability) *securityapi.SecurityContextConstraints {
176+
return &securityapi.SecurityContextConstraints{
177+
DefaultAddCapabilities: def,
178+
AllowedCapabilities: allow,
179+
RequiredDropCapabilities: drop,
180+
}
181+
}
182+
183+
tests := map[string]struct {
184+
defaultAdd []kapi.Capability
185+
allowed []kapi.Capability
186+
requiredDrop []kapi.Capability
187+
expectedPoints points
188+
}{
189+
"nothing specified": {
190+
defaultAdd: nil,
191+
allowed: nil,
192+
requiredDrop: nil,
193+
expectedPoints: capDefaultPoints,
194+
},
195+
"default": {
196+
defaultAdd: []kapi.Capability{"KILL", "MKNOD"},
197+
allowed: nil,
198+
requiredDrop: nil,
199+
expectedPoints: capDefaultPoints + 2*capAddOnePoints,
200+
},
201+
"allow": {
202+
defaultAdd: nil,
203+
allowed: []kapi.Capability{"KILL", "MKNOD"},
204+
requiredDrop: nil,
205+
expectedPoints: capDefaultPoints + 2*capAllowOnePoints,
206+
},
207+
"allow star": {
208+
defaultAdd: nil,
209+
allowed: []kapi.Capability{"*"},
210+
requiredDrop: nil,
211+
expectedPoints: capDefaultPoints + capAllowAllPoints,
212+
},
213+
"allow all": {
214+
defaultAdd: nil,
215+
allowed: []kapi.Capability{"ALL"},
216+
requiredDrop: nil,
217+
expectedPoints: capDefaultPoints + capAllowAllPoints,
218+
},
219+
"allow all case": {
220+
defaultAdd: nil,
221+
allowed: []kapi.Capability{"All"},
222+
requiredDrop: nil,
223+
expectedPoints: capDefaultPoints + capAllowAllPoints,
224+
},
225+
"drop": {
226+
defaultAdd: nil,
227+
allowed: nil,
228+
requiredDrop: []kapi.Capability{"KILL", "MKNOD"},
229+
expectedPoints: capDefaultPoints + 2*capDropOnePoints,
230+
},
231+
"drop all": {
232+
defaultAdd: nil,
233+
allowed: nil,
234+
requiredDrop: []kapi.Capability{"ALL"},
235+
expectedPoints: capDefaultPoints + capDropAllPoints,
236+
},
237+
"drop all case": {
238+
defaultAdd: nil,
239+
allowed: nil,
240+
requiredDrop: []kapi.Capability{"all"},
241+
expectedPoints: capDefaultPoints + capDropAllPoints,
242+
},
243+
"drop star": {
244+
defaultAdd: nil,
245+
allowed: nil,
246+
requiredDrop: []kapi.Capability{"*"},
247+
expectedPoints: capDefaultPoints + capDropOnePoints,
248+
},
249+
"mixture": {
250+
defaultAdd: []kapi.Capability{"SETUID", "SETGID"},
251+
allowed: []kapi.Capability{"*"},
252+
requiredDrop: []kapi.Capability{"SYS_CHROOT"},
253+
expectedPoints: capDefaultPoints + 2*capAddOnePoints + capAllowAllPoints + capDropOnePoints,
254+
},
255+
}
256+
for k, v := range tests {
257+
scc := newSCC(v.defaultAdd, v.allowed, v.requiredDrop)
258+
actualPoints := capabilitiesPointValue(scc)
259+
if actualPoints != v.expectedPoints {
260+
t.Errorf("%s expected %d capability score but got %d", k, v.expectedPoints, actualPoints)
261+
}
262+
}
263+
}

0 commit comments

Comments
 (0)