@@ -13,6 +13,8 @@ import (
13
13
api "k8s.io/kubernetes/pkg/apis/core"
14
14
"k8s.io/kubernetes/pkg/apis/extensions"
15
15
"k8s.io/kubernetes/pkg/security/podsecuritypolicy/sysctl"
16
+ "k8s.io/kubernetes/pkg/securitycontext"
17
+ "k8s.io/kubernetes/pkg/util/maps"
16
18
17
19
securityapi "github.com/openshift/origin/pkg/security/apis/security"
18
20
)
@@ -103,49 +105,33 @@ func NewSimpleProvider(scc *securityapi.SecurityContextConstraints) (SecurityCon
103
105
// Create a PodSecurityContext based on the given constraints. If a setting is already set
104
106
// on the PodSecurityContext it will not be changed. Validate should be used after the context
105
107
// is created to ensure it complies with the required restrictions.
106
- //
107
- // NOTE: this method works on a copy of the PodSecurityContext. It is up to the caller to
108
- // apply the PSC if validation passes.
109
108
func (s * simpleProvider ) CreatePodSecurityContext (pod * api.Pod ) (* api.PodSecurityContext , map [string ]string , error ) {
110
- var sc * api.PodSecurityContext = nil
111
- if pod .Spec .SecurityContext != nil {
112
- // work with a copy
113
- copy := * pod .Spec .SecurityContext
114
- sc = & copy
115
- } else {
116
- sc = & api.PodSecurityContext {}
117
- }
118
-
119
- var annotationsCopy map [string ]string = nil
120
- if pod .Annotations != nil {
121
- annotationsCopy = make (map [string ]string , len (pod .Annotations ))
122
- for k , v := range pod .Annotations {
123
- annotationsCopy [k ] = v
124
- }
125
- }
109
+ sc := securitycontext .NewPodSecurityContextMutator (pod .Spec .SecurityContext )
110
+
111
+ annotationsCopy := maps .CopySS (pod .Annotations )
126
112
127
- if sc .SupplementalGroups == nil {
113
+ if sc .SupplementalGroups () == nil {
128
114
supGroups , err := s .supplementalGroupStrategy .Generate (pod )
129
115
if err != nil {
130
116
return nil , nil , err
131
117
}
132
- sc .SupplementalGroups = supGroups
118
+ sc .SetSupplementalGroups ( supGroups )
133
119
}
134
120
135
- if sc .FSGroup == nil {
121
+ if sc .FSGroup () == nil {
136
122
fsGroup , err := s .fsGroupStrategy .GenerateSingle (pod )
137
123
if err != nil {
138
124
return nil , nil , err
139
125
}
140
- sc .FSGroup = fsGroup
126
+ sc .SetFSGroup ( fsGroup )
141
127
}
142
128
143
- if sc .SELinuxOptions == nil {
129
+ if sc .SELinuxOptions () == nil {
144
130
seLinux , err := s .seLinuxStrategy .Generate (pod , nil )
145
131
if err != nil {
146
132
return nil , nil , err
147
133
}
148
- sc .SELinuxOptions = seLinux
134
+ sc .SetSELinuxOptions ( seLinux )
149
135
}
150
136
151
137
// we only generate a seccomp annotation for the entire pod. Validation
@@ -166,93 +152,83 @@ func (s *simpleProvider) CreatePodSecurityContext(pod *api.Pod) (*api.PodSecurit
166
152
}
167
153
}
168
154
169
- return sc , annotationsCopy , nil
155
+ return sc . PodSecurityContext () , annotationsCopy , nil
170
156
}
171
157
172
158
// Create a SecurityContext based on the given constraints. If a setting is already set on the
173
159
// container's security context then it will not be changed. Validation should be used after
174
160
// the context is created to ensure it complies with the required restrictions.
175
- //
176
- // NOTE: this method works on a copy of the SC of the container. It is up to the caller to apply
177
- // the SC if validation passes.
178
161
func (s * simpleProvider ) CreateContainerSecurityContext (pod * api.Pod , container * api.Container ) (* api.SecurityContext , error ) {
179
- var sc * api.SecurityContext = nil
180
- if container .SecurityContext != nil {
181
- // work with a copy of the original
182
- copy := * container .SecurityContext
183
- sc = & copy
184
- } else {
185
- sc = & api.SecurityContext {}
186
- }
187
- if sc .RunAsUser == nil {
162
+ sc := securitycontext .NewEffectiveContainerSecurityContextMutator (
163
+ securitycontext .NewPodSecurityContextAccessor (pod .Spec .SecurityContext ),
164
+ securitycontext .NewContainerSecurityContextMutator (container .SecurityContext ),
165
+ )
166
+ if sc .RunAsUser () == nil {
188
167
uid , err := s .runAsUserStrategy .Generate (pod , container )
189
168
if err != nil {
190
169
return nil , err
191
170
}
192
- sc .RunAsUser = uid
171
+ sc .SetRunAsUser ( uid )
193
172
}
194
173
195
- if sc .SELinuxOptions == nil {
174
+ if sc .SELinuxOptions () == nil {
196
175
seLinux , err := s .seLinuxStrategy .Generate (pod , container )
197
176
if err != nil {
198
177
return nil , err
199
178
}
200
- sc .SELinuxOptions = seLinux
179
+ sc .SetSELinuxOptions ( seLinux )
201
180
}
202
181
203
182
// if we're using the non-root strategy set the marker that this container should not be
204
183
// run as root which will signal to the kubelet to do a final check either on the runAsUser
205
184
// or, if runAsUser is not set, the image
206
- if sc .RunAsNonRoot == nil && sc .RunAsUser == nil && s .scc .RunAsUser .Type == securityapi .RunAsUserStrategyMustRunAsNonRoot {
185
+ if sc .RunAsNonRoot () == nil && sc .RunAsUser () == nil && s .scc .RunAsUser .Type == securityapi .RunAsUserStrategyMustRunAsNonRoot {
207
186
nonRoot := true
208
- sc .RunAsNonRoot = & nonRoot
187
+ sc .SetRunAsNonRoot ( & nonRoot )
209
188
}
210
189
211
190
caps , err := s .capabilitiesStrategy .Generate (pod , container )
212
191
if err != nil {
213
192
return nil , err
214
193
}
215
- sc .Capabilities = caps
194
+ sc .SetCapabilities ( caps )
216
195
217
196
// if the SCC requires a read only root filesystem and the container has not made a specific
218
197
// request then default ReadOnlyRootFilesystem to true.
219
- if s .scc .ReadOnlyRootFilesystem && sc .ReadOnlyRootFilesystem == nil {
198
+ if s .scc .ReadOnlyRootFilesystem && sc .ReadOnlyRootFilesystem () == nil {
220
199
readOnlyRootFS := true
221
- sc .ReadOnlyRootFilesystem = & readOnlyRootFS
200
+ sc .SetReadOnlyRootFilesystem ( & readOnlyRootFS )
222
201
}
223
202
224
- return sc , nil
203
+ return sc . ContainerSecurityContext () , nil
225
204
}
226
205
227
206
// Ensure a pod's SecurityContext is in compliance with the given constraints.
228
207
func (s * simpleProvider ) ValidatePodSecurityContext (pod * api.Pod , fldPath * field.Path ) field.ErrorList {
229
208
allErrs := field.ErrorList {}
230
209
231
- if pod .Spec .SecurityContext == nil {
232
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("securityContext" ), pod .Spec .SecurityContext , "No security context is set" ))
233
- return allErrs
234
- }
210
+ sc := securitycontext .NewPodSecurityContextAccessor (pod .Spec .SecurityContext )
235
211
236
212
fsGroups := []int64 {}
237
- if pod . Spec . SecurityContext . FSGroup != nil {
238
- fsGroups = append (fsGroups , * pod . Spec . SecurityContext . FSGroup )
213
+ if fsGroup := sc . FSGroup (); fsGroup != nil {
214
+ fsGroups = append (fsGroups , * fsGroup )
239
215
}
240
216
allErrs = append (allErrs , s .fsGroupStrategy .Validate (pod , fsGroups )... )
241
- allErrs = append (allErrs , s .supplementalGroupStrategy .Validate (pod , pod . Spec . SecurityContext . SupplementalGroups )... )
217
+ allErrs = append (allErrs , s .supplementalGroupStrategy .Validate (pod , sc . SupplementalGroups () )... )
242
218
allErrs = append (allErrs , s .seccompStrategy .ValidatePod (pod )... )
243
219
244
- allErrs = append (allErrs , s .seLinuxStrategy .Validate (fldPath .Child ("seLinuxOptions" ), pod , nil , pod . Spec . SecurityContext . SELinuxOptions )... )
220
+ allErrs = append (allErrs , s .seLinuxStrategy .Validate (fldPath .Child ("seLinuxOptions" ), pod , nil , sc . SELinuxOptions () )... )
245
221
246
- if ! s .scc .AllowHostNetwork && pod . Spec . SecurityContext . HostNetwork {
247
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostNetwork" ), pod . Spec . SecurityContext . HostNetwork , "Host network is not allowed to be used" ))
222
+ if ! s .scc .AllowHostNetwork && sc . HostNetwork () {
223
+ allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostNetwork" ), sc . HostNetwork () , "Host network is not allowed to be used" ))
248
224
}
249
225
250
- if ! s .scc .AllowHostPID && pod . Spec . SecurityContext . HostPID {
251
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostPID" ), pod . Spec . SecurityContext . HostPID , "Host PID is not allowed to be used" ))
226
+ if ! s .scc .AllowHostPID && sc . HostPID () {
227
+ allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostPID" ), sc . HostPID () , "Host PID is not allowed to be used" ))
252
228
}
253
229
254
- if ! s .scc .AllowHostIPC && pod . Spec . SecurityContext . HostIPC {
255
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostIPC" ), pod . Spec . SecurityContext . HostIPC , "Host IPC is not allowed to be used" ))
230
+ if ! s .scc .AllowHostIPC && sc . HostIPC () {
231
+ allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostIPC" ), sc . HostIPC () , "Host IPC is not allowed to be used" ))
256
232
}
257
233
258
234
allErrs = append (allErrs , s .sysctlsStrategy .Validate (pod )... )
@@ -303,24 +279,22 @@ func (s *simpleProvider) ValidatePodSecurityContext(pod *api.Pod, fldPath *field
303
279
func (s * simpleProvider ) ValidateContainerSecurityContext (pod * api.Pod , container * api.Container , fldPath * field.Path ) field.ErrorList {
304
280
allErrs := field.ErrorList {}
305
281
306
- if container .SecurityContext == nil {
307
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("securityContext" ), container .SecurityContext , "No security context is set" ))
308
- return allErrs
309
- }
282
+ podSC := securitycontext .NewPodSecurityContextAccessor (pod .Spec .SecurityContext )
283
+ sc := securitycontext .NewEffectiveContainerSecurityContextAccessor (podSC , securitycontext .NewContainerSecurityContextMutator (container .SecurityContext ))
310
284
311
- sc := container .SecurityContext
312
- allErrs = append (allErrs , s .runAsUserStrategy .Validate (fldPath .Child ("securityContext" ), pod , container , sc .RunAsNonRoot , sc .RunAsUser )... )
313
- allErrs = append (allErrs , s .seLinuxStrategy .Validate (fldPath .Child ("seLinuxOptions" ), pod , container , sc .SELinuxOptions )... )
285
+ allErrs = append (allErrs , s .runAsUserStrategy .Validate (fldPath .Child ("securityContext" ), pod , container , sc .RunAsNonRoot (), sc .RunAsUser ())... )
286
+ allErrs = append (allErrs , s .seLinuxStrategy .Validate (fldPath .Child ("seLinuxOptions" ), pod , container , sc .SELinuxOptions ())... )
314
287
allErrs = append (allErrs , s .seccompStrategy .ValidateContainer (pod , container )... )
315
288
316
- if ! s .scc .AllowPrivilegedContainer && sc .Privileged != nil && * sc .Privileged {
317
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("privileged" ), * sc .Privileged , "Privileged containers are not allowed" ))
289
+ privileged := sc .Privileged ()
290
+ if ! s .scc .AllowPrivilegedContainer && privileged != nil && * privileged {
291
+ allErrs = append (allErrs , field .Invalid (fldPath .Child ("privileged" ), * privileged , "Privileged containers are not allowed" ))
318
292
}
319
293
320
- allErrs = append (allErrs , s .capabilitiesStrategy .Validate (pod , container , sc .Capabilities )... )
294
+ allErrs = append (allErrs , s .capabilitiesStrategy .Validate (pod , container , sc .Capabilities () )... )
321
295
322
- if ! s .scc .AllowHostNetwork && pod . Spec . SecurityContext . HostNetwork {
323
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostNetwork" ), pod . Spec . SecurityContext . HostNetwork , "Host network is not allowed to be used" ))
296
+ if ! s .scc .AllowHostNetwork && podSC . HostNetwork () {
297
+ allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostNetwork" ), podSC . HostNetwork () , "Host network is not allowed to be used" ))
324
298
}
325
299
326
300
if ! s .scc .AllowHostPorts {
@@ -337,19 +311,20 @@ func (s *simpleProvider) ValidateContainerSecurityContext(pod *api.Pod, containe
337
311
}
338
312
}
339
313
340
- if ! s .scc .AllowHostPID && pod . Spec . SecurityContext . HostPID {
341
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostPID" ), pod . Spec . SecurityContext . HostPID , "Host PID is not allowed to be used" ))
314
+ if ! s .scc .AllowHostPID && podSC . HostPID () {
315
+ allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostPID" ), podSC . HostPID () , "Host PID is not allowed to be used" ))
342
316
}
343
317
344
- if ! s .scc .AllowHostIPC && pod . Spec . SecurityContext . HostIPC {
345
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostIPC" ), pod . Spec . SecurityContext . HostIPC , "Host IPC is not allowed to be used" ))
318
+ if ! s .scc .AllowHostIPC && podSC . HostIPC () {
319
+ allErrs = append (allErrs , field .Invalid (fldPath .Child ("hostIPC" ), podSC . HostIPC () , "Host IPC is not allowed to be used" ))
346
320
}
347
321
348
322
if s .scc .ReadOnlyRootFilesystem {
349
- if sc .ReadOnlyRootFilesystem == nil {
350
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("readOnlyRootFilesystem" ), sc .ReadOnlyRootFilesystem , "ReadOnlyRootFilesystem may not be nil and must be set to true" ))
351
- } else if ! * sc .ReadOnlyRootFilesystem {
352
- allErrs = append (allErrs , field .Invalid (fldPath .Child ("readOnlyRootFilesystem" ), * sc .ReadOnlyRootFilesystem , "ReadOnlyRootFilesystem must be set to true" ))
323
+ readOnly := sc .ReadOnlyRootFilesystem ()
324
+ if readOnly == nil {
325
+ allErrs = append (allErrs , field .Invalid (fldPath .Child ("readOnlyRootFilesystem" ), readOnly , "ReadOnlyRootFilesystem may not be nil and must be set to true" ))
326
+ } else if ! * readOnly {
327
+ allErrs = append (allErrs , field .Invalid (fldPath .Child ("readOnlyRootFilesystem" ), * readOnly , "ReadOnlyRootFilesystem must be set to true" ))
353
328
}
354
329
}
355
330
0 commit comments