sandbox: expose seccomp interface
All checks were successful
Test / Create distribution (push) Successful in 31s
Test / Sandbox (push) Successful in 1m59s
Test / Hakurei (push) Successful in 2m47s
Test / Sandbox (race detector) (push) Successful in 3m11s
Test / Planterette (push) Successful in 3m34s
Test / Hakurei (race detector) (push) Successful in 4m22s
Test / Flake checks (push) Successful in 1m8s
All checks were successful
Test / Create distribution (push) Successful in 31s
Test / Sandbox (push) Successful in 1m59s
Test / Hakurei (push) Successful in 2m47s
Test / Sandbox (race detector) (push) Successful in 3m11s
Test / Planterette (push) Successful in 3m34s
Test / Hakurei (race detector) (push) Successful in 4m22s
Test / Flake checks (push) Successful in 1m8s
There's no point in artificially limiting and abstracting away these options. The higher level hakurei package is responsible for providing a secure baseline and sane defaults. The sandbox package should present everything to the caller. Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
parent
a6887f7253
commit
31aef905fa
@ -178,7 +178,7 @@ func testProxyFinaliseStartWaitCloseString(t *testing.T, useSandbox bool) {
|
|||||||
t.Run("string", func(t *testing.T) {
|
t.Run("string", func(t *testing.T) {
|
||||||
wantSubstr := fmt.Sprintf("%s -test.run=TestHelperStub -- --args=3 --fd=4", os.Args[0])
|
wantSubstr := fmt.Sprintf("%s -test.run=TestHelperStub -- --args=3 --fd=4", os.Args[0])
|
||||||
if useSandbox {
|
if useSandbox {
|
||||||
wantSubstr = fmt.Sprintf(`argv: ["%s" "-test.run=TestHelperStub" "--" "--args=3" "--fd=4"], flags: 0x0, seccomp: 0x1, presets: 0xf`, os.Args[0])
|
wantSubstr = fmt.Sprintf(`argv: ["%s" "-test.run=TestHelperStub" "--" "--args=3" "--fd=4"], filter: true, rules: 0, flags: 0x1, presets: 0xf`, os.Args[0])
|
||||||
}
|
}
|
||||||
if got := p.String(); !strings.Contains(got, wantSubstr) {
|
if got := p.String(); !strings.Contains(got, wantSubstr) {
|
||||||
t.Errorf("String: %q, want %q",
|
t.Errorf("String: %q, want %q",
|
||||||
|
@ -67,6 +67,7 @@ func (p *Proxy) Start() error {
|
|||||||
p.final, true,
|
p.final, true,
|
||||||
argF, func(container *sandbox.Container) {
|
argF, func(container *sandbox.Container) {
|
||||||
container.SeccompFlags |= seccomp.AllowMultiarch
|
container.SeccompFlags |= seccomp.AllowMultiarch
|
||||||
|
container.SeccompPresets |= seccomp.PresetStrict
|
||||||
container.Hostname = "hakurei-dbus"
|
container.Hostname = "hakurei-dbus"
|
||||||
container.CommandContext = p.CommandContext
|
container.CommandContext = p.CommandContext
|
||||||
if p.output != nil {
|
if p.output != nil {
|
||||||
|
@ -14,6 +14,8 @@ type (
|
|||||||
SeccompFlags seccomp.ExportFlag `json:"seccomp_flags"`
|
SeccompFlags seccomp.ExportFlag `json:"seccomp_flags"`
|
||||||
// extra seccomp presets
|
// extra seccomp presets
|
||||||
SeccompPresets seccomp.FilterPreset `json:"seccomp_presets"`
|
SeccompPresets seccomp.FilterPreset `json:"seccomp_presets"`
|
||||||
|
// disable project-specific filter extensions
|
||||||
|
SeccompCompat bool `json:"seccomp_compat,omitempty"`
|
||||||
// allow ptrace and friends
|
// allow ptrace and friends
|
||||||
Devel bool `json:"devel,omitempty"`
|
Devel bool `json:"devel,omitempty"`
|
||||||
// allow userns creation in container
|
// allow userns creation in container
|
||||||
|
@ -30,6 +30,8 @@ func NewContainer(s *hst.ContainerConfig, os sys.State, uid, gid *int) (*sandbox
|
|||||||
Hostname: s.Hostname,
|
Hostname: s.Hostname,
|
||||||
SeccompFlags: s.SeccompFlags,
|
SeccompFlags: s.SeccompFlags,
|
||||||
SeccompPresets: s.SeccompPresets,
|
SeccompPresets: s.SeccompPresets,
|
||||||
|
RetainSession: s.Tty,
|
||||||
|
HostNet: s.Net,
|
||||||
}
|
}
|
||||||
|
|
||||||
{
|
{
|
||||||
@ -41,17 +43,17 @@ func NewContainer(s *hst.ContainerConfig, os sys.State, uid, gid *int) (*sandbox
|
|||||||
container.SeccompFlags |= seccomp.AllowMultiarch
|
container.SeccompFlags |= seccomp.AllowMultiarch
|
||||||
}
|
}
|
||||||
|
|
||||||
if s.Devel {
|
if !s.SeccompCompat {
|
||||||
container.Flags |= sandbox.FAllowDevel
|
container.SeccompPresets |= seccomp.PresetExt
|
||||||
}
|
}
|
||||||
if s.Userns {
|
if !s.Devel {
|
||||||
container.Flags |= sandbox.FAllowUserns
|
container.SeccompPresets |= seccomp.PresetDenyDevel
|
||||||
}
|
}
|
||||||
if s.Net {
|
if !s.Userns {
|
||||||
container.Flags |= sandbox.FAllowNet
|
container.SeccompPresets |= seccomp.PresetDenyNS
|
||||||
}
|
}
|
||||||
if s.Tty {
|
if !s.Tty {
|
||||||
container.Flags |= sandbox.FAllowTTY
|
container.SeccompPresets |= seccomp.PresetDenyTTY
|
||||||
}
|
}
|
||||||
|
|
||||||
if s.MapRealUID {
|
if s.MapRealUID {
|
||||||
|
@ -6,6 +6,7 @@ import (
|
|||||||
"git.gensokyo.uk/security/hakurei/hst"
|
"git.gensokyo.uk/security/hakurei/hst"
|
||||||
"git.gensokyo.uk/security/hakurei/internal/app"
|
"git.gensokyo.uk/security/hakurei/internal/app"
|
||||||
"git.gensokyo.uk/security/hakurei/sandbox"
|
"git.gensokyo.uk/security/hakurei/sandbox"
|
||||||
|
"git.gensokyo.uk/security/hakurei/sandbox/seccomp"
|
||||||
"git.gensokyo.uk/security/hakurei/system"
|
"git.gensokyo.uk/security/hakurei/system"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -94,12 +95,11 @@ var testCasesNixos = []sealTestCase{
|
|||||||
UpdatePerm("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", acl.Read, acl.Write).
|
UpdatePerm("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", acl.Read, acl.Write).
|
||||||
UpdatePerm("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", acl.Read, acl.Write),
|
UpdatePerm("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", acl.Read, acl.Write),
|
||||||
&sandbox.Params{
|
&sandbox.Params{
|
||||||
Uid: 1971,
|
Uid: 1971,
|
||||||
Gid: 100,
|
Gid: 100,
|
||||||
Flags: sandbox.FAllowNet | sandbox.FAllowUserns,
|
Dir: "/var/lib/persist/module/hakurei/0/1",
|
||||||
Dir: "/var/lib/persist/module/hakurei/0/1",
|
Path: "/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start",
|
||||||
Path: "/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start",
|
Args: []string{"/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start"},
|
||||||
Args: []string{"/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start"},
|
|
||||||
Env: []string{
|
Env: []string{
|
||||||
"DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1971/bus",
|
"DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1971/bus",
|
||||||
"DBUS_SYSTEM_BUS_ADDRESS=unix:path=/run/dbus/system_bus_socket",
|
"DBUS_SYSTEM_BUS_ADDRESS=unix:path=/run/dbus/system_bus_socket",
|
||||||
@ -142,6 +142,8 @@ var testCasesNixos = []sealTestCase{
|
|||||||
Bind("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", "/run/user/1971/bus", 0).
|
Bind("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", "/run/user/1971/bus", 0).
|
||||||
Bind("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", "/run/dbus/system_bus_socket", 0).
|
Bind("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", "/run/dbus/system_bus_socket", 0).
|
||||||
Tmpfs("/var/run/nscd", 8192, 0755),
|
Tmpfs("/var/run/nscd", 8192, 0755),
|
||||||
|
SeccompPresets: seccomp.PresetExt | seccomp.PresetDenyTTY | seccomp.PresetDenyDevel,
|
||||||
|
HostNet: true,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
@ -8,6 +8,7 @@ import (
|
|||||||
"git.gensokyo.uk/security/hakurei/hst"
|
"git.gensokyo.uk/security/hakurei/hst"
|
||||||
"git.gensokyo.uk/security/hakurei/internal/app"
|
"git.gensokyo.uk/security/hakurei/internal/app"
|
||||||
"git.gensokyo.uk/security/hakurei/sandbox"
|
"git.gensokyo.uk/security/hakurei/sandbox"
|
||||||
|
"git.gensokyo.uk/security/hakurei/sandbox/seccomp"
|
||||||
"git.gensokyo.uk/security/hakurei/system"
|
"git.gensokyo.uk/security/hakurei/system"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -28,10 +29,9 @@ var testCasesPd = []sealTestCase{
|
|||||||
Ensure("/tmp/hakurei.1971/tmpdir", 0700).UpdatePermType(system.User, "/tmp/hakurei.1971/tmpdir", acl.Execute).
|
Ensure("/tmp/hakurei.1971/tmpdir", 0700).UpdatePermType(system.User, "/tmp/hakurei.1971/tmpdir", acl.Execute).
|
||||||
Ensure("/tmp/hakurei.1971/tmpdir/0", 01700).UpdatePermType(system.User, "/tmp/hakurei.1971/tmpdir/0", acl.Read, acl.Write, acl.Execute),
|
Ensure("/tmp/hakurei.1971/tmpdir/0", 01700).UpdatePermType(system.User, "/tmp/hakurei.1971/tmpdir/0", acl.Read, acl.Write, acl.Execute),
|
||||||
&sandbox.Params{
|
&sandbox.Params{
|
||||||
Flags: sandbox.FAllowNet | sandbox.FAllowUserns | sandbox.FAllowTTY,
|
Dir: "/home/chronos",
|
||||||
Dir: "/home/chronos",
|
Path: "/run/current-system/sw/bin/zsh",
|
||||||
Path: "/run/current-system/sw/bin/zsh",
|
Args: []string{"/run/current-system/sw/bin/zsh"},
|
||||||
Args: []string{"/run/current-system/sw/bin/zsh"},
|
|
||||||
Env: []string{
|
Env: []string{
|
||||||
"HOME=/home/chronos",
|
"HOME=/home/chronos",
|
||||||
"SHELL=/run/current-system/sw/bin/zsh",
|
"SHELL=/run/current-system/sw/bin/zsh",
|
||||||
@ -68,6 +68,9 @@ var testCasesPd = []sealTestCase{
|
|||||||
Place("/etc/passwd", []byte("chronos:x:65534:65534:Hakurei:/home/chronos:/run/current-system/sw/bin/zsh\n")).
|
Place("/etc/passwd", []byte("chronos:x:65534:65534:Hakurei:/home/chronos:/run/current-system/sw/bin/zsh\n")).
|
||||||
Place("/etc/group", []byte("hakurei:x:65534:\n")).
|
Place("/etc/group", []byte("hakurei:x:65534:\n")).
|
||||||
Tmpfs("/var/run/nscd", 8192, 0755),
|
Tmpfs("/var/run/nscd", 8192, 0755),
|
||||||
|
SeccompPresets: seccomp.PresetExt | seccomp.PresetDenyDevel,
|
||||||
|
HostNet: true,
|
||||||
|
RetainSession: true,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -164,10 +167,9 @@ var testCasesPd = []sealTestCase{
|
|||||||
UpdatePerm("/tmp/hakurei.1971/ebf083d1b175911782d413369b64ce7c/bus", acl.Read, acl.Write).
|
UpdatePerm("/tmp/hakurei.1971/ebf083d1b175911782d413369b64ce7c/bus", acl.Read, acl.Write).
|
||||||
UpdatePerm("/tmp/hakurei.1971/ebf083d1b175911782d413369b64ce7c/system_bus_socket", acl.Read, acl.Write),
|
UpdatePerm("/tmp/hakurei.1971/ebf083d1b175911782d413369b64ce7c/system_bus_socket", acl.Read, acl.Write),
|
||||||
&sandbox.Params{
|
&sandbox.Params{
|
||||||
Flags: sandbox.FAllowNet | sandbox.FAllowUserns | sandbox.FAllowTTY,
|
Dir: "/home/chronos",
|
||||||
Dir: "/home/chronos",
|
Path: "/run/current-system/sw/bin/zsh",
|
||||||
Path: "/run/current-system/sw/bin/zsh",
|
Args: []string{"zsh", "-c", "exec chromium "},
|
||||||
Args: []string{"zsh", "-c", "exec chromium "},
|
|
||||||
Env: []string{
|
Env: []string{
|
||||||
"DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/65534/bus",
|
"DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/65534/bus",
|
||||||
"DBUS_SYSTEM_BUS_ADDRESS=unix:path=/run/dbus/system_bus_socket",
|
"DBUS_SYSTEM_BUS_ADDRESS=unix:path=/run/dbus/system_bus_socket",
|
||||||
@ -215,6 +217,9 @@ var testCasesPd = []sealTestCase{
|
|||||||
Bind("/tmp/hakurei.1971/ebf083d1b175911782d413369b64ce7c/bus", "/run/user/65534/bus", 0).
|
Bind("/tmp/hakurei.1971/ebf083d1b175911782d413369b64ce7c/bus", "/run/user/65534/bus", 0).
|
||||||
Bind("/tmp/hakurei.1971/ebf083d1b175911782d413369b64ce7c/system_bus_socket", "/run/dbus/system_bus_socket", 0).
|
Bind("/tmp/hakurei.1971/ebf083d1b175911782d413369b64ce7c/system_bus_socket", "/run/dbus/system_bus_socket", 0).
|
||||||
Tmpfs("/var/run/nscd", 8192, 0755),
|
Tmpfs("/var/run/nscd", 8192, 0755),
|
||||||
|
SeccompPresets: seccomp.PresetExt | seccomp.PresetDenyDevel,
|
||||||
|
HostNet: true,
|
||||||
|
RetainSession: true,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
@ -9,6 +9,7 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"git.gensokyo.uk/security/hakurei/sandbox"
|
"git.gensokyo.uk/security/hakurei/sandbox"
|
||||||
|
"git.gensokyo.uk/security/hakurei/sandbox/seccomp"
|
||||||
)
|
)
|
||||||
|
|
||||||
const lddTimeout = 2 * time.Second
|
const lddTimeout = 2 * time.Second
|
||||||
@ -29,6 +30,8 @@ func ExecFilter(ctx context.Context,
|
|||||||
container := sandbox.New(c, "ldd", p)
|
container := sandbox.New(c, "ldd", p)
|
||||||
container.CommandContext = commandContext
|
container.CommandContext = commandContext
|
||||||
container.Hostname = "hakurei-ldd"
|
container.Hostname = "hakurei-ldd"
|
||||||
|
container.SeccompFlags |= seccomp.AllowMultiarch
|
||||||
|
container.SeccompPresets |= seccomp.PresetStrict
|
||||||
stdout, stderr := new(bytes.Buffer), new(bytes.Buffer)
|
stdout, stderr := new(bytes.Buffer), new(bytes.Buffer)
|
||||||
container.Stdout = stdout
|
container.Stdout = stdout
|
||||||
container.Stderr = stderr
|
container.Stderr = stderr
|
||||||
|
@ -17,32 +17,6 @@ import (
|
|||||||
"git.gensokyo.uk/security/hakurei/sandbox/seccomp"
|
"git.gensokyo.uk/security/hakurei/sandbox/seccomp"
|
||||||
)
|
)
|
||||||
|
|
||||||
type HardeningFlags uintptr
|
|
||||||
|
|
||||||
const (
|
|
||||||
FSyscallCompat HardeningFlags = 1 << iota
|
|
||||||
FAllowDevel
|
|
||||||
FAllowUserns
|
|
||||||
FAllowTTY
|
|
||||||
FAllowNet
|
|
||||||
)
|
|
||||||
|
|
||||||
func (flags HardeningFlags) seccomp(presets seccomp.FilterPreset) seccomp.FilterPreset {
|
|
||||||
if flags&FSyscallCompat == 0 {
|
|
||||||
presets |= seccomp.PresetExt
|
|
||||||
}
|
|
||||||
if flags&FAllowDevel == 0 {
|
|
||||||
presets |= seccomp.PresetDenyDevel
|
|
||||||
}
|
|
||||||
if flags&FAllowUserns == 0 {
|
|
||||||
presets |= seccomp.PresetDenyNS
|
|
||||||
}
|
|
||||||
if flags&FAllowTTY == 0 {
|
|
||||||
presets |= seccomp.PresetDenyTTY
|
|
||||||
}
|
|
||||||
return presets
|
|
||||||
}
|
|
||||||
|
|
||||||
type (
|
type (
|
||||||
// Container represents a container environment being prepared or run.
|
// Container represents a container environment being prepared or run.
|
||||||
// None of [Container] methods are safe for concurrent use.
|
// None of [Container] methods are safe for concurrent use.
|
||||||
@ -94,17 +68,23 @@ type (
|
|||||||
Hostname string
|
Hostname string
|
||||||
// Sequential container setup ops.
|
// Sequential container setup ops.
|
||||||
*Ops
|
*Ops
|
||||||
|
// Seccomp system call filter rules.
|
||||||
|
SeccompRules []seccomp.NativeRule
|
||||||
// Extra seccomp flags.
|
// Extra seccomp flags.
|
||||||
SeccompFlags seccomp.ExportFlag
|
SeccompFlags seccomp.ExportFlag
|
||||||
// Extra seccomp presets.
|
// Seccomp presets. Has no effect unless SeccompRules is zero-length.
|
||||||
SeccompPresets seccomp.FilterPreset
|
SeccompPresets seccomp.FilterPreset
|
||||||
|
// Do not load seccomp program.
|
||||||
|
SeccompDisable bool
|
||||||
// Permission bits of newly created parent directories.
|
// Permission bits of newly created parent directories.
|
||||||
// The zero value is interpreted as 0755.
|
// The zero value is interpreted as 0755.
|
||||||
ParentPerm os.FileMode
|
ParentPerm os.FileMode
|
||||||
|
// Do not syscall.Setsid.
|
||||||
|
RetainSession bool
|
||||||
|
// Do not [syscall.CLONE_NEWNET].
|
||||||
|
HostNet bool
|
||||||
// Retain CAP_SYS_ADMIN.
|
// Retain CAP_SYS_ADMIN.
|
||||||
Privileged bool
|
Privileged bool
|
||||||
|
|
||||||
Flags HardeningFlags
|
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -120,7 +100,7 @@ func (p *Container) Start() error {
|
|||||||
p.cancel = cancel
|
p.cancel = cancel
|
||||||
|
|
||||||
var cloneFlags uintptr = CLONE_NEWIPC | CLONE_NEWUTS | CLONE_NEWCGROUP
|
var cloneFlags uintptr = CLONE_NEWIPC | CLONE_NEWUTS | CLONE_NEWCGROUP
|
||||||
if p.Flags&FAllowNet == 0 {
|
if !p.HostNet {
|
||||||
cloneFlags |= CLONE_NEWNET
|
cloneFlags |= CLONE_NEWNET
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -132,6 +112,10 @@ func (p *Container) Start() error {
|
|||||||
p.Gid = OverflowGid()
|
p.Gid = OverflowGid()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if !p.RetainSession {
|
||||||
|
p.SeccompPresets |= seccomp.PresetDenyTTY
|
||||||
|
}
|
||||||
|
|
||||||
if p.CommandContext != nil {
|
if p.CommandContext != nil {
|
||||||
p.cmd = p.CommandContext(ctx)
|
p.cmd = p.CommandContext(ctx)
|
||||||
} else {
|
} else {
|
||||||
@ -148,7 +132,7 @@ func (p *Container) Start() error {
|
|||||||
}
|
}
|
||||||
p.cmd.Dir = "/"
|
p.cmd.Dir = "/"
|
||||||
p.cmd.SysProcAttr = &SysProcAttr{
|
p.cmd.SysProcAttr = &SysProcAttr{
|
||||||
Setsid: p.Flags&FAllowTTY == 0,
|
Setsid: !p.RetainSession,
|
||||||
Pdeathsig: SIGKILL,
|
Pdeathsig: SIGKILL,
|
||||||
Cloneflags: cloneFlags | CLONE_NEWUSER | CLONE_NEWPID | CLONE_NEWNS,
|
Cloneflags: cloneFlags | CLONE_NEWUSER | CLONE_NEWPID | CLONE_NEWNS,
|
||||||
|
|
||||||
@ -211,6 +195,11 @@ func (p *Container) Serve() error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if p.SeccompRules == nil {
|
||||||
|
// do not transmit nil
|
||||||
|
p.SeccompRules = make([]seccomp.NativeRule, 0)
|
||||||
|
}
|
||||||
|
|
||||||
err := setup.Encode(
|
err := setup.Encode(
|
||||||
&initParams{
|
&initParams{
|
||||||
p.Params,
|
p.Params,
|
||||||
@ -229,8 +218,8 @@ func (p *Container) Serve() error {
|
|||||||
func (p *Container) Wait() error { defer p.cancel(); return p.cmd.Wait() }
|
func (p *Container) Wait() error { defer p.cancel(); return p.cmd.Wait() }
|
||||||
|
|
||||||
func (p *Container) String() string {
|
func (p *Container) String() string {
|
||||||
return fmt.Sprintf("argv: %q, flags: %#x, seccomp: %#x, presets: %#x",
|
return fmt.Sprintf("argv: %q, filter: %v, rules: %d, flags: %#x, presets: %#x",
|
||||||
p.Args, p.Flags, int(p.SeccompFlags), int(p.Flags.seccomp(p.SeccompPresets)))
|
p.Args, !p.SeccompDisable, len(p.SeccompRules), int(p.SeccompFlags), int(p.SeccompPresets))
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(ctx context.Context, name string, args ...string) *Container {
|
func New(ctx context.Context, name string, args ...string) *Container {
|
||||||
|
@ -36,22 +36,39 @@ func TestContainer(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
name string
|
name string
|
||||||
flags sandbox.HardeningFlags
|
filter bool
|
||||||
ops *sandbox.Ops
|
session bool
|
||||||
mnt []*vfs.MountInfoEntry
|
net bool
|
||||||
host string
|
ops *sandbox.Ops
|
||||||
|
mnt []*vfs.MountInfoEntry
|
||||||
|
host string
|
||||||
|
rules []seccomp.NativeRule
|
||||||
|
flags seccomp.ExportFlag
|
||||||
|
presets seccomp.FilterPreset
|
||||||
}{
|
}{
|
||||||
{"minimal", 0, new(sandbox.Ops), nil, "test-minimal"},
|
{"minimal", true, false, false,
|
||||||
{"allow", sandbox.FAllowUserns | sandbox.FAllowNet | sandbox.FAllowTTY,
|
new(sandbox.Ops), nil, "test-minimal",
|
||||||
new(sandbox.Ops), nil, "test-minimal"},
|
nil, 0, seccomp.PresetStrict},
|
||||||
{"tmpfs", 0,
|
{"allow", true, true, true,
|
||||||
|
new(sandbox.Ops), nil, "test-minimal",
|
||||||
|
nil, 0, seccomp.PresetExt | seccomp.PresetDenyDevel},
|
||||||
|
{"no filter", false, true, true,
|
||||||
|
new(sandbox.Ops), nil, "test-no-filter",
|
||||||
|
nil, 0, seccomp.PresetExt},
|
||||||
|
{"custom rules", true, true, true,
|
||||||
|
new(sandbox.Ops), nil, "test-no-filter",
|
||||||
|
[]seccomp.NativeRule{
|
||||||
|
{seccomp.ScmpSyscall(syscall.SYS_SETUID), seccomp.ScmpErrno(syscall.EPERM), nil},
|
||||||
|
}, 0, seccomp.PresetExt},
|
||||||
|
{"tmpfs", true, false, false,
|
||||||
new(sandbox.Ops).
|
new(sandbox.Ops).
|
||||||
Tmpfs(hst.Tmp, 0, 0755),
|
Tmpfs(hst.Tmp, 0, 0755),
|
||||||
[]*vfs.MountInfoEntry{
|
[]*vfs.MountInfoEntry{
|
||||||
e("/", hst.Tmp, "rw,nosuid,nodev,relatime", "tmpfs", "tmpfs", ignore),
|
e("/", hst.Tmp, "rw,nosuid,nodev,relatime", "tmpfs", "tmpfs", ignore),
|
||||||
}, "test-tmpfs"},
|
}, "test-tmpfs",
|
||||||
{"dev", sandbox.FAllowTTY, // go test output is not a tty
|
nil, 0, seccomp.PresetStrict},
|
||||||
|
{"dev", true, true /* go test output is not a tty */, false,
|
||||||
new(sandbox.Ops).
|
new(sandbox.Ops).
|
||||||
Dev("/dev").
|
Dev("/dev").
|
||||||
Mqueue("/dev/mqueue"),
|
Mqueue("/dev/mqueue"),
|
||||||
@ -65,7 +82,8 @@ func TestContainer(t *testing.T) {
|
|||||||
e("/tty", "/dev/tty", "rw,nosuid", "devtmpfs", "devtmpfs", ignore),
|
e("/tty", "/dev/tty", "rw,nosuid", "devtmpfs", "devtmpfs", ignore),
|
||||||
e("/", "/dev/pts", "rw,nosuid,noexec,relatime", "devpts", "devpts", "rw,mode=620,ptmxmode=666"),
|
e("/", "/dev/pts", "rw,nosuid,noexec,relatime", "devpts", "devpts", "rw,mode=620,ptmxmode=666"),
|
||||||
e("/", "/dev/mqueue", "rw,nosuid,nodev,noexec,relatime", "mqueue", "mqueue", "rw"),
|
e("/", "/dev/mqueue", "rw,nosuid,nodev,noexec,relatime", "mqueue", "mqueue", "rw"),
|
||||||
}, ""},
|
}, "",
|
||||||
|
nil, 0, seccomp.PresetStrict},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
@ -79,9 +97,14 @@ func TestContainer(t *testing.T) {
|
|||||||
container.Gid = 100
|
container.Gid = 100
|
||||||
container.Hostname = tc.host
|
container.Hostname = tc.host
|
||||||
container.CommandContext = commandContext
|
container.CommandContext = commandContext
|
||||||
container.Flags |= tc.flags
|
|
||||||
container.Stdout, container.Stderr = os.Stdout, os.Stderr
|
container.Stdout, container.Stderr = os.Stdout, os.Stderr
|
||||||
container.Ops = tc.ops
|
container.Ops = tc.ops
|
||||||
|
container.SeccompRules = tc.rules
|
||||||
|
container.SeccompFlags = tc.flags | seccomp.AllowMultiarch
|
||||||
|
container.SeccompPresets = tc.presets
|
||||||
|
container.SeccompDisable = !tc.filter
|
||||||
|
container.RetainSession = tc.session
|
||||||
|
container.HostNet = tc.net
|
||||||
if container.Args[5] == "" {
|
if container.Args[5] == "" {
|
||||||
if name, err := os.Hostname(); err != nil {
|
if name, err := os.Hostname(); err != nil {
|
||||||
t.Fatalf("cannot get hostname: %v", err)
|
t.Fatalf("cannot get hostname: %v", err)
|
||||||
@ -163,9 +186,12 @@ func e(root, target, vfsOptstr, fsType, source, fsOptstr string) *vfs.MountInfoE
|
|||||||
|
|
||||||
func TestContainerString(t *testing.T) {
|
func TestContainerString(t *testing.T) {
|
||||||
container := sandbox.New(t.Context(), "ldd", "/usr/bin/env")
|
container := sandbox.New(t.Context(), "ldd", "/usr/bin/env")
|
||||||
container.Flags |= sandbox.FAllowDevel
|
|
||||||
container.SeccompFlags |= seccomp.AllowMultiarch
|
container.SeccompFlags |= seccomp.AllowMultiarch
|
||||||
want := `argv: ["ldd" "/usr/bin/env"], flags: 0x2, seccomp: 0x1, presets: 0x7`
|
container.SeccompRules = seccomp.Preset(
|
||||||
|
seccomp.PresetExt|seccomp.PresetDenyNS|seccomp.PresetDenyTTY,
|
||||||
|
container.SeccompFlags)
|
||||||
|
container.SeccompPresets = seccomp.PresetStrict
|
||||||
|
want := `argv: ["ldd" "/usr/bin/env"], filter: true, rules: 65, flags: 0x1, presets: 0xf`
|
||||||
if got := container.String(); got != want {
|
if got := container.String(); got != want {
|
||||||
t.Errorf("String: %s, want %s", got, want)
|
t.Errorf("String: %s, want %s", got, want)
|
||||||
}
|
}
|
||||||
|
@ -229,8 +229,18 @@ func Init(prepare func(prefix string), setVerbose func(verbose bool)) {
|
|||||||
log.Fatalf("cannot capset: %v", err)
|
log.Fatalf("cannot capset: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := seccomp.Load(seccomp.Preset(params.Flags.seccomp(params.SeccompPresets), params.SeccompFlags), params.SeccompFlags); err != nil {
|
if !params.SeccompDisable {
|
||||||
log.Fatalf("cannot load syscall filter: %v", err)
|
rules := params.SeccompRules
|
||||||
|
if len(rules) == 0 { // non-empty rules slice always overrides presets
|
||||||
|
msg.Verbosef("resolving presets %#x", params.SeccompPresets)
|
||||||
|
rules = seccomp.Preset(params.SeccompPresets, params.SeccompFlags)
|
||||||
|
}
|
||||||
|
if err := seccomp.Load(rules, params.SeccompFlags); err != nil {
|
||||||
|
log.Fatalf("cannot load syscall filter: %v", err)
|
||||||
|
}
|
||||||
|
msg.Verbosef("%d filter rules loaded", len(rules))
|
||||||
|
} else {
|
||||||
|
msg.Verbose("syscall filter not configured")
|
||||||
}
|
}
|
||||||
|
|
||||||
extraFiles := make([]*os.File, params.Count)
|
extraFiles := make([]*os.File, params.Count)
|
||||||
|
@ -205,7 +205,7 @@ func (d MountDevOp) apply(params *Params) error {
|
|||||||
fmt.Sprintf("cannot mount devpts on %q:", devPtsPath))
|
fmt.Sprintf("cannot mount devpts on %q:", devPtsPath))
|
||||||
}
|
}
|
||||||
|
|
||||||
if params.Flags&FAllowTTY != 0 {
|
if params.RetainSession {
|
||||||
var buf [8]byte
|
var buf [8]byte
|
||||||
if _, _, errno := Syscall(SYS_IOCTL, 1, TIOCGWINSZ, uintptr(unsafe.Pointer(&buf[0]))); errno == 0 {
|
if _, _, errno := Syscall(SYS_IOCTL, 1, TIOCGWINSZ, uintptr(unsafe.Pointer(&buf[0]))); errno == 0 {
|
||||||
consolePath := toSysroot(path.Join(v, "console"))
|
consolePath := toSysroot(path.Join(v, "console"))
|
||||||
|
@ -171,11 +171,11 @@ type ScmpDatum uint64
|
|||||||
// Argument / Value comparison definition
|
// Argument / Value comparison definition
|
||||||
type ScmpArgCmp struct {
|
type ScmpArgCmp struct {
|
||||||
// argument number, starting at 0
|
// argument number, starting at 0
|
||||||
arg C.uint
|
Arg C.uint
|
||||||
// the comparison op, e.g. SCMP_CMP_*
|
// the comparison op, e.g. SCMP_CMP_*
|
||||||
op ScmpCompare
|
Op ScmpCompare
|
||||||
|
|
||||||
datum_a, datum_b ScmpDatum
|
DatumA, DatumB ScmpDatum
|
||||||
}
|
}
|
||||||
|
|
||||||
// only used for testing
|
// only used for testing
|
||||||
|
Loading…
x
Reference in New Issue
Block a user