container: optionally isolate host abstract UNIX domain sockets via landlock
Some checks failed
Test / Create distribution (pull_request) Failing after 32s
Test / Sandbox (pull_request) Failing after 51s
Test / Sandbox (race detector) (pull_request) Failing after 54s
Test / Hpkg (pull_request) Failing after 56s
Test / Hakurei (pull_request) Failing after 1m9s
Test / Hakurei (race detector) (push) Failing after 1m0s
Test / Hakurei (push) Failing after 1m11s
Test / Hakurei (race detector) (pull_request) Failing after 1m18s
Test / Flake checks (pull_request) Has been skipped
Test / Create distribution (push) Failing after 30s
Test / Sandbox (push) Failing after 49s
Test / Hpkg (push) Failing after 48s
Test / Sandbox (race detector) (push) Failing after 51s
Test / Flake checks (push) Has been skipped
Some checks failed
Test / Create distribution (pull_request) Failing after 32s
Test / Sandbox (pull_request) Failing after 51s
Test / Sandbox (race detector) (pull_request) Failing after 54s
Test / Hpkg (pull_request) Failing after 56s
Test / Hakurei (pull_request) Failing after 1m9s
Test / Hakurei (race detector) (push) Failing after 1m0s
Test / Hakurei (push) Failing after 1m11s
Test / Hakurei (race detector) (pull_request) Failing after 1m18s
Test / Flake checks (pull_request) Has been skipped
Test / Create distribution (push) Failing after 30s
Test / Sandbox (push) Failing after 49s
Test / Hpkg (push) Failing after 48s
Test / Sandbox (race detector) (push) Failing after 51s
Test / Flake checks (push) Has been skipped
This commit is contained in:
parent
2f1d42c8dd
commit
c9eeafbbf0
@ -28,6 +28,8 @@ type appInfo struct {
|
|||||||
// passed through to [hst.Config]
|
// passed through to [hst.Config]
|
||||||
Net bool `json:"net,omitempty"`
|
Net bool `json:"net,omitempty"`
|
||||||
// passed through to [hst.Config]
|
// passed through to [hst.Config]
|
||||||
|
ScopeAbstract bool `json:"scope_abstract,omitempty"`
|
||||||
|
// passed through to [hst.Config]
|
||||||
Device bool `json:"dev,omitempty"`
|
Device bool `json:"dev,omitempty"`
|
||||||
// passed through to [hst.Config]
|
// passed through to [hst.Config]
|
||||||
Tty bool `json:"tty,omitempty"`
|
Tty bool `json:"tty,omitempty"`
|
||||||
|
55
container/landlock/landlock.go
Normal file
55
container/landlock/landlock.go
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
package landlock
|
||||||
|
|
||||||
|
/*
|
||||||
|
#include <linux/landlock.h>
|
||||||
|
#include <sys/syscall.h>
|
||||||
|
*/
|
||||||
|
import "C"
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"syscall"
|
||||||
|
"unsafe"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
LANDLOCK_CREATE_RULESET_VERSION = C.LANDLOCK_CREATE_RULESET_VERSION
|
||||||
|
LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET = C.LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET
|
||||||
|
|
||||||
|
SYS_LANDLOCK_CREATE_RULESET = C.SYS_landlock_create_ruleset
|
||||||
|
SYS_LANDLOCK_RESTRICT_SELF = C.SYS_landlock_restrict_self
|
||||||
|
)
|
||||||
|
|
||||||
|
type LandlockRulesetAttr = C.struct_landlock_ruleset_attr
|
||||||
|
|
||||||
|
// ScopeAbstract calls landlock_restrict_self and must be called from a goroutine wired to an m
|
||||||
|
// with the process starting from the same goroutine.
|
||||||
|
func ScopeAbstract() error {
|
||||||
|
abi, _, err := syscall.Syscall(SYS_LANDLOCK_CREATE_RULESET, 0, 0, LANDLOCK_CREATE_RULESET_VERSION)
|
||||||
|
|
||||||
|
if err != 0 {
|
||||||
|
return fmt.Errorf("could not fetch landlock ABI: errno %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if abi < 6 {
|
||||||
|
return fmt.Errorf("landlock ABI must be >= 6, got %d", abi)
|
||||||
|
}
|
||||||
|
|
||||||
|
attrs := LandlockRulesetAttr{
|
||||||
|
scoped: LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET,
|
||||||
|
}
|
||||||
|
|
||||||
|
fd, _, err := syscall.Syscall(SYS_LANDLOCK_CREATE_RULESET, uintptr(unsafe.Pointer(&attrs)), unsafe.Sizeof(attrs), 0)
|
||||||
|
|
||||||
|
if err != 0 {
|
||||||
|
return fmt.Errorf("could not create landlock ruleset: errno %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
defer syscall.Close(int(fd))
|
||||||
|
|
||||||
|
r, _, err := syscall.Syscall(SYS_LANDLOCK_RESTRICT_SELF, fd, 0, 0)
|
||||||
|
if r != 0 {
|
||||||
|
return fmt.Errorf("could not restrict self via landlock: errno %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
@ -79,6 +79,8 @@ type (
|
|||||||
Userns bool `json:"userns,omitempty"`
|
Userns bool `json:"userns,omitempty"`
|
||||||
// share host net namespace
|
// share host net namespace
|
||||||
Net bool `json:"net,omitempty"`
|
Net bool `json:"net,omitempty"`
|
||||||
|
// disallow accessing abstract UNIX domain sockets created outside the container
|
||||||
|
ScopeAbstract bool `json:"scope_abstract,omitempty"`
|
||||||
// allow dangerous terminal I/O
|
// allow dangerous terminal I/O
|
||||||
Tty bool `json:"tty,omitempty"`
|
Tty bool `json:"tty,omitempty"`
|
||||||
// allow multiarch
|
// allow multiarch
|
||||||
|
@ -33,6 +33,7 @@ func newContainer(s *hst.ContainerConfig, os sys.State, prefix string, uid, gid
|
|||||||
SeccompPresets: s.SeccompPresets,
|
SeccompPresets: s.SeccompPresets,
|
||||||
RetainSession: s.Tty,
|
RetainSession: s.Tty,
|
||||||
HostNet: s.Net,
|
HostNet: s.Net,
|
||||||
|
ScopeAbstract: s.ScopeAbstract,
|
||||||
|
|
||||||
// the container is canceled when shim is requested to exit or receives an interrupt or termination signal;
|
// the container is canceled when shim is requested to exit or receives an interrupt or termination signal;
|
||||||
// this behaviour is implemented in the shim
|
// this behaviour is implemented in the shim
|
||||||
|
@ -137,6 +137,7 @@ in
|
|||||||
multiarch
|
multiarch
|
||||||
env
|
env
|
||||||
;
|
;
|
||||||
|
scope_abstract = app.scopeAbstract;
|
||||||
map_real_uid = app.mapRealUid;
|
map_real_uid = app.mapRealUid;
|
||||||
|
|
||||||
filesystem =
|
filesystem =
|
||||||
|
22
options.md
22
options.md
@ -572,6 +572,28 @@ boolean
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
*Example:*
|
||||||
|
` true `
|
||||||
|
|
||||||
|
|
||||||
|
## environment\.hakurei\.apps\.\<name>\.scopeAbstract
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Whether to restrict abstract UNIX domain socket access\.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
*Type:*
|
||||||
|
boolean
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
*Default:*
|
||||||
|
` true `
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
*Example:*
|
*Example:*
|
||||||
` true `
|
` true `
|
||||||
|
|
||||||
|
@ -182,6 +182,9 @@ in
|
|||||||
net = mkEnableOption "network access" // {
|
net = mkEnableOption "network access" // {
|
||||||
default = true;
|
default = true;
|
||||||
};
|
};
|
||||||
|
scopeAbstract = mkEnableOption "abstract unix domain socket access" // {
|
||||||
|
default = true;
|
||||||
|
};
|
||||||
|
|
||||||
nix = mkEnableOption "nix daemon access";
|
nix = mkEnableOption "nix daemon access";
|
||||||
mapRealUid = mkEnableOption "mapping to priv-user uid";
|
mapRealUid = mkEnableOption "mapping to priv-user uid";
|
||||||
|
@ -64,6 +64,10 @@ func (p *Proxy) Start() error {
|
|||||||
argF, func(z *container.Container) {
|
argF, func(z *container.Container) {
|
||||||
z.SeccompFlags |= seccomp.AllowMultiarch
|
z.SeccompFlags |= seccomp.AllowMultiarch
|
||||||
z.SeccompPresets |= seccomp.PresetStrict
|
z.SeccompPresets |= seccomp.PresetStrict
|
||||||
|
|
||||||
|
// xdg-dbus-proxy requires host abstract UNIX domain socket access
|
||||||
|
z.ScopeAbstract = false
|
||||||
|
|
||||||
z.Hostname = "hakurei-dbus"
|
z.Hostname = "hakurei-dbus"
|
||||||
if p.output != nil {
|
if p.output != nil {
|
||||||
z.Stdout, z.Stderr = p.output, p.output
|
z.Stdout, z.Stderr = p.output, p.output
|
||||||
|
@ -243,7 +243,7 @@ in
|
|||||||
seccomp = true;
|
seccomp = true;
|
||||||
|
|
||||||
try_socket = "/tmp/.X11-unix/X0";
|
try_socket = "/tmp/.X11-unix/X0";
|
||||||
socket_abstract = true;
|
socket_abstract = false;
|
||||||
socket_pathname = true;
|
socket_pathname = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -269,7 +269,7 @@ in
|
|||||||
seccomp = true;
|
seccomp = true;
|
||||||
|
|
||||||
try_socket = "/tmp/.X11-unix/X0";
|
try_socket = "/tmp/.X11-unix/X0";
|
||||||
socket_abstract = true;
|
socket_abstract = false;
|
||||||
socket_pathname = false;
|
socket_pathname = false;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -264,7 +264,7 @@ in
|
|||||||
seccomp = true;
|
seccomp = true;
|
||||||
|
|
||||||
try_socket = "/tmp/.X11-unix/X0";
|
try_socket = "/tmp/.X11-unix/X0";
|
||||||
socket_abstract = true;
|
socket_abstract = false;
|
||||||
socket_pathname = false;
|
socket_pathname = false;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -262,7 +262,7 @@ in
|
|||||||
seccomp = true;
|
seccomp = true;
|
||||||
|
|
||||||
try_socket = "/tmp/.X11-unix/X0";
|
try_socket = "/tmp/.X11-unix/X0";
|
||||||
socket_abstract = true;
|
socket_abstract = false;
|
||||||
socket_pathname = false;
|
socket_pathname = false;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -275,7 +275,7 @@ in
|
|||||||
seccomp = true;
|
seccomp = true;
|
||||||
|
|
||||||
try_socket = "/tmp/.X11-unix/X0";
|
try_socket = "/tmp/.X11-unix/X0";
|
||||||
socket_abstract = true;
|
socket_abstract = false;
|
||||||
socket_pathname = true;
|
socket_pathname = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user