mirror of
https://git.mirrors.martin98.com/https://github.com/ceph/ceph-csi.git
synced 2025-08-17 17:35:54 +08:00

Several packages are only used while running the e2e suite. These packages are less important to update, as the they can not influence the final executable that is part of the Ceph-CSI container-image. By moving these dependencies out of the main Ceph-CSI go.mod, it is easier to identify if a reported CVE affects Ceph-CSI, or only the testing (like most of the Kubernetes CVEs). Signed-off-by: Niels de Vos <ndevos@ibm.com>
172 lines
5.1 KiB
Go
172 lines
5.1 KiB
Go
/*
|
|
Copyright 2021 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package policy
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
"k8s.io/pod-security-admission/api"
|
|
)
|
|
|
|
/*
|
|
If seccomp profiles are specified, only runtime default and localhost profiles are allowed.
|
|
|
|
v1.0 - v1.18:
|
|
**Restricted Fields:**
|
|
metadata.annotations['seccomp.security.alpha.kubernetes.io/pod']
|
|
metadata.annotations['container.seccomp.security.alpha.kubernetes.io/*']
|
|
|
|
**Allowed Values:** 'runtime/default', 'docker/default', 'localhost/*', undefined
|
|
|
|
v1.19+:
|
|
**Restricted Fields:**
|
|
spec.securityContext.seccompProfile.type
|
|
spec.containers[*].securityContext.seccompProfile.type
|
|
spec.initContainers[*].securityContext.seccompProfile.type
|
|
|
|
**Allowed Values:** 'RuntimeDefault', 'Localhost', undefined
|
|
*/
|
|
const (
|
|
annotationKeyPod = "seccomp.security.alpha.kubernetes.io/pod"
|
|
annotationKeyContainerPrefix = "container.seccomp.security.alpha.kubernetes.io/"
|
|
|
|
checkSeccompBaselineID CheckID = "seccompProfile_baseline"
|
|
)
|
|
|
|
func init() {
|
|
addCheck(CheckSeccompBaseline)
|
|
}
|
|
|
|
func CheckSeccompBaseline() Check {
|
|
return Check{
|
|
ID: checkSeccompBaselineID,
|
|
Level: api.LevelBaseline,
|
|
Versions: []VersionedCheck{
|
|
{
|
|
MinimumVersion: api.MajorMinorVersion(1, 0),
|
|
CheckPod: seccompProfileBaseline_1_0,
|
|
},
|
|
{
|
|
MinimumVersion: api.MajorMinorVersion(1, 19),
|
|
CheckPod: seccompProfileBaseline_1_19,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func validSeccomp(t corev1.SeccompProfileType) bool {
|
|
return t == corev1.SeccompProfileTypeLocalhost ||
|
|
t == corev1.SeccompProfileTypeRuntimeDefault
|
|
}
|
|
|
|
func validSeccompAnnotationValue(v string) bool {
|
|
return v == corev1.SeccompProfileRuntimeDefault ||
|
|
v == corev1.DeprecatedSeccompProfileDockerDefault ||
|
|
strings.HasPrefix(v, corev1.SeccompLocalhostProfileNamePrefix)
|
|
}
|
|
|
|
// seccompProfileBaseline_1_0 checks baseline policy on seccomp alpha annotation
|
|
func seccompProfileBaseline_1_0(podMetadata *metav1.ObjectMeta, podSpec *corev1.PodSpec) CheckResult {
|
|
forbidden := sets.NewString()
|
|
|
|
if val, ok := podMetadata.Annotations[annotationKeyPod]; ok {
|
|
if !validSeccompAnnotationValue(val) {
|
|
forbidden.Insert(fmt.Sprintf("%s=%q", annotationKeyPod, val))
|
|
}
|
|
}
|
|
|
|
visitContainers(podSpec, func(c *corev1.Container) {
|
|
annotation := annotationKeyContainerPrefix + c.Name
|
|
if val, ok := podMetadata.Annotations[annotation]; ok {
|
|
if !validSeccompAnnotationValue(val) {
|
|
forbidden.Insert(fmt.Sprintf("%s=%q", annotation, val))
|
|
}
|
|
}
|
|
})
|
|
|
|
if len(forbidden) > 0 {
|
|
return CheckResult{
|
|
Allowed: false,
|
|
ForbiddenReason: "seccompProfile",
|
|
ForbiddenDetail: fmt.Sprintf(
|
|
"forbidden %s %s",
|
|
pluralize("annotation", "annotations", len(forbidden)),
|
|
strings.Join(forbidden.List(), ", "),
|
|
),
|
|
}
|
|
}
|
|
|
|
return CheckResult{Allowed: true}
|
|
}
|
|
|
|
// seccompProfileBaseline_1_19 checks baseline policy on securityContext.seccompProfile field
|
|
func seccompProfileBaseline_1_19(podMetadata *metav1.ObjectMeta, podSpec *corev1.PodSpec) CheckResult {
|
|
// things that explicitly set seccompProfile.type to a bad value
|
|
var badSetters []string
|
|
badValues := sets.NewString()
|
|
|
|
if podSpec.SecurityContext != nil && podSpec.SecurityContext.SeccompProfile != nil {
|
|
if !validSeccomp(podSpec.SecurityContext.SeccompProfile.Type) {
|
|
badSetters = append(badSetters, "pod")
|
|
badValues.Insert(string(podSpec.SecurityContext.SeccompProfile.Type))
|
|
}
|
|
}
|
|
|
|
// containers that explicitly set seccompProfile.type to a bad value
|
|
var explicitlyBadContainers []string
|
|
|
|
visitContainers(podSpec, func(c *corev1.Container) {
|
|
if c.SecurityContext != nil && c.SecurityContext.SeccompProfile != nil {
|
|
// container explicitly set seccompProfile
|
|
if !validSeccomp(c.SecurityContext.SeccompProfile.Type) {
|
|
// container explicitly set seccompProfile to a bad value
|
|
explicitlyBadContainers = append(explicitlyBadContainers, c.Name)
|
|
badValues.Insert(string(c.SecurityContext.SeccompProfile.Type))
|
|
}
|
|
}
|
|
})
|
|
|
|
if len(explicitlyBadContainers) > 0 {
|
|
badSetters = append(
|
|
badSetters,
|
|
fmt.Sprintf(
|
|
"%s %s",
|
|
pluralize("container", "containers", len(explicitlyBadContainers)),
|
|
joinQuote(explicitlyBadContainers),
|
|
),
|
|
)
|
|
}
|
|
// pod or containers explicitly set bad seccompProfiles
|
|
if len(badSetters) > 0 {
|
|
return CheckResult{
|
|
Allowed: false,
|
|
ForbiddenReason: "seccompProfile",
|
|
ForbiddenDetail: fmt.Sprintf(
|
|
"%s must not set securityContext.seccompProfile.type to %s",
|
|
strings.Join(badSetters, " and "),
|
|
joinQuote(badValues.List()),
|
|
),
|
|
}
|
|
}
|
|
|
|
return CheckResult{Allowed: true}
|
|
}
|