Change libcontainer to drop all capabilities by default. Only keeps
those that were specified in the config. This commit also explicitly adds a set of capabilities that we were silently not dropping and were assumed by the tests. Docker-DCO-1.1-Signed-off-by: Victor Marmol <vmarmol@google.com> (github: vmarmol)
This commit is contained in:
parent
06b6ff0f39
commit
e0f356a13a
|
@ -7,32 +7,34 @@ import (
|
||||||
"github.com/syndtr/gocapability/capability"
|
"github.com/syndtr/gocapability/capability"
|
||||||
)
|
)
|
||||||
|
|
||||||
// DropCapabilities drops capabilities for the current process based
|
const allCapabilityTypes = capability.CAPS | capability.BOUNDS
|
||||||
// on the container's configuration.
|
|
||||||
|
// DropCapabilities drops all capabilities for the current process expect those specified in the container configuration.
|
||||||
func DropCapabilities(container *libcontainer.Container) error {
|
func DropCapabilities(container *libcontainer.Container) error {
|
||||||
if drop := getCapabilitiesMask(container); len(drop) > 0 {
|
|
||||||
c, err := capability.NewPid(os.Getpid())
|
c, err := capability.NewPid(os.Getpid())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
c.Unset(capability.CAPS|capability.BOUNDS, drop...)
|
|
||||||
|
|
||||||
if err := c.Apply(capability.CAPS | capability.BOUNDS); err != nil {
|
keep := getEnabledCapabilities(container)
|
||||||
|
c.Clear(allCapabilityTypes)
|
||||||
|
c.Set(allCapabilityTypes, keep...)
|
||||||
|
|
||||||
|
if err := c.Apply(allCapabilityTypes); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// getCapabilitiesMask returns the specific cap mask values for the libcontainer types
|
// getCapabilitiesMask returns the capabilities that should not be dropped by the container.
|
||||||
func getCapabilitiesMask(container *libcontainer.Container) []capability.Cap {
|
func getEnabledCapabilities(container *libcontainer.Container) []capability.Cap {
|
||||||
drop := []capability.Cap{}
|
keep := []capability.Cap{}
|
||||||
for key, enabled := range container.CapabilitiesMask {
|
for key, enabled := range container.CapabilitiesMask {
|
||||||
if !enabled {
|
if enabled {
|
||||||
if c := libcontainer.GetCapability(key); c != nil {
|
if c := libcontainer.GetCapability(key); c != nil {
|
||||||
drop = append(drop, c.Value)
|
keep = append(keep, c.Value)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return drop
|
return keep
|
||||||
}
|
}
|
||||||
|
|
5
types.go
5
types.go
|
@ -55,6 +55,11 @@ var (
|
||||||
{Key: "MAC_ADMIN", Value: capability.CAP_MAC_ADMIN},
|
{Key: "MAC_ADMIN", Value: capability.CAP_MAC_ADMIN},
|
||||||
{Key: "NET_ADMIN", Value: capability.CAP_NET_ADMIN},
|
{Key: "NET_ADMIN", Value: capability.CAP_NET_ADMIN},
|
||||||
{Key: "SYSLOG", Value: capability.CAP_SYSLOG},
|
{Key: "SYSLOG", Value: capability.CAP_SYSLOG},
|
||||||
|
{Key: "SETUID", Value: capability.CAP_SETUID},
|
||||||
|
{Key: "SETGID", Value: capability.CAP_SETGID},
|
||||||
|
{Key: "CHOWN", Value: capability.CAP_CHOWN},
|
||||||
|
{Key: "NET_RAW", Value: capability.CAP_NET_RAW},
|
||||||
|
{Key: "DAC_OVERRIDE", Value: capability.CAP_DAC_OVERRIDE},
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue