Merge pull request #215 from xlgao-zju/support-apparmor
support apparmor
This commit is contained in:
commit
79073df3c2
20 changed files with 808 additions and 28 deletions
|
@ -19,6 +19,7 @@ RUN apt-get update && apt-get install -y \
|
||||||
protobuf-compiler \
|
protobuf-compiler \
|
||||||
python-minimal \
|
python-minimal \
|
||||||
libglib2.0-dev \
|
libglib2.0-dev \
|
||||||
|
libapparmor-dev \
|
||||||
--no-install-recommends
|
--no-install-recommends
|
||||||
|
|
||||||
# install bats
|
# install bats
|
||||||
|
|
15
README.md
15
README.md
|
@ -67,6 +67,21 @@ make BUILDTAGS=""
|
||||||
sudo make install
|
sudo make install
|
||||||
```
|
```
|
||||||
|
|
||||||
|
#### Build Tags
|
||||||
|
|
||||||
|
`cri-o` supports optional build tags for compiling support of various features.
|
||||||
|
To add build tags to the make option the `BUILDTAGS` variable must be set.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
make BUILDTAGS='seccomp apparmor'
|
||||||
|
```
|
||||||
|
|
||||||
|
| Build Tag | Feature | Dependency |
|
||||||
|
|-----------|------------------------------------|-------------|
|
||||||
|
| seccomp | syscall filtering | libseccomp |
|
||||||
|
| selinux | selinux process and mount labeling | <none> |
|
||||||
|
| apparmor | apparmor profile support | libapparmor |
|
||||||
|
|
||||||
### Running pods and containers
|
### Running pods and containers
|
||||||
|
|
||||||
#### Start the server
|
#### Start the server
|
||||||
|
|
|
@ -11,10 +11,11 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
ocidRoot = "/var/lib/ocid"
|
ocidRoot = "/var/lib/ocid"
|
||||||
conmonPath = "/usr/libexec/ocid/conmon"
|
conmonPath = "/usr/libexec/ocid/conmon"
|
||||||
pausePath = "/usr/libexec/ocid/pause"
|
pausePath = "/usr/libexec/ocid/pause"
|
||||||
seccompProfilePath = "/etc/ocid/seccomp.json"
|
seccompProfilePath = "/etc/ocid/seccomp.json"
|
||||||
|
apparmorProfileName = "ocid-default"
|
||||||
)
|
)
|
||||||
|
|
||||||
var commentedConfigTemplate = template.Must(template.New("config").Parse(`
|
var commentedConfigTemplate = template.Must(template.New("config").Parse(`
|
||||||
|
@ -64,6 +65,10 @@ selinux = {{ .SELinux }}
|
||||||
# default for the runtime.
|
# default for the runtime.
|
||||||
seccomp_profile = "{{ .SeccompProfile }}"
|
seccomp_profile = "{{ .SeccompProfile }}"
|
||||||
|
|
||||||
|
# apparmor_profile is the apparmor profile name which is used as the
|
||||||
|
# default for the runtime.
|
||||||
|
apparmor_profile = "{{ .ApparmorProfile }}"
|
||||||
|
|
||||||
# The "ocid.image" table contains settings pertaining to the
|
# The "ocid.image" table contains settings pertaining to the
|
||||||
# management of OCI images.
|
# management of OCI images.
|
||||||
[ocid.image]
|
[ocid.image]
|
||||||
|
@ -94,8 +99,9 @@ func DefaultConfig() *server.Config {
|
||||||
ConmonEnv: []string{
|
ConmonEnv: []string{
|
||||||
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
|
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
|
||||||
},
|
},
|
||||||
SELinux: selinux.SelinuxEnabled(),
|
SELinux: selinux.SelinuxEnabled(),
|
||||||
SeccompProfile: seccompProfilePath,
|
SeccompProfile: seccompProfilePath,
|
||||||
|
ApparmorProfile: apparmorProfileName,
|
||||||
},
|
},
|
||||||
ImageConfig: server.ImageConfig{
|
ImageConfig: server.ImageConfig{
|
||||||
Pause: pausePath,
|
Pause: pausePath,
|
||||||
|
|
|
@ -59,6 +59,9 @@ func mergeConfig(config *server.Config, ctx *cli.Context) error {
|
||||||
if ctx.GlobalIsSet("seccomp-profile") {
|
if ctx.GlobalIsSet("seccomp-profile") {
|
||||||
config.SeccompProfile = ctx.GlobalString("seccomp-profile")
|
config.SeccompProfile = ctx.GlobalString("seccomp-profile")
|
||||||
}
|
}
|
||||||
|
if ctx.GlobalIsSet("apparmor-profile") {
|
||||||
|
config.ApparmorProfile = ctx.GlobalString("apparmor-profile")
|
||||||
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -135,6 +138,10 @@ func main() {
|
||||||
Name: "seccomp-profile",
|
Name: "seccomp-profile",
|
||||||
Usage: "default seccomp profile path",
|
Usage: "default seccomp profile path",
|
||||||
},
|
},
|
||||||
|
cli.StringFlag{
|
||||||
|
Name: "apparmor-profile",
|
||||||
|
Usage: "default apparmor profile name (default: \"ocid-default\")",
|
||||||
|
},
|
||||||
cli.BoolFlag{
|
cli.BoolFlag{
|
||||||
Name: "selinux",
|
Name: "selinux",
|
||||||
Usage: "enable selinux support",
|
Usage: "enable selinux support",
|
||||||
|
|
|
@ -20,6 +20,7 @@ ocid - Enable OCI Kubernetes Container Runtime daemon
|
||||||
[**--sandboxdir**=[*value*]]
|
[**--sandboxdir**=[*value*]]
|
||||||
[**--selinux**]
|
[**--selinux**]
|
||||||
[**--seccomp-profile**=[*value*]]
|
[**--seccomp-profile**=[*value*]]
|
||||||
|
[**--apparmor-profile**=[*value*]]
|
||||||
[**--version**|**-v**]
|
[**--version**|**-v**]
|
||||||
|
|
||||||
# DESCRIPTION
|
# DESCRIPTION
|
||||||
|
@ -76,12 +77,15 @@ ocid is meant to provide an integration path between OCI conformant runtimes and
|
||||||
**--sandboxdir**=""
|
**--sandboxdir**=""
|
||||||
OCID pod sandbox dir (default: "/var/lib/ocid/sandboxes")
|
OCID pod sandbox dir (default: "/var/lib/ocid/sandboxes")
|
||||||
|
|
||||||
**--selinux**
|
**--selinux**=*true*|*false*
|
||||||
Enable selinux support (default: false)
|
Enable selinux support (default: false)
|
||||||
|
|
||||||
**seccomp_profile**
|
**--seccomp_profile**=""
|
||||||
Path to the seccomp json profile to be used as the runtime's default (default: "/etc/ocid/seccomp.json")
|
Path to the seccomp json profile to be used as the runtime's default (default: "/etc/ocid/seccomp.json")
|
||||||
|
|
||||||
|
**--apparmor_profile**=""
|
||||||
|
Name of the apparmor profile to be used as the runtime's default (default: "ocid-default")
|
||||||
|
|
||||||
**--version, -v**
|
**--version, -v**
|
||||||
Print the version
|
Print the version
|
||||||
|
|
||||||
|
|
|
@ -55,12 +55,15 @@ The `ocid` table supports the following options:
|
||||||
**runtime**=""
|
**runtime**=""
|
||||||
OCI runtime path (default: "/usr/bin/runc")
|
OCI runtime path (default: "/usr/bin/runc")
|
||||||
|
|
||||||
**selinux**
|
**selinux**=*true*|*false*
|
||||||
Enable selinux support (default: false)
|
Enable selinux support (default: false)
|
||||||
|
|
||||||
**seccomp_profile**
|
**seccomp_profile**=""
|
||||||
Path to the seccomp json profile to be used as the runtime's default (default: "/etc/ocid/seccomp.json")
|
Path to the seccomp json profile to be used as the runtime's default (default: "/etc/ocid/seccomp.json")
|
||||||
|
|
||||||
|
**apparmor_profile**=""
|
||||||
|
Name of the apparmor profile to be used as the runtime's default (default: "ocid-default")
|
||||||
|
|
||||||
## OCID.IMAGE TABLE
|
## OCID.IMAGE TABLE
|
||||||
|
|
||||||
**pause**=""
|
**pause**=""
|
||||||
|
|
89
server/apparmor/aaparser.go
Normal file
89
server/apparmor/aaparser.go
Normal file
|
@ -0,0 +1,89 @@
|
||||||
|
// +build apparmor
|
||||||
|
|
||||||
|
package apparmor
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os/exec"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
binary = "apparmor_parser"
|
||||||
|
)
|
||||||
|
|
||||||
|
// GetVersion returns the major and minor version of apparmor_parser.
|
||||||
|
func GetVersion() (int, error) {
|
||||||
|
output, err := cmd("", "--version")
|
||||||
|
if err != nil {
|
||||||
|
return -1, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return parseVersion(output)
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoadProfile runs `apparmor_parser -r` on a specified apparmor profile to
|
||||||
|
// replace the profile.
|
||||||
|
func LoadProfile(profilePath string) error {
|
||||||
|
_, err := cmd("", "-r", profilePath)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// cmd runs `apparmor_parser` with the passed arguments.
|
||||||
|
func cmd(dir string, arg ...string) (string, error) {
|
||||||
|
c := exec.Command(binary, arg...)
|
||||||
|
c.Dir = dir
|
||||||
|
|
||||||
|
output, err := c.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("running `%s %s` failed with output: %s\nerror: %v", c.Path, strings.Join(c.Args, " "), output, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return string(output), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// parseVersion takes the output from `apparmor_parser --version` and returns
|
||||||
|
// a representation of the {major, minor, patch} version as a single number of
|
||||||
|
// the form MMmmPPP {major, minor, patch}.
|
||||||
|
func parseVersion(output string) (int, error) {
|
||||||
|
// output is in the form of the following:
|
||||||
|
// AppArmor parser version 2.9.1
|
||||||
|
// Copyright (C) 1999-2008 Novell Inc.
|
||||||
|
// Copyright 2009-2012 Canonical Ltd.
|
||||||
|
|
||||||
|
lines := strings.SplitN(output, "\n", 2)
|
||||||
|
words := strings.Split(lines[0], " ")
|
||||||
|
version := words[len(words)-1]
|
||||||
|
|
||||||
|
// split by major minor version
|
||||||
|
v := strings.Split(version, ".")
|
||||||
|
if len(v) == 0 || len(v) > 3 {
|
||||||
|
return -1, fmt.Errorf("parsing version failed for output: `%s`", output)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Default the versions to 0.
|
||||||
|
var majorVersion, minorVersion, patchLevel int
|
||||||
|
|
||||||
|
majorVersion, err := strconv.Atoi(v[0])
|
||||||
|
if err != nil {
|
||||||
|
return -1, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(v) > 1 {
|
||||||
|
minorVersion, err = strconv.Atoi(v[1])
|
||||||
|
if err != nil {
|
||||||
|
return -1, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(v) > 2 {
|
||||||
|
patchLevel, err = strconv.Atoi(v[2])
|
||||||
|
if err != nil {
|
||||||
|
return -1, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// major*10^5 + minor*10^3 + patch*10^0
|
||||||
|
numericVersion := majorVersion*1e5 + minorVersion*1e3 + patchLevel
|
||||||
|
return numericVersion, nil
|
||||||
|
}
|
154
server/apparmor/apparmor.go
Normal file
154
server/apparmor/apparmor.go
Normal file
|
@ -0,0 +1,154 @@
|
||||||
|
// +build apparmor
|
||||||
|
|
||||||
|
package apparmor
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/Sirupsen/logrus"
|
||||||
|
"github.com/docker/docker/utils/templates"
|
||||||
|
"github.com/opencontainers/runc/libcontainer/apparmor"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
// defaultApparmorProfile is the name of default apparmor profile name.
|
||||||
|
defaultApparmorProfile = "ocid-default"
|
||||||
|
|
||||||
|
// profileDirectory is the file store for apparmor profiles and macros.
|
||||||
|
profileDirectory = "/etc/apparmor.d"
|
||||||
|
|
||||||
|
// ContainerAnnotationKeyPrefix is the prefix to an annotation key specifying a container profile.
|
||||||
|
ContainerAnnotationKeyPrefix = "container.apparmor.security.beta.kubernetes.io/"
|
||||||
|
|
||||||
|
// ProfileRuntimeDefault is he profile specifying the runtime default.
|
||||||
|
ProfileRuntimeDefault = "runtime/default"
|
||||||
|
// ProfileNamePrefix is the prefix for specifying profiles loaded on the node.
|
||||||
|
ProfileNamePrefix = "localhost/"
|
||||||
|
|
||||||
|
// readConfigTimeout is the timeout of reading apparmor profiles.
|
||||||
|
readConfigTimeout = 10
|
||||||
|
)
|
||||||
|
|
||||||
|
// profileData holds information about the given profile for generation.
|
||||||
|
type profileData struct {
|
||||||
|
// Name is profile name.
|
||||||
|
Name string
|
||||||
|
// Imports defines the apparmor functions to import, before defining the profile.
|
||||||
|
Imports []string
|
||||||
|
// InnerImports defines the apparmor functions to import in the profile.
|
||||||
|
InnerImports []string
|
||||||
|
// Version is the {major, minor, patch} version of apparmor_parser as a single number.
|
||||||
|
Version int
|
||||||
|
}
|
||||||
|
|
||||||
|
// InstallDefaultAppArmorProfile installs default apparmor profile.
|
||||||
|
func InstallDefaultAppArmorProfile() {
|
||||||
|
if err := InstallDefault(defaultApparmorProfile); err != nil {
|
||||||
|
// Allow daemon to run if loading failed, but are active
|
||||||
|
// (possibly through another run, manually, or via system startup)
|
||||||
|
if !IsLoaded(defaultApparmorProfile) {
|
||||||
|
logrus.Errorf("AppArmor enabled on system but the %s profile could not be loaded.", defaultApparmorProfile)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsEnabled returns true if apparmor is enabled for the host.
|
||||||
|
func IsEnabled() bool {
|
||||||
|
return apparmor.IsEnabled()
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetProfileNameFromPodAnnotations gets the name of the profile to use with container from
|
||||||
|
// pod annotations
|
||||||
|
func GetProfileNameFromPodAnnotations(annotations map[string]string, containerName string) string {
|
||||||
|
return annotations[ContainerAnnotationKeyPrefix+containerName]
|
||||||
|
}
|
||||||
|
|
||||||
|
// InstallDefault generates a default profile in a temp directory determined by
|
||||||
|
// os.TempDir(), then loads the profile into the kernel using 'apparmor_parser'.
|
||||||
|
func InstallDefault(name string) error {
|
||||||
|
p := profileData{
|
||||||
|
Name: name,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Install to a temporary directory.
|
||||||
|
f, err := ioutil.TempFile("", name)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer f.Close()
|
||||||
|
|
||||||
|
if err := p.generateDefault(f); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return LoadProfile(f.Name())
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsLoaded checks if a passed profile has been loaded into the kernel.
|
||||||
|
func IsLoaded(name string) bool {
|
||||||
|
file, err := os.Open("/sys/kernel/security/apparmor/profiles")
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
defer file.Close()
|
||||||
|
|
||||||
|
ch := make(chan bool, 1)
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
r := bufio.NewReader(file)
|
||||||
|
for {
|
||||||
|
p, err := r.ReadString('\n')
|
||||||
|
if err != nil {
|
||||||
|
ch <- false
|
||||||
|
}
|
||||||
|
if strings.HasPrefix(p, name+" ") {
|
||||||
|
ch <- true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
select {
|
||||||
|
case <-time.After(time.Duration(readConfigTimeout) * time.Second):
|
||||||
|
return false
|
||||||
|
case enabled := <-ch:
|
||||||
|
return enabled
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// generateDefault creates an apparmor profile from ProfileData.
|
||||||
|
func (p *profileData) generateDefault(out io.Writer) error {
|
||||||
|
compiled, err := templates.NewParse("apparmor_profile", baseTemplate)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if macroExists("tunables/global") {
|
||||||
|
p.Imports = append(p.Imports, "#include <tunables/global>")
|
||||||
|
} else {
|
||||||
|
p.Imports = append(p.Imports, "@{PROC}=/proc/")
|
||||||
|
}
|
||||||
|
|
||||||
|
if macroExists("abstractions/base") {
|
||||||
|
p.InnerImports = append(p.InnerImports, "#include <abstractions/base>")
|
||||||
|
}
|
||||||
|
|
||||||
|
ver, err := GetVersion()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
p.Version = ver
|
||||||
|
|
||||||
|
return compiled.Execute(out, p)
|
||||||
|
}
|
||||||
|
|
||||||
|
// macrosExists checks if the passed macro exists.
|
||||||
|
func macroExists(m string) bool {
|
||||||
|
_, err := os.Stat(path.Join(profileDirectory, m))
|
||||||
|
return err == nil
|
||||||
|
}
|
27
server/apparmor/apparmor_unsupported.go
Normal file
27
server/apparmor/apparmor_unsupported.go
Normal file
|
@ -0,0 +1,27 @@
|
||||||
|
// +build !apparmor
|
||||||
|
|
||||||
|
package apparmor
|
||||||
|
|
||||||
|
const (
|
||||||
|
// ContainerAnnotationKeyPrefix is the prefix to an annotation key specifying a container profile.
|
||||||
|
ContainerAnnotationKeyPrefix = "container.apparmor.security.beta.kubernetes.io/"
|
||||||
|
|
||||||
|
// ProfileRuntimeDefault is he profile specifying the runtime default.
|
||||||
|
ProfileRuntimeDefault = "runtime/default"
|
||||||
|
// ProfileNamePrefix is the prefix for specifying profiles loaded on the node.
|
||||||
|
ProfileNamePrefix = "localhost/"
|
||||||
|
)
|
||||||
|
|
||||||
|
// IsEnabled returns false, when build without apparmor build tag.
|
||||||
|
func IsEnabled() bool {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// InstallDefaultAppArmorProfile dose nothing, when build without apparmor build tag.
|
||||||
|
func InstallDefaultAppArmorProfile() {
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetProfileNameFromPodAnnotations dose nothing, when build without apparmor build tag.
|
||||||
|
func GetProfileNameFromPodAnnotations(annotations map[string]string, containerName string) string {
|
||||||
|
return ""
|
||||||
|
}
|
45
server/apparmor/template.go
Normal file
45
server/apparmor/template.go
Normal file
|
@ -0,0 +1,45 @@
|
||||||
|
// +build apparmor
|
||||||
|
|
||||||
|
package apparmor
|
||||||
|
|
||||||
|
// baseTemplate defines the default apparmor profile for containers.
|
||||||
|
const baseTemplate = `
|
||||||
|
{{range $value := .Imports}}
|
||||||
|
{{$value}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
profile {{.Name}} flags=(attach_disconnected,mediate_deleted) {
|
||||||
|
{{range $value := .InnerImports}}
|
||||||
|
{{$value}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
network,
|
||||||
|
capability,
|
||||||
|
file,
|
||||||
|
umount,
|
||||||
|
|
||||||
|
deny @{PROC}/* w, # deny write for all files directly in /proc (not in a subdir)
|
||||||
|
# deny write to files not in /proc/<number>/** or /proc/sys/**
|
||||||
|
deny @{PROC}/{[^1-9],[^1-9][^0-9],[^1-9s][^0-9y][^0-9s],[^1-9][^0-9][^0-9][^0-9]*}/** w,
|
||||||
|
deny @{PROC}/sys/[^k]** w, # deny /proc/sys except /proc/sys/k* (effectively /proc/sys/kernel)
|
||||||
|
deny @{PROC}/sys/kernel/{?,??,[^s][^h][^m]**} w, # deny everything except shm* in /proc/sys/kernel/
|
||||||
|
deny @{PROC}/sysrq-trigger rwklx,
|
||||||
|
deny @{PROC}/mem rwklx,
|
||||||
|
deny @{PROC}/kmem rwklx,
|
||||||
|
deny @{PROC}/kcore rwklx,
|
||||||
|
|
||||||
|
deny mount,
|
||||||
|
|
||||||
|
deny /sys/[^f]*/** wklx,
|
||||||
|
deny /sys/f[^s]*/** wklx,
|
||||||
|
deny /sys/fs/[^c]*/** wklx,
|
||||||
|
deny /sys/fs/c[^g]*/** wklx,
|
||||||
|
deny /sys/fs/cg[^r]*/** wklx,
|
||||||
|
deny /sys/firmware/** rwklx,
|
||||||
|
deny /sys/kernel/security/** rwklx,
|
||||||
|
|
||||||
|
{{if ge .Version 208095}}
|
||||||
|
ptrace (trace,read) peer={{.Name}},
|
||||||
|
{{end}}
|
||||||
|
}
|
||||||
|
`
|
|
@ -68,6 +68,10 @@ type RuntimeConfig struct {
|
||||||
// SeccompProfile is the seccomp json profile path which is used as the
|
// SeccompProfile is the seccomp json profile path which is used as the
|
||||||
// default for the runtime.
|
// default for the runtime.
|
||||||
SeccompProfile string `toml:"seccomp_profile"`
|
SeccompProfile string `toml:"seccomp_profile"`
|
||||||
|
|
||||||
|
// ApparmorProfile is the apparmor profile name which is used as the
|
||||||
|
// default for the runtime.
|
||||||
|
ApparmorProfile string `toml:"apparmor_profile"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// ImageConfig represents the "ocid.image" TOML config table.
|
// ImageConfig represents the "ocid.image" TOML config table.
|
||||||
|
|
|
@ -12,6 +12,7 @@ import (
|
||||||
"github.com/Sirupsen/logrus"
|
"github.com/Sirupsen/logrus"
|
||||||
"github.com/docker/docker/pkg/stringid"
|
"github.com/docker/docker/pkg/stringid"
|
||||||
"github.com/kubernetes-incubator/cri-o/oci"
|
"github.com/kubernetes-incubator/cri-o/oci"
|
||||||
|
"github.com/kubernetes-incubator/cri-o/server/apparmor"
|
||||||
"github.com/kubernetes-incubator/cri-o/server/seccomp"
|
"github.com/kubernetes-incubator/cri-o/server/seccomp"
|
||||||
"github.com/kubernetes-incubator/cri-o/utils"
|
"github.com/kubernetes-incubator/cri-o/utils"
|
||||||
"github.com/opencontainers/runc/libcontainer/label"
|
"github.com/opencontainers/runc/libcontainer/label"
|
||||||
|
@ -182,6 +183,15 @@ func (s *Server) createSandboxContainer(containerID string, containerName string
|
||||||
specgen.AddAnnotation(k, v)
|
specgen.AddAnnotation(k, v)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// set this container's apparmor profile if it is set by sandbox
|
||||||
|
if s.appArmorEnabled {
|
||||||
|
appArmorProfileName := s.getAppArmorProfileName(sb.annotations, metadata.GetName())
|
||||||
|
if appArmorProfileName != "" {
|
||||||
|
specgen.SetProcessApparmorProfile(appArmorProfileName)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if containerConfig.GetLinux().GetSecurityContext().GetPrivileged() {
|
if containerConfig.GetLinux().GetSecurityContext().GetPrivileged() {
|
||||||
specgen.SetupPrivileged(true)
|
specgen.SetupPrivileged(true)
|
||||||
}
|
}
|
||||||
|
@ -373,3 +383,19 @@ func (s *Server) generateContainerIDandName(podName string, name string, attempt
|
||||||
}
|
}
|
||||||
return id, name, err
|
return id, name, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// getAppArmorProfileName gets the profile name for the given container.
|
||||||
|
func (s *Server) getAppArmorProfileName(annotations map[string]string, ctrName string) string {
|
||||||
|
profile := apparmor.GetProfileNameFromPodAnnotations(annotations, ctrName)
|
||||||
|
|
||||||
|
if profile == "" {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
if profile == apparmor.ProfileRuntimeDefault {
|
||||||
|
// If the value is runtime/default, then return default profile.
|
||||||
|
return s.appArmorProfile
|
||||||
|
}
|
||||||
|
|
||||||
|
return strings.TrimPrefix(profile, apparmor.ProfileNamePrefix)
|
||||||
|
}
|
||||||
|
|
|
@ -13,6 +13,7 @@ import (
|
||||||
"github.com/docker/docker/pkg/registrar"
|
"github.com/docker/docker/pkg/registrar"
|
||||||
"github.com/docker/docker/pkg/truncindex"
|
"github.com/docker/docker/pkg/truncindex"
|
||||||
"github.com/kubernetes-incubator/cri-o/oci"
|
"github.com/kubernetes-incubator/cri-o/oci"
|
||||||
|
"github.com/kubernetes-incubator/cri-o/server/apparmor"
|
||||||
"github.com/kubernetes-incubator/cri-o/server/seccomp"
|
"github.com/kubernetes-incubator/cri-o/server/seccomp"
|
||||||
"github.com/kubernetes-incubator/cri-o/utils"
|
"github.com/kubernetes-incubator/cri-o/utils"
|
||||||
"github.com/opencontainers/runc/libcontainer/label"
|
"github.com/opencontainers/runc/libcontainer/label"
|
||||||
|
@ -39,6 +40,9 @@ type Server struct {
|
||||||
|
|
||||||
seccompEnabled bool
|
seccompEnabled bool
|
||||||
seccompProfile seccomp.Seccomp
|
seccompProfile seccomp.Seccomp
|
||||||
|
|
||||||
|
appArmorEnabled bool
|
||||||
|
appArmorProfile string
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) loadContainer(id string) error {
|
func (s *Server) loadContainer(id string) error {
|
||||||
|
@ -281,7 +285,8 @@ func New(config *Config) (*Server, error) {
|
||||||
sandboxes: sandboxes,
|
sandboxes: sandboxes,
|
||||||
containers: containers,
|
containers: containers,
|
||||||
},
|
},
|
||||||
seccompEnabled: seccompEnabled(),
|
seccompEnabled: seccompEnabled(),
|
||||||
|
appArmorEnabled: apparmor.IsEnabled(),
|
||||||
}
|
}
|
||||||
seccompProfile, err := ioutil.ReadFile(config.SeccompProfile)
|
seccompProfile, err := ioutil.ReadFile(config.SeccompProfile)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -293,6 +298,11 @@ func New(config *Config) (*Server, error) {
|
||||||
}
|
}
|
||||||
s.seccompProfile = seccompConfig
|
s.seccompProfile = seccompConfig
|
||||||
|
|
||||||
|
if s.appArmorEnabled {
|
||||||
|
apparmor.InstallDefaultAppArmorProfile()
|
||||||
|
}
|
||||||
|
s.appArmorProfile = config.ApparmorProfile
|
||||||
|
|
||||||
s.podIDIndex = truncindex.NewTruncIndex([]string{})
|
s.podIDIndex = truncindex.NewTruncIndex([]string{})
|
||||||
s.podNameIndex = registrar.NewRegistrar()
|
s.podNameIndex = registrar.NewRegistrar()
|
||||||
s.ctrIDIndex = truncindex.NewTruncIndex([]string{})
|
s.ctrIDIndex = truncindex.NewTruncIndex([]string{})
|
||||||
|
|
155
test/apparmor.bats
Normal file
155
test/apparmor.bats
Normal file
|
@ -0,0 +1,155 @@
|
||||||
|
#!/usr/bin/env bats
|
||||||
|
|
||||||
|
load helpers
|
||||||
|
|
||||||
|
function teardown() {
|
||||||
|
cleanup_test
|
||||||
|
}
|
||||||
|
|
||||||
|
# 1. test running with loading the default apparmor profile.
|
||||||
|
# test that we can run with the default apparmor profile which will not block touching a file in `.`
|
||||||
|
@test "load default apparmor profile and run a container with it" {
|
||||||
|
# this test requires docker, thus it can't yet be run in a container
|
||||||
|
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
||||||
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
||||||
|
enabled=is_apparmor_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since apparmor is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
|
start_ocid
|
||||||
|
|
||||||
|
sed -e 's/%VALUE%/,"container\.apparmor\.security\.beta\.kubernetes\.io\/testname1": "runtime\/default"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/apparmor1.json
|
||||||
|
|
||||||
|
run ocic pod create --name apparmor1 --config "$TESTDIR"/apparmor1.json
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
pod_id="$output"
|
||||||
|
run ocic ctr create --name testname1 --config "$TESTDATA"/container_redis.json --pod "$pod_id"
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
ctr_id="$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run ocic ctr execsync --id "$ctr_id" touch test.txt
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
|
||||||
|
|
||||||
|
cleanup_ctrs
|
||||||
|
cleanup_pods
|
||||||
|
stop_ocid
|
||||||
|
}
|
||||||
|
|
||||||
|
# 2. test running with loading a specific apparmor profile as ocid default apparmor profile.
|
||||||
|
# test that we can run with a specific apparmor profile which will block touching a file in `.` as ocid default apparmor profile.
|
||||||
|
@test "load a specific apparmor profile as default apparmor and run a container with it" {
|
||||||
|
# this test requires docker, thus it can't yet be run in a container
|
||||||
|
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
||||||
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
||||||
|
enabled=is_apparmor_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since apparmor is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
|
load_apparmor_test_profile
|
||||||
|
start_ocid "" "$APPARMOR_TEST_PROFILE_NAME"
|
||||||
|
|
||||||
|
sed -e 's/%VALUE%/,"container\.apparmor\.security\.beta\.kubernetes\.io\/testname2": "apparmor-test-deny-write"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/apparmor2.json
|
||||||
|
|
||||||
|
run ocic pod create --name apparmor2 --config "$TESTDIR"/apparmor2.json
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
pod_id="$output"
|
||||||
|
run ocic ctr create --name testname2 --config "$TESTDATA"/container_redis.json --pod "$pod_id"
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
ctr_id="$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run ocic ctr execsync --id "$ctr_id" touch test.txt
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -ne 0 ]
|
||||||
|
[[ "$output" =~ "Permission denied" ]]
|
||||||
|
|
||||||
|
cleanup_ctrs
|
||||||
|
cleanup_pods
|
||||||
|
stop_ocid
|
||||||
|
remove_apparmor_test_profile
|
||||||
|
}
|
||||||
|
|
||||||
|
# 3. test running with loading a specific apparmor profile but not as ocid default apparmor profile.
|
||||||
|
# test that we can run with a specific apparmor profile which will block touching a file in `.`
|
||||||
|
@test "load default apparmor profile and run a container with another apparmor profile" {
|
||||||
|
# this test requires docker, thus it can't yet be run in a container
|
||||||
|
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
||||||
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
||||||
|
enabled=is_apparmor_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since apparmor is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
|
load_apparmor_test_profile
|
||||||
|
start_ocid
|
||||||
|
|
||||||
|
sed -e 's/%VALUE%/,"container\.apparmor\.security\.beta\.kubernetes\.io\/testname3": "apparmor-test-deny-write"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/apparmor3.json
|
||||||
|
|
||||||
|
run ocic pod create --name apparmor3 --config "$TESTDIR"/apparmor3.json
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
pod_id="$output"
|
||||||
|
run ocic ctr create --name testname3 --config "$TESTDATA"/container_redis.json --pod "$pod_id"
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
ctr_id="$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run ocic ctr execsync --id "$ctr_id" touch test.txt
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -ne 0 ]
|
||||||
|
[[ "$output" =~ "Permission denied" ]]
|
||||||
|
|
||||||
|
cleanup_ctrs
|
||||||
|
cleanup_pods
|
||||||
|
stop_ocid
|
||||||
|
remove_apparmor_test_profile
|
||||||
|
}
|
||||||
|
|
||||||
|
# 4. test running with wrong apparmor profile name.
|
||||||
|
# test that we can will fail when running a ctr with rong apparmor profile name.
|
||||||
|
@test "run a container with wrong apparmor profile name" {
|
||||||
|
# this test requires docker, thus it can't yet be run in a container
|
||||||
|
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
||||||
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
||||||
|
enabled=is_apparmor_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since apparmor is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
|
start_ocid
|
||||||
|
|
||||||
|
sed -e 's/%VALUE%/,"container\.apparmor\.security\.beta\.kubernetes\.io\/testname4": "not-exists"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/apparmor4.json
|
||||||
|
|
||||||
|
run ocic pod create --name apparmor4 --config "$TESTDIR"/apparmor4.json
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
pod_id="$output"
|
||||||
|
run ocic ctr create --name testname4 --config "$TESTDATA"/container_redis.json --pod "$pod_id"
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -ne 0 ]
|
||||||
|
[[ "$output" =~ "Creating container failed" ]]
|
||||||
|
|
||||||
|
|
||||||
|
cleanup_ctrs
|
||||||
|
cleanup_pods
|
||||||
|
stop_ocid
|
||||||
|
}
|
|
@ -17,11 +17,23 @@ OCIC_BINARY=${OCIC_BINARY:-${OCID_ROOT}/cri-o/ocic}
|
||||||
CONMON_BINARY=${CONMON_BINARY:-${OCID_ROOT}/cri-o/conmon/conmon}
|
CONMON_BINARY=${CONMON_BINARY:-${OCID_ROOT}/cri-o/conmon/conmon}
|
||||||
# Path of the pause binary.
|
# Path of the pause binary.
|
||||||
PAUSE_BINARY=${PAUSE_BINARY:-${OCID_ROOT}/cri-o/pause/pause}
|
PAUSE_BINARY=${PAUSE_BINARY:-${OCID_ROOT}/cri-o/pause/pause}
|
||||||
# Path of the default seccomp profile
|
# Path of the default seccomp profile.
|
||||||
SECCOMP_PROFILE=${SECCOMP_PROFILE:-${OCID_ROOT}/cri-o/seccomp.json}
|
SECCOMP_PROFILE=${SECCOMP_PROFILE:-${OCID_ROOT}/cri-o/seccomp.json}
|
||||||
|
# Name of the default apparmor profile.
|
||||||
|
APPARMOR_PROFILE=${APPARMOR_PROFILE:-ocid-default}
|
||||||
# Path of the runc binary.
|
# Path of the runc binary.
|
||||||
RUNC_PATH=$(command -v runc || true)
|
RUNC_PATH=$(command -v runc || true)
|
||||||
RUNC_BINARY=${RUNC_PATH:-/usr/local/sbin/runc}
|
RUNC_BINARY=${RUNC_PATH:-/usr/local/sbin/runc}
|
||||||
|
# Path of the apparmor_parser binary.
|
||||||
|
APPARMOR_PARSER_BINARY=${APPARMOR_PARSER_BINARY:-/sbin/apparmor_parser}
|
||||||
|
# Path of the apparmor profile for test.
|
||||||
|
APPARMOR_TEST_PROFILE_PATH=${APPARMOR_TEST_PROFILE_PATH:-${TESTDATA}/apparmor_test_deny_write}
|
||||||
|
# Name of the apparmor profile for test.
|
||||||
|
APPARMOR_TEST_PROFILE_NAME=${APPARMOR_TEST_PROFILE_NAME:-apparmor-test-deny-write}
|
||||||
|
# Path of boot config.
|
||||||
|
BOOT_CONFIG_FILE_PATH=${BOOT_CONFIG_FILE_PATH:-/boot/config-`uname -r`}
|
||||||
|
# Path of apparmor parameters file.
|
||||||
|
APPARMOR_PARAMETERS_FILE_PATH=${APPARMOR_PARAMETERS_FILE_PATH:-/sys/module/apparmor/parameters/enabled}
|
||||||
|
|
||||||
TESTDIR=$(mktemp -d)
|
TESTDIR=$(mktemp -d)
|
||||||
if [ -e /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then
|
if [ -e /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then
|
||||||
|
@ -80,13 +92,19 @@ function wait_until_reachable() {
|
||||||
|
|
||||||
# Start ocid.
|
# Start ocid.
|
||||||
function start_ocid() {
|
function start_ocid() {
|
||||||
"$OCID_BINARY" --conmon "$CONMON_BINARY" --pause "$PAUSE_BINARY" --listen "$OCID_SOCKET" --runtime "$RUNC_BINARY" --root "$TESTDIR/ocid" --sandboxdir "$TESTDIR/sandboxes" --containerdir "$TESTDIR/ocid/containers" --seccomp-profile "$SECCOMP_PROFILE" config >$OCID_CONFIG
|
if [[ -n "$1" ]]; then
|
||||||
"$OCID_BINARY" --debug --config "$OCID_CONFIG" & OCID_PID=$!
|
seccomp="$1"
|
||||||
wait_until_reachable
|
else
|
||||||
}
|
seccomp="$SECCOMP_PROFILE"
|
||||||
|
fi
|
||||||
|
|
||||||
function start_ocid_with_seccomp_path() {
|
if [[ -n "$2" ]]; then
|
||||||
"$OCID_BINARY" --conmon "$CONMON_BINARY" --pause "$PAUSE_BINARY" --listen "$OCID_SOCKET" --runtime "$RUNC_BINARY" --root "$TESTDIR/ocid" --sandboxdir "$TESTDIR/sandboxes" --containerdir "$TESTDIR/ocid/containers" --seccomp-profile "$1" config >$OCID_CONFIG
|
apparmor="$2"
|
||||||
|
else
|
||||||
|
apparmor="$APPARMOR_PROFILE"
|
||||||
|
fi
|
||||||
|
|
||||||
|
"$OCID_BINARY" --conmon "$CONMON_BINARY" --pause "$PAUSE_BINARY" --listen "$OCID_SOCKET" --runtime "$RUNC_BINARY" --root "$TESTDIR/ocid" --sandboxdir "$TESTDIR/sandboxes" --containerdir "$TESTDIR/ocid/containers" --seccomp-profile "$seccomp" --apparmor-profile "$apparmor" config >$OCID_CONFIG
|
||||||
"$OCID_BINARY" --debug --config "$OCID_CONFIG" & OCID_PID=$!
|
"$OCID_BINARY" --debug --config "$OCID_CONFIG" & OCID_PID=$!
|
||||||
wait_until_reachable
|
wait_until_reachable
|
||||||
}
|
}
|
||||||
|
@ -128,3 +146,38 @@ function stop_ocid() {
|
||||||
function cleanup_test() {
|
function cleanup_test() {
|
||||||
rm -rf "$TESTDIR"
|
rm -rf "$TESTDIR"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
function load_apparmor_test_profile() {
|
||||||
|
"$APPARMOR_PARSER_BINARY" -r "$APPARMOR_TEST_PROFILE_PATH"
|
||||||
|
}
|
||||||
|
|
||||||
|
function remove_apparmor_test_profile() {
|
||||||
|
"$APPARMOR_PARSER_BINARY" -R "$APPARMOR_TEST_PROFILE_PATH"
|
||||||
|
}
|
||||||
|
|
||||||
|
function is_seccomp_enabled() {
|
||||||
|
if [[ -f "$BOOT_CONFIG_FILE_PATH" ]]; then
|
||||||
|
out=$(cat "$BOOT_CONFIG_FILE_PATH" | grep CONFIG_SECCOMP=)
|
||||||
|
if [[ "$out" =~ "CONFIG_SECCOMP=y" ]]; then
|
||||||
|
echo 1
|
||||||
|
else
|
||||||
|
echo 0
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
echo 0
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
function is_apparmor_enabled() {
|
||||||
|
if [[ -f "$APPARMOR_PARAMETERS_FILE_PATH" ]]; then
|
||||||
|
out=$(cat "$APPARMOR_PARAMETERS_FILE_PATH")
|
||||||
|
if [[ "$out" =~ "Y" ]]; then
|
||||||
|
echo 1
|
||||||
|
else
|
||||||
|
echo 0
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
echo 0
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
|
@ -14,10 +14,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp1-1-testname-0": "unconfined"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp1.json
|
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp1-1-testname-0": "unconfined"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp1.json
|
||||||
run ocic pod create --name seccomp1 --config "$TESTDIR"/seccomp1.json
|
run ocic pod create --name seccomp1 --config "$TESTDIR"/seccomp1.json
|
||||||
|
@ -48,10 +55,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp2-1-testname2-0": "runtime\/default"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp2.json
|
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp2-1-testname2-0": "runtime\/default"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp2.json
|
||||||
run ocic pod create --name seccomp2 --config "$TESTDIR"/seccomp2.json
|
run ocic pod create --name seccomp2 --config "$TESTDIR"/seccomp2.json
|
||||||
|
@ -82,10 +96,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp3-1-testname3-1": "notgood"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp3.json
|
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp3-1-testname3-1": "notgood"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp3.json
|
||||||
run ocic pod create --name seccomp3 --config "$TESTDIR"/seccomp3.json
|
run ocic pod create --name seccomp3 --config "$TESTDIR"/seccomp3.json
|
||||||
|
@ -111,10 +132,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
#sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
#sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
#sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
#sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
#sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
#sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
#start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
#start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
skip "need https://issues.k8s.io/36997"
|
skip "need https://issues.k8s.io/36997"
|
||||||
}
|
}
|
||||||
|
@ -129,10 +157,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp2-1-testname2-0-not-exists": "unconfined", "security\.alpha\.kubernetes\.io\/seccomp\/pod": "runtime\/default"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp5.json
|
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp2-1-testname2-0-not-exists": "unconfined", "security\.alpha\.kubernetes\.io\/seccomp\/pod": "runtime\/default"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp5.json
|
||||||
run ocic pod create --name seccomp5 --config "$TESTDIR"/seccomp5.json
|
run ocic pod create --name seccomp5 --config "$TESTDIR"/seccomp5.json
|
||||||
|
@ -166,10 +201,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp6-1-testname6-0-not-exists": "runtime-default"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp6.json
|
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/container\/redhat\.test\.ocid-seccomp6-1-testname6-0-not-exists": "runtime-default"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp6.json
|
||||||
run ocic pod create --name seccomp6 --config "$TESTDIR"/seccomp6.json
|
run ocic pod create --name seccomp6 --config "$TESTDIR"/seccomp6.json
|
||||||
|
@ -200,10 +242,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/pod": "unconfined"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp1.json
|
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/pod": "unconfined"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp1.json
|
||||||
run ocic pod create --name seccomp1 --config "$TESTDIR"/seccomp1.json
|
run ocic pod create --name seccomp1 --config "$TESTDIR"/seccomp1.json
|
||||||
|
@ -234,10 +283,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/pod": "runtime\/default"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp2.json
|
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/pod": "runtime\/default"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp2.json
|
||||||
run ocic pod create --name seccomp2 --config "$TESTDIR"/seccomp2.json
|
run ocic pod create --name seccomp2 --config "$TESTDIR"/seccomp2.json
|
||||||
|
@ -268,10 +324,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
# 3. test running with pod wrong profile name
|
# 3. test running with pod wrong profile name
|
||||||
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/pod": "notgood"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp3.json
|
sed -e 's/%VALUE%/,"security\.alpha\.kubernetes\.io\/seccomp\/pod": "notgood"/g' "$TESTDATA"/sandbox_config_seccomp.json > "$TESTDIR"/seccomp3.json
|
||||||
|
@ -298,10 +361,17 @@ function teardown() {
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
skip "cannot yet run this test in a container, use sudo make localintegration"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
|
enabled=is_seccomp_enabled
|
||||||
|
if [[ "$enabled" =~ "0" ]]; then
|
||||||
|
skip "skip this test since seccomp is not enabled."
|
||||||
|
fi
|
||||||
|
|
||||||
#sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
#sed -e 's/"chmod",//' "$OCID_ROOT"/cri-o/seccomp.json > "$TESTDIR"/seccomp_profile1.json
|
||||||
#sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
#sed -i 's/"fchmod",//' "$TESTDIR"/seccomp_profile1.json
|
||||||
#sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
#sed -i 's/"fchmodat",//g' "$TESTDIR"/seccomp_profile1.json
|
||||||
#start_ocid_with_seccomp_path "$TESTDIR"/seccomp_profile1.json
|
|
||||||
|
#start_ocid "$TESTDIR"/seccomp_profile1.json
|
||||||
|
|
||||||
skip "need https://issues.k8s.io/36997"
|
skip "need https://issues.k8s.io/36997"
|
||||||
}
|
}
|
||||||
|
|
10
test/testdata/apparmor_test_deny_write
vendored
Normal file
10
test/testdata/apparmor_test_deny_write
vendored
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
#include <tunables/global>
|
||||||
|
|
||||||
|
profile apparmor-test-deny-write flags=(attach_disconnected) {
|
||||||
|
#include <abstractions/base>
|
||||||
|
|
||||||
|
file,
|
||||||
|
|
||||||
|
# Deny all file writes.
|
||||||
|
deny /** w,
|
||||||
|
}
|
42
vendor/src/github.com/docker/docker/utils/templates/templates.go
vendored
Normal file
42
vendor/src/github.com/docker/docker/utils/templates/templates.go
vendored
Normal file
|
@ -0,0 +1,42 @@
|
||||||
|
package templates
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"strings"
|
||||||
|
"text/template"
|
||||||
|
)
|
||||||
|
|
||||||
|
// basicFunctions are the set of initial
|
||||||
|
// functions provided to every template.
|
||||||
|
var basicFunctions = template.FuncMap{
|
||||||
|
"json": func(v interface{}) string {
|
||||||
|
a, _ := json.Marshal(v)
|
||||||
|
return string(a)
|
||||||
|
},
|
||||||
|
"split": strings.Split,
|
||||||
|
"join": strings.Join,
|
||||||
|
"title": strings.Title,
|
||||||
|
"lower": strings.ToLower,
|
||||||
|
"upper": strings.ToUpper,
|
||||||
|
"pad": padWithSpace,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Parse creates a new annonymous template with the basic functions
|
||||||
|
// and parses the given format.
|
||||||
|
func Parse(format string) (*template.Template, error) {
|
||||||
|
return NewParse("", format)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewParse creates a new tagged template with the basic functions
|
||||||
|
// and parses the given format.
|
||||||
|
func NewParse(tag, format string) (*template.Template, error) {
|
||||||
|
return template.New(tag).Funcs(basicFunctions).Parse(format)
|
||||||
|
}
|
||||||
|
|
||||||
|
// padWithSpace adds whitespace to the input if the input is non-empty
|
||||||
|
func padWithSpace(source string, prefix, suffix int) string {
|
||||||
|
if source == "" {
|
||||||
|
return source
|
||||||
|
}
|
||||||
|
return strings.Repeat(" ", prefix) + source + strings.Repeat(" ", suffix)
|
||||||
|
}
|
39
vendor/src/github.com/opencontainers/runc/libcontainer/apparmor/apparmor.go
vendored
Normal file
39
vendor/src/github.com/opencontainers/runc/libcontainer/apparmor/apparmor.go
vendored
Normal file
|
@ -0,0 +1,39 @@
|
||||||
|
// +build apparmor,linux
|
||||||
|
|
||||||
|
package apparmor
|
||||||
|
|
||||||
|
// #cgo LDFLAGS: -lapparmor
|
||||||
|
// #include <sys/apparmor.h>
|
||||||
|
// #include <stdlib.h>
|
||||||
|
import "C"
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"unsafe"
|
||||||
|
)
|
||||||
|
|
||||||
|
// IsEnabled returns true if apparmor is enabled for the host.
|
||||||
|
func IsEnabled() bool {
|
||||||
|
if _, err := os.Stat("/sys/kernel/security/apparmor"); err == nil && os.Getenv("container") == "" {
|
||||||
|
if _, err = os.Stat("/sbin/apparmor_parser"); err == nil {
|
||||||
|
buf, err := ioutil.ReadFile("/sys/module/apparmor/parameters/enabled")
|
||||||
|
return err == nil && len(buf) > 1 && buf[0] == 'Y'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// ApplyProfile will apply the profile with the specified name to the process after
|
||||||
|
// the next exec.
|
||||||
|
func ApplyProfile(name string) error {
|
||||||
|
if name == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
cName := C.CString(name)
|
||||||
|
defer C.free(unsafe.Pointer(cName))
|
||||||
|
if _, err := C.aa_change_onexec(cName); err != nil {
|
||||||
|
return fmt.Errorf("apparmor failed to apply profile: %s", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
20
vendor/src/github.com/opencontainers/runc/libcontainer/apparmor/apparmor_disabled.go
vendored
Normal file
20
vendor/src/github.com/opencontainers/runc/libcontainer/apparmor/apparmor_disabled.go
vendored
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
// +build !apparmor !linux
|
||||||
|
|
||||||
|
package apparmor
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
var ErrApparmorNotEnabled = errors.New("apparmor: config provided but apparmor not supported")
|
||||||
|
|
||||||
|
func IsEnabled() bool {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func ApplyProfile(name string) error {
|
||||||
|
if name != "" {
|
||||||
|
return ErrApparmorNotEnabled
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
Loading…
Reference in a new issue