Merge pull request #5223 from crosbymichael/load-profile
Use apparmor parser directly
This commit is contained in:
commit
e353fa62bb
6 changed files with 184 additions and 131 deletions
|
@ -8,12 +8,16 @@ package apparmor
|
||||||
import "C"
|
import "C"
|
||||||
import (
|
import (
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
"unsafe"
|
"unsafe"
|
||||||
)
|
)
|
||||||
|
|
||||||
func IsEnabled() bool {
|
func IsEnabled() bool {
|
||||||
buf, err := ioutil.ReadFile("/sys/module/apparmor/parameters/enabled")
|
if _, err := os.Stat("/sys/kernel/security/apparmor"); err == nil {
|
||||||
return err == nil && len(buf) > 1 && buf[0] == 'Y'
|
buf, err := ioutil.ReadFile("/sys/module/apparmor/parameters/enabled")
|
||||||
|
return err == nil && len(buf) > 1 && buf[0] == 'Y'
|
||||||
|
}
|
||||||
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func ApplyProfile(pid int, name string) error {
|
func ApplyProfile(pid int, name string) error {
|
94
apparmor/gen.go
Normal file
94
apparmor/gen.go
Normal file
|
@ -0,0 +1,94 @@
|
||||||
|
package apparmor
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"text/template"
|
||||||
|
)
|
||||||
|
|
||||||
|
type data struct {
|
||||||
|
Name string
|
||||||
|
Imports []string
|
||||||
|
InnerImports []string
|
||||||
|
}
|
||||||
|
|
||||||
|
const baseTemplate = `
|
||||||
|
{{range $value := .Imports}}
|
||||||
|
{{$value}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
profile {{.Name}} flags=(attach_disconnected,mediate_deleted) {
|
||||||
|
{{range $value := .InnerImports}}
|
||||||
|
{{$value}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
network,
|
||||||
|
capability,
|
||||||
|
file,
|
||||||
|
umount,
|
||||||
|
|
||||||
|
mount fstype=tmpfs,
|
||||||
|
mount fstype=mqueue,
|
||||||
|
mount fstype=fuse.*,
|
||||||
|
mount fstype=binfmt_misc -> /proc/sys/fs/binfmt_misc/,
|
||||||
|
mount fstype=efivarfs -> /sys/firmware/efi/efivars/,
|
||||||
|
mount fstype=fusectl -> /sys/fs/fuse/connections/,
|
||||||
|
mount fstype=securityfs -> /sys/kernel/security/,
|
||||||
|
mount fstype=debugfs -> /sys/kernel/debug/,
|
||||||
|
mount fstype=proc -> /proc/,
|
||||||
|
mount fstype=sysfs -> /sys/,
|
||||||
|
|
||||||
|
deny @{PROC}/sys/fs/** wklx,
|
||||||
|
deny @{PROC}/sysrq-trigger rwklx,
|
||||||
|
deny @{PROC}/mem rwklx,
|
||||||
|
deny @{PROC}/kmem rwklx,
|
||||||
|
deny @{PROC}/sys/kernel/[^s][^h][^m]* wklx,
|
||||||
|
deny @{PROC}/sys/kernel/*/** wklx,
|
||||||
|
|
||||||
|
deny mount options=(ro, remount) -> /,
|
||||||
|
deny mount fstype=debugfs -> /var/lib/ureadahead/debugfs/,
|
||||||
|
deny mount fstype=devpts,
|
||||||
|
|
||||||
|
deny /sys/[^f]*/** wklx,
|
||||||
|
deny /sys/f[^s]*/** wklx,
|
||||||
|
deny /sys/fs/[^c]*/** wklx,
|
||||||
|
deny /sys/fs/c[^g]*/** wklx,
|
||||||
|
deny /sys/fs/cg[^r]*/** wklx,
|
||||||
|
deny /sys/firmware/efi/efivars/** rwklx,
|
||||||
|
deny /sys/kernel/security/** rwklx,
|
||||||
|
}
|
||||||
|
`
|
||||||
|
|
||||||
|
func generateProfile(out io.Writer) error {
|
||||||
|
compiled, err := template.New("apparmor_profile").Parse(baseTemplate)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
data := &data{
|
||||||
|
Name: "docker-default",
|
||||||
|
}
|
||||||
|
if tuntablesExists() {
|
||||||
|
data.Imports = append(data.Imports, "#include <tunables/global>")
|
||||||
|
} else {
|
||||||
|
data.Imports = append(data.Imports, "@{PROC}=/proc/")
|
||||||
|
}
|
||||||
|
if abstrctionsEsists() {
|
||||||
|
data.InnerImports = append(data.InnerImports, "#include <abstractions/base>")
|
||||||
|
}
|
||||||
|
if err := compiled.Execute(out, data); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// check if the tunables/global exist
|
||||||
|
func tuntablesExists() bool {
|
||||||
|
_, err := os.Stat("/etc/apparmor.d/tunables/global")
|
||||||
|
return err == nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// check if abstractions/base exist
|
||||||
|
func abstrctionsEsists() bool {
|
||||||
|
_, err := os.Stat("/etc/apparmor.d/abstractions/base")
|
||||||
|
return err == nil
|
||||||
|
}
|
83
apparmor/setup.go
Normal file
83
apparmor/setup.go
Normal file
|
@ -0,0 +1,83 @@
|
||||||
|
package apparmor
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"path"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
DefaultProfilePath = "/etc/apparmor.d/docker"
|
||||||
|
)
|
||||||
|
|
||||||
|
func InstallDefaultProfile(backupPath string) error {
|
||||||
|
if !IsEnabled() {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// If the profile already exists, check if we already have a backup
|
||||||
|
// if not, do the backup and override it. (docker 0.10 upgrade changed the apparmor profile)
|
||||||
|
// see gh#5049, apparmor blocks signals in ubuntu 14.04
|
||||||
|
if _, err := os.Stat(DefaultProfilePath); err == nil {
|
||||||
|
if _, err := os.Stat(backupPath); err == nil {
|
||||||
|
// If both the profile and the backup are present, do nothing
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// Make sure the directory exists
|
||||||
|
if err := os.MkdirAll(path.Dir(backupPath), 0755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create the backup file
|
||||||
|
f, err := os.Create(backupPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer f.Close()
|
||||||
|
|
||||||
|
src, err := os.Open(DefaultProfilePath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer src.Close()
|
||||||
|
|
||||||
|
if _, err := io.Copy(f, src); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Make sure /etc/apparmor.d exists
|
||||||
|
if err := os.MkdirAll(path.Dir(DefaultProfilePath), 0755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
f, err := os.OpenFile(DefaultProfilePath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0644)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := generateProfile(f); err != nil {
|
||||||
|
f.Close()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
f.Close()
|
||||||
|
|
||||||
|
cmd := exec.Command("/sbin/apparmor_parser", "-r", "-W", "docker")
|
||||||
|
// to use the parser directly we have to make sure we are in the correct
|
||||||
|
// dir with the profile
|
||||||
|
cmd.Dir = "/etc/apparmor.d"
|
||||||
|
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil && !os.IsNotExist(err) {
|
||||||
|
if e, ok := err.(*exec.Error); ok {
|
||||||
|
// keeping with the current profile load code, if the parser does not
|
||||||
|
// exist then just return
|
||||||
|
if e.Err == exec.ErrNotFound || os.IsNotExist(e.Err) {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return fmt.Errorf("Error loading docker profile: %s (%s)", err, output)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -1,128 +0,0 @@
|
||||||
package apparmor
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"io"
|
|
||||||
"io/ioutil"
|
|
||||||
"os"
|
|
||||||
"os/exec"
|
|
||||||
"path"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
DefaultProfilePath = "/etc/apparmor.d/docker"
|
|
||||||
)
|
|
||||||
|
|
||||||
const DefaultProfile = `
|
|
||||||
# AppArmor profile from lxc for containers.
|
|
||||||
|
|
||||||
#include <tunables/global>
|
|
||||||
profile docker-default flags=(attach_disconnected,mediate_deleted) {
|
|
||||||
#include <abstractions/base>
|
|
||||||
network,
|
|
||||||
capability,
|
|
||||||
file,
|
|
||||||
umount,
|
|
||||||
|
|
||||||
# ignore DENIED message on / remount
|
|
||||||
deny mount options=(ro, remount) -> /,
|
|
||||||
|
|
||||||
# allow tmpfs mounts everywhere
|
|
||||||
mount fstype=tmpfs,
|
|
||||||
|
|
||||||
# allow mqueue mounts everywhere
|
|
||||||
mount fstype=mqueue,
|
|
||||||
|
|
||||||
# allow fuse mounts everywhere
|
|
||||||
mount fstype=fuse.*,
|
|
||||||
|
|
||||||
# allow bind mount of /lib/init/fstab for lxcguest
|
|
||||||
mount options=(rw, bind) /lib/init/fstab.lxc/ -> /lib/init/fstab/,
|
|
||||||
|
|
||||||
# deny writes in /proc/sys/fs but allow binfmt_misc to be mounted
|
|
||||||
mount fstype=binfmt_misc -> /proc/sys/fs/binfmt_misc/,
|
|
||||||
deny @{PROC}/sys/fs/** wklx,
|
|
||||||
|
|
||||||
# allow efivars to be mounted, writing to it will be blocked though
|
|
||||||
mount fstype=efivarfs -> /sys/firmware/efi/efivars/,
|
|
||||||
|
|
||||||
# block some other dangerous paths
|
|
||||||
deny @{PROC}/sysrq-trigger rwklx,
|
|
||||||
deny @{PROC}/mem rwklx,
|
|
||||||
deny @{PROC}/kmem rwklx,
|
|
||||||
deny @{PROC}/sys/kernel/[^s][^h][^m]* wklx,
|
|
||||||
deny @{PROC}/sys/kernel/*/** wklx,
|
|
||||||
|
|
||||||
# deny writes in /sys except for /sys/fs/cgroup, also allow
|
|
||||||
# fusectl, securityfs and debugfs to be mounted there (read-only)
|
|
||||||
mount fstype=fusectl -> /sys/fs/fuse/connections/,
|
|
||||||
mount fstype=securityfs -> /sys/kernel/security/,
|
|
||||||
mount fstype=debugfs -> /sys/kernel/debug/,
|
|
||||||
deny mount fstype=debugfs -> /var/lib/ureadahead/debugfs/,
|
|
||||||
mount fstype=proc -> /proc/,
|
|
||||||
mount fstype=sysfs -> /sys/,
|
|
||||||
deny /sys/[^f]*/** wklx,
|
|
||||||
deny /sys/f[^s]*/** wklx,
|
|
||||||
deny /sys/fs/[^c]*/** wklx,
|
|
||||||
deny /sys/fs/c[^g]*/** wklx,
|
|
||||||
deny /sys/fs/cg[^r]*/** wklx,
|
|
||||||
deny /sys/firmware/efi/efivars/** rwklx,
|
|
||||||
deny /sys/kernel/security/** rwklx,
|
|
||||||
mount options=(move) /sys/fs/cgroup/cgmanager/ -> /sys/fs/cgroup/cgmanager.lower/,
|
|
||||||
|
|
||||||
# the container may never be allowed to mount devpts. If it does, it
|
|
||||||
# will remount the host's devpts. We could allow it to do it with
|
|
||||||
# the newinstance option (but, right now, we don't).
|
|
||||||
deny mount fstype=devpts,
|
|
||||||
}
|
|
||||||
`
|
|
||||||
|
|
||||||
func InstallDefaultProfile(backupPath string) error {
|
|
||||||
if !IsEnabled() {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// If the profile already exists, check if we already have a backup
|
|
||||||
// if not, do the backup and override it. (docker 0.10 upgrade changed the apparmor profile)
|
|
||||||
// see gh#5049, apparmor blocks signals in ubuntu 14.04
|
|
||||||
if _, err := os.Stat(DefaultProfilePath); err == nil {
|
|
||||||
if _, err := os.Stat(backupPath); err == nil {
|
|
||||||
// If both the profile and the backup are present, do nothing
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
// Make sure the directory exists
|
|
||||||
if err := os.MkdirAll(path.Dir(backupPath), 0755); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create the backup file
|
|
||||||
f, err := os.Create(backupPath)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer f.Close()
|
|
||||||
src, err := os.Open(DefaultProfilePath)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer src.Close()
|
|
||||||
if _, err := io.Copy(f, src); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Make sure /etc/apparmor.d exists
|
|
||||||
if err := os.MkdirAll(path.Dir(DefaultProfilePath), 0755); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := ioutil.WriteFile(DefaultProfilePath, []byte(DefaultProfile), 0644); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
output, err := exec.Command("/lib/init/apparmor-profile-load", "docker").CombinedOutput()
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("Error loading docker profile: %s (%s)", err, output)
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
|
@ -8,9 +8,9 @@ import (
|
||||||
"runtime"
|
"runtime"
|
||||||
"syscall"
|
"syscall"
|
||||||
|
|
||||||
|
"github.com/dotcloud/docker/pkg/apparmor"
|
||||||
"github.com/dotcloud/docker/pkg/label"
|
"github.com/dotcloud/docker/pkg/label"
|
||||||
"github.com/dotcloud/docker/pkg/libcontainer"
|
"github.com/dotcloud/docker/pkg/libcontainer"
|
||||||
"github.com/dotcloud/docker/pkg/libcontainer/apparmor"
|
|
||||||
"github.com/dotcloud/docker/pkg/libcontainer/capabilities"
|
"github.com/dotcloud/docker/pkg/libcontainer/capabilities"
|
||||||
"github.com/dotcloud/docker/pkg/libcontainer/network"
|
"github.com/dotcloud/docker/pkg/libcontainer/network"
|
||||||
"github.com/dotcloud/docker/pkg/libcontainer/utils"
|
"github.com/dotcloud/docker/pkg/libcontainer/utils"
|
||||||
|
|
Loading…
Reference in a new issue