179 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			179 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| //go:build linux
 | |
| 
 | |
| /*
 | |
|    Copyright The docker Authors.
 | |
|    Copyright The Moby Authors.
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package apparmor
 | |
| 
 | |
| import (
 | |
| 	"bufio"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"os"
 | |
| 	"os/exec"
 | |
| 	"path"
 | |
| 	"strings"
 | |
| 	"text/template"
 | |
| )
 | |
| 
 | |
| // NOTE: This code is copied from <github.com/docker/docker/profiles/apparmor>.
 | |
| //       If you plan to make any changes, please make sure they are also sent
 | |
| //       upstream.
 | |
| 
 | |
| const dir = "/etc/apparmor.d"
 | |
| 
 | |
| const defaultTemplate = `
 | |
| {{range $value := .Imports}}
 | |
| {{$value}}
 | |
| {{end}}
 | |
| 
 | |
| profile {{.Name}} flags=(attach_disconnected,mediate_deleted) {
 | |
| {{range $value := .InnerImports}}
 | |
|   {{$value}}
 | |
| {{end}}
 | |
| 
 | |
|   network,
 | |
|   capability,
 | |
|   file,
 | |
|   umount,
 | |
|   # Host (privileged) processes may send signals to container processes.
 | |
|   signal (receive) peer=unconfined,
 | |
|   # Manager may send signals to container processes.
 | |
|   signal (receive) peer={{.DaemonProfile}},
 | |
|   # Container processes may send signals amongst themselves.
 | |
|   signal (send,receive) peer={{.Name}},
 | |
| 
 | |
|   deny @{PROC}/* w,   # deny write for all files directly in /proc (not in a subdir)
 | |
|   # deny write to files not in /proc/<number>/** or /proc/sys/**
 | |
|   deny @{PROC}/{[^1-9],[^1-9][^0-9],[^1-9s][^0-9y][^0-9s],[^1-9][^0-9][^0-9][^0-9]*}/** w,
 | |
|   deny @{PROC}/sys/[^k]** w,  # deny /proc/sys except /proc/sys/k* (effectively /proc/sys/kernel)
 | |
|   deny @{PROC}/sys/kernel/{?,??,[^s][^h][^m]**} w,  # deny everything except shm* in /proc/sys/kernel/
 | |
|   deny @{PROC}/sysrq-trigger rwklx,
 | |
|   deny @{PROC}/mem rwklx,
 | |
|   deny @{PROC}/kmem rwklx,
 | |
|   deny @{PROC}/kcore rwklx,
 | |
| 
 | |
|   deny mount,
 | |
| 
 | |
|   deny /sys/[^f]*/** wklx,
 | |
|   deny /sys/f[^s]*/** wklx,
 | |
|   deny /sys/fs/[^c]*/** wklx,
 | |
|   deny /sys/fs/c[^g]*/** wklx,
 | |
|   deny /sys/fs/cg[^r]*/** wklx,
 | |
|   deny /sys/firmware/** rwklx,
 | |
|   deny /sys/devices/virtual/powercap/** rwklx,
 | |
|   deny /sys/kernel/security/** rwklx,
 | |
| 
 | |
|   # allow processes within the container to trace each other,
 | |
|   # provided all other LSM and yama setting allow it.
 | |
|   ptrace (trace,tracedby,read,readby) peer={{.Name}},
 | |
| }
 | |
| `
 | |
| 
 | |
| type data struct {
 | |
| 	Name          string
 | |
| 	Imports       []string
 | |
| 	InnerImports  []string
 | |
| 	DaemonProfile string
 | |
| }
 | |
| 
 | |
| func cleanProfileName(profile string) string {
 | |
| 	// Normally profiles are suffixed by " (enforce)". AppArmor profiles cannot
 | |
| 	// contain spaces so this doesn't restrict daemon profile names.
 | |
| 	profile, _, _ = strings.Cut(profile, " ")
 | |
| 	if profile == "" {
 | |
| 		profile = "unconfined"
 | |
| 	}
 | |
| 	return profile
 | |
| }
 | |
| 
 | |
| func loadData(name string) (*data, error) {
 | |
| 	p := data{
 | |
| 		Name: name,
 | |
| 	}
 | |
| 
 | |
| 	if macroExists("tunables/global") {
 | |
| 		p.Imports = append(p.Imports, "#include <tunables/global>")
 | |
| 	} else {
 | |
| 		p.Imports = append(p.Imports, "@{PROC}=/proc/")
 | |
| 	}
 | |
| 	if macroExists("abstractions/base") {
 | |
| 		p.InnerImports = append(p.InnerImports, "#include <abstractions/base>")
 | |
| 	}
 | |
| 
 | |
| 	// Figure out the daemon profile.
 | |
| 	currentProfile, err := os.ReadFile("/proc/self/attr/current")
 | |
| 	if err != nil {
 | |
| 		// If we couldn't get the daemon profile, assume we are running
 | |
| 		// unconfined which is generally the default.
 | |
| 		currentProfile = nil
 | |
| 	}
 | |
| 	p.DaemonProfile = cleanProfileName(string(currentProfile))
 | |
| 
 | |
| 	return &p, nil
 | |
| }
 | |
| 
 | |
| func generate(p *data, o io.Writer) error {
 | |
| 	t, err := template.New("apparmor_profile").Parse(defaultTemplate)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return t.Execute(o, p)
 | |
| }
 | |
| 
 | |
| func load(path string) error {
 | |
| 	out, err := aaParser("-Kr", path)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("parser error(%q): %w", strings.TrimSpace(out), err)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // macrosExists checks if the passed macro exists.
 | |
| func macroExists(m string) bool {
 | |
| 	_, err := os.Stat(path.Join(dir, m))
 | |
| 	return err == nil
 | |
| }
 | |
| 
 | |
| func aaParser(args ...string) (string, error) {
 | |
| 	out, err := exec.Command("apparmor_parser", args...).CombinedOutput()
 | |
| 	return string(out), err
 | |
| }
 | |
| 
 | |
| func isLoaded(name string) (bool, error) {
 | |
| 	f, err := os.Open("/sys/kernel/security/apparmor/profiles")
 | |
| 	if err != nil {
 | |
| 		return false, err
 | |
| 	}
 | |
| 	defer f.Close()
 | |
| 	r := bufio.NewReader(f)
 | |
| 	for {
 | |
| 		p, err := r.ReadString('\n')
 | |
| 		if err == io.EOF {
 | |
| 			break
 | |
| 		}
 | |
| 		if err != nil {
 | |
| 			return false, err
 | |
| 		}
 | |
| 		if strings.HasPrefix(p, name+" ") {
 | |
| 			return true, nil
 | |
| 		}
 | |
| 	}
 | |
| 	return false, nil
 | |
| }
 | 
