PodSecurity check for AppArmor fields
This commit is contained in:
parent
24537a9131
commit
d25b1ded76
@ -23,6 +23,7 @@ import (
|
|||||||
|
|
||||||
corev1 "k8s.io/api/core/v1"
|
corev1 "k8s.io/api/core/v1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
"k8s.io/pod-security-admission/api"
|
"k8s.io/pod-security-admission/api"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -35,6 +36,14 @@ profile, or restrict overrides to an allowed set of profiles.
|
|||||||
metadata.annotations['container.apparmor.security.beta.kubernetes.io/*']
|
metadata.annotations['container.apparmor.security.beta.kubernetes.io/*']
|
||||||
|
|
||||||
**Allowed Values:** 'runtime/default', 'localhost/*', empty, undefined
|
**Allowed Values:** 'runtime/default', 'localhost/*', empty, undefined
|
||||||
|
|
||||||
|
**Restricted Fields:**
|
||||||
|
spec.securityContext.appArmorProfile.type
|
||||||
|
spec.containers[*].securityContext.appArmorProfile.type
|
||||||
|
spec.initContainers[*].securityContext.appArmorProfile.type
|
||||||
|
spec.ephemeralContainers[*].securityContext.appArmorProfile.type
|
||||||
|
|
||||||
|
**Allowed Values:** 'RuntimeDefault', 'Localhost', undefined
|
||||||
*/
|
*/
|
||||||
func init() {
|
func init() {
|
||||||
addCheck(CheckAppArmorProfile)
|
addCheck(CheckAppArmorProfile)
|
||||||
@ -55,25 +64,78 @@ func CheckAppArmorProfile() Check {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func allowedProfile(profile string) bool {
|
func allowedAnnotationValue(profile string) bool {
|
||||||
return len(profile) == 0 ||
|
return len(profile) == 0 ||
|
||||||
profile == corev1.AppArmorBetaProfileRuntimeDefault ||
|
profile == corev1.AppArmorBetaProfileRuntimeDefault ||
|
||||||
strings.HasPrefix(profile, corev1.AppArmorBetaProfileNamePrefix)
|
strings.HasPrefix(profile, corev1.AppArmorBetaProfileNamePrefix)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func allowedProfileType(profile corev1.AppArmorProfileType) bool {
|
||||||
|
switch profile {
|
||||||
|
case corev1.AppArmorProfileTypeRuntimeDefault,
|
||||||
|
corev1.AppArmorProfileTypeLocalhost:
|
||||||
|
return true
|
||||||
|
default:
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func appArmorProfile_1_0(podMetadata *metav1.ObjectMeta, podSpec *corev1.PodSpec) CheckResult {
|
func appArmorProfile_1_0(podMetadata *metav1.ObjectMeta, podSpec *corev1.PodSpec) CheckResult {
|
||||||
var forbiddenValues []string
|
var badSetters []string // things that explicitly set appArmorProfile.type to a bad value
|
||||||
for k, v := range podMetadata.Annotations {
|
badValues := sets.NewString()
|
||||||
if strings.HasPrefix(k, corev1.AppArmorBetaContainerAnnotationKeyPrefix) && !allowedProfile(v) {
|
|
||||||
forbiddenValues = append(forbiddenValues, fmt.Sprintf("%s=%q", k, v))
|
if podSpec.SecurityContext != nil && podSpec.SecurityContext.AppArmorProfile != nil {
|
||||||
|
if !allowedProfileType(podSpec.SecurityContext.AppArmorProfile.Type) {
|
||||||
|
badSetters = append(badSetters, "pod")
|
||||||
|
badValues.Insert(string(podSpec.SecurityContext.AppArmorProfile.Type))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if len(forbiddenValues) > 0 {
|
|
||||||
sort.Strings(forbiddenValues)
|
var badContainers []string // containers that set apparmorProfile.type to a bad value
|
||||||
|
visitContainers(podSpec, func(c *corev1.Container) {
|
||||||
|
if c.SecurityContext != nil && c.SecurityContext.AppArmorProfile != nil {
|
||||||
|
if !allowedProfileType(c.SecurityContext.AppArmorProfile.Type) {
|
||||||
|
badContainers = append(badContainers, c.Name)
|
||||||
|
badValues.Insert(string(c.SecurityContext.AppArmorProfile.Type))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
if len(badContainers) > 0 {
|
||||||
|
badSetters = append(
|
||||||
|
badSetters,
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s %s",
|
||||||
|
pluralize("container", "containers", len(badContainers)),
|
||||||
|
joinQuote(badContainers),
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
var forbiddenAnnotations []string
|
||||||
|
for k, v := range podMetadata.Annotations {
|
||||||
|
if strings.HasPrefix(k, corev1.AppArmorBetaContainerAnnotationKeyPrefix) && !allowedAnnotationValue(v) {
|
||||||
|
forbiddenAnnotations = append(forbiddenAnnotations, fmt.Sprintf("%s=%q", k, v))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
badValueList := badValues.List()
|
||||||
|
if len(forbiddenAnnotations) > 0 {
|
||||||
|
sort.Strings(forbiddenAnnotations)
|
||||||
|
badValueList = append(badValueList, forbiddenAnnotations...)
|
||||||
|
badSetters = append(badSetters, pluralize("annotation", "annotations", len(forbiddenAnnotations)))
|
||||||
|
}
|
||||||
|
|
||||||
|
// pod or containers explicitly set bad apparmorProfiles
|
||||||
|
if len(badSetters) > 0 {
|
||||||
return CheckResult{
|
return CheckResult{
|
||||||
Allowed: false,
|
Allowed: false,
|
||||||
ForbiddenReason: pluralize("forbidden AppArmor profile", "forbidden AppArmor profiles", len(forbiddenValues)),
|
ForbiddenReason: pluralize("forbidden AppArmor profile", "forbidden AppArmor profiles", len(badValueList)),
|
||||||
ForbiddenDetail: strings.Join(forbiddenValues, ", "),
|
ForbiddenDetail: fmt.Sprintf(
|
||||||
|
"%s must not set AppArmor profile type to %s",
|
||||||
|
strings.Join(badSetters, " and "),
|
||||||
|
joinQuote(badValueList),
|
||||||
|
),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -24,69 +24,145 @@ import (
|
|||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestCheckAppArmor(t *testing.T) {
|
func TestCheckAppArmor_Allowed(t *testing.T) {
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
name string
|
name string
|
||||||
metaData *metav1.ObjectMeta
|
metaData *metav1.ObjectMeta
|
||||||
podSpec *corev1.PodSpec
|
podSpec *corev1.PodSpec
|
||||||
expectedResult *CheckResult
|
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "container with default AppArmor + extra annotations",
|
name: "container with default AppArmor + extra annotations",
|
||||||
metaData: &metav1.ObjectMeta{Annotations: map[string]string{
|
metaData: &metav1.ObjectMeta{Annotations: map[string]string{
|
||||||
corev1.AppArmorBetaProfileNamePrefix + "test": "runtime/default",
|
corev1.AppArmorBetaProfileNamePrefix + "test": "runtime/default",
|
||||||
"env": "prod",
|
"env": "prod",
|
||||||
},
|
}},
|
||||||
},
|
podSpec: &corev1.PodSpec{},
|
||||||
podSpec: &corev1.PodSpec{},
|
|
||||||
expectedResult: &CheckResult{Allowed: true},
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "container with local AppArmor + extra annotations",
|
name: "container with local AppArmor + extra annotations",
|
||||||
metaData: &metav1.ObjectMeta{Annotations: map[string]string{
|
metaData: &metav1.ObjectMeta{Annotations: map[string]string{
|
||||||
corev1.AppArmorBetaProfileNamePrefix + "test": "localhost/sec-profile01",
|
corev1.AppArmorBetaProfileNamePrefix + "test": "localhost/sec-profile01",
|
||||||
"env": "dev",
|
"env": "dev",
|
||||||
},
|
}},
|
||||||
},
|
podSpec: &corev1.PodSpec{},
|
||||||
podSpec: &corev1.PodSpec{},
|
|
||||||
expectedResult: &CheckResult{Allowed: true},
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "container with no AppArmor annotations",
|
name: "container with no AppArmor annotations",
|
||||||
metaData: &metav1.ObjectMeta{Annotations: map[string]string{
|
metaData: &metav1.ObjectMeta{Annotations: map[string]string{
|
||||||
"env": "dev",
|
"env": "dev",
|
||||||
},
|
}},
|
||||||
},
|
podSpec: &corev1.PodSpec{},
|
||||||
podSpec: &corev1.PodSpec{},
|
|
||||||
expectedResult: &CheckResult{Allowed: true},
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "container with no annotations",
|
name: "container with no annotations",
|
||||||
metaData: &metav1.ObjectMeta{},
|
metaData: &metav1.ObjectMeta{},
|
||||||
podSpec: &corev1.PodSpec{},
|
podSpec: &corev1.PodSpec{},
|
||||||
expectedResult: &CheckResult{Allowed: true},
|
},
|
||||||
|
{
|
||||||
|
name: "pod with runtime default",
|
||||||
|
metaData: &metav1.ObjectMeta{},
|
||||||
|
podSpec: &corev1.PodSpec{
|
||||||
|
SecurityContext: &corev1.PodSecurityContext{
|
||||||
|
AppArmorProfile: &corev1.AppArmorProfile{
|
||||||
|
Type: corev1.AppArmorProfileTypeRuntimeDefault,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "container with localhost profile",
|
||||||
|
metaData: &metav1.ObjectMeta{},
|
||||||
|
podSpec: &corev1.PodSpec{
|
||||||
|
Containers: []corev1.Container{{
|
||||||
|
Name: "foo",
|
||||||
|
SecurityContext: &corev1.SecurityContext{
|
||||||
|
AppArmorProfile: &corev1.AppArmorProfile{
|
||||||
|
Type: corev1.AppArmorProfileTypeRuntimeDefault,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}},
|
||||||
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, testCase := range testCases {
|
for _, testCase := range testCases {
|
||||||
t.Run(testCase.name, func(t *testing.T) {
|
t.Run(testCase.name, func(t *testing.T) {
|
||||||
result := appArmorProfile_1_0(testCase.metaData, nil)
|
result := appArmorProfile_1_0(testCase.metaData, testCase.podSpec)
|
||||||
if result.Allowed != testCase.expectedResult.Allowed {
|
if !result.Allowed {
|
||||||
t.Errorf("Expected result was Allowed=%v for annotations %v",
|
t.Errorf("Should be allowed")
|
||||||
testCase.expectedResult.Allowed, testCase.metaData.Annotations)
|
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestAppArmorProfile(t *testing.T) {
|
func TestCheckAppArmor_Forbidden(t *testing.T) {
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
pod *corev1.Pod
|
pod *corev1.Pod
|
||||||
expectReason string
|
expectReason string
|
||||||
expectDetail string
|
expectDetail string
|
||||||
}{
|
}{
|
||||||
|
{
|
||||||
|
name: "unconfined pod",
|
||||||
|
pod: &corev1.Pod{
|
||||||
|
Spec: corev1.PodSpec{
|
||||||
|
SecurityContext: &corev1.PodSecurityContext{
|
||||||
|
AppArmorProfile: &corev1.AppArmorProfile{
|
||||||
|
Type: corev1.AppArmorProfileTypeUnconfined,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectReason: "forbidden AppArmor profile",
|
||||||
|
expectDetail: `pod must not set AppArmor profile type to "Unconfined"`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "unconfined container",
|
||||||
|
pod: &corev1.Pod{
|
||||||
|
Spec: corev1.PodSpec{
|
||||||
|
SecurityContext: &corev1.PodSecurityContext{
|
||||||
|
AppArmorProfile: &corev1.AppArmorProfile{
|
||||||
|
Type: corev1.AppArmorProfileTypeRuntimeDefault,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Containers: []corev1.Container{{
|
||||||
|
Name: "foo",
|
||||||
|
SecurityContext: &corev1.SecurityContext{
|
||||||
|
AppArmorProfile: &corev1.AppArmorProfile{
|
||||||
|
Type: corev1.AppArmorProfileTypeUnconfined,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectReason: "forbidden AppArmor profile",
|
||||||
|
expectDetail: `container "foo" must not set AppArmor profile type to "Unconfined"`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "unconfined init container",
|
||||||
|
pod: &corev1.Pod{
|
||||||
|
Spec: corev1.PodSpec{
|
||||||
|
SecurityContext: &corev1.PodSecurityContext{
|
||||||
|
AppArmorProfile: &corev1.AppArmorProfile{
|
||||||
|
Type: corev1.AppArmorProfileTypeRuntimeDefault,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Containers: []corev1.Container{{
|
||||||
|
Name: "foo",
|
||||||
|
}},
|
||||||
|
InitContainers: []corev1.Container{{
|
||||||
|
Name: "bar",
|
||||||
|
SecurityContext: &corev1.SecurityContext{
|
||||||
|
AppArmorProfile: &corev1.AppArmorProfile{
|
||||||
|
Type: corev1.AppArmorProfileTypeUnconfined,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectReason: "forbidden AppArmor profile",
|
||||||
|
expectDetail: `container "bar" must not set AppArmor profile type to "Unconfined"`,
|
||||||
|
},
|
||||||
{
|
{
|
||||||
name: "multiple containers",
|
name: "multiple containers",
|
||||||
pod: &corev1.Pod{
|
pod: &corev1.Pod{
|
||||||
@ -102,11 +178,11 @@ func TestAppArmorProfile(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
expectReason: `forbidden AppArmor profiles`,
|
expectReason: "forbidden AppArmor profiles",
|
||||||
expectDetail: strings.Join([]string{
|
expectDetail: "annotations must not set AppArmor profile type to " + strings.Join([]string{
|
||||||
`container.apparmor.security.beta.kubernetes.io/="bogus"`,
|
`"container.apparmor.security.beta.kubernetes.io/="bogus""`,
|
||||||
`container.apparmor.security.beta.kubernetes.io/e="unconfined"`,
|
`"container.apparmor.security.beta.kubernetes.io/e="unconfined""`,
|
||||||
`container.apparmor.security.beta.kubernetes.io/f="unknown"`,
|
`"container.apparmor.security.beta.kubernetes.io/f="unknown""`,
|
||||||
}, ", "),
|
}, ", "),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user