mirror of
https://github.com/containers/podman.git
synced 2025-06-05 14:06:01 +08:00
Handle dropping capabilties correctly when running as non root user
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
@ -67,7 +67,7 @@ func securityConfigureGenerator(s *specgen.SpecGenerator, g *generate.Generator,
|
|||||||
g.SetupPrivileged(true)
|
g.SetupPrivileged(true)
|
||||||
caplist = capabilities.AllCapabilities()
|
caplist = capabilities.AllCapabilities()
|
||||||
} else {
|
} else {
|
||||||
caplist, err = rtc.Capabilities(s.User, s.CapAdd, s.CapDrop)
|
caplist, err = capabilities.MergeCapabilities(rtc.Containers.DefaultCapabilities, s.CapAdd, s.CapDrop)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@ -107,10 +107,18 @@ func securityConfigureGenerator(s *specgen.SpecGenerator, g *generate.Generator,
|
|||||||
}
|
}
|
||||||
configSpec := g.Config
|
configSpec := g.Config
|
||||||
configSpec.Process.Capabilities.Bounding = caplist
|
configSpec.Process.Capabilities.Bounding = caplist
|
||||||
|
|
||||||
|
if s.User == "" || s.User == "root" || s.User == "0" {
|
||||||
|
configSpec.Process.Capabilities.Effective = caplist
|
||||||
configSpec.Process.Capabilities.Permitted = caplist
|
configSpec.Process.Capabilities.Permitted = caplist
|
||||||
configSpec.Process.Capabilities.Inheritable = caplist
|
configSpec.Process.Capabilities.Inheritable = caplist
|
||||||
configSpec.Process.Capabilities.Effective = caplist
|
|
||||||
configSpec.Process.Capabilities.Ambient = caplist
|
configSpec.Process.Capabilities.Ambient = caplist
|
||||||
|
} else {
|
||||||
|
configSpec.Process.Capabilities.Effective = []string{}
|
||||||
|
configSpec.Process.Capabilities.Permitted = []string{}
|
||||||
|
configSpec.Process.Capabilities.Inheritable = []string{}
|
||||||
|
configSpec.Process.Capabilities.Ambient = []string{}
|
||||||
|
}
|
||||||
// HANDLE SECCOMP
|
// HANDLE SECCOMP
|
||||||
if s.SeccompProfilePath != "unconfined" {
|
if s.SeccompProfilePath != "unconfined" {
|
||||||
seccompConfig, err := getSeccompConfig(s, configSpec, newImage)
|
seccompConfig, err := getSeccompConfig(s, configSpec, newImage)
|
||||||
|
@ -217,6 +217,51 @@ var _ = Describe("Podman run", func() {
|
|||||||
Expect(session.ExitCode()).To(Equal(0))
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
It("podman run user capabilities test", func() {
|
||||||
|
session := podmanTest.Podman([]string{"run", "--rm", "--user", "bin", ALPINE, "grep", "CapBnd", "/proc/self/status"})
|
||||||
|
session.WaitWithDefaultTimeout()
|
||||||
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
|
Expect(session.OutputToString()).To(ContainSubstring("00000000a80425fb"))
|
||||||
|
|
||||||
|
session = podmanTest.Podman([]string{"run", "--rm", "--user", "bin", ALPINE, "grep", "CapEff", "/proc/self/status"})
|
||||||
|
session.WaitWithDefaultTimeout()
|
||||||
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
|
Expect(session.OutputToString()).To(ContainSubstring("0000000000000000"))
|
||||||
|
|
||||||
|
session = podmanTest.Podman([]string{"run", "--rm", "--user", "root", ALPINE, "grep", "CapBnd", "/proc/self/status"})
|
||||||
|
session.WaitWithDefaultTimeout()
|
||||||
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
|
Expect(session.OutputToString()).To(ContainSubstring("00000000a80425fb"))
|
||||||
|
|
||||||
|
session = podmanTest.Podman([]string{"run", "--rm", "--user", "root", ALPINE, "grep", "CapEff", "/proc/self/status"})
|
||||||
|
session.WaitWithDefaultTimeout()
|
||||||
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
|
Expect(session.OutputToString()).To(ContainSubstring("00000000a80425fb"))
|
||||||
|
|
||||||
|
session = podmanTest.Podman([]string{"run", "--rm", ALPINE, "grep", "CapBnd", "/proc/self/status"})
|
||||||
|
session.WaitWithDefaultTimeout()
|
||||||
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
|
Expect(session.OutputToString()).To(ContainSubstring("00000000a80425fb"))
|
||||||
|
|
||||||
|
session = podmanTest.Podman([]string{"run", "--rm", ALPINE, "grep", "CapEff", "/proc/self/status"})
|
||||||
|
session.WaitWithDefaultTimeout()
|
||||||
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
|
Expect(session.OutputToString()).To(ContainSubstring("00000000a80425fb"))
|
||||||
|
|
||||||
|
dockerfile := `FROM busybox
|
||||||
|
USER bin`
|
||||||
|
podmanTest.BuildImage(dockerfile, "test", "false")
|
||||||
|
session = podmanTest.Podman([]string{"run", "--rm", "--user", "bin", "test", "grep", "CapBnd", "/proc/self/status"})
|
||||||
|
session.WaitWithDefaultTimeout()
|
||||||
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
|
Expect(session.OutputToString()).To(ContainSubstring("00000000a80425fb"))
|
||||||
|
|
||||||
|
session = podmanTest.Podman([]string{"run", "--rm", "--user", "bin", "test", "grep", "CapEff", "/proc/self/status"})
|
||||||
|
session.WaitWithDefaultTimeout()
|
||||||
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
|
Expect(session.OutputToString()).To(ContainSubstring("0000000000000000"))
|
||||||
|
})
|
||||||
|
|
||||||
It("podman run limits test", func() {
|
It("podman run limits test", func() {
|
||||||
SkipIfRootless()
|
SkipIfRootless()
|
||||||
session := podmanTest.Podman([]string{"run", "--rm", "--ulimit", "rtprio=99", "--cap-add=sys_nice", fedoraMinimal, "cat", "/proc/self/sched"})
|
session := podmanTest.Podman([]string{"run", "--rm", "--ulimit", "rtprio=99", "--cap-add=sys_nice", fedoraMinimal, "cat", "/proc/self/sched"})
|
||||||
|
@ -63,6 +63,7 @@ echo $rand | 0 | $rand
|
|||||||
|
|
||||||
@test "podman run - uidmapping has no /sys/kernel mounts" {
|
@test "podman run - uidmapping has no /sys/kernel mounts" {
|
||||||
skip_if_rootless "cannot umount as rootless"
|
skip_if_rootless "cannot umount as rootless"
|
||||||
|
skip_if_remote "TODO Fix this for remote case"
|
||||||
|
|
||||||
run_podman run --rm --uidmap 0:100:10000 $IMAGE mount
|
run_podman run --rm --uidmap 0:100:10000 $IMAGE mount
|
||||||
run grep /sys/kernel <(echo "$output")
|
run grep /sys/kernel <(echo "$output")
|
||||||
|
Reference in New Issue
Block a user