factory.go 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. /*
  2. Copyright 2016 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package podsecuritypolicy
  14. import (
  15. "fmt"
  16. utilfeature "k8s.io/apiserver/pkg/util/feature"
  17. "k8s.io/kubernetes/pkg/features"
  18. corev1 "k8s.io/api/core/v1"
  19. policy "k8s.io/api/policy/v1beta1"
  20. "k8s.io/apimachinery/pkg/util/errors"
  21. "k8s.io/kubernetes/pkg/security/podsecuritypolicy/apparmor"
  22. "k8s.io/kubernetes/pkg/security/podsecuritypolicy/capabilities"
  23. "k8s.io/kubernetes/pkg/security/podsecuritypolicy/group"
  24. "k8s.io/kubernetes/pkg/security/podsecuritypolicy/seccomp"
  25. "k8s.io/kubernetes/pkg/security/podsecuritypolicy/selinux"
  26. "k8s.io/kubernetes/pkg/security/podsecuritypolicy/sysctl"
  27. "k8s.io/kubernetes/pkg/security/podsecuritypolicy/user"
  28. )
  29. type simpleStrategyFactory struct{}
  30. var _ StrategyFactory = &simpleStrategyFactory{}
  31. func NewSimpleStrategyFactory() StrategyFactory {
  32. return &simpleStrategyFactory{}
  33. }
  34. func (f *simpleStrategyFactory) CreateStrategies(psp *policy.PodSecurityPolicy, namespace string) (*ProviderStrategies, error) {
  35. errs := []error{}
  36. userStrat, err := createUserStrategy(&psp.Spec.RunAsUser)
  37. if err != nil {
  38. errs = append(errs, err)
  39. }
  40. var groupStrat group.GroupStrategy
  41. if utilfeature.DefaultFeatureGate.Enabled(features.RunAsGroup) {
  42. groupStrat, err = createRunAsGroupStrategy(psp.Spec.RunAsGroup)
  43. if err != nil {
  44. errs = append(errs, err)
  45. }
  46. }
  47. seLinuxStrat, err := createSELinuxStrategy(&psp.Spec.SELinux)
  48. if err != nil {
  49. errs = append(errs, err)
  50. }
  51. appArmorStrat, err := createAppArmorStrategy(psp)
  52. if err != nil {
  53. errs = append(errs, err)
  54. }
  55. seccompStrat, err := createSeccompStrategy(psp)
  56. if err != nil {
  57. errs = append(errs, err)
  58. }
  59. fsGroupStrat, err := createFSGroupStrategy(&psp.Spec.FSGroup)
  60. if err != nil {
  61. errs = append(errs, err)
  62. }
  63. supGroupStrat, err := createSupplementalGroupStrategy(&psp.Spec.SupplementalGroups)
  64. if err != nil {
  65. errs = append(errs, err)
  66. }
  67. capStrat, err := createCapabilitiesStrategy(psp.Spec.DefaultAddCapabilities, psp.Spec.RequiredDropCapabilities, psp.Spec.AllowedCapabilities)
  68. if err != nil {
  69. errs = append(errs, err)
  70. }
  71. sysctlsStrat := createSysctlsStrategy(sysctl.SafeSysctlWhitelist(), psp.Spec.AllowedUnsafeSysctls, psp.Spec.ForbiddenSysctls)
  72. if len(errs) > 0 {
  73. return nil, errors.NewAggregate(errs)
  74. }
  75. strategies := &ProviderStrategies{
  76. RunAsUserStrategy: userStrat,
  77. RunAsGroupStrategy: groupStrat,
  78. SELinuxStrategy: seLinuxStrat,
  79. AppArmorStrategy: appArmorStrat,
  80. FSGroupStrategy: fsGroupStrat,
  81. SupplementalGroupStrategy: supGroupStrat,
  82. CapabilitiesStrategy: capStrat,
  83. SeccompStrategy: seccompStrat,
  84. SysctlsStrategy: sysctlsStrat,
  85. }
  86. return strategies, nil
  87. }
  88. // createUserStrategy creates a new user strategy.
  89. func createUserStrategy(opts *policy.RunAsUserStrategyOptions) (user.RunAsUserStrategy, error) {
  90. switch opts.Rule {
  91. case policy.RunAsUserStrategyMustRunAs:
  92. return user.NewMustRunAs(opts)
  93. case policy.RunAsUserStrategyMustRunAsNonRoot:
  94. return user.NewRunAsNonRoot(opts)
  95. case policy.RunAsUserStrategyRunAsAny:
  96. return user.NewRunAsAny(opts)
  97. default:
  98. return nil, fmt.Errorf("Unrecognized RunAsUser strategy type %s", opts.Rule)
  99. }
  100. }
  101. // createRunAsGroupStrategy creates a new group strategy.
  102. func createRunAsGroupStrategy(opts *policy.RunAsGroupStrategyOptions) (group.GroupStrategy, error) {
  103. if opts == nil {
  104. return group.NewRunAsAny()
  105. }
  106. switch opts.Rule {
  107. case policy.RunAsGroupStrategyMustRunAs:
  108. return group.NewMustRunAs(opts.Ranges)
  109. case policy.RunAsGroupStrategyRunAsAny:
  110. return group.NewRunAsAny()
  111. case policy.RunAsGroupStrategyMayRunAs:
  112. return group.NewMayRunAs(opts.Ranges)
  113. default:
  114. return nil, fmt.Errorf("Unrecognized RunAsGroup strategy type %s", opts.Rule)
  115. }
  116. }
  117. // createSELinuxStrategy creates a new selinux strategy.
  118. func createSELinuxStrategy(opts *policy.SELinuxStrategyOptions) (selinux.SELinuxStrategy, error) {
  119. switch opts.Rule {
  120. case policy.SELinuxStrategyMustRunAs:
  121. return selinux.NewMustRunAs(opts)
  122. case policy.SELinuxStrategyRunAsAny:
  123. return selinux.NewRunAsAny(opts)
  124. default:
  125. return nil, fmt.Errorf("Unrecognized SELinuxContext strategy type %s", opts.Rule)
  126. }
  127. }
  128. // createAppArmorStrategy creates a new AppArmor strategy.
  129. func createAppArmorStrategy(psp *policy.PodSecurityPolicy) (apparmor.Strategy, error) {
  130. return apparmor.NewStrategy(psp.Annotations), nil
  131. }
  132. // createSeccompStrategy creates a new seccomp strategy.
  133. func createSeccompStrategy(psp *policy.PodSecurityPolicy) (seccomp.Strategy, error) {
  134. return seccomp.NewStrategy(psp.Annotations), nil
  135. }
  136. // createFSGroupStrategy creates a new fsgroup strategy
  137. func createFSGroupStrategy(opts *policy.FSGroupStrategyOptions) (group.GroupStrategy, error) {
  138. switch opts.Rule {
  139. case policy.FSGroupStrategyRunAsAny:
  140. return group.NewRunAsAny()
  141. case policy.FSGroupStrategyMayRunAs:
  142. return group.NewMayRunAs(opts.Ranges)
  143. case policy.FSGroupStrategyMustRunAs:
  144. return group.NewMustRunAs(opts.Ranges)
  145. default:
  146. return nil, fmt.Errorf("Unrecognized FSGroup strategy type %s", opts.Rule)
  147. }
  148. }
  149. // createSupplementalGroupStrategy creates a new supplemental group strategy
  150. func createSupplementalGroupStrategy(opts *policy.SupplementalGroupsStrategyOptions) (group.GroupStrategy, error) {
  151. switch opts.Rule {
  152. case policy.SupplementalGroupsStrategyRunAsAny:
  153. return group.NewRunAsAny()
  154. case policy.SupplementalGroupsStrategyMayRunAs:
  155. return group.NewMayRunAs(opts.Ranges)
  156. case policy.SupplementalGroupsStrategyMustRunAs:
  157. return group.NewMustRunAs(opts.Ranges)
  158. default:
  159. return nil, fmt.Errorf("Unrecognized SupplementalGroups strategy type %s", opts.Rule)
  160. }
  161. }
  162. // createCapabilitiesStrategy creates a new capabilities strategy.
  163. func createCapabilitiesStrategy(defaultAddCaps, requiredDropCaps, allowedCaps []corev1.Capability) (capabilities.Strategy, error) {
  164. return capabilities.NewDefaultCapabilities(defaultAddCaps, requiredDropCaps, allowedCaps)
  165. }
  166. // createSysctlsStrategy creates a new sysctls strategy.
  167. func createSysctlsStrategy(safeWhitelist, allowedUnsafeSysctls, forbiddenSysctls []string) sysctl.SysctlsStrategy {
  168. return sysctl.NewMustMatchPatterns(safeWhitelist, allowedUnsafeSysctls, forbiddenSysctls)
  169. }