Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add security system #312

Closed
wants to merge 11 commits into from
Closed

Add security system #312

wants to merge 11 commits into from

Conversation

zyga
Copy link
Collaborator

@zyga zyga commented Jan 11, 2016

This branch sets the stage for pluggable security systems.

Each capability type can now refer to a list of security systems. The type can be asked to grant or revoke permission expressed by those systems. A trivial "legacy" hw-assign security system is provided.

The main intent of this branch is to discuss the interface as I have some code that uses this for apparmor and seccomp coming up.

Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
This patch adds a small dummy implementation for getting/setting
capability attribute. The real implementation is proposed for merging
separately.

Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
This patch adds an interface for security systems. Security systems are
an abstraction for configuring security associated with capabilities.
Each type will define security systems that make the permission side
of the capability work. Various security systems can be used (apparmor,
seccomp, dbus, etc.).

Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
This patch adds a wrapper to use hw-access as a capability security system.

Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
// legacySecurtySystem aids in the ongoing work to transition capability system
// from hwaccess API to a more direct approach. It allows particular capability
// types to define a common interface that doesn't expose hwaccess API anymore.
type legacySecurtySystem struct {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Typo: should be legacySecuritySystem

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah, great catch, corrected!

@jdstrand
Copy link

I was asked to look at the approach (ie, I haven't done an in depth code review or tested this). The direction this is going looks good from a security capabilities definition/grant/revoke perspective. Thanks!

Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>
@zyga
Copy link
Collaborator Author

zyga commented Jan 11, 2016

@jdstrand thanks for looking at this!

sec := cap.Type.SecuritySystems[j]
if err := sec.RevokePermissions(snapName, cap); err != nil {
// XXX: Should we do something other than panic here?
panic(fmt.Sprintf("unable to revoke partially granted permissions: %q", err))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

eventually yes, there's got to be a big red "give up and work out the current state of the system from the top again" button in the Overseer

@chipaca
Copy link
Contributor

chipaca commented Jan 12, 2016

this seems ok to me. The amount of code that's exactly line-by-line the same between Type.RevokePermissions and Type.GrantPermissions makes me think there's got to be a way of writing the code once, but it can happen later if you'd rather.

@@ -42,3 +46,22 @@ type Capability struct {
func (c Capability) String() string {
return c.Name
}

// SetAttr sets capability attribute to a given value.
// TODO: remove temporary function implementation once attrtypes are merged.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we please drop these temporary methods altogether for the time being? They're purely a setter and a getter for a public map attribute, with literally zero benefit. That means we're simply adding cruft that needs to be removed later and that is hard to agree or disagree because the full replacement TODOs give them a blank check of existence.

@niemeyer
Copy link
Contributor

@zyga I'm closing this for the time being. Once the points and design we discussed yesterday are addressed, please reopen it or push a new PR.

@niemeyer niemeyer closed this Jan 12, 2016
@zyga zyga deleted the add-security-system branch March 8, 2016 11:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
4 participants