forked from canonical/snapd
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request canonical#1947 from jdstrand/jdstrand.docker
interfaces/builtin: add initial docker interface
- Loading branch information
Showing
8 changed files
with
1,251 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,132 @@ | ||
// -*- Mode: Go; indent-tabs-mode: t -*- | ||
|
||
/* | ||
* Copyright (C) 2016 Canonical Ltd | ||
* | ||
* This program is free software: you can redistribute it and/or modify | ||
* it under the terms of the GNU General Public License version 3 as | ||
* published by the Free Software Foundation. | ||
* | ||
* This program is distributed in the hope that it will be useful, | ||
* but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
* GNU General Public License for more details. | ||
* | ||
* You should have received a copy of the GNU General Public License | ||
* along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
* | ||
*/ | ||
|
||
package builtin | ||
|
||
import ( | ||
"fmt" | ||
|
||
"github.com/snapcore/snapd/interfaces" | ||
) | ||
|
||
const dockerConnectedPlugAppArmor = ` | ||
# Description: allow access to the Docker daemon socket. This gives privileged | ||
# access to the system via Docker's socket API. | ||
# Usage: reserved | ||
# Allow talking to the docker daemon | ||
/{,var/}run/docker.sock rw, | ||
` | ||
|
||
const dockerConnectedPlugSecComp = ` | ||
# Description: allow access to the Docker daemon socket. This gives privileged | ||
# access to the system via Docker's socket API. | ||
# Usage: reserved | ||
setsockopt | ||
bind | ||
` | ||
|
||
type DockerInterface struct{} | ||
|
||
func (iface *DockerInterface) Name() string { | ||
return "docker" | ||
} | ||
|
||
func (iface *DockerInterface) PermanentPlugSnippet(plug *interfaces.Plug, securitySystem interfaces.SecuritySystem) ([]byte, error) { | ||
switch securitySystem { | ||
case interfaces.SecurityAppArmor, | ||
interfaces.SecurityDBus, | ||
interfaces.SecurityMount, | ||
interfaces.SecuritySecComp, | ||
interfaces.SecurityUDev: | ||
return nil, nil | ||
default: | ||
return nil, interfaces.ErrUnknownSecurity | ||
} | ||
} | ||
|
||
func (iface *DockerInterface) ConnectedPlugSnippet(plug *interfaces.Plug, slot *interfaces.Slot, securitySystem interfaces.SecuritySystem) ([]byte, error) { | ||
switch securitySystem { | ||
case interfaces.SecurityAppArmor: | ||
snippet := []byte(dockerConnectedPlugAppArmor) | ||
return snippet, nil | ||
case interfaces.SecuritySecComp: | ||
snippet := []byte(dockerConnectedPlugSecComp) | ||
return snippet, nil | ||
case interfaces.SecurityDBus, | ||
interfaces.SecurityMount, | ||
interfaces.SecurityUDev: | ||
return nil, nil | ||
default: | ||
return nil, interfaces.ErrUnknownSecurity | ||
} | ||
} | ||
|
||
func (iface *DockerInterface) PermanentSlotSnippet(slot *interfaces.Slot, securitySystem interfaces.SecuritySystem) ([]byte, error) { | ||
// No permanent slot policy. Instead, use the docker-support interface | ||
switch securitySystem { | ||
case interfaces.SecurityAppArmor, | ||
interfaces.SecurityDBus, | ||
interfaces.SecurityMount, | ||
interfaces.SecuritySecComp, | ||
interfaces.SecurityUDev: | ||
return nil, nil | ||
default: | ||
return nil, interfaces.ErrUnknownSecurity | ||
} | ||
} | ||
|
||
func (iface *DockerInterface) ConnectedSlotSnippet(plug *interfaces.Plug, slot *interfaces.Slot, securitySystem interfaces.SecuritySystem) ([]byte, error) { | ||
// The docker socket is a named socket and therefore mediated by | ||
// AppArmor file rules. As such, there is no additional ConnectedSlot | ||
// policy to add. | ||
switch securitySystem { | ||
case interfaces.SecurityAppArmor, | ||
interfaces.SecurityDBus, | ||
interfaces.SecurityMount, | ||
interfaces.SecuritySecComp, | ||
interfaces.SecurityUDev: | ||
return nil, nil | ||
default: | ||
return nil, interfaces.ErrUnknownSecurity | ||
} | ||
} | ||
|
||
func (iface *DockerInterface) SanitizePlug(plug *interfaces.Plug) error { | ||
if iface.Name() != plug.Interface { | ||
panic(fmt.Sprintf("plug is not of interface %q", iface.Name())) | ||
} | ||
return nil | ||
} | ||
|
||
func (iface *DockerInterface) SanitizeSlot(slot *interfaces.Slot) error { | ||
snapName := slot.Snap.Name() | ||
devName := slot.Snap.Developer | ||
// The docker slot interface can only by used with the docker project | ||
// and Canonical | ||
if snapName != "docker" || (devName != "canonical" && devName != "docker") { | ||
return fmt.Errorf("docker slot interface is reserved for the upstream docker project") | ||
} | ||
return nil | ||
} | ||
|
||
func (iface *DockerInterface) AutoConnect() bool { | ||
return false | ||
} |
Oops, something went wrong.