1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196
|
// -*- Mode: Go; indent-tabs-mode: t -*-
/*
* Copyright (C) 2021 Canonical Ltd
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 3 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
// This tool is provided for integration with systemd on distributions where
// apparmor profiles generated and managed by snapd are not loaded by the
// system-wide apparmor systemd integration on early boot-up.
//
// Only the start operation is provided as all other activity is managed by
// snapd as a part of the life-cycle of particular snaps.
//
// In addition this tool assumes that the system-wide apparmor service has
// already executed, initializing apparmor file-systems as necessary.
//
// NOTE: This tool ignores failures in some scenarios as the intent is to
// simply load application profiles ahead of time, as many as we can (for
// performance reasons), even if for whatever reason some of those fail.
package main
import (
"errors"
"fmt"
"os"
"path/filepath"
"strings"
"github.com/snapcore/snapd/dirs"
"github.com/snapcore/snapd/logger"
"github.com/snapcore/snapd/osutil"
"github.com/snapcore/snapd/release"
apparmor_sandbox "github.com/snapcore/snapd/sandbox/apparmor"
"github.com/snapcore/snapd/snapdtool"
"github.com/snapcore/snapd/systemd"
)
// Checks to see if the current container is capable of having internal AppArmor
// profiles that should be loaded.
//
// The only known container environments capable of supporting internal policy
// are LXD, LXC and incus environments.
//
// Returns true if the container environment is capable of having its own internal
// policy and false otherwise.
//
// IMPORTANT: This function will return true in the case of a
// non-LXD/non-LXC/non-incus system container technology being nested inside of
// a LXD/LXC/incus container that utilized an AppArmor namespace and profile
// stacking. The reason true will be returned is because .ns_stacked will be
// "yes" and .ns_name will still match "(lx[dc]|incus)-*" since the nested
// system container technology will not have set up a new AppArmor profile
// namespace. This will result in the nested system container's boot process to
// experience failed policy loads but the boot process should continue without
// any loss of functionality. This is an unsupported configuration that cannot
// be properly handled by this function.
func isContainerWithInternalPolicy() bool {
var securityFSPath = filepath.Join(dirs.GlobalRootDir, "/sys/kernel/security")
if release.OnWSL {
// WSL-1 is an emulated Windows layer that has no support for AppArmor.
// WSL-2 is a virtualised environment with the Linux kernel as
// distributed by Microsoft.
//
// In the future, Microsoft could enable AppArmor in the WSL kernel
// configuration and modify the special init process that launches
// distributions in quasi-containers. This change would initialize
// AppArmor nesting automatically, potentially eliminating the need for
// this WSL-specific logic.
//
// In the meantime, given that people experiment with AppArmor on WSL,
// so we only bail out if the securityfs is not available. When
// securityfs is present we assume everything else is "just right" even
// though that is not really true, and we know apparmor profiles loaded
// in one WSL distribution container are visible in all distribution
// containers.
if release.WSLVersion == 2 && osutil.IsDirectory(securityFSPath) {
return true
}
return false
}
var appArmorSecurityFSPath = filepath.Join(securityFSPath, "apparmor")
var nsStackedPath = filepath.Join(appArmorSecurityFSPath, ".ns_stacked")
var nsNamePath = filepath.Join(appArmorSecurityFSPath, ".ns_name")
contents, err := os.ReadFile(nsStackedPath)
if err != nil && !errors.Is(err, os.ErrNotExist) {
logger.Noticef("Failed to read %s: %v", nsStackedPath, err)
return false
}
if strings.TrimSpace(string(contents)) != "yes" {
return false
}
contents, err = os.ReadFile(nsNamePath)
if err != nil && !errors.Is(err, os.ErrNotExist) {
logger.Noticef("Failed to read %s: %v", nsNamePath, err)
return false
}
// LXD, LXC and incus set up AppArmor namespaces starting with "lxd-",
// "lxc-" and "incus-" respectively. Return false for all other
// namespace identifiers.
name := strings.TrimSpace(string(contents))
if !strings.HasPrefix(name, "lxd-") && !strings.HasPrefix(name, "lxc-") && !strings.HasPrefix(name, "incus-") {
return false
}
return true
}
func loadAppArmorProfiles() error {
candidates, err := filepath.Glob(dirs.SnapAppArmorDir + "/*")
if err != nil {
return fmt.Errorf("Failed to glob profiles from snap apparmor dir %s: %v", dirs.SnapAppArmorDir, err)
}
profiles := make([]string, 0, len(candidates))
for _, profile := range candidates {
// Filter out profiles with names ending with ~, those are
// temporary files created by snapd.
if strings.HasSuffix(profile, "~") {
continue
}
profiles = append(profiles, profile)
}
if len(profiles) == 0 {
logger.Noticef("No profiles to load")
return nil
}
logger.Noticef("Loading profiles %v", profiles)
return apparmor_sandbox.LoadProfiles(profiles, apparmor_sandbox.SystemCacheDir, 0)
}
func isContainer() bool {
// systemd's implementation may fail on WSL2 with custom kernels
return release.OnWSL || systemd.IsContainer()
}
func validateArgs(args []string) error {
if len(args) != 1 || args[0] != "start" {
return errors.New("Expected to be called with a single 'start' argument.")
}
return nil
}
func init() {
logger.SimpleSetup(nil)
}
func main() {
if err := run(); err != nil {
fmt.Fprintf(os.Stderr, "error: %v\n", err)
os.Exit(1)
}
}
func run() error {
snapdtool.ExecInSnapdOrCoreSnap()
if err := validateArgs(os.Args[1:]); err != nil {
return err
}
if isContainer() {
logger.Debugf("inside container environment")
// in container environment - see if container has own
// policy that we need to manage otherwise get out of the
// way
if !isContainerWithInternalPolicy() {
logger.Noticef("Inside container environment without internal policy")
return nil
}
}
return loadAppArmorProfiles()
}
func mockParserSearchPath(parserSearchPath string) (restore func()) {
return apparmor_sandbox.MockParserSearchPath(parserSearchPath)
}
|