kubectl/pkg/cmd/debug/profiles.go

477 lines
13 KiB
Go

/*
Copyright 2022 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package debug
import (
"fmt"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/kubectl/pkg/util/podutils"
"k8s.io/utils/ptr"
)
type debugStyle int
const (
// debug by ephemeral container
ephemeral debugStyle = iota
// debug by pod copy
podCopy
// debug node
node
// unsupported debug methodology
unsupported
)
const (
// NOTE: when you add a new profile string, remember to add it to the
// --profile flag's help text
// ProfileLegacy represents the legacy debugging profile which is backwards-compatible with 1.23 behavior.
ProfileLegacy = "legacy"
// ProfileGeneral contains a reasonable set of defaults tailored for each debugging journey.
ProfileGeneral = "general"
// ProfileBaseline is identical to "general" but eliminates privileges that are disallowed under
// the baseline security profile, such as host namespaces, host volume, mounts and SYS_PTRACE.
ProfileBaseline = "baseline"
// ProfileRestricted is identical to "baseline" but adds configuration that's required
// under the restricted security profile, such as requiring a non-root user and dropping all capabilities.
ProfileRestricted = "restricted"
// ProfileNetadmin offers elevated privileges for network debugging.
ProfileNetadmin = "netadmin"
// ProfileSysadmin offers elevated privileges for debugging.
ProfileSysadmin = "sysadmin"
)
type ProfileApplier interface {
// Apply applies the profile to the given container in the pod.
Apply(pod *corev1.Pod, containerName string, target runtime.Object) error
}
// NewProfileApplier returns a new Options for the given profile name.
func NewProfileApplier(profile string, kflags KeepFlags) (ProfileApplier, error) {
switch profile {
case ProfileLegacy:
return &legacyProfile{kflags}, nil
case ProfileGeneral:
return &generalProfile{kflags}, nil
case ProfileBaseline:
return &baselineProfile{kflags}, nil
case ProfileRestricted:
return &restrictedProfile{kflags}, nil
case ProfileNetadmin:
return &netadminProfile{kflags}, nil
case ProfileSysadmin:
return &sysadminProfile{kflags}, nil
}
return nil, fmt.Errorf("unknown profile: %s", profile)
}
type legacyProfile struct {
KeepFlags
}
type generalProfile struct {
KeepFlags
}
type baselineProfile struct {
KeepFlags
}
type restrictedProfile struct {
KeepFlags
}
type netadminProfile struct {
KeepFlags
}
type sysadminProfile struct {
KeepFlags
}
// KeepFlags holds the flag set that determine which fields to keep in the copy pod.
type KeepFlags struct {
Labels bool
Annotations bool
Liveness bool
Readiness bool
Startup bool
InitContainers bool
}
// RemoveLabels removes labels from the pod.
func (kflags KeepFlags) RemoveLabels(p *corev1.Pod) {
if !kflags.Labels {
p.Labels = nil
}
}
// RemoveAnnotations remove annotations from the pod.
func (kflags KeepFlags) RemoveAnnotations(p *corev1.Pod) {
if !kflags.Annotations {
p.Annotations = nil
}
}
// RemoveProbes remove probes from all containers of the pod.
func (kflags KeepFlags) RemoveProbes(p *corev1.Pod) {
for i := range p.Spec.Containers {
if !kflags.Liveness {
p.Spec.Containers[i].LivenessProbe = nil
}
if !kflags.Readiness {
p.Spec.Containers[i].ReadinessProbe = nil
}
if !kflags.Startup {
p.Spec.Containers[i].StartupProbe = nil
}
}
}
// RemoveInitContainers remove initContainers from the pod.
func (kflags KeepFlags) RemoveInitContainers(p *corev1.Pod) {
if !kflags.InitContainers {
p.Spec.InitContainers = nil
}
}
func getDebugStyle(pod *corev1.Pod, target runtime.Object) (debugStyle, error) {
switch target.(type) {
case *corev1.Pod:
if asserted, ok := target.(*corev1.Pod); ok {
if pod != asserted { // comparing addresses
return podCopy, nil
}
}
return ephemeral, nil
case *corev1.Node:
return node, nil
}
return unsupported, fmt.Errorf("objects of type %T are not supported", target)
}
func (p *legacyProfile) Apply(pod *corev1.Pod, containerName string, target runtime.Object) error {
style, err := getDebugStyle(pod, target)
if err != nil {
return fmt.Errorf("legacy profile: %w", err)
}
switch style {
case node:
mountRootPartition(pod, containerName)
useHostNamespaces(pod)
case podCopy:
p.Labels = false
p.RemoveLabels(pod)
case ephemeral:
// no additional modifications needed
}
return nil
}
func (p *generalProfile) Apply(pod *corev1.Pod, containerName string, target runtime.Object) error {
style, err := getDebugStyle(pod, target)
if err != nil {
return fmt.Errorf("general profile: %w", err)
}
switch style {
case node:
mountRootPartition(pod, containerName)
clearSecurityContext(pod, containerName)
useHostNamespaces(pod)
case podCopy:
p.RemoveLabels(pod)
p.RemoveAnnotations(pod)
p.RemoveProbes(pod)
p.RemoveInitContainers(pod)
allowProcessTracing(pod, containerName)
shareProcessNamespace(pod)
case ephemeral:
allowProcessTracing(pod, containerName)
}
return nil
}
func (p *baselineProfile) Apply(pod *corev1.Pod, containerName string, target runtime.Object) error {
style, err := getDebugStyle(pod, target)
if err != nil {
return fmt.Errorf("baseline profile: %w", err)
}
clearSecurityContext(pod, containerName)
switch style {
case podCopy:
p.RemoveLabels(pod)
p.RemoveAnnotations(pod)
p.RemoveProbes(pod)
p.RemoveInitContainers(pod)
shareProcessNamespace(pod)
case ephemeral, node:
// no additional modifications needed
}
return nil
}
func (p *restrictedProfile) Apply(pod *corev1.Pod, containerName string, target runtime.Object) error {
style, err := getDebugStyle(pod, target)
if err != nil {
return fmt.Errorf("restricted profile: %w", err)
}
clearSecurityContext(pod, containerName)
disallowRoot(pod, containerName)
dropCapabilities(pod, containerName)
disallowPrivilegeEscalation(pod, containerName)
setSeccompProfile(pod, containerName)
switch style {
case podCopy:
p.RemoveLabels(pod)
p.RemoveAnnotations(pod)
p.RemoveProbes(pod)
p.RemoveInitContainers(pod)
shareProcessNamespace(pod)
case ephemeral, node:
// no additional modifications needed
}
return nil
}
func (p *netadminProfile) Apply(pod *corev1.Pod, containerName string, target runtime.Object) error {
style, err := getDebugStyle(pod, target)
if err != nil {
return fmt.Errorf("netadmin profile: %w", err)
}
allowNetadminCapability(pod, containerName)
switch style {
case node:
useHostNamespaces(pod)
case podCopy:
p.RemoveLabels(pod)
p.RemoveAnnotations(pod)
p.RemoveProbes(pod)
p.RemoveInitContainers(pod)
shareProcessNamespace(pod)
case ephemeral:
// no additional modifications needed
}
return nil
}
func (p *sysadminProfile) Apply(pod *corev1.Pod, containerName string, target runtime.Object) error {
style, err := getDebugStyle(pod, target)
if err != nil {
return fmt.Errorf("sysadmin profile: %w", err)
}
setPrivileged(pod, containerName)
switch style {
case node:
useHostNamespaces(pod)
mountRootPartition(pod, containerName)
case podCopy:
// to mimic general, default and baseline
p.RemoveLabels(pod)
p.RemoveAnnotations(pod)
p.RemoveProbes(pod)
p.RemoveInitContainers(pod)
shareProcessNamespace(pod)
case ephemeral:
// no additional modifications needed
}
return nil
}
// mountRootPartition mounts the host's root path at "/host" in the container.
func mountRootPartition(p *corev1.Pod, containerName string) {
const volumeName = "host-root"
p.Spec.Volumes = append(p.Spec.Volumes, corev1.Volume{
Name: volumeName,
VolumeSource: corev1.VolumeSource{
HostPath: &corev1.HostPathVolumeSource{Path: "/"},
},
})
podutils.VisitContainers(&p.Spec, podutils.Containers, func(c *corev1.Container, _ podutils.ContainerType) bool {
if c.Name != containerName {
return true
}
c.VolumeMounts = append(c.VolumeMounts, corev1.VolumeMount{
MountPath: "/host",
Name: volumeName,
})
return false
})
}
// useHostNamespaces configures the pod to use the host's network, PID, and IPC
// namespaces.
func useHostNamespaces(p *corev1.Pod) {
p.Spec.HostNetwork = true
p.Spec.HostPID = true
p.Spec.HostIPC = true
}
// shareProcessNamespace configures all containers in the pod to share the
// process namespace.
func shareProcessNamespace(p *corev1.Pod) {
if p.Spec.ShareProcessNamespace == nil {
p.Spec.ShareProcessNamespace = ptr.To(true)
}
}
// clearSecurityContext clears the security context for the container.
func clearSecurityContext(p *corev1.Pod, containerName string) {
podutils.VisitContainers(&p.Spec, podutils.AllContainers, func(c *corev1.Container, _ podutils.ContainerType) bool {
if c.Name != containerName {
return true
}
c.SecurityContext = nil
return false
})
}
// setPrivileged configures the containers as privileged.
func setPrivileged(p *corev1.Pod, containerName string) {
podutils.VisitContainers(&p.Spec, podutils.AllContainers, func(c *corev1.Container, _ podutils.ContainerType) bool {
if c.Name != containerName {
return true
}
if c.SecurityContext == nil {
c.SecurityContext = &corev1.SecurityContext{}
}
c.SecurityContext.Privileged = ptr.To(true)
return false
})
}
// disallowRoot configures the container to run as a non-root user.
func disallowRoot(p *corev1.Pod, containerName string) {
podutils.VisitContainers(&p.Spec, podutils.AllContainers, func(c *corev1.Container, _ podutils.ContainerType) bool {
if c.Name != containerName {
return true
}
if c.SecurityContext == nil {
c.SecurityContext = &corev1.SecurityContext{}
}
c.SecurityContext.RunAsNonRoot = ptr.To(true)
return false
})
}
// dropCapabilities drops all Capabilities for the container
func dropCapabilities(p *corev1.Pod, containerName string) {
podutils.VisitContainers(&p.Spec, podutils.AllContainers, func(c *corev1.Container, _ podutils.ContainerType) bool {
if c.Name != containerName {
return true
}
if c.SecurityContext == nil {
c.SecurityContext = &corev1.SecurityContext{}
}
if c.SecurityContext.Capabilities == nil {
c.SecurityContext.Capabilities = &corev1.Capabilities{}
}
c.SecurityContext.Capabilities.Drop = []corev1.Capability{"ALL"}
c.SecurityContext.Capabilities.Add = nil
return false
})
}
// allowProcessTracing grants the SYS_PTRACE capability to the container.
func allowProcessTracing(p *corev1.Pod, containerName string) {
podutils.VisitContainers(&p.Spec, podutils.AllContainers, func(c *corev1.Container, _ podutils.ContainerType) bool {
if c.Name != containerName {
return true
}
addCapability(c, "SYS_PTRACE")
return false
})
}
// allowNetadminCapability grants NET_ADMIN and NET_RAW capability to the container.
func allowNetadminCapability(p *corev1.Pod, containerName string) {
podutils.VisitContainers(&p.Spec, podutils.AllContainers, func(c *corev1.Container, _ podutils.ContainerType) bool {
if c.Name != containerName {
return true
}
addCapability(c, "NET_ADMIN")
addCapability(c, "NET_RAW")
return false
})
}
func addCapability(c *corev1.Container, capability corev1.Capability) {
if c.SecurityContext == nil {
c.SecurityContext = &corev1.SecurityContext{}
}
if c.SecurityContext.Capabilities == nil {
c.SecurityContext.Capabilities = &corev1.Capabilities{}
}
c.SecurityContext.Capabilities.Add = append(c.SecurityContext.Capabilities.Add, capability)
}
// disallowPrivilegeEscalation configures the containers not allowed PrivilegeEscalation
func disallowPrivilegeEscalation(p *corev1.Pod, containerName string) {
podutils.VisitContainers(&p.Spec, podutils.AllContainers, func(c *corev1.Container, _ podutils.ContainerType) bool {
if c.Name != containerName {
return true
}
if c.SecurityContext == nil {
c.SecurityContext = &corev1.SecurityContext{}
}
c.SecurityContext.AllowPrivilegeEscalation = ptr.To(false)
return false
})
}
// setSeccompProfile apply SeccompProfile to the containers
func setSeccompProfile(p *corev1.Pod, containerName string) {
podutils.VisitContainers(&p.Spec, podutils.AllContainers, func(c *corev1.Container, _ podutils.ContainerType) bool {
if c.Name != containerName {
return true
}
if c.SecurityContext == nil {
c.SecurityContext = &corev1.SecurityContext{}
}
c.SecurityContext.SeccompProfile = &corev1.SeccompProfile{Type: "RuntimeDefault"}
return false
})
}