Skip to content

Commit e9c8277

Browse files
committed
C-WCOW: Misc cleanup
Signed-off-by: Mahati Chamarthy <mahati.chamarthy@gmail.com>
1 parent c2cb6e5 commit e9c8277

File tree

2 files changed

+15
-37
lines changed

2 files changed

+15
-37
lines changed

pkg/securitypolicy/framework.rego

Lines changed: 5 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -299,7 +299,7 @@ noNewPrivileges_ok(no_new_privileges) {
299299

300300
noNewPrivileges_ok_check(obj) {
301301
is_linux
302-
noNewPrivileges_ok(obj.no_new_privileges)
302+
noNewPrivileges_ok(obj)
303303
}
304304

305305
noNewPrivileges_ok_check(obj) {
@@ -650,7 +650,7 @@ possible_container_after_caps(env_containers, is_exec) := {
650650
caps_list := valid_caps_for_all(env_containers, is_privileged)
651651
filtered := [container |
652652
container := env_containers[_]
653-
caps_ok(get_capabilities(container, input.privileged), caps_list)
653+
caps_ok(get_capabilities(container, is_privileged), caps_list)
654654
]
655655
}
656656

@@ -747,6 +747,7 @@ exec_in_container := {"metadata": [updateMatches],
747747
"env_list": env_list,
748748
"caps_list": caps_list,
749749
"allowed": true} {
750+
750751
container_started
751752

752753
# narrow our matches based upon the process requested
@@ -756,7 +757,7 @@ exec_in_container := {"metadata": [updateMatches],
756757
# the error handling, such that error messaging correctly reflects
757758
# the narrowing process.
758759
workingDirectory_ok(container.working_dir)
759-
#noNewPrivileges_ok(container.no_new_privileges)
760+
noNewPrivileges_ok_check(container.no_new_privileges)
760761
user_ok(container.user)
761762
some process in container.exec_processes
762763
command_ok(process.command)
@@ -795,16 +796,6 @@ exec_in_container := {"metadata": [updateMatches],
795796
}
796797
}
797798

798-
noNewPrivileges(current_container) {
799-
is_linux
800-
current_container.no_new_privileges
801-
input.noNewPrivileges
802-
}
803-
804-
noNewPrivileges(current_container) {
805-
is_windows
806-
}
807-
808799
default shutdown_container := {"allowed": false}
809800

810801
shutdown_container := {"started": remove, "metadata": [remove], "allowed": true} {
@@ -1661,7 +1652,7 @@ noNewPrivileges_matches {
16611652
some process in container.exec_processes
16621653
command_ok(process.command)
16631654
workingDirectory_ok(process.working_dir)
1664-
noNewPrivileges_ok_check(process)
1655+
noNewPrivileges_ok_check(process.no_new_privileges)
16651656
}
16661657

16671658
errors["invalid noNewPrivileges"] {

pkg/securitypolicy/rego_utils_test.go

Lines changed: 10 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1410,31 +1410,18 @@ func setupRegoCreateContainerTest(gc *generatedConstraints, testContainer *secur
14101410

14111411
// Handle user configuration based on OS type
14121412
user := IDName{}
1413-
var groups []IDName
1414-
var umask string
1415-
var capabilities *oci.LinuxCapabilities
1413+
if testContainer.User.UserIDName.Strategy != IDNameStrategyRegex {
1414+
user = buildIDNameFromConfig(testContainer.User.UserIDName, testRand)
1415+
}
1416+
groups := buildGroupIDNamesFromUser(testContainer.User, testRand)
1417+
umask := testContainer.User.Umask
14161418

1417-
if testOSType == "windows" {
1418-
// For Windows, use the WindowsUser field from the test container if available
1419-
/*if testContainer.WindowsUser != "" {
1420-
user = IDName{Name: testContainer.WindowsUser}
1421-
} else {
1422-
user = IDName{Name: generateIDNameName(testRand)}
1423-
}*/
1419+
var capabilities *oci.LinuxCapabilities
1420+
if testContainer.Capabilities != nil {
1421+
capsExternal := copyLinuxCapabilities(testContainer.Capabilities.toExternal())
1422+
capabilities = &capsExternal
14241423
} else {
1425-
// For Linux, use the full ID/Name strategy
1426-
if testContainer.User.UserIDName.Strategy != IDNameStrategyRegex {
1427-
user = buildIDNameFromConfig(testContainer.User.UserIDName, testRand)
1428-
}
1429-
groups = buildGroupIDNamesFromUser(testContainer.User, testRand)
1430-
umask = testContainer.User.Umask
1431-
1432-
if testContainer.Capabilities != nil {
1433-
capsExternal := copyLinuxCapabilities(testContainer.Capabilities.toExternal())
1434-
capabilities = &capsExternal
1435-
} else {
1436-
capabilities = nil
1437-
}
1424+
capabilities = nil
14381425
}
14391426

14401427
seccomp := testContainer.SeccompProfileSHA256

0 commit comments

Comments
 (0)