mirror of
https://github.com/siderolabs/talos.git
synced 2025-10-09 06:31:25 +02:00
This PR makes sure that some capabilities (SYS_BOOT and SYS_MODULES) and never be gained by any process running on Talos except for `machined` itself. Signed-off-by: Andrey Smirnov <andrey.smirnov@talos-systems.com>
27 lines
785 B
Go
27 lines
785 B
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
// Package capability provides utility functions to work with capabilities.
|
|
package capability
|
|
|
|
import (
|
|
"strings"
|
|
|
|
"kernel.org/pub/linux/libs/security/libcap/cap"
|
|
)
|
|
|
|
// AllGrantableCapabilities returns list of capabilities that can be granted to the container based on
|
|
// process bounding capabilities.
|
|
func AllGrantableCapabilities() []string {
|
|
capabilities := []string{}
|
|
|
|
for v := cap.Value(0); v < cap.MaxBits(); v++ {
|
|
if set, _ := cap.GetBound(v); set { //nolint:errcheck
|
|
capabilities = append(capabilities, strings.ToUpper(v.String()))
|
|
}
|
|
}
|
|
|
|
return capabilities
|
|
}
|