Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 673c8193cdb1
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: dcf40f7c24ee
Choose a head ref
  • 9 commits
  • 6 files changed
  • 1 contributor

Commits on Mar 14, 2019

  1. nixos: Add 'chroot' options to systemd.services

    Currently, if you want to properly chroot a systemd service, you could
    do it using BindReadOnlyPaths=/nix/store (which is not what I'd call
    "properly", because the whole store is still accessible) or use a
    separate derivation that gathers the runtime closure of the service you
    want to chroot. The former is the easier method and there is also a
    method directly offered by systemd, called ProtectSystem, which still
    leaves the whole store accessible. The latter however is a bit more
    involved, because you need to bind-mount each store path of the runtime
    closure of the service you want to chroot.
    
    This can be achieved using pkgs.closureInfo and a small derivation that
    packs everything into a systemd unit, which later can be added to
    systemd.packages. That's also what I did several times[1][2] in the
    past.
    
    However, this process got a bit tedious, so I decided that it would be
    generally useful for NixOS, so this very implementation was born.
    
    Now if you want to chroot a systemd service, all you need to do is:
    
      {
        systemd.services.yourservice = {
          description = "My Shiny Service";
          wantedBy = [ "multi-user.target" ];
    
          chroot.enable = true;
          serviceConfig.ExecStart = "${pkgs.myservice}/bin/myservice";
        };
      }
    
    If more than the dependencies for the ExecStart* and ExecStop* (which
    btw. also includes "script" and {pre,post}Start) need to be in the
    chroot, it can be specified using the chroot.packages option. By
    default (which uses the "full-apivfs"[3] confinement mode), a user
    namespace is set up as well and /proc, /sys and /dev are mounted
    appropriately.
    
    In addition - and by default - a /bin/sh executable is provided as well,
    which is useful for most programs that use the system() C library call
    to execute commands via shell. The shell providing /bin/sh is dash
    instead of the default in NixOS (which is bash), because it's way more
    lightweight and after all we're chrooting because we want to lower the
    attack surface and it should be only used for "/bin/sh -c something".
    
    Prior to submitting this here, I did a first implementation of this
    outside[4] of nixpkgs, which duplicated the "pathSafeName" functionality
    from systemd-lib.nix, just because it's only a single line.
    
    However, I decided to just re-use the one from systemd here and
    subsequently made it available when importing systemd-lib.nix, so that
    the systemd-chroot implementation also benefits from fixes to that
    functionality (which is now a proper function).
    
    Unfortunately, we do have a few limitations as well. The first being
    that DynamicUser doesn't work in conjunction with tmpfs, because it
    already sets up a tmpfs in a different path and simply ignores the one
    we define. We could probably solve this by detecting it and try to
    bind-mount our paths to that different path whenever DynamicUser is
    enabled.
    
    The second limitation/issue is that RootDirectoryStartOnly doesn't work
    right now, because it only affects the RootDirectory option and not the
    individual bind mounts or our tmpfs. It would be helpful if systemd
    would have a way to disable specific bind mounts as well or at least
    have some way to ignore failures for the bind mounts/tmpfs setup.
    
    Another quirk we do have right now is that systemd tries to create a
    /usr directory within the chroot, which subsequently fails. Fortunately,
    this is just an ugly error and not a hard failure.
    
    [1]: https://github.com/headcounter/shabitica/blob/3bb01728a0237ad5e7/default.nix#L43-L62
    [2]: https://github.com/aszlig/avonc/blob/dedf29e092481a33dc/nextcloud.nix#L103-L124
    [3]: The reason this is called "full-apivfs" instead of just "full" is
         to make room for a *real* "full" confinement mode, which is more
         restrictive even.
    [4]: https://github.com/aszlig/avonc/blob/92a20bece4df54625e/systemd-chroot.nix
    
    Signed-off-by: aszlig <aszlig@nix.build>
    aszlig committed Mar 14, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    ac64ce9 View commit details
  2. nixos/systemd-chroot: Rename chroot to confinement

    Quoting @edolstra from [1]:
    
      I don't really like the name "chroot", something like "confine[ment]"
      or "restrict" seems better. Conceptually we're not providing a
      completely different filesystem tree but a restricted view of the same
      tree.
    
    I already used "confinement" as a sub-option and I do agree that
    "chroot" sounds a bit too specific (especially because not *only* chroot
    is involved).
    
    So this changes the module name and its option to use "confinement"
    instead of "chroot" and also renames the "chroot.confinement" to
    "confinement.mode".
    
    [1]: #57519 (comment)
    
    Signed-off-by: aszlig <aszlig@nix.build>
    aszlig committed Mar 14, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    0ba48f4 View commit details
  3. nixos/confinement: Allow to configure /bin/sh

    Another thing requested by @edolstra in [1]:
    
      We should not provide a different /bin/sh in the chroot, that's just
      asking for confusion and random shell script breakage. It should be
      the same shell (i.e. bash) as in a regular environment.
    
    While I personally would even go as far to even have a very restricted
    shell that is not even a shell and basically *only* allows "/bin/sh -c"
    with only *very* minimal parsing of shell syntax, I do agree that people
    expect /bin/sh to be bash (or the one configured by environment.binsh)
    on NixOS.
    
    So this should make both others and me happy in that I could just use
    confinement.binSh = "${pkgs.dash}/bin/dash" for the services I confine.
    
    [1]: #57519 (comment)
    
    Signed-off-by: aszlig <aszlig@nix.build>
    aszlig committed Mar 14, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    46f7dd4 View commit details
  4. nixos/confinement: Allow to include the full unit

    From @edolstra at [1]:
    
      BTW we probably should take the closure of the whole unit rather than
      just the exec commands, to handle things like Environment variables.
    
    With this commit, there is now a "fullUnit" option, which can be enabled
    to include the full closure of the service unit into the chroot.
    
    However, I did not enable this by default, because I do disagree here
    and *especially* things like environment variables or environment files
    shouldn't be in the closure of the chroot.
    
    For example if you have something like:
    
      { pkgs, ... }:
    
      {
        systemd.services.foobar = {
          serviceConfig.EnvironmentFile = ${pkgs.writeText "secrets" ''
            user=admin
            password=abcdefg
          '';
        };
      }
    
    We really do not want the *file* to end up in the chroot, but rather
    just the environment variables to be exported.
    
    Another thing is that this makes it less predictable what actually will
    end up in the chroot, because we have a "globalEnvironment" option that
    will get merged in as well, so users adding stuff to that option will
    also make it available in confined units.
    
    I also added a big fat warning about that in the description of the
    fullUnit option.
    
    [1]: #57519 (comment)
    
    Signed-off-by: aszlig <aszlig@nix.build>
    aszlig committed Mar 14, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    9e9af4f View commit details

Commits on Mar 15, 2019

  1. nixos/confinement: Explicitly set serviceConfig

    My implementation was relying on PrivateDevices, PrivateTmp,
    PrivateUsers and others to be false by default if chroot-only mode is
    used.
    
    However there is an ongoing effort[1] to change these defaults, which
    then will actually increase the attack surface in chroot-only mode,
    because it is expected that there is no /dev, /sys or /proc.
    
    If for example PrivateDevices is enabled by default, there suddenly will
    be a mounted /dev in the chroot and we wouldn't detect it.
    
    Fortunately, our tests cover that, but I'm preparing for this anyway so
    that we have a smoother transition without the need to fix our
    implementation again.
    
    Thanks to @infinisil for the heads-up.
    
    [1]: #14645
    
    Signed-off-by: aszlig <aszlig@nix.build>
    aszlig committed Mar 15, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    d13ad38 View commit details

Commits on Mar 27, 2019

  1. nixos/confinement: Remove handling for StartOnly

    Noted by @infinisil on IRC:
    
       infinisil: Question regarding the confinement PR
       infinisil: On line 136 you do different things depending on
                  RootDirectoryStartOnly
       infinisil: But on line 157 you have an assertion that disallows that
                  option being true
       infinisil: Is there a reason behind this or am I missing something
    
    I originally left this in so that once systemd supports that, we can
    just flip a switch and remove the assertion and thus support
    RootDirectoryStartOnly for our confinement module.
    
    However, this doesn't seem to be on the roadmap for systemd in the
    foreseeable future, so I'll just remove this, especially because it's
    very easy to add it again, once it is supported.
    
    Signed-off-by: aszlig <aszlig@nix.build>
    aszlig committed Mar 27, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    861a1ce View commit details
  2. nixos/confinement: Use PrivateMounts option

    So far we had MountFlags = "private", but as @infinisil has correctly
    noticed, there is a dedicated PrivateMounts option, which does exactly
    that and is better integrated than providing raw mount flags.
    
    When checking for the reason why I used MountFlags instead of
    PrivateMounts, I found that at the time I wrote the initial version of
    this module (Mar 12 06:15:58 2018 +0100) the PrivateMounts option didn't
    exist yet and has been added to systemd in Jun 13 08:20:18 2018 +0200.
    
    Signed-off-by: aszlig <aszlig@nix.build>
    aszlig committed Mar 27, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    52299bc View commit details
  3. nixos/release-notes: Add entry about confinement

    First of all, the reason I added this to the "highlights" section is
    that we want users to be aware of these options, because in the end we
    really want to decrease the attack surface of NixOS services and this is
    a step towards improving that situation.
    
    The reason why I'm adding this to the changelog of the NixOS 19.03
    release instead of 19.09 is that it makes backporting services that use
    these options easier. Doing the backport of the confinement module after
    the official release would mean that it's not part of the release
    announcement and potentially could fall under the radar of most users.
    
    These options and the whole module also do not change anything in
    existing services or affect other modules, so they're purely optional.
    
    Adding this "last minute" to the 19.03 release doesn't hurt and is
    probably a good preparation for the next months where we hopefully
    confine as much services as we can :-)
    
    I also have asked @samueldr and @lheckemann, whether they're okay with
    the inclusion in 19.03. While so far only @samueldr has accepted the
    change, we can still move the changelog entry to the NixOS 19.09 release
    notes in case @lheckemann rejects it.
    
    Signed-off-by: aszlig <aszlig@nix.build>
    aszlig committed Mar 27, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    ada3239 View commit details

Commits on Mar 29, 2019

  1. Merge pull request #57519 (systemd-confinement)

    Currently if you want to properly chroot a systemd service, you could do
    it using BindReadOnlyPaths=/nix/store or use a separate derivation which
    gathers the runtime closure of the service you want to chroot. The
    former is the easier method and there is also a method directly offered
    by systemd, called ProtectSystem, which still leaves the whole store
    accessible. The latter however is a bit more involved, because you need
    to bind-mount each store path of the runtime closure of the service you
    want to chroot.
    
    This can be achieved using pkgs.closureInfo and a small derivation that
    packs everything into a systemd unit, which later can be added to
    systemd.packages.
    
    However, this process is a bit tedious, so the changes here implement
    this in a more generic way.
    
    Now if you want to chroot a systemd service, all you need to do is:
    
      {
        systemd.services.myservice = {
          description = "My Shiny Service";
          wantedBy = [ "multi-user.target" ];
    
          confinement.enable = true;
          serviceConfig.ExecStart = "${pkgs.myservice}/bin/myservice";
        };
      }
    
    If more than the dependencies for the ExecStart* and ExecStop* (which
    btw. also includes script and {pre,post}Start) need to be in the chroot,
    it can be specified using the confinement.packages option. By default
    (which uses the full-apivfs confinement mode), a user namespace is set
    up as well and /proc, /sys and /dev are mounted appropriately.
    
    In addition - and by default - a /bin/sh executable is provided, which
    is useful for most programs that use the system() C library call to
    execute commands via shell.
    
    Unfortunately, there are a few limitations at the moment. The first
    being that DynamicUser doesn't work in conjunction with tmpfs, because
    systemd seems to ignore the TemporaryFileSystem option if DynamicUser is
    enabled. I started implementing a workaround to do this, but I decided
    to not include it as part of this pull request, because it needs a lot
    more testing to ensure it's consistent with the behaviour without
    DynamicUser.
    
    The second limitation/issue is that RootDirectoryStartOnly doesn't work
    right now, because it only affects the RootDirectory option and doesn't
    include/exclude the individual bind mounts or the tmpfs.
    
    A quirk we do have right now is that systemd tries to create a /usr
    directory within the chroot, which subsequently fails. Fortunately, this
    is just an ugly error and not a hard failure.
    
    The changes also come with a changelog entry for NixOS 19.03, which is
    why I asked for a vote of the NixOS 19.03 stable maintainers whether to
    include it (I admit it's a bit late a few days before official release,
    sorry for that):
    
      @samueldr:
    
        Via pull request comment[1]:
    
          +1 for backporting as this only enhances the feature set of nixos,
          and does not (at a glance) change existing behaviours.
    
        Via IRC:
    
          new feature: -1, tests +1, we're at zero, self-contained, with no
          global effects without actively using it, +1, I think it's good
    
      @lheckemann:
    
        Via pull request comment[2]:
    
          I'm neutral on backporting. On the one hand, as @samueldr says,
          this doesn't change any existing functionality. On the other hand,
          it's a new feature and we're well past the feature freeze, which
          AFAIU is intended so that new, potentially buggy features aren't
          introduced in the "stabilisation period". It is a cool feature
          though? :)
    
    A few other people on IRC didn't have opposition either against late
    inclusion into NixOS 19.03:
    
      @edolstra:  "I'm not against it"
      @infinisil: "+1 from me as well"
      @grahamc:   "IMO its up to the RMs"
    
    So that makes +1 from @samueldr, 0 from @lheckemann, 0 from @edolstra
    and +1 from @infinisil (even though he's not a release manager) and no
    opposition from anyone, which is the reason why I'm merging this right
    now.
    
    I also would like to thank @infinisil, @edolstra and @danbst for their
    reviews.
    
    [1]: #57519 (comment)
    [2]: #57519 (comment)
    aszlig committed Mar 29, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    dcf40f7 View commit details
11 changes: 11 additions & 0 deletions nixos/doc/manual/release-notes/rl-1903.xml
Original file line number Diff line number Diff line change
@@ -68,6 +68,17 @@
<xref linkend="sec-kubernetes"/> for details.
</para>
</listitem>
<listitem>
<para>
There is now a set of <option>confinement</option> options for
<option>systemd.services</option>, which allows to restrict services
into a <citerefentry>
<refentrytitle>chroot</refentrytitle>
<manvolnum>2</manvolnum>
</citerefentry>ed environment that only contains the store paths from
the runtime closure of the service.
</para>
</listitem>
</itemizedlist>
</section>

1 change: 1 addition & 0 deletions nixos/modules/module-list.nix
Original file line number Diff line number Diff line change
@@ -172,6 +172,7 @@
./security/rtkit.nix
./security/wrappers/default.nix
./security/sudo.nix
./security/systemd-confinement.nix
./services/admin/oxidized.nix
./services/admin/salt/master.nix
./services/admin/salt/minion.nix
199 changes: 199 additions & 0 deletions nixos/modules/security/systemd-confinement.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,199 @@
{ config, pkgs, lib, ... }:

let
toplevelConfig = config;
inherit (lib) types;
inherit (import ../system/boot/systemd-lib.nix {
inherit config pkgs lib;
}) mkPathSafeName;
in {
options.systemd.services = lib.mkOption {
type = types.attrsOf (types.submodule ({ name, config, ... }: {
options.confinement.enable = lib.mkOption {
type = types.bool;
default = false;
description = ''
If set, all the required runtime store paths for this service are
bind-mounted into a <literal>tmpfs</literal>-based <citerefentry>
<refentrytitle>chroot</refentrytitle>
<manvolnum>2</manvolnum>
</citerefentry>.
'';
};

options.confinement.fullUnit = lib.mkOption {
type = types.bool;
default = false;
description = ''
Whether to include the full closure of the systemd unit file into the
chroot, instead of just the dependencies for the executables.
<warning><para>While it may be tempting to just enable this option to
make things work quickly, please be aware that this might add paths
to the closure of the chroot that you didn't anticipate. It's better
to use <option>confinement.packages</option> to <emphasis
role="strong">explicitly</emphasis> add additional store paths to the
chroot.</para></warning>
'';
};

options.confinement.packages = lib.mkOption {
type = types.listOf (types.either types.str types.package);
default = [];
description = let
mkScOption = optName: "<option>serviceConfig.${optName}</option>";
in ''
Additional packages or strings with context to add to the closure of
the chroot. By default, this includes all the packages from the
${lib.concatMapStringsSep ", " mkScOption [
"ExecReload" "ExecStartPost" "ExecStartPre" "ExecStop"
"ExecStopPost"
]} and ${mkScOption "ExecStart"} options. If you want to have all the
dependencies of this systemd unit, you can use
<option>confinement.fullUnit</option>.
<note><para>The store paths listed in <option>path</option> are
<emphasis role="strong">not</emphasis> included in the closure as
well as paths from other options except those listed
above.</para></note>
'';
};

options.confinement.binSh = lib.mkOption {
type = types.nullOr types.path;
default = toplevelConfig.environment.binsh;
defaultText = "config.environment.binsh";
example = lib.literalExample "\${pkgs.dash}/bin/dash";
description = ''
The program to make available as <filename>/bin/sh</filename> inside
the chroot. If this is set to <literal>null</literal>, no
<filename>/bin/sh</filename> is provided at all.
This is useful for some applications, which for example use the
<citerefentry>
<refentrytitle>system</refentrytitle>
<manvolnum>3</manvolnum>
</citerefentry> library function to execute commands.
'';
};

options.confinement.mode = lib.mkOption {
type = types.enum [ "full-apivfs" "chroot-only" ];
default = "full-apivfs";
description = ''
The value <literal>full-apivfs</literal> (the default) sets up
private <filename class="directory">/dev</filename>, <filename
class="directory">/proc</filename>, <filename
class="directory">/sys</filename> and <filename
class="directory">/tmp</filename> file systems in a separate user
name space.
If this is set to <literal>chroot-only</literal>, only the file
system name space is set up along with the call to <citerefentry>
<refentrytitle>chroot</refentrytitle>
<manvolnum>2</manvolnum>
</citerefentry>.
<note><para>This doesn't cover network namespaces and is solely for
file system level isolation.</para></note>
'';
};

config = let
rootName = "${mkPathSafeName name}-chroot";
inherit (config.confinement) binSh fullUnit;
wantsAPIVFS = lib.mkDefault (config.confinement.mode == "full-apivfs");
in lib.mkIf config.confinement.enable {
serviceConfig = {
RootDirectory = pkgs.runCommand rootName {} "mkdir \"$out\"";
TemporaryFileSystem = "/";
PrivateMounts = lib.mkDefault true;

# https://github.com/NixOS/nixpkgs/issues/14645 is a future attempt
# to change some of these to default to true.
#
# If we run in chroot-only mode, having something like PrivateDevices
# set to true by default will mount /dev within the chroot, whereas
# with "chroot-only" it's expected that there are no /dev, /proc and
# /sys file systems available.
#
# However, if this suddenly becomes true, the attack surface will
# increase, so let's explicitly set these options to true/false
# depending on the mode.
MountAPIVFS = wantsAPIVFS;
PrivateDevices = wantsAPIVFS;
PrivateTmp = wantsAPIVFS;
PrivateUsers = wantsAPIVFS;
ProtectControlGroups = wantsAPIVFS;
ProtectKernelModules = wantsAPIVFS;
ProtectKernelTunables = wantsAPIVFS;
};
confinement.packages = let
execOpts = [
"ExecReload" "ExecStart" "ExecStartPost" "ExecStartPre" "ExecStop"
"ExecStopPost"
];
execPkgs = lib.concatMap (opt: let
isSet = config.serviceConfig ? ${opt};
in lib.optional isSet config.serviceConfig.${opt}) execOpts;
unitAttrs = toplevelConfig.systemd.units."${name}.service";
allPkgs = lib.singleton (builtins.toJSON unitAttrs);
unitPkgs = if fullUnit then allPkgs else execPkgs;
in unitPkgs ++ lib.optional (binSh != null) binSh;
};
}));
};

config.assertions = lib.concatLists (lib.mapAttrsToList (name: cfg: let
whatOpt = optName: "The 'serviceConfig' option '${optName}' for"
+ " service '${name}' is enabled in conjunction with"
+ " 'confinement.enable'";
in lib.optionals cfg.confinement.enable [
{ assertion = !cfg.serviceConfig.RootDirectoryStartOnly or false;
message = "${whatOpt "RootDirectoryStartOnly"}, but right now systemd"
+ " doesn't support restricting bind-mounts to 'ExecStart'."
+ " Please either define a separate service or find a way to run"
+ " commands other than ExecStart within the chroot.";
}
{ assertion = !cfg.serviceConfig.DynamicUser or false;
message = "${whatOpt "DynamicUser"}. Please create a dedicated user via"
+ " the 'users.users' option instead as this combination is"
+ " currently not supported.";
}
]) config.systemd.services);

config.systemd.packages = lib.concatLists (lib.mapAttrsToList (name: cfg: let
rootPaths = let
contents = lib.concatStringsSep "\n" cfg.confinement.packages;
in pkgs.writeText "${mkPathSafeName name}-string-contexts.txt" contents;

chrootPaths = pkgs.runCommand "${mkPathSafeName name}-chroot-paths" {
closureInfo = pkgs.closureInfo { inherit rootPaths; };
serviceName = "${name}.service";
excludedPath = rootPaths;
} ''
mkdir -p "$out/lib/systemd/system"
serviceFile="$out/lib/systemd/system/$serviceName"
echo '[Service]' > "$serviceFile"
# /bin/sh is special here, because the option value could contain a
# symlink and we need to properly resolve it.
${lib.optionalString (cfg.confinement.binSh != null) ''
binsh=${lib.escapeShellArg cfg.confinement.binSh}
realprog="$(readlink -e "$binsh")"
echo "BindReadOnlyPaths=$realprog:/bin/sh" >> "$serviceFile"
''}
while read storePath; do
if [ -L "$storePath" ]; then
# Currently, systemd can't cope with symlinks in Bind(ReadOnly)Paths,
# so let's just bind-mount the target to that location.
echo "BindReadOnlyPaths=$(readlink -e "$storePath"):$storePath"
elif [ "$storePath" != "$excludedPath" ]; then
echo "BindReadOnlyPaths=$storePath"
fi
done < "$closureInfo/store-paths" >> "$serviceFile"
'';
in lib.optional cfg.confinement.enable chrootPaths) config.systemd.services);
}
9 changes: 4 additions & 5 deletions nixos/modules/system/boot/systemd-lib.nix
Original file line number Diff line number Diff line change
@@ -9,12 +9,11 @@ in rec {

shellEscape = s: (replaceChars [ "\\" ] [ "\\\\" ] s);

mkPathSafeName = lib.replaceChars ["@" ":" "\\" "[" "]"] ["-" "-" "-" "" ""];

makeUnit = name: unit:
let
pathSafeName = lib.replaceChars ["@" ":" "\\" "[" "]"] ["-" "-" "-" "" ""] name;
in
if unit.enable then
pkgs.runCommand "unit-${pathSafeName}"
pkgs.runCommand "unit-${mkPathSafeName name}"
{ preferLocalBuild = true;
allowSubstitutes = false;
inherit (unit) text;
@@ -24,7 +23,7 @@ in rec {
echo -n "$text" > $out/${shellEscape name}
''
else
pkgs.runCommand "unit-${pathSafeName}-disabled"
pkgs.runCommand "unit-${mkPathSafeName name}-disabled"
{ preferLocalBuild = true;
allowSubstitutes = false;
}
1 change: 1 addition & 0 deletions nixos/tests/all-tests.nix
Original file line number Diff line number Diff line change
@@ -221,6 +221,7 @@ in
switchTest = handleTest ./switch-test.nix {};
syncthing-relay = handleTest ./syncthing-relay.nix {};
systemd = handleTest ./systemd.nix {};
systemd-confinement = handleTest ./systemd-confinement.nix {};
taskserver = handleTest ./taskserver.nix {};
telegraf = handleTest ./telegraf.nix {};
tomcat = handleTest ./tomcat.nix {};
168 changes: 168 additions & 0 deletions nixos/tests/systemd-confinement.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,168 @@
import ./make-test.nix {
name = "systemd-confinement";

machine = { pkgs, lib, ... }: let
testServer = pkgs.writeScript "testserver.sh" ''
#!${pkgs.stdenv.shell}
export PATH=${lib.escapeShellArg "${pkgs.coreutils}/bin"}
${lib.escapeShellArg pkgs.stdenv.shell} 2>&1
echo "exit-status:$?"
'';

testClient = pkgs.writeScriptBin "chroot-exec" ''
#!${pkgs.stdenv.shell} -e
output="$(echo "$@" | nc -NU "/run/test$(< /teststep).sock")"
ret="$(echo "$output" | sed -nre '$s/^exit-status:([0-9]+)$/\1/p')"
echo "$output" | head -n -1
exit "''${ret:-1}"
'';

mkTestStep = num: { description, config ? {}, testScript }: {
systemd.sockets."test${toString num}" = {
description = "Socket for Test Service ${toString num}";
wantedBy = [ "sockets.target" ];
socketConfig.ListenStream = "/run/test${toString num}.sock";
socketConfig.Accept = true;
};

systemd.services."test${toString num}@" = {
description = "Confined Test Service ${toString num}";
confinement = (config.confinement or {}) // { enable = true; };
serviceConfig = (config.serviceConfig or {}) // {
ExecStart = testServer;
StandardInput = "socket";
};
} // removeAttrs config [ "confinement" "serviceConfig" ];

__testSteps = lib.mkOrder num ''
subtest '${lib.escape ["\\" "'"] description}', sub {
$machine->succeed('echo ${toString num} > /teststep');
${testScript}
};
'';
};

in {
imports = lib.imap1 mkTestStep [
{ description = "chroot-only confinement";
config.confinement.mode = "chroot-only";
testScript = ''
$machine->succeed(
'test "$(chroot-exec ls -1 / | paste -sd,)" = bin,nix',
'test "$(chroot-exec id -u)" = 0',
'chroot-exec chown 65534 /bin',
);
'';
}
{ description = "full confinement with APIVFS";
testScript = ''
$machine->fail(
'chroot-exec ls -l /etc',
'chroot-exec ls -l /run',
'chroot-exec chown 65534 /bin',
);
$machine->succeed(
'test "$(chroot-exec id -u)" = 0',
'chroot-exec chown 0 /bin',
);
'';
}
{ description = "check existence of bind-mounted /etc";
config.serviceConfig.BindReadOnlyPaths = [ "/etc" ];
testScript = ''
$machine->succeed('test -n "$(chroot-exec cat /etc/passwd)"');
'';
}
{ description = "check if User/Group really runs as non-root";
config.serviceConfig.User = "chroot-testuser";
config.serviceConfig.Group = "chroot-testgroup";
testScript = ''
$machine->succeed('chroot-exec ls -l /dev');
$machine->succeed('test "$(chroot-exec id -u)" != 0');
$machine->fail('chroot-exec touch /bin/test');
'';
}
(let
symlink = pkgs.runCommand "symlink" {
target = pkgs.writeText "symlink-target" "got me\n";
} "ln -s \"$target\" \"$out\"";
in {
description = "check if symlinks are properly bind-mounted";
config.confinement.packages = lib.singleton symlink;
testScript = ''
$machine->fail('chroot-exec test -e /etc');
$machine->succeed('chroot-exec cat ${symlink} >&2');
$machine->succeed('test "$(chroot-exec cat ${symlink})" = "got me"');
'';
})
{ description = "check if StateDirectory works";
config.serviceConfig.User = "chroot-testuser";
config.serviceConfig.Group = "chroot-testgroup";
config.serviceConfig.StateDirectory = "testme";
testScript = ''
$machine->succeed('chroot-exec touch /tmp/canary');
$machine->succeed('chroot-exec "echo works > /var/lib/testme/foo"');
$machine->succeed('test "$(< /var/lib/testme/foo)" = works');
$machine->succeed('test ! -e /tmp/canary');
'';
}
{ description = "check if /bin/sh works";
testScript = ''
$machine->succeed(
'chroot-exec test -e /bin/sh',
'test "$(chroot-exec \'/bin/sh -c "echo bar"\')" = bar',
);
'';
}
{ description = "check if suppressing /bin/sh works";
config.confinement.binSh = null;
testScript = ''
$machine->succeed(
'chroot-exec test ! -e /bin/sh',
'test "$(chroot-exec \'/bin/sh -c "echo foo"\')" != foo',
);
'';
}
{ description = "check if we can set /bin/sh to something different";
config.confinement.binSh = "${pkgs.hello}/bin/hello";
testScript = ''
$machine->succeed(
'chroot-exec test -e /bin/sh',
'test "$(chroot-exec /bin/sh -g foo)" = foo',
);
'';
}
{ description = "check if only Exec* dependencies are included";
config.environment.FOOBAR = pkgs.writeText "foobar" "eek\n";
testScript = ''
$machine->succeed('test "$(chroot-exec \'cat "$FOOBAR"\')" != eek');
'';
}
{ description = "check if all unit dependencies are included";
config.environment.FOOBAR = pkgs.writeText "foobar" "eek\n";
config.confinement.fullUnit = true;
testScript = ''
$machine->succeed('test "$(chroot-exec \'cat "$FOOBAR"\')" = eek');
'';
}
];

options.__testSteps = lib.mkOption {
type = lib.types.lines;
description = "All of the test steps combined as a single script.";
};

config.environment.systemPackages = lib.singleton testClient;

config.users.groups.chroot-testgroup = {};
config.users.users.chroot-testuser = {
description = "Chroot Test User";
group = "chroot-testgroup";
};
};

testScript = { nodes, ... }: ''
$machine->waitForUnit('multi-user.target');
${nodes.machine.config.__testSteps}
'';
}