builtin

package
v0.0.0-...-bc60ea4 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Dec 20, 2024 License: GPL-3.0 Imports: 37 Imported by: 58

README

Interface policy

Plug and slot rules

Declarative rules are used to control what plugs or slots a snap is allowed to use, and if a snap is allowed to use a plug/slot, what other slots/plugs can connect to that plug/slot on this snap.

The overall structure has two top-level keys: plugs and slots. These affect the plugs and slots of the snap respectively. Beneath these are the names of interfaces. Each interface key introduces a map with 6 possible keys:

  • allow-installation
  • deny-installation
  • allow-connection
  • deny-connection
  • allow-auto-connection
  • deny-auto-connection

Each of these keys can either have a static value of true/false or can be a more complex object/list which is “evaluated” by snapd on a device to determine the actual value, be it true or false.

Base declaration and snap declarations

The rules defined in the snapd interfaces source code (via setting commonInterface.baseDeclarationSlots/Plugs) form the “base declaration” and can be overridden by per-snap rules in the snap store published via the per-snap snap-declaration assertions, which make it possible for a store to alter the policy hardcoded in snapd. For example, a store assertion is typically used to grant auto-connection to some plugs of a specific application where this is deemed reasonable or safe (such as auto-connecting the camera interface in a web-streaming application).

Basic evaluation and precedence

When not otherwise specified, the default values for allow-* keys are true, while the default values for deny-* keys are false. A matched deny-* constraint overrides and takes precedence over a matching allow-* constraint from within the same stanza. The order of evaluation of rules is the following (execution stops as soon as a matching rule is found, meaning that the topmost elements in this list have higher priority):

  • deny-* keys in plug snap-declaration rule
  • allow-* keys in plug snap-declaration rule
  • deny-* keys in slot snap-declaration rule
  • allow-* keys in slot snap-declaration rule
  • deny-* keys in plug base-declaration rule
  • allow-* keys in plug base-declaration rule
  • deny-* keys in slot base-declaration rule
  • allow-* keys in slot base-declaration rule

In other words, snap-declaration (store) rules have priority over base-declaration rules; then, plug rules have priority over slot rules, and finally, deny rules have priority over allow rules within the same stanza.

allow-installation

The allow-installation key is evaluated when the snap is being installed. If this evaluates to false, the snap cannot be installed if an interface plug or slot for which allow-installation evaluated to false exists in the snap. An example would be the snapd-control interface, which has in the base-declaration the static allow-installation: false rule for plugs:

snapd-control:
  allow-installation: false
  deny-auto-connection: true

If a snap does not plug snapd-control then this rule does not apply, but if the snap does declare a snapd-control plug and there are no assertions in the store for this snap about allowing snapd-control, then snap installation will fail.

Snap interfaces that have allow-installation set to false for their plugs in the base-declaration are said to be super-privileged, meaning they cannot be used at all without a snap-declaration assertion.

A snap's interface slot provided by a non-system snap is considered super-privileged if it has allow-installation that evaluates to false in the base-declaration. An application snap or gadget defining such slots cannot be used without an accompanying snap-declaration assertion.

allow-connection

The allow-connection key controls whether an API/manual connection is permitted at all and usually is used to ensure that only “compatible” plugs and slots are connected to each other. A great example is the content interface, where the following (abbreviated) rule from the base-declaration is used to ensure that a candidate plug and slot content interface have matching content attribute values:

allow-connection:
  plug-attributes:
    content: $SLOT(content)

This can be read as allow-connection evaluating to true only when the plug has an attribute content with the same value as the attribute content in the slot. That is to say, these plug and slots are compatible because content does match for the plug and slot:

# in the snap providing the content:
slots:
  foo-content:
    interface: content
    content: specific-files

# in the snap consuming the content:
plugs:
  foo-content:
    interface: content
    content: specific-files

While the following plug and slots are not compatible:

slots:
  foo-content:
    interface: content
    content: other-files

plugs:
  foo-content:
    interface: content
    content: specific-files
allow-auto-connection

The allow-auto-connection key is the final key considered when snapd is evaluating the automatic connection of interface plugs and slots. If this key evaluates to true, then this plug/slot combination is considered a valid candidate for automatic connection. In this context allow-connection is ignored.

An automatic connection will happen normally only if there is one single candidate combination with a slot for a given plug.

Supported rule constraints

Each of the keys seen before (allow/deny-installation, allow/deny-connection, and allow/deny-auto-connection) has a set of sub-keys that can be used as rules with each constraint. The authoritative place where this information comes from is inside snapd in the asserts package, specifically the file ifacedecls.go is the main place where these are defined.

In allow-connection or allow-auto-connection constraints about snap type, snap ID and publisher can only be specified for the other side snap (e.g. a slot-side allow-connection constraint can only specify plug-snap-type, plug-snap-id, plug-snap-publisher). As an exception, constraints on snap type for the slot providing snap (slot-snap-type) can be specified on the slot side as well. This is only meaningful/useful in the base declaration as it allows for a constraint on whether the slot side is provided by the system snap or not.

For the plug-snap-type and slot-snap-type rules there are 4 possible values: core, gadget, kernel, and app. The core snap type refers to whichever snap is providing snapd on the system and therefore the system interface slots, either the core snap or snapd snap (typically core snap on UC16 devices, snapd snap on UC18+ systems, and either on classic systems depending on re-exec logic).

The on-store, on-brand, and on-model rules are generally not hard-coded within snapd interfaces. They are instead specified in store assertions where they are known as "device context constraints". These device context constraints are primarily used to ensure a given rule only applies to a device with a serial assertion (and thus model assertion) from a given brand or using a given store (as specified by the model). This is because if the assertion and snap from a brand store were copied to a non-branded device, the assertion could still be acknowledged by the device and the snap installed, but the assertion would not operate, and snap connections would not take place as they do on the branded device.

The plug-names and slot-names rules are also only used in store assertions. They refer to the naming of a plug or slot when that slot is scoped globally with a name other than the generic interface name. For example this assertion:

plugs:
  gpio:
    allow-auto-connection:
      slot-names: [ gpio1 ]
      plug-names: [ gpio-red-led ]

only allows the plugging snap to have its plug named gpio-red-led auto-connected to a gpio slot named gpio1.

Rule evaluation
Greedy connection / single slot rule

The first rule about whether an automatic connection happens between a plug and a slot has to do with “arity” or how many slots a given plug is being considered to connect to and vice versa. This is expressed with the slots-per-plug and plugs-per-slot rules, with the default value of plugs-per-slot being “*” meaning any number of plugs can be connected to a specific slot. The default value of slots-per-plug is "1", however, meaning that a plug can in general without a special snap-declaration only automatically connect to one slot. All that is to say, if there are multiple candidate slots, in the default case a plug will auto-connect to neither of them and snapd will issue a warning.

See also this forum post which was written when this logic was first implemented.

Maps and Lists

The next rule about evaluating snap-declaration assertions is that maps are treated as logical ANDs where each key in the map must individually evaluate to true and lists are treated as logical ORs where only one of the elements of the list must evaluate to true. With the following example assertion, order for the serial-port plug in this snap to auto-connect, either the first element of the list must evaluate to true or the second element of the list must evaluate to true (or they could both theoretically evaluate to true, but this is impossible in practice since the slots can only come from gadgets and so to match both the system would have to have two gadget snaps installed simultaneously which is impossible).

plugs:
  serial-port:
    allow-auto-connection:
      -
        on-store:
          - my-app-store
        plug-names:
          - serial-rf-nic
        slot-attributes:
          path: /dev/serial-port-rfnic
        slot-names:
          - serial-rf-nic
        slot-snap-id:
          - Cx4J8ADDq8xULNaAjO7mQid75ru4rObB
      -
        on-store:
          - my-app-store
        plug-names:
          - serial-rf-nic
        slot-attributes:
          path: /dev/serial-port-rfnic
        slot-names:
          - serial-rf-nic
        slot-snap-id:
          - WabnwLoV48BCMj8NoOetmdxFFMxDsPGb

For the first element of the allow-auto-connection list to evaluate to true, the following things must be true:

  • The device must be on a brand device in my-app-store AND
  • The plug name must be serial-rf-nic AND
  • The slot name must be serial-rf-nic AND
  • The slot must declare an attribute, path, with the value /dev/serial-port-rfnic AND
  • The slot must come from a snap with a snap ID of Cx4J8ADDq8xULNaAjO7mQid75ru4rObB

The above is also true for the second element of the allow-auto-connection list.

An equivalent way to write an assertion that works in exactly the same way would be:

plugs:
  serial-port:
    allow-auto-connection:
      on-store:
        - my-app-store
      plug-names:
        - serial-rf-nic
      slot-attributes:
        path: /dev/serial-port-rfnic
      slot-names:
        - serial-rf-nic
      slot-snap-id:
        - Cx4J8ADDq8xULNaAjO7mQid75ru4rObB
        - WabnwLoV48BCMj8NoOetmdxFFMxDsPGb

The chief difference here is that instead of having a list of two maps, we instead have a single map, and the key which changes for the two gadgets is the slot-snap-id which now has two values in a list. In this case, the slot snap ID must be one of the snap IDs in the list in order for the slot-snap-id rule to evaluate to true. So the following things must be true:

  • The device must be on a brand device in my-app-store AND
  • The plug name must be serial-rf-nic AND
  • The slot-name must be serial-rf-nic AND
  • The slot must declare an attribute, path, with the value /dev/serial-port-rfnic AND
  • The slot must come from a snap with a snap ID of any of the following elements:
    • Cx4J8ADDq8xULNaAjO7mQid75ru4rObB, OR
    • WabnwLoV48BCMj8NoOetmdxFFMxDsPGb

Lists and maps can also be used as values for attributes under plug/slot-attributes constraints. A map will match only if the attribute value contains all the entries in the constraints map with the same values (extra attribute elements are ignored). A list will match against a non-list attribute value if the value matches any of the list elements. A list will match against a list attribute value if all the elements in the attribute list value in turn match something in the list. This means, for example, a constraint list of value constraints will match a list of attribute scalars if the two groups of values match as a set (order doesn't matter).

Attribute constraints and special matches and variables

Plug/slot-attributes string value constraints are interpreted as regexps (wrapped implicitly in ^$ anchors), unless they are one of the special forms starting with $.

The special forms starting with $ currently consist of:

  • $SLOT_PUBLISHER_ID, $PLUG_PUBLISHER_ID: these can be specified in the plug-publisher-id and slot-publisher-id constraints respectively and are used from the plug side and slot side of a declaration to refer to the publisher-id of the other side of the connection.
  • $PLUG(), $SLOT(): similar to the above, but used in the plug-attributes and slot-attributes constraints for specifying attributes instead of publisher-ids.
  • $MISSING: used in the plug-attributes and slot-attributes constraints to match when the attribute set to $MISSING is not specified in the snap.

For example, these features are used in the base-declaration for the content interface to express that a connection is only allowed when the attribute value of the verbatim “content” attribute on the slot side is the same as the plug side and that auto-connection should only take place by default when the plug publisher ID is the same as the slot publisher ID (unless this is overridden by a store assertion):

content:
  allow-installation:
    slot-snap-type:
      - app
      - gadget
  allow-connection:
    plug-attributes:
      content: $SLOT(content)
  allow-auto-connection:
    plug-publisher-id:
      - $SLOT_PUBLISHER_ID
    plug-attributes:
      content: $SLOT(content)

Unasserted local installation

When a snap is installed without matching assertions using --dangerous, many checks are not performed. This helps with local snap development.

For installation only, any slot-snap-type constraint in a base-declaration allow-installation rule for slots is checked. Any deny-installation rule here is ignored. Nothing is checked for the snap plugs.

For connections involving the snap, no rules are checked and it is always allowed.

For auto-connection, the base-declaration and any rule for the other side (if available) is considered. This usually means no auto-connection will happen unless allowed by the base-declaration or by a slot-side snap-declaration.

Base declaration policy patterns

This section discusses the patterns to follow when writing base declaration rules for an interface (via setting commonInterface.baseDeclarationSlots/Plugs), depending on the security characteristics of the interface.

Slots for a specific interface can be provided by the system snap (so called implicit slots), or by an application snap, or sometimes by both.

For almost all interfaces, and whenever possible, the base declaration rules are written as slot-side-only rules.

Importantly, items are not merged between the slots and plugs, or between the base declaration and snap declaration for a particular type of rule.

This means that if a connection rule for both the slot-side and plug-side is specified in the base declaration, only the plug side is used (plug-side overrides the slot side).

Installation rules target their side only; a slot-side installation rule is for allowing snaps with a slot of the given interface. A plug-side installation rule is for snaps with a plug of the given interface.

Interfaces can be broadly categorized as:

  • auto-connected implicit slots (eg, network)
  • manually connected implicit slots (eg, bluetooth-control)
  • auto-connected app-provided slots (eg, mir)
  • manually connected app-provided slots (eg, bluez)

As such, that they will follow this pattern:

slots:
  auto-connected-implicit-slot:
    allow-installation:
      slot-snap-type:
        - core                     # implicit slot
    #allow-auto-connection: true   # allow auto-connect, default

  manual-connected-implicit-slot:
    allow-installation:
      slot-snap-type:
        - core                     # implicit slot
    deny-auto-connection: true     # force manual connect

  auto-connected-provided-slot:
    allow-installation:
      slot-snap-type:
        - app                      # app provided slot
    deny-connection: true          # require allow-connection in snap decl

  manual-connected-provided-slot:
    allow-installation:
      slot-snap-type:
        - app                      # app provided slot
    deny-connection: true          # require allow-connection in snap decl
    deny-auto-connection: true     # force manual connect

As some slots can be provided by both the system or an application snap, some interfaces will be in more than one category.

Auto-connection should be allowed in the base-declaration if the access to the resources provided by the interface does not have security implications.

App-provided slots use 'deny-connection: true' since slot implementations require privileged access to the system and the snap must be trusted. In this manner, a snap declaration for the slot-providing snap is required to override the base declaration to allow connections with the app-provided slot.

Slots dealing with hardware will typically specify 'gadget' and 'core' as the slot-snap-type (eg, serial-port). Eg:

slots:
  manual-connected-hw-slot:
    allow-installation:
      slot-snap-type:
        - core
        - gadget
    deny-auto-connection: true

Denying auto-connection not only stops access but also covers the fact that there might be multiple slots for an hardware interface for which there is no way to choose one.

So called super-privileged plugs should also disallow installation on a system. A snap declaration is required to override the base declaration to allow installation (eg, kernel-module-control). Eg:

plugs:
  manual-connected-super-privileged-plug:
    allow-installation: false
    deny-auto-connection: true
(remember this overrides slot side rules)

This pattern makes sense for interfaces that carry great security risks and allow the snap to take control outside of the sandbox, e.g. installing a kernel module.

So called super-privileged slot implementations should also disallow installation on a system and a snap declaration is required to override the base declaration to allow installation (eg, docker). Eg:

slots:
  manual-connected-super-privileged-slot:
    allow-installation: false
    deny-connection: true
    deny-auto-connection: true

This pattern makes sense for interfaces where implementing them requires extensive system access, or where there is the need for a review to check for policy or to avoid resource use/naming clashes.

Some interfaces have policy that is meant to cover application snap slot implementations but also classic systems. Since the slot implementation is privileged, we require a snap declaration to be used for app-provided slot implementations on non-classic systems (eg, network-manager). Eg:

slots:
  classic-or-not-slot:
    allow-installation:
      slot-snap-type:
        - app
        - core
    deny-auto-connection: true
    deny-connection:
      on-classic: false

The idea of this pattern is that on classic we expect the slot to be system provided and for it to be app-provide on Core. However, the work on Core Desktop means this idea is not always valid. A different approach is to deny-connection based on the type of slot carrying snap, e.g for upower-observe nowadays, we have:

upower-observe:
  allow-installation:
    slot-snap-type:
      - app
      - core
  deny-auto-connection:
    slot-snap-type:
      - app
  deny-connection:
    slot-snap-type:
      - app

Some interfaces only have implicit slots and should be auto-connected only on classic systems (eg, home). Eg:

slots:
  implicit-auto-classic-slot:
    allow-installation:
      slot-snap-type:
        - core
    deny-auto-connection:
      on-classic: false

Some interfaces with app-provided slots allow connections if some expectation is met. This in turn is expressed by some kind of tag attribute on both plug and slot (usually named after the interface) that must match, for example content:

slots:
  content:
    allow-installation:
      slot-snap-type:
        - app
        - gadget
    allow-connection:
      plug-attributes:
        content: $SLOT(content)
    allow-auto-connection:
      plug-publisher-id:
        - $SLOT_PUBLISHER_ID
      plug-attributes:
        content: $SLOT(content)

In these situations auto-connection is often granted by default if the publisher also matches.

Some interfaces might need complex policies that mix many of these patterns, for example, shared-memory:

  • allows auto-connection to the implicit slot if the plug set a private attribute to true (default is false)
  • supports app-provided slots but that are super-privileged to avoid naming clashes
  • uses a tag attribute to match plug and slots, and if the slot could be defined lets same publisher plugs auto-connect
 slots:
   shared-memory:
     allow-installation:
       slot-snap-type:
         - app
         - gadget
         - core
     deny-installation:
       slot-snap-type:
         - app
         - gadget
     deny-auto-connection: true
 
 plugs:
  shared-memory:
     allow-connection:
       -
         plug-attributes:
           private: false
         slot-attributes:
           shared-memory: $PLUG(shared-memory)
       -
         plug-attributes:
           private: true
         slot-snap-type:
           - core
     allow-auto-connection:
       -
         plug-attributes:
           private: false
         slot-publisher-id:
           - $PLUG_PUBLISHER_ID
         slot-attributes:
           shared-memory: $PLUG(shared-memory)
       -
         plug-attributes:
           private: true
         slot-snap-type:
           - core

Note the combining of allow-installation and deny-installation slot-snap-type constraints to make the slot super-privileged while accounting for the slot snap type check done for --dangerous installations.

Documentation

Index

Constants

View Source
const UsbMaxInterfaces = 32

The maximum number of Usb bInterfaceNumber.

Variables

This section is empty.

Functions

func Interfaces

func Interfaces() []interfaces.Interface

Interfaces returns all of the built-in interfaces.

func MockInterface

func MockInterface(iface interfaces.Interface) func()

func SanitizePlugsSlots

func SanitizePlugsSlots(snapInfo *snap.Info)

Types

type ModuleInfo

type ModuleInfo struct {
	// contains filtered or unexported fields
}

type MountInfo

type MountInfo struct {
	// contains filtered or unexported fields
}

Source Files

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL