Authobot is a simple authorization plugin for docker to prevent some API usages that we know will expose hosts data and are not required for a legitimate use of docker from a containerized jenkins build agent.
We prevent
- running container with bind mounts
- running privileged container
- more to come
We also provide a whitelist of authorized API URIs, based on docker-pipeline / declarative-pipeline requirements. Any other API call will be rejected.
➜ # ➜ # let's run a container ➜ # ➜ docker run --rm -t ubuntu echo Hello Hello ➜ # ➜ # let's now run a _privileged_ container (can access hosts' devices) ➜ # ➜ docker run --rm -t --privileged ubuntu echo Hello docker: Error response from daemon: authorization denied by plugin authobot:latest: use of Privileged contianers is not allowed. See 'docker run --help'. ➜ # ➜ # hum, let's bind mount host filesystem to hack all it's secrets ➜ # ➜ docker run --rm -t -v /:/host ubuntu echo Hello docker: Error response from daemon: authorization denied by plugin authobot:latest: use of bind mounts is not allowed. See 'docker run --help'. ➜ # ➜ # ok, let's just mount a volume to persist our data ➜ # ➜ docker run --rm -t -v some_volume:/host ubuntu echo Hello Hello we use dep to manage dependencies. run dep ensure to generate a local vendor folder so you can hack and build the plugin.
build with docker build -t authobot .
create rootfs directory, and export container filesystem
rm -rf rootfs mkdir rootfs ID=$(docker run -d authobot:latest) docker export $ID | tar -x -C rootfs docker kill $ID docker rm $ID Then, install and enable plugin on your local docker daemon
docker plugin create authobot $(pwd) docker plugin enable authobot change docker daemon configuration to include --authorization-plugin=authobot and restart daemon.
