turbot/docker_compliance

Query: exec_permissions_644_docker_socket

Usage

powerpipe query docker_compliance.query.exec_permissions_644_docker_socket

Steampipe Tables

SQL

with os_output as (
select
btrim(stdout_output, E' \n\r\t') as os,
_ctx ->> 'connection_name' as os_conn
from
exec_command
where
command = 'uname -s'
), hostname as (
select
btrim(stdout_output, E' \n\r\t') as host,
_ctx ->> 'connection_name' as host_conn,
_ctx
from
exec_command
where
command = 'hostname'
),
linux_output as (
select
stdout_output,
_ctx ->> 'connection_name' as conn
from
exec_command,
os_output
where
os_conn = _ctx ->> 'connection_name'
and command = 'stat -c %a "$(systemctl show -p FragmentPath docker.socket | awk -F''='' ''{print $2}'')"'
),
linux_file_location as (
select
stdout_output,
_ctx ->> 'connection_name' as conn
from
exec_command,
os_output
where
os_conn = _ctx ->> 'connection_name'
and command = 'echo $(systemctl show -p FragmentPath docker.socket)'
)
select
host as resource,
case
when os.os ilike '%Darwin%' then 'skip'
when l.stdout_output = '' then 'skip'
when o.stdout_output like '%644%' then 'ok'
else 'alarm'
end as status,
case
when os.os ilike '%Darwin%' then host || ' docker.socket does not exist on ' || os.os || ' OS.'
when l.stdout_output = '' then host || ' recommendation is not applicable as the file is unavailable.'
else host || ' docker.socket file permission set to ' || (btrim(o.stdout_output, E' \n\r\t')) || '.'
end as reason
, h._ctx ->> 'connection_name' as connection_name
from
hostname as h,
os_output as os,
linux_output as o,
linux_file_location as l
where
os.os_conn = h.host_conn
and h.host_conn = o.conn
and h.host_conn = l.conn;

Controls

The query is being used by the following controls: