-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: spec the seccomp profile format #39128
Labels
Comments
yujuhong
added
area/security
sig/node
Categorizes an issue or PR as relevant to SIG Node.
labels
Jan 4, 2017
This was referenced May 24, 2017
k8s-github-robot
pushed a commit
that referenced
this issue
Jul 17, 2017
Automatic merge from submit-queue Kubelet CRI: move seccomp from annotations to security context **What this PR does / why we need it**: This is the final step for #39130, which moves seccomp from annotations to linux container security context. And it also fixes #36997 by set the full seccomp profile path for node-installed profiles. Note it doesn't include spec the seccomp profile format, which should be addressed at #39128. And a following PR is required for implementing in kuberuntime and dockershim. **Which issue this PR fixes** Fixes #39130 Fixes #36997 **Special notes for your reviewer**: **Release note**: ```release-note Kubelet CRI: move seccomp from annotations to security context. ```
This was referenced Sep 23, 2017
I prefer to stay with the OCI spec, so we don't have to define a new one and can use one that is a standard. Just to note your link to runc is actually pointing to the libcontainer format. Runc has a spec converter that converts the OCI spec to libcontainer. For example, this is where the syscall names[] array is exploded into []syscalls with a name. |
The issue above has more details. /close |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Seccomp is supported by annotations today in both kubernetes api (#25324) and CRI (#33500):
security.alpha.kubernetes.io/seccomp/container/<container name>
for containerssecurity.alpha.kubernetes.io/seccomp/pod
for podThe candidate values include
localhost/<profile-name>
, which indicates the profile installed to the node's local seccomp profile root.So from the API, only the profile path is defined and the profile format is not defined clearly.
Althoughthe docker's seccomp profile format is supposed at the beginng time, we are adding other runtimes by CRI, so it's time to spec the seccomp profile format clearly.
candidate formats
There are three candidate formats in my opinion (please let me know if I missed others):
I prefer to define a new one based on oci seccomp and add
ArchMap
to it because of@euank @yujuhong @Random-Liu @timstclair @mrunalp WDYT
cc/ @kubernetes/sig-node-misc
The text was updated successfully, but these errors were encountered: