-
Notifications
You must be signed in to change notification settings - Fork 624
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support nerdctl run --security-opt=XXX
#11
Comments
nerdctl run --seccomp=XXX
nerdctl run --security-opt=XXX
@AkihiroSuda mentions that apparmor support has been implemented. Unfortunately, deploying my lxkns discovery service using the existing docker-compose.yaml fails, seemingly the security option from the composer file doesn't get applied? Admittedly, this might have been composed in infosec theory hell 😁: version: '2.4'
services:
lxkns:
image: lxkns:latest
read_only: true
build:
context: ../..
dockerfile: deployments/lxkns/Dockerfile
command:
- "/lxkns"
- "--initialcgroup"
- "--docker=unix:///proc/1/root/run/docker.sock"
- "--containerd=/proc/1/root/run/containerd/containerd.sock"
ports:
- "5010:5010"
user: "65534"
security_opt:
# apparmor only accepts a profile name, which must have been loaded
# by the system admin. You might want to use the lxkns-apparmor
# profile to be found in this directory.
- apparmor:unconfined #- apparmor:lxkns
# Please note that Docker's default container seccomp profile is
# adaptive: it allows all those syscalls for which the process has
# matching capabilities. In consequence, this Docker default seccomp
# profile thus does not interfere with lxkns. However, we still want
# to slightly curb the unneeded parts of the powers bestowed upon us
# by especially CRAP_SYS_ADMIN and CAP_SYS_PTRACE...
- seccomp:deployments/lxkns/lxkns-seccomp.json
cap_drop:
- ALL
cap_add:
- SYS_ADMIN # change namespaces
- SYS_CHROOT # change mount namespaces
- SYS_PTRACE # access nsfs namespace information
- DAC_READ_SEARCH # for fully discovering bind-mounted namespaces
- DAC_OVERRIDE # for accessing the containerd API socket
# We need the full PID view for correct scanning.
pid: host
Shouldn't |
(oh, and SELinux support for setting the context (elements) would be great either!) |
Hi guys, any news about SELinux support? |
Related to runfinch/finch#192, I think it would be great if |
I'm interested in implementing this @AkihiroSuda, is it free for grabs? |
@arnaldo2792 Feel free to have a try. |
Ok, I started to work on it 👍 |
I'm still going through this, it took me some time to configure a reliable setup and understanding what docker/containerd-cri do when |
Add the security options to the
nerdctl run
.Seccomp security profiles for Docker
AppArmor security profiles for Docker
The text was updated successfully, but these errors were encountered: