-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Custom Resource Definition (CRD) for profiles #117
Comments
cc @cmurphy |
I started working on a rough schema definition for this: https://gist.github.com/cmurphy/dc67e2d1214947972f41b7caa2ebf3ae Going to look into using kubebuilder to translate the yaml into Go and build the controller. |
Awesome, thank you for the update @cmurphy! I’ll give it a look. (cc @pjbgf @hasheddan) |
I really like the proposal in the GitHub gist! One thing you've already mentioned is that some fields are not part of the runtime spec. Now it gets a bit tricky: The main reason of that is because before the runtime spec even existed, docker invented the original seccomp profile types there: https://github.com/moby/moby/blob/master/api/types/seccomp.go But, we also have types there:
I like the idea to just rely on the runtime-spec in the first place, because that's the only one where a common standard exists. On the other hand we have to find a way to express the capability bounding (see |
Just added some comments directly in the gist, but in short: yes, brilliant stuff from @cmurphy! 👍 @saschagrunert I would agree with your suggestion to start with support for the runtime-spec. If we document that non-OCI fields are only supported on the I have a feeling that most users won't be using things such as |
Thanks for the comments! I started a rough implementation here: #125 I added |
The idea is to create a CRD on top of profiles, which helps to:
The text was updated successfully, but these errors were encountered: