Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Seccomp profile policy enforcement. #1705

Merged
merged 5 commits into from
Mar 28, 2023
Merged

Seccomp profile policy enforcement. #1705

merged 5 commits into from
Mar 28, 2023

Conversation

matajoh
Copy link
Member

@matajoh matajoh commented Mar 21, 2023

This commit adds enforcement over the seccomp profile associated with a container. The policy author can measure their seccomp profile and include this measurement in the policy. Subsequently, they can provided that same seccomp profile to the orchestrator (e.g. via an annotation) and GCS will measure the provided profile and provide this as input to the policy engine.

This commit also adds a series of CRI tests for security context enforcement.

This commit adds enforcement over the seccomp profile associated with a container. The
policy author can measure their seccomp profile and include this measurement in the
policy. Subsequently, they can provided that same seccomp profile to the orchestrator
(e.g. via an annotation) and GCS will measure the provided profile and provide this as
input to the policy engine.

This commit also adds a series of CRI tests for security context enforcement.

Signed-off-by: Matthew A Johnson <matjoh@microsoft.com>
@matajoh matajoh requested a review from a team as a code owner March 21, 2023 13:13
Signed-off-by: Matthew Johnson <matjoh@microsoft.com>
Signed-off-by: Matthew A Johnson <matjoh@microsoft.com>
Signed-off-by: Matthew A Johnson <matjoh@microsoft.com>
Signed-off-by: Maksim An <maksiman@microsoft.com>
@anmaxvl anmaxvl merged commit ff268a2 into microsoft:main Mar 28, 2023
@anmaxvl anmaxvl deleted the seccomp-policy branch March 28, 2023 19:24
princepereira pushed a commit to princepereira/hcsshim that referenced this pull request Aug 29, 2024
This commit adds enforcement over the seccomp profile associated with a container. The
policy author can measure their seccomp profile and include this measurement in the
policy. Subsequently, they can provided that same seccomp profile to the orchestrator
(e.g. via an annotation) and GCS will measure the provided profile and provide this as
input to the policy engine.

This commit also adds a series of CRI tests for security context enforcement.

Fixing error with privileged exec_in_container
Adding CRI test for privileged exec in container

Signed-off-by: Matthew A Johnson <matjoh@microsoft.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants