-
Notifications
You must be signed in to change notification settings - Fork 3.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Landlock LSM #6056
Comments
For Containerd Landlock integration I suggest the next steps:
Example of LandlockProfile.json Command example: Notes: Landlock profile could be parsed into runtime-spec Spec.Process structure and passed to runc.
Notes: Adding generateLandlockSpecOpts() function which could be used by containerSpecOprt() one in /cri/server/container_create_linux.go
There are also several questions that pop up:
Colleagues, please share your comments and opinions. |
This issue is stale because it has been open 90 days with no activity. This issue will be closed in 7 days unless new comments are made or the stale label is removed. |
This issue was closed because it has been stalled for 7 days with no activity. |
What is the problem you're trying to solve
Adding Landlock support in containerd.
Landlock is a stackable LSM providing unprivileged access control for a set of processes.
It was merged in mainline Linux 5.13. Its author Mickaël Salaün @l0kod, https://landlock.io/.
I suppose Landlock will bring better sandboxing with unprivileged features and improve container security.
Describe the solution you'd like
Now Landlock's integration works (for runtime-spec and runc) have been in progress for some time:
Containerd Landlock implementation depends on runtime-spec --> runc solutions, so it's just a start. I'm going to show my point of view on architecture a bit later.
Additional context
No response
The text was updated successfully, but these errors were encountered: