You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently lockc allows to pick the policy level only for Kubernetes pods (via namespace labels).
We need to provide some way to be able to pick the policy level with Docker as well.
The most reasonable syntax will be probably something like:
docker run --label org.lockc.policy=privileged [image]
One important requirement: only root should be able to set a policy. We will probably have to monitor the docker socket somehow. nah, I created a separate task for that #66
The text was updated successfully, but these errors were encountered:
It seems that setting label on Docker container is only leaving it in container config.json /var/lib/docker/containers/<CONTAINER_UUID>/config.v2.json
runc and containerd don't know anything about this labels.
After investigation we agreed that this can be extracted from runc by checking /run/docker/containerd/daemon/io.containerd.runtime.v2.task/moby/<CONTAINER_UUID>/config.json
Adding support for Docker containers and enforce lockc profiles.
Example usage can be:
docker run --label org.lockc.policy=privileged [image]
Fixes: lockc-project#57
Signed-off-by: Michal Jura <[email protected]>
Adding support for Docker containers and enforce lockc profiles.
Example usage can be:
docker run --label org.lockc.policy=privileged [image]
Fixes: lockc-project#57
Signed-off-by: Michal Jura <[email protected]>
Currently lockc allows to pick the policy level only for Kubernetes pods (via namespace labels).
We need to provide some way to be able to pick the policy level with Docker as well.
The most reasonable syntax will be probably something like:
One important requirement: only root should be able to set a policy. We will probably have to monitor the docker socket somehow.nah, I created a separate task for that #66The text was updated successfully, but these errors were encountered: