Merge pull request #38 from Roblox/seccomp

Add support for custom seccomp profiles.
This commit is contained in:
Shishir 2020-09-02 10:49:40 -07:00 committed by GitHub
commit 573657976c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 34 additions and 8 deletions

View File

@ -86,6 +86,7 @@ More detailed instructions are in the [`example README.md`](https://github.com/R
| **args** | []string | no | Arguments to the command. |
| **privileged** | bool | no | Run container in privileged mode. Your container will have all linux capabilities when running in privileged mode. |
| **seccomp** | bool | no | Enable default seccomp profile. List of [`allowed syscalls`](https://github.com/containerd/containerd/blob/master/contrib/seccomp/seccomp_default.go#L51-L390). |
| **seccomp_profile** | string | no | Path to custom seccomp profile. `seccomp` must be set to `true` in order to use `seccomp_profile`. The default `docker` seccomp profile found [`here`](https://github.com/moby/moby/blob/master/profiles/seccomp/default.json) can be used as a reference, and modified to create a custom seccomp profile. |
| **readonly_rootfs** | bool | no | Container root filesystem will be read-only. |
| **host_network** | bool | no | Enable host network. This is equivalent to `--net=host` in docker. |
| **cap_add** | []string | no | Add individual capabilities. |
@ -112,6 +113,19 @@ mounts = [
}
]
```
**Custom seccomp profile example**
The default `docker` seccomp profile found [`here`](https://github.com/moby/moby/blob/master/profiles/seccomp/default.json)
can be downloaded, and modified (by removing/adding syscalls) to create a custom seccomp profile.<br/>
The custom seccomp profile can then be saved under `/opt/seccomp/seccomp.json` on the Nomad client nodes.
A nomad job can be launched using this custom seccomp profile.
```
config {
seccomp = true
seccomp_profile = "/opt/seccomp/seccomp.json"
}
```
## Networking
@ -120,7 +134,7 @@ mounts = [
**NOTE:** `host` and `bridge` are mutually exclusive options, and only one of them should be used at a time.
1. **Host** network can be enabled by setting `host_network` to `true` in task config
of the job spec [Check under [`Supported options`](https://github.com/Roblox/nomad-driver-containerd#supported-options)].
of the job spec (see under [`Supported options`](https://github.com/Roblox/nomad-driver-containerd#supported-options)).
2. **Bridge** network can be enabled by setting the `network` stanza in the task group section of the job spec.
@ -129,12 +143,14 @@ network {
mode = "bridge"
}
```
You need to install CNI plugins on nomad client nodes under `/opt/cni/bin` before you can use `bridge` networks.
You need to install CNI plugins on Nomad client nodes under `/opt/cni/bin` before you can use `bridge` networks.
**Instructions for installing CNI plugins.**<br/>
- $ curl -L -o cni-plugins.tgz https://github.com/containernetworking/plugins/releases/download/v0.8.1/cni-plugins-linux-amd64-v0.8.1.tgz<br/>
- sudo mkdir -p /opt/cni/bin<br/>
- sudo tar -C /opt/cni/bin -xzf cni-plugins.tgz
**Instructions for installing CNI plugins.**<br/>
```
$ curl -L -o cni-plugins.tgz https://github.com/containernetworking/plugins/releases/download/v0.8.6/cni-plugins-linux-amd64-v0.8.6.tgz
$ sudo mkdir -p /opt/cni/bin
$ sudo tar -C /opt/cni/bin -xzf cni-plugins.tgz
```
## Tests
```

View File

@ -66,10 +66,18 @@ func (d *Driver) createContainer(image containerd.Image, containerName, containe
opts = append(opts, oci.WithPrivileged)
}
// Enable default seccomp profile.
if !config.Seccomp && config.SeccompProfile != "" {
return nil, fmt.Errorf("seccomp must be set to true, if using a custom seccomp_profile.")
}
// Enable default (or custom) seccomp profile.
// Allowed syscalls for the default seccomp profile: https://github.com/containerd/containerd/blob/master/contrib/seccomp/seccomp_default.go#L51-L390
if config.Seccomp {
opts = append(opts, seccomp.WithDefaultProfile())
if config.SeccompProfile != "" {
opts = append(opts, seccomp.WithProfile(config.SeccompProfile))
} else {
opts = append(opts, seccomp.WithDefaultProfile())
}
}
// Launch container in read-only mode.

View File

@ -93,6 +93,7 @@ var (
"devices": hclspec.NewAttr("devices", "list(string)", false),
"privileged": hclspec.NewAttr("privileged", "bool", false),
"seccomp": hclspec.NewAttr("seccomp", "bool", false),
"seccomp_profile": hclspec.NewAttr("seccomp_profile", "string", false),
"readonly_rootfs": hclspec.NewAttr("readonly_rootfs", "bool", false),
"host_network": hclspec.NewAttr("host_network", "bool", false),
"mounts": hclspec.NewBlockList("mounts", hclspec.NewObject(map[string]*hclspec.Spec{
@ -143,6 +144,7 @@ type TaskConfig struct {
CapDrop []string `codec:"cap_drop"`
Devices []string `codec:"devices"`
Seccomp bool `codec:"seccomp"`
SeccompProfile string `codec:"seccomp_profile"`
Privileged bool `codec:"privileged"`
ReadOnlyRootfs bool `codec:"readonly_rootfs"`
HostNetwork bool `codec:"host_network"`