On 10/28/2014 10:14 AM, Daniel J Walsh wrote:
Wondering how to tie a config file of pre-defined options that can be invoked by the cliOn 10/28/2014 09:33 AM, SGhosh wrote:On 10/28/2014 08:47 AM, Jon Stanley wrote:On Tue, Oct 28, 2014 at 7:59 AM, Daniel J Walsh<dwalsh redhat com> wrote:syscalls, by default. On an X86_64 system x32 and i686 syscallswill beeliminated.This seems problematic in the fact that you couldn't then run a 32-bit application in a container, unless I'm missing something.Dan - would it be possible to have runtime instantiated seccomp profiles? eg. decide early on whether the i686 syscalls will be allowed or not? additive profiles like tuned? -subhenduNot sure what that means. Adding i686 support would require you to do something like docker run --security-opt seccomp:add_arch:i686 ...
Might be able to get this via k8e yaml definition for pods if docker upstream is stuck on META. It might be easier to have in K8e as the yaml files are read before invoking the docker cli.I would love it if we could get to the point where the packager of the app could describe the requirements of the application in the json meta data. But I am not sure if docker upstream would take this kind of patch. Sort of a meta { "requires": "seccomp:add_arch:i686" } Doing this for capabilities, seccomp, SELinux types, would be nice, as well as specifying which volume mounts need to be mounted into the container.
-sg