Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new type to support userns #53

Merged
merged 2 commits into from
Jun 11, 2018
Merged

Add new type to support userns #53

merged 2 commits into from
Jun 11, 2018

Conversation

rhatdan
Copy link
Member

@rhatdan rhatdan commented Jun 6, 2018

No description provided.

@cgwalters
Copy link

My issue with this is...it's already really super confusing between Docker/Kube/OpenShift all of which have different security constraints. The fact that Kube/OpenShift don't do seccomp by default, but docker/podman does is probably the most confusing.

How this all interacts with SELinux is yet another mess.

Let me strawman this: If seccomp is disabled, then the container runtime should assume container_userns_t by default.

@cgwalters
Copy link

Similarly to how --privileged also changes to spc_t.

@rhatdan
Copy link
Member Author

rhatdan commented Jun 6, 2018

@cgwalters I was thinking more that podman would see that it is run by a non privileged user so it would use an alternate label. Not related to seccomp. I also think we need a way of using seccomp, but adding in the usernamepace syscall when run as non priv.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
@rhatdan rhatdan merged commit dfaf8fd into master Jun 11, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants