You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Use an object with rule-type keys instead of an array of rules with
specific types to make configuration lighter.
* Simplify the access rights consts as they are scoped and typed by the
`LandlockFSAction`.
* Update some field comments and add elaborations on the usage of `abi`
etc.
* Misc minor fixes.
Signed-off-by: Kailun Qin <[email protected]>
Copy file name to clipboardExpand all lines: config.md
+48-42Lines changed: 48 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -213,12 +213,22 @@ For Linux-based systems, the `process` object supports the following process-spe
213
213
***`selinuxLabel`** (string, OPTIONAL) specifies the SELinux label for the process.
214
214
For more information about SELinux, see [SELinux documentation][selinux].
215
215
***`landlock`** (object, OPTIONAL) specifies the Landlock unprivileged access control settings for the container process.
216
+
Note that `noNewPrivileges` must be set to true to use this feature.
216
217
For more information about Landlock, see [Landlock documentation][landlock].
217
218
`landlock` contains the following properties:
218
219
219
220
***`ruleset`** (object, OPTIONAL) the `ruleset` field identifies a set of rules (i.e., actions on objects) that need to be handled (i.e., restricted).
220
-
***`rules`** (array of objects, OPTIONAL) the `rules` field specifies the security policies (i.e., actions allowed on objects) to be added to an existing ruleset
221
+
The `ruleset` currently contains the following types:
222
+
* **`handledAccessFS`** (array of strings, OPTIONAL) is an array of FS typed actions that are handled by a ruleset.
223
+
If no rule explicitly allow them, they should then be forbidden.
224
+
***`rules`** (object, OPTIONAL) the `rules` field specifies the security policies (i.e., actions allowed on objects) to be added to an existing ruleset.
225
+
The `rules` currently contains the following types:
226
+
* **`pathBeneath`** (array of objects, OPTIONAL) is an array of the file-hierarchy typed rules.
227
+
Entries in the array contain the following properties:
228
+
* **`allowedAccess`** (array of strings, OPTIONAL) is an array of FS typed actions that are allowed by a rule.
229
+
* **`paths`** (array of strings, OPTIONAL) is an array of files or parent directories of the file hierarchies to restrict.
221
230
***`abi`** (object, OPTIONAL) the `abi` field defines the specific Landlock ABI version.
231
+
This should be used by the runtime to check if the kernel supports the specified sets of Landlock features and then enforce those following a best-effort security approach.
222
232
223
233
### <aname="configUser" />User
224
234
@@ -262,61 +272,57 @@ _Note: symbolic name for uid and gid, such as uname and gname respectively, are
0 commit comments