mirror of
https://github.com/siderolabs/talos.git
synced 2026-05-05 12:26:21 +02:00
fix: enable seccomp default profile by default
This enable seccomp profile for all containers launched by Talos: apid, trustd, etcd and kubelet. Also by default disallow gaining more privileges in the container (basically disables setuid). As containers are running as root this is no-op, but soon we'll have running as non-root users and this becomes important. Signed-off-by: Andrey Smirnov <andrey.smirnov@talos-systems.com>
This commit is contained in:
parent
8ddbcc9643
commit
e6fa401b66
@ -92,6 +92,7 @@ Talos can be configued to use Kubernetes 1.21 or CAPI v0.4.x components can be u
|
||||
description = """\
|
||||
* etcd PKI moved to `/system/secrets`
|
||||
* kubelet bootstrap CSR auto-signing scoped to kubelet bootstrap tokens only
|
||||
* enforce default seccomp profile on all system containers
|
||||
"""
|
||||
|
||||
[notes.equinixmetal]
|
||||
|
||||
@ -15,6 +15,7 @@ import (
|
||||
|
||||
"github.com/containerd/containerd"
|
||||
"github.com/containerd/containerd/cio"
|
||||
"github.com/containerd/containerd/contrib/seccomp"
|
||||
"github.com/containerd/containerd/errdefs"
|
||||
"github.com/containerd/containerd/namespaces"
|
||||
"github.com/containerd/containerd/oci"
|
||||
@ -275,6 +276,8 @@ func (c *containerdRunner) newOCISpecOpts(image oci.Image) []oci.SpecOpts {
|
||||
oci.WithEnv(c.opts.Env),
|
||||
oci.WithHostHostsFile,
|
||||
oci.WithHostResolvconf,
|
||||
oci.WithNoNewPrivileges,
|
||||
seccomp.WithDefaultProfile(),
|
||||
)
|
||||
|
||||
specOpts = append(specOpts,
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user