Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add basis for allowing the creation of configuration enforcement in gcs #1094

Merged
merged 1 commit into from
Aug 4, 2021
Merged

Add basis for allowing the creation of configuration enforcement in gcs #1094

merged 1 commit into from
Aug 4, 2021

Conversation

SeanTAllen
Copy link
Contributor

This commit is the minimal set of functionality needed to allow users
to create a configuration policy that gcs can enforce.

Policy enforcement will allow users to state "only these containers, with these
command lines, etc etc" should be run. If anything in gcs doesn't match the
user supplied policy, it will end container run and report an error.

Currently, only container filesystem policy is enforced. This is done at
two points. When a pmem device is mounted, its dm-verity root hash is checked
against policy to see if it is allowed.

At the time of overlay creation, the order of layers is compared to policy to
make sure that the container is being constructed as the user expected.

Additional policy enforcement that is coming in future commits includes:

  • enforce policy for scsi mounts
  • enforce container command line
  • enforce environment variables

This commit is the minimal set of functionality needed to allow users
to create a configuration policy that gcs can enforce.

Policy enforcement will allow users to state "only these containers, with these
command lines, etc etc" should be run. If anything in gcs doesn't match the
user supplied policy, it will end container run and report an error.

Currently, only container filesystem policy is enforced. This is done at
two points. When a pmem device is mounted, its dm-verity root hash is checked
against policy to see if it is allowed.

At the time of overlay creation, the order of layers is compared to policy to
make sure that the container is being constructed as the user expected.

Additional policy enforcement that is coming in future commits includes:

- enforce policy for scsi mounts
- enforce container command line
- enforce environment variables
@SeanTAllen SeanTAllen requested a review from a team as a code owner August 3, 2021 14:02
Copy link
Contributor

@anmaxvl anmaxvl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@msscotb
Copy link
Contributor

msscotb commented Aug 4, 2021

LGTM

@SeanTAllen
Copy link
Contributor Author

I got two LGTMs. Can I get a merge?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants