Last active
March 16, 2023 17:12
-
-
Save gbrayut/b494064d125d02573f17a709457797f7 to your computer and use it in GitHub Desktop.
Testing Kubernetes seccompProfile
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
apiVersion: v1 | |
kind: Pod | |
metadata: | |
name: runtimedefault-pod | |
spec: | |
containers: | |
- name: test-container | |
image: r.j3ss.co/amicontained | |
command: ["/usr/bin/amicontained"] | |
securityContext: | |
seccompProfile: | |
type: RuntimeDefault | |
--- | |
apiVersion: v1 | |
kind: Pod | |
metadata: | |
name: not-runtimedefault-pod | |
spec: | |
containers: | |
- name: test-container | |
image: r.j3ss.co/amicontained | |
command: ["/usr/bin/amicontained"] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# See https://cloud.google.com/kubernetes-engine/docs/concepts/seccomp-in-gke | |
kubectl apply -f /tmp/test-seccomp.yaml | |
kubectl get po | |
kubectl logs runtimedefault-pod > /tmp/runtimedefault-pod | |
kubectl logs not-runtimedefault-pod > /tmp/not-runtimedefault-pod | |
diffmerge /tmp/{not-,}runtimedefault-pod |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Container Runtime: kube | |
Has Namespaces: | |
pid: true | |
user: false | |
AppArmor Profile: cri-containerd.apparmor.d (enforce) | |
Capabilities: | |
BOUNDING -> chown dac_override fowner fsetid kill setgid setuid setpcap net_bind_service net_raw sys_chroot mknod audit_write setfcap | |
Seccomp: disabled | |
Blocked Syscalls (20): | |
SYSLOG SETPGID SETSID VHANGUP PIVOT_ROOT ACCT SETTIMEOFDAY SWAPON SWAPOFF REBOOT SETHOSTNAME SETDOMAINNAME INIT_MODULE DELETE_MODULE | |
LOOKUP_DCOOKIE FANOTIFY_INIT OPEN_BY_HANDLE_AT FINIT_MODULE KEXEC_FILE_LOAD BPF | |
Looking for Docker.sock |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Container Runtime: kube | |
Has Namespaces: | |
pid: true | |
user: false | |
AppArmor Profile: cri-containerd.apparmor.d (enforce) | |
Capabilities: | |
BOUNDING -> chown dac_override fowner fsetid kill setgid setuid setpcap net_bind_service net_raw sys_chroot mknod audit_write setfcap | |
Seccomp: filtering | |
Blocked Syscalls (60): | |
SYSLOG SETPGID SETSID USELIB USTAT SYSFS VHANGUP PIVOT_ROOT _SYSCTL ACCT SETTIMEOFDAY MOUNT UMOUNT2 SWAPON SWAPOFF REBOOT SETHOSTNAME | |
SETDOMAINNAME IOPL IOPERM CREATE_MODULE INIT_MODULE DELETE_MODULE GET_KERNEL_SYMS QUERY_MODULE QUOTACTL NFSSERVCTL GETPMSG PUTPMSG | |
AFS_SYSCALL TUXCALL SECURITY LOOKUP_DCOOKIE CLOCK_SETTIME VSERVER MBIND SET_MEMPOLICY GET_MEMPOLICY KEXEC_LOAD ADD_KEY REQUEST_KEY | |
KEYCTL MIGRATE_PAGES UNSHARE MOVE_PAGES PERF_EVENT_OPEN FANOTIFY_INIT NAME_TO_HANDLE_AT OPEN_BY_HANDLE_AT SETNS PROCESS_VM_READV | |
PROCESS_VM_WRITEV KCMP FINIT_MODULE KEXEC_FILE_LOAD BPF USERFAULTFD PKEY_MPROTECT PKEY_ALLOC PKEY_FREE | |
Looking for Docker.sock |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment