You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: config.md
+49-49
Original file line number
Diff line number
Diff line change
@@ -353,51 +353,51 @@ For Linux-based systems, the `process` object supports the following process-spe
353
353
CPU affinity after the process is moved to container's cgroup, and the
354
354
final affinity is determined by the Linux kernel.
355
355
***`landlock`** (object, OPTIONAL) specifies the Landlock unprivileged access control settings for the container process.
356
-
Note that `noNewPrivileges` must be set to true to use this feature.
357
-
For more information about Landlock, see [Landlock documentation][landlock].
358
-
`landlock` contains the following properties:
359
-
360
-
***`ruleset`** (object, OPTIONAL) the `ruleset` field identifies a set of rules (i.e., actions on objects) that need to be handled (i.e., restricted).
361
-
The `ruleset` currently contains the following types:
362
-
* **`handledAccessFS`** (array of strings, OPTIONAL) is an array of FS typed actions that are handled by a ruleset.
363
-
If no rule explicitly allow them, they should then be forbidden.
364
-
* **`handledAssessNetwork`** (array of strings, OPTIONAL) is an array of NETWORK typed actions that are handled by a ruleset. (The NETWORK typed actions are avaliable when the ABI version >= 4. the behavior of the NETWORK typed actions is not used when the ABI version is less than 4 will depend on the **`disableBestEffort`**)
365
-
***`rules`** (object, OPTIONAL) the `rules` field specifies the security policies (i.e., actions allowed on objects) to be added to an existing ruleset.
366
-
The `rules` currently contains the following types:
367
-
* **`pathBeneath`** (array of objects, OPTIONAL) is an array of the file-hierarchy typed rules.
368
-
Entries in the array contain the following properties:
369
-
* **`allowedAccess`** (array of strings, OPTIONAL) is an array of FS typed actions that are allowed by a rule. The actions are grouped by the ABI version in the following description:
370
-
1. ABI version >= 1:
371
-
1. exectute
372
-
2. write_file
373
-
3. read_file
374
-
4. read_dir
375
-
5. remove_dir
376
-
6. remove_file
377
-
7. make_char
378
-
8. make_dir
379
-
9. make_reg
380
-
10. make_sock
381
-
11. make_fifo
382
-
12. make_block
383
-
13. make_sym
384
-
2. ABI version >= 2:
385
-
1. refer
386
-
3. ABI version >= 3:
387
-
1. truncate
388
-
* **`paths`** (array of strings, OPTIONAL) is an array of files or parent directories of the file hierarchies to restrict.
389
-
* **`portBeneath`** (array of objects, OPTIONAL) is an array of the network-hierarchy typed rules.
390
-
Entries in the array contain the following properties:
391
-
* **`allowedAccess`** (array of strings, OPTIONAL) is an array of NETWORK typed actions that are allowed by a rule. The actions are grouped by the ABI version in the following description:
392
-
1. ABI version >= 4:
393
-
1. bind
394
-
2. connect
395
-
* **`ports`** (array of strings, OPTIONAL) is an array of network ports to restrict.
396
-
***`disableBestEffort`** (bool, OPTIONAL) the `disableBestEffort` field disables the best-effort security approach for Landlock access rights.
397
-
This is for conditions when the Landlock access rights explicitly configured by the container are not supported or available in the running kernel.
398
-
If the best-effort security approach is enabled (`false`), the runtime SHOULD enforce the strongest rules configured up to the current kernel support, and only be [logged as a warning](runtime.md#warnings) for those not supported.
399
-
If disabled (`true`), the runtime MUST [generate an error](runtime.md#errors) if one or more rules specified by the container is not supported.
400
-
Default is `false`, i.e., following a best-effort security approach.
356
+
Note that `noNewPrivileges` must be set to true to use this feature.
357
+
For more information about Landlock, see [Landlock documentation][landlock].
358
+
`landlock` contains the following properties:
359
+
360
+
***`handledAccess`** (object, OPTIONAL) specifies the access rights that will be restricted by the ruleset.
361
+
The `handledAccess` currently contains the following types:
362
+
* **`handledAccessFS`** (array of strings, OPTIONAL) is an array of FS typed actions that are handled by a ruleset.
363
+
If no rule explicitly allow them, they should then be forbidden.
364
+
* **`handledAccessNetwork`** (array of strings, OPTIONAL) is an array of NETWORK typed actions that are handled by a ruleset. (The NETWORK typed actions are available when the ABI version >= 4. The behavior when the ABI version is less than 4 will depend on the **`enableBestEffort`**)
365
+
***`rules`** (object, OPTIONAL) specifies the security policies (i.e., actions allowed on objects) to be enforced.
366
+
The `rules` currently contains the following types:
367
+
* **`pathBeneath`** (array of objects, OPTIONAL) is an array of the file-hierarchy typed rules.
368
+
Entries in the array contain the following properties:
369
+
* **`allowedAccess`** (array of strings, OPTIONAL) is an array of FS typed actions that are allowed by a rule. The actions are grouped by the ABI version in the following description:
370
+
1. ABI version >= 1:
371
+
1. execute
372
+
2. write_file
373
+
3. read_file
374
+
4. read_dir
375
+
5. remove_dir
376
+
6. remove_file
377
+
7. make_char
378
+
8. make_dir
379
+
9. make_reg
380
+
10. make_sock
381
+
11. make_fifo
382
+
12. make_block
383
+
13. make_sym
384
+
2. ABI version >= 2:
385
+
1. refer
386
+
3. ABI version >= 3:
387
+
1. truncate
388
+
* **`paths`** (array of strings, OPTIONAL) is an array of files or parent directories of the file hierarchies to restrict.
389
+
* **`networkPort`** (array of objects, OPTIONAL) is an array of the network socket rules.
390
+
Entries in the array contain the following properties:
391
+
* **`allowedAccess`** (array of strings, OPTIONAL) is an array of NETWORK typed actions that are allowed by a rule. The actions are grouped by the ABI version in the following description:
392
+
1. ABI version >= 4:
393
+
1. bind
394
+
2. connect
395
+
* **`ports`** (array of strings, OPTIONAL) is an array of network ports to restrict.
396
+
***`enableBestEffort`** (bool, OPTIONAL) the `enableBestEffort` field disables the best-effort security approach for Landlock access rights.
397
+
This is for conditions when the Landlock access rights explicitly configured by the container are not supported or available in the running kernel.
398
+
If the best-effort security approach is enabled (`false`), the runtime SHOULD enforce the strongest rules configured up to the current kernel support, and only be [logged as a warning](runtime.md#warnings) for those not supported.
399
+
If disabled (`true`), the runtime MUST [generate an error](runtime.md#errors) if one or more rules specified by the container is not supported.
400
+
Default is `true`, i.e., following a best-effort security approach.
401
401
402
402
### <aname="configUser" />User
403
403
@@ -444,7 +444,7 @@ _Note: symbolic name for uid and gid, such as uname and gname respectively, are
444
444
"priority": 4
445
445
},
446
446
"landlock": {
447
-
"ruleset": {
447
+
"handledAccess": {
448
448
"handledAccessFS": [
449
449
"execute",
450
450
"write_file",
@@ -462,7 +462,7 @@ _Note: symbolic name for uid and gid, such as uname and gname respectively, are
462
462
"refer",
463
463
"truncate"
464
464
],
465
-
"handledAssessNetwork": [
465
+
"handledAccessNetwork": [
466
466
"bind",
467
467
"connect"
468
468
]
@@ -501,7 +501,7 @@ _Note: symbolic name for uid and gid, such as uname and gname respectively, are
501
501
]
502
502
}
503
503
],
504
-
"portBeneath": [
504
+
"networkPort": [
505
505
{
506
506
"allowedAccess": [
507
507
"bind",
@@ -514,7 +514,7 @@ _Note: symbolic name for uid and gid, such as uname and gname respectively, are
0 commit comments