-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Open
Labels
area: container runtimeIssue related to docker, kubernetes, OCI runtimeIssue related to docker, kubernetes, OCI runtimearea: usabilityIssue related to usabilityIssue related to usabilitytype: enhancementNew feature or requestNew feature or request
Description
@scanlime on Twitter is trying to run runsc inside a Docker container with the standard seccomp policy enabled. This is similar to rootless mode (#311), but a little bit more strict.
The immediate issue is that we exec into empty namespaces, which the profile does not allow. It is not clear if there would be more issues if that were resolved, though I didn't see any glaring issues comparing our seccomp filters to Docker's.
It's also not clear if the defense-in-depth features we'd have to disable to make this work would make it a bad idea. But in general, it is very reasonable to want to run a sandbox as a subprocess in an existing container.
negz and stephenjudkins
Metadata
Metadata
Assignees
Labels
area: container runtimeIssue related to docker, kubernetes, OCI runtimeIssue related to docker, kubernetes, OCI runtimearea: usabilityIssue related to usabilityIssue related to usabilitytype: enhancementNew feature or requestNew feature or request