Export container/seccomp.NativeRule via hst #15

Open
opened 2025-09-29 06:51:57 +09:00 by ophestra · 1 comment
Owner

The lookup table for syscall names is already present. A JSON adaptor is needed for the NativeRule struct. The seccomp overrides are already removed from hst as part of v0.3.x.

When applying the custom filter, internal/app must ensure it does not reduce protection to the kernel. It might be sufficient to append custom filter rules to generated (preset) rules.

The lookup table for syscall names is already present. A JSON adaptor is needed for the `NativeRule` struct. The seccomp overrides are already removed from `hst` as part of v0.3.x. When applying the custom filter, `internal/app` must ensure it does not reduce protection to the kernel. It might be sufficient to append custom filter rules to generated (preset) rules.
ophestra added this to the v0.3.0 milestone 2025-09-29 06:52:07 +09:00
Author
Owner

The underlying seccomp and std package now supports this to the extent of not requiring breaking changes to the exported API. Removing this from v0.3.0 as integrating this into hst will not break API.

The underlying `seccomp` and `std` package now supports this to the extent of not requiring breaking changes to the exported API. Removing this from v0.3.0 as integrating this into `hst` will not break API.
ophestra removed this from the v0.3.0 milestone 2025-11-06 01:03:40 +09:00
ophestra added the
Kind
Feature
Priority
Low
Reviewed
Confirmed
Status
Blocked
labels 2025-11-10 01:11:37 +09:00
Sign in to join this conversation.
No description provided.