Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[service] [request]: Custom seccomp profile for ECS containers #1782

Open
nick-kang opened this issue Jul 4, 2022 · 2 comments
Open

[service] [request]: Custom seccomp profile for ECS containers #1782

nick-kang opened this issue Jul 4, 2022 · 2 comments
Labels
Proposed Community submitted issue

Comments

@nick-kang
Copy link

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Tell us about your request
Ability to add custom seccomp profile to ECS containers

Which service(s) is this request for?
ECS

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
We'd like to securely run headless chromium on ECS. We'd like to run the container giving the least privileges possible and that involves passing in a custom seccomp.json file (docker/for-linux#496 (comment)).

ECS dockerSecurityOptions doesn't not support custom seccomp files.

Are you currently working around this issue?
We are using EKS as a workaround and this is blocking our migration to ECS.

Additional context
Anything else we should know?

Attachments
If you think you might have additional information that you'd like to include via an attachment, please do - we'll take a look. (Remember to remove any personally-identifiable information.)

@nick-kang nick-kang added the Proposed Community submitted issue label Jul 4, 2022
@forty
Copy link

forty commented Feb 15, 2023

I have just opened a support case to AWS support on this topic.

Our use case is to be able to communicate with AWS Nitro Enclave through VSOCK, which is by default not possible with recent docker releases, as the default seccomp filter does not allow AF_VSOCK.

Allowing custom profile would avoid having to ressort to using privileged=true (the only workaround currently) which is not great obviously.

@douddle
Copy link

douddle commented Feb 17, 2023

I have a similar issue. I need to use VSOCK.
I have found this previous issue pretty similar but pending since 5 years!
#356

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Proposed Community submitted issue
Projects
None yet
Development

No branches or pull requests

3 participants