automation-tests/common
flouthoc e278dcf7ef path: dest paths inside container should always be treated as *nix type
Destination path inside containers should be always validated  as
*nix absolute path. So its recommended to use path.IsAbs() instead of
filepath.IsAbs().

[NO TEST NEEDED]

Signed-off-by: flouthoc <flouthoc.git@gmail.com>
2021-08-16 09:46:05 +05:30
..
.github
cmd/seccomp
docs Add codespell fixes 2021-08-11 16:43:59 -04:00
libimage Add codespell fixes 2021-08-11 16:43:59 -04:00
logos
pkg path: dest paths inside container should always be treated as *nix type 2021-08-16 09:46:05 +05:30
tests new libimage package 2021-04-21 11:17:47 +02:00
tools
vendor Merge pull request #718 from containers/dependabot/go_modules/github.com/containers/storage-1.34.0 2021-08-10 14:54:30 +00:00
version Move to v0.43.1+dev 2021-08-12 06:45:18 -04:00
.cirrus.yml add passdriver for secrets. 2021-05-28 14:11:14 +02:00
.gitignore
.golangci.yml new libimage package 2021-04-21 11:17:47 +02:00
CODE-OF-CONDUCT.md
CONTRIBUTING.md
LICENSE
Makefile Remove no_libsubid flag 2021-08-10 13:20:10 -04:00
OWNERS add @Luap99 to OWNERS 2021-06-10 11:08:52 +02:00
README.md micro modify: README.md: delete one space 2021-04-23 22:29:04 +08:00
SECURITY.md
go.mod Merge pull request #718 from containers/dependabot/go_modules/github.com/containers/storage-1.34.0 2021-08-10 14:54:30 +00:00
go.sum Merge pull request #718 from containers/dependabot/go_modules/github.com/containers/storage-1.34.0 2021-08-10 14:54:30 +00:00

README.md

containers/common

Location for shared common files and common go code to manage those files in github.com/containers repos.

The common files to one or more projects in the containers group will be kept in this repository.

It will be up to the individual projects to include the files from this repository.

seccomp

The seccomp package in pkg/seccomp is a set of Go libraries used by container runtimes to generate and load seccomp mappings into the kernel.

seccomp (short for secure computing mode) is a BPF based syscall filter language and present a more conventional function-call based filtering interface that should be familiar to, and easily adopted by, application developers.

Building the seccomp.json file

The make target make seccomp.json generates the seccomp.json file, which contains the allowed list of syscalls that can be used by container runtime engines like CRI-O, Buildah, Podman and Docker, and container runtimes like OCI Runc to control the syscalls available to containers.

Supported build tags

Contributing

When developing this library, please use make (or make … BUILDTAGS=…) to take advantage of the tests and validation.

Contact