seccomp

package
v28.5.0+incompatible Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Oct 1, 2025 License: Apache-2.0 Imports: 2 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func DefaultProfile deprecated

func DefaultProfile() *seccomp.Seccomp

DefaultProfile defines the allowed syscalls for the default seccomp profile.

Deprecated: use seccomp.DefaultProfile.

func GetDefaultProfile deprecated

func GetDefaultProfile(rs *specs.Spec) (*specs.LinuxSeccomp, error)

GetDefaultProfile returns the default seccomp profile.

Deprecated: use seccomp.GetDefaultProfile.

func LoadProfile deprecated

func LoadProfile(body string, rs *specs.Spec) (*specs.LinuxSeccomp, error)

LoadProfile takes a json string and decodes the seccomp profile.

Deprecated: use seccomp.LoadProfile.

Types

type Architecture deprecated

type Architecture = seccomp.Architecture

Architecture is used to represent a specific architecture and its sub-architectures

Deprecated: use seccomp.Architecture.

type Filter deprecated

type Filter = seccomp.Filter

Filter is used to conditionally apply Seccomp rules

Deprecated: use seccomp.Filter.

type KernelVersion deprecated

type KernelVersion = seccomp.KernelVersion

KernelVersion holds information about the kernel.

Deprecated: use seccomp.KernelVersion.

type Seccomp deprecated

type Seccomp = seccomp.Seccomp

Seccomp represents the config for a seccomp profile for syscall restriction. It is used to marshal/unmarshal the JSON profiles as accepted by docker, and extends the runtime-spec's specs.LinuxSeccomp, overriding some fields to provide the ability to define conditional rules based on the host's kernel version, architecture, and the container's capabilities.

Deprecated: use seccomp.Seccomp.

type Syscall deprecated

type Syscall = seccomp.Syscall

Syscall is used to match a group of syscalls in Seccomp. It extends the runtime-spec Syscall type, adding a "Name" field for backward compatibility with older JSON representations, additional "Comment" metadata, and conditional rules ("Includes", "Excludes") used to generate a runtime-spec Seccomp profile based on the container (capabilities) and host's (arch, kernel) configuration.

Deprecated: use seccomp.Syscall.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL