- 
                Notifications
    You must be signed in to change notification settings 
- Fork 130
chore(pegboard): update oci config for stricter security #2500
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(pegboard): update oci config for stricter security #2500
Conversation
| Warning This pull request is not mergeable via GitHub because a downstack PR is open. Once all requirements are satisfied, merge this PR as a stack on Graphite. 
 How to use the Graphite Merge QueueAdd the label merge-queue to this PR to add it to the merge queue. You must have a Graphite account in order to use the merge queue. Sign up using this link. An organization admin has enabled the Graphite Merge Queue in this repository. Please do not merge from GitHub as this will restart CI on PRs being processed by the merge queue. This stack of pull requests is managed by Graphite. Learn more about stacking. | 
| Deploying rivet with   | 
| Latest commit: | d4c8eac | 
| Status: | ✅ Deploy successful! | 
| Preview URL: | https://befd5211.rivet.pages.dev | 
| Branch Preview URL: | https://graphite-base-2501.rivet.pages.dev | 
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
PR Summary
Enhanced container security through stricter OCI configuration and seccomp policies, while adding a basic health check endpoint.
- Added /pingendpoint inpackages/edge/infra/guard/server/src/routing/api.rsfor basic health monitoring
- Implemented stricter resource limits in oci_config.rsincluding CPU (10,000 shares max), memory, pids (256), and block I/O (10MB/s)
- Reduced Linux capabilities to minimum required set (CAP_SETGID,CAP_SETUID,CAP_NET_BIND_SERVICE,CAP_KILL)
- Removed high-risk syscalls like ptrace,chroot, andcapsetin seccomp configuration
- Added comprehensive namespace isolation including user, network, and cgroup namespaces
3 file(s) reviewed, no comment(s)
Edit PR Review Bot Settings | Greptile
| Deploying rivet-studio with   | 
| Latest commit: | d4c8eac | 
| Status: | ✅ Deploy successful! | 
| Preview URL: | https://c7bb98f7.rivet-studio.pages.dev | 
| Branch Preview URL: | https://graphite-base-2501.rivet-studio.pages.dev | 
| Deploying rivet-hub with   | 
| Latest commit: | d4c8eac | 
| Status: | ✅ Deploy successful! | 
| Preview URL: | https://8773682a.rivet-hub-7jb.pages.dev | 
| Branch Preview URL: | https://graphite-base-2501.rivet-hub-7jb.pages.dev | 


Changes