hoosegow 1.2.0 → 1.2.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 08457775221dac7f850e7f3ba83e41661a45ae62
4
- data.tar.gz: 64919e4a0404a832ff1cd700bb8b665af96fd63e
3
+ metadata.gz: 8a743e7ec41c3707de2a2e28ac52496e05453c70
4
+ data.tar.gz: b69f9d254a0c2fe8f3639cdeaadaf2957632e1af
5
5
  SHA512:
6
- metadata.gz: fe8880787a543fca141ec9c2f59df2ae778dc7d791709c7a9f39e304f2ea0f16800d79d3236c0e28f4feff3fb7afc3077c124c4a645be2206a46f4dc85d8e6d6
7
- data.tar.gz: edda7d73693b4944a81dc1cbdbf699feb2ffba8507412fb12d0207188fcf74cead9732fd37cad938516eccdb007c2d24e513cfcb350bb915d23ed35eff63669b
6
+ metadata.gz: 51cca6f9ed8ab60e905c3f601541eefa119425fd4a24e969c3f0426daa34d87d31aa9b1adf02a76bf03e58c7f832beb17309438dcac7e0b249d776fbbc338d68
7
+ data.tar.gz: 6a424b86b4fbf080eb87056a9a85d5266bc6071d044bac12751557ece029d9f7ae712a98b60db1f87abea488fb240f36799d6b3352b46723074aff88d27b0618
data/README.md CHANGED
@@ -8,7 +8,7 @@ Hoosegow runs both in your code and in a Docker container. When you call a metho
8
8
 
9
9
  Hoosegow is intended to add a layer of security to projects that need to run code that is not fully trusted/audited. Because the untrusted code is running inside a Docker container, an attacker who manages to exploit a vulnerability in the code must also break out of the Docker container before gaining any access to the host system.
10
10
 
11
- This means that Hoosegow is only as strong as Docker. Docker employs Kernel namespaces, capabilities, and cgroups to contain processes running inside a container. This is not true Virtualization though, and a process running as root inside the container *can* compromise the host system. Any priviledge escalation bugs in the host Kernel could also be used to become root and compromise the host machine. Further hardening of the base Ubuntu image, along with tools like AppArmor or SE-Linux can improve the security posture of an application relying on Hoosegow/Docker.
11
+ This means that Hoosegow is only as strong as Docker. Docker employs Kernel namespaces, capabilities, and cgroups to contain processes running inside a container. This is not true virtualization though, and a process running as root inside the container *can* compromise the host system. Any privilege escalation bugs in the host Kernel could also be used to become root and compromise the host machine. Further hardening of the base Ubuntu image, along with tools like AppArmor or SE-Linux can improve the security posture of an application relying on Hoosegow/Docker.
12
12
 
13
13
  The following are some useful resources regarding the security of Docker:
14
14
 
data/hoosegow.gemspec CHANGED
@@ -2,7 +2,7 @@ require 'rake'
2
2
 
3
3
  Gem::Specification.new do |s|
4
4
  s.name = 'hoosegow'
5
- s.version = '1.2.0'
5
+ s.version = '1.2.1'
6
6
  s.summary = "A Docker jail for ruby code"
7
7
  s.description = "Hoosegow provides an RPC layer on top of Docker containers so that you can isolate unsafe parts of your application."
8
8
  s.authors = ["Ben Toews", "Matt Burke"]
data/script/bootstrap ADDED
@@ -0,0 +1,2 @@
1
+ #!/bin/bash
2
+ bundle install -j4
data/script/cibuild ADDED
@@ -0,0 +1,2 @@
1
+ #!/bin/bash
2
+ bundle exec rake spec
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: hoosegow
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.2.0
4
+ version: 1.2.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Ben Toews
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2014-10-23 00:00:00.000000000 Z
12
+ date: 2015-06-11 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: rake
@@ -128,6 +128,8 @@ files:
128
128
  - lib/hoosegow/exceptions.rb
129
129
  - lib/hoosegow/image_bundle.rb
130
130
  - lib/hoosegow/protocol.rb
131
+ - script/bootstrap
132
+ - script/cibuild
131
133
  - script/proxy-integration-test
132
134
  - spec/hoosegow_docker_spec.rb
133
135
  - spec/hoosegow_spec.rb
@@ -152,7 +154,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
152
154
  version: '0'
153
155
  requirements: []
154
156
  rubyforge_project:
155
- rubygems_version: 2.2.2
157
+ rubygems_version: 2.2.3
156
158
  signing_key:
157
159
  specification_version: 4
158
160
  summary: A Docker jail for ruby code