You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: config-linux.md
+15-8Lines changed: 15 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,6 +73,18 @@ If a new namespace is not created (because the namespace type is not listed, or
73
73
74
74
## User namespace mappings
75
75
76
+
**`uidMappings`** (array of objects, OPTIONAL) describes the user namespace uid mappings from the host to the container.
77
+
**`gidMappings`** (array of objects, OPTIONAL) describes the user namespace gid mappings from the host to the container.
78
+
79
+
Each entry has the following structure:
80
+
81
+
***`hostID`** (uint32, REQUIRED)* - is the starting uid/gid on the host to be mapped to *containerID*.
82
+
***`containerID`** (uint32, REQUIRED)* - is the starting uid/gid in the container.
83
+
***`size`** (uint32, REQUIRED)* - is the number of ids to be mapped.
84
+
85
+
The runtime SHOULD NOT modify the ownership of referenced filesystems to realize the mapping.
86
+
There is a limit of 5 mappings which is the Linux kernel hard limit.
87
+
76
88
###### Example
77
89
78
90
```json
@@ -92,17 +104,12 @@ If a new namespace is not created (because the namespace type is not listed, or
92
104
]
93
105
```
94
106
95
-
uid/gid mappings describe the user namespace mappings from the host to the container.
96
-
The runtime SHOULD NOT modify the ownership of referenced filesystems to realize the mapping.
97
-
*hostID* is the starting uid/gid on the host to be mapped to *containerID* which is the starting uid/gid in the container and *size* refers to the number of ids to be mapped.
98
-
There is a limit of 5 mappings which is the Linux kernel hard limit.
99
-
100
107
## Devices
101
108
102
109
**`devices`** (array of objects, OPTIONAL) lists devices that MUST be available in the container.
103
110
The runtime may supply them however it likes (with [mknod][mknod.2], by bind mounting from the runtime mount namespace, etc.).
104
111
105
-
The following parameters can be specified:
112
+
Each entry has the following structure:
106
113
107
114
***`type`***(string, REQUIRED)* - type of device: `c`, `b`, `u` or `p`.
108
115
More info in [mknod(1)][mknod.1].
@@ -202,7 +209,7 @@ However, a runtime MAY attach the container process to additional cgroup control
202
209
**`devices`** (array of objects, OPTIONAL) configures the [device whitelist][cgroup-v1-devices].
203
210
The runtime MUST apply entries in the listed order.
204
211
205
-
The following parameters can be specified:
212
+
Each entry has the following structure:
206
213
207
214
***`allow`***(boolean, REQUIRED)* - whether the entry is allowed or denied.
208
215
***`type`***(string, OPTIONAL)* - type of device: `a` (all), `c` (char), or `b` (block).
@@ -421,7 +428,7 @@ Each entry has the following structure:
421
428
**`network`** (object, OPTIONAL) represents the cgroup subsystems `net_cls` and `net_prio`.
422
429
For more information, see [the net\_cls cgroup man page][cgroup-v1-net-cls] and [the net\_prio cgroup man page][cgroup-v1-net-prio].
423
430
424
-
The following parameters can be specified to setup these cgroup controllers:
431
+
The following parameters can be specified to setup the controller:
425
432
426
433
***`classID`***(uint32, OPTIONAL)* - is the network class identifier the cgroup's network packets will be tagged with
0 commit comments