|
3 | 3 | The Linux container specification uses various kernel features like namespaces, cgroups, capabilities, LSM, and file system jails to fulfill the spec. |
4 | 4 | Additional information is needed for Linux over the [default spec configuration](config.md) in order to configure these various kernel features. |
5 | 5 |
|
6 | | -## Capabilities |
7 | | - |
8 | | -Capabilities is an array that specifies Linux capabilities that can be provided to the process inside the container. |
9 | | -Valid values are the strings for capabilities defined in [the man page](http://man7.org/linux/man-pages/man7/capabilities.7.html) |
10 | | - |
11 | | -```json |
12 | | - "capabilities": [ |
13 | | - "CAP_AUDIT_WRITE", |
14 | | - "CAP_KILL", |
15 | | - "CAP_NET_BIND_SERVICE" |
16 | | - ] |
17 | | -``` |
18 | | - |
19 | 6 | ## Default File Systems |
20 | 7 |
|
21 | 8 | The Linux ABI includes both syscalls and several special file paths. |
@@ -486,28 +473,6 @@ The kernel enforces the `soft` limit for a resource while the `hard` limit acts |
486 | 473 | ] |
487 | 474 | ``` |
488 | 475 |
|
489 | | -## SELinux process label |
490 | | - |
491 | | -SELinux process label specifies the label with which the processes in a container are run. |
492 | | -For more information about SELinux, see [Selinux documentation](http://selinuxproject.org/page/Main_Page) |
493 | | - |
494 | | -###### Example |
495 | | - |
496 | | -```json |
497 | | - "selinuxProcessLabel": "system_u:system_r:svirt_lxc_net_t:s0:c124,c675" |
498 | | -``` |
499 | | - |
500 | | -## Apparmor profile |
501 | | - |
502 | | -Apparmor profile specifies the name of the apparmor profile that will be used for the container. |
503 | | -For more information about Apparmor, see [Apparmor documentation](https://wiki.ubuntu.com/AppArmor) |
504 | | - |
505 | | -###### Example |
506 | | - |
507 | | -```json |
508 | | - "apparmorProfile": "acme_secure_profile" |
509 | | -``` |
510 | | - |
511 | 476 | ## seccomp |
512 | 477 |
|
513 | 478 | Seccomp provides application sandboxing mechanism in the Linux kernel. |
@@ -574,17 +539,6 @@ Its value is either slave, private, or shared. |
574 | 539 | "rootfsPropagation": "slave", |
575 | 540 | ``` |
576 | 541 |
|
577 | | -## No new privileges |
578 | | - |
579 | | -Setting `noNewPrivileges` to true prevents the processes in the container from gaining additional privileges. |
580 | | -[The kernel doc](https://www.kernel.org/doc/Documentation/prctl/no_new_privs.txt) has more information on how this is achieved using a prctl system call. |
581 | | - |
582 | | -###### Example |
583 | | - |
584 | | -```json |
585 | | - "noNewPrivileges": true, |
586 | | -``` |
587 | | - |
588 | 542 | [cgroup-v1]: https://www.kernel.org/doc/Documentation/cgroup-v1/cgroups.txt |
589 | 543 | [cgroup-v1-blkio]: https://www.kernel.org/doc/Documentation/cgroup-v1/blkio-controller.txt |
590 | 544 | [cgroup-v1-cpusets]: https://www.kernel.org/doc/Documentation/cgroup-v1/cpusets.txt |
|
0 commit comments