You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cmd/oci-runtime-tool/generate.go
+47Lines changed: 47 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -65,6 +65,9 @@ var generateFlags = []cli.Flag{
65
65
cli.StringFlag{Name: "rootfs-path", Value: "rootfs", Usage: "path to the root filesystem"},
66
66
cli.StringFlag{Name: "rootfs-propagation", Usage: "mount propagation for rootfs"},
67
67
cli.BoolFlag{Name: "rootfs-readonly", Usage: "make the container's rootfs readonly"},
68
+
cli.StringSliceFlag{Name: "rlimits-add", Usage: "specifies resource limits for processes inside the container. "},
69
+
cli.StringSliceFlag{Name: "rlimits-remove", Usage: "remove specified resource limits for processes inside the container. "},
70
+
cli.BoolFlag{Name: "rlimits-remove-all", Usage: "remove all resource limits for processes inside the container. "},
68
71
cli.StringFlag{Name: "seccomp-allow", Usage: "specifies syscalls to respond with allow"},
69
72
cli.StringFlag{Name: "seccomp-arch", Usage: "specifies additional architectures permitted to be used for system calls"},
70
73
cli.StringFlag{Name: "seccomp-default", Usage: "specifies default action to be used for system calls and removes existing rules with specified action"},
Copy file name to clipboardExpand all lines: man/oci-runtime-tool-generate.1.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -237,6 +237,17 @@ read the configuration from `config.json`.
237
237
238
238
By default a container will have its root filesystem writable allowing processes to write files anywhere. By specifying the `--rootfs-readonly` flag the container will have its root filesystem mounted as read only prohibiting any writes.
239
239
240
+
**--rlimits-add**=[]
241
+
Specifies resource limits, format is RLIMIT:HARD:SOFT. e.g. --rlimits-add=RLIMIT_NOFILE:1024:1024
242
+
This option can be specified multiple times. When same RLIMIT specified over once, the last one make sense.
243
+
244
+
**--rlimits-remove**=[]
245
+
Remove the specified resource limits for process inside the container.
246
+
This option can be specified multiple times.
247
+
248
+
**--rlimits-remove-all**=true|false
249
+
Remove all resource limits for process inside the container. The default is *false*.
250
+
240
251
**--seccomp-allow**=SYSCALL
241
252
Specifies syscalls to be added to the ALLOW list.
242
253
See --seccomp-syscalls for setting limits on arguments.
0 commit comments