You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Bind mount directories src:dest:(rw,ro) If you specify, ` --bind
34
34
/HOST-DIR:/CONTAINER-DIR`, runc bind mounts `/HOST-DIR` in the host
35
35
to `/CONTAINER-DIR` in the OCI container. The `OPTIONS` are a comma
@@ -45,10 +45,11 @@ read the configuration from `config.json`.
45
45
**--cap-drop**=[]
46
46
Drop Linux capabilities
47
47
48
-
**--cgroup**=[*PATH*]
49
-
Use a Cgroup namespace. If *PATH* is set, join that namespace. If it
50
-
is unset, create a new namespace. The special *PATH*`host` removes
51
-
any existing Cgroup namespace from the configuration.
48
+
**--cgroup**=*PATH*
49
+
Use a Cgroup namespace where *PATH* is an existing Cgroup namespace file
50
+
to join. The special *PATH* empty-string creates a new namespace.
51
+
The special *PATH*`host` removes any existing Cgroup namespace from
52
+
the configuration.
52
53
53
54
**--cgroups-path**=""
54
55
Specifies the path to the cgroups relative to the cgroups mount point.
@@ -77,15 +78,17 @@ inside of the container.
77
78
**--hostname**=""
78
79
Set the container host name that is available inside the container.
79
80
80
-
**--ipc**=[*PATH*]
81
-
Use an IPC namespace. If *PATH* is set, join that namespace. If it
82
-
is unset, create a new namespace. The special *PATH*`host` removes
83
-
any existing IPC namespace from the configuration.
81
+
**--ipc**=*PATH*
82
+
Use an IPC namespace where *PATH* is an existing IPC namespace file
83
+
to join. The special *PATH* empty-string creates a new namespace.
84
+
The special *PATH*`host` removes any existing IPC namespace from the
85
+
configuration.
84
86
85
-
**--mount**=[*PATH*]
86
-
Use a mount namespace. If *PATH* is set, join that namespace. If
87
-
it is unset, create a new namespace. The special *PATH*`host`
88
-
removes any existing mount namespace from the configuration.
87
+
**--mount**=*PATH*
88
+
Use a mount namespace where *PATH* is an existing mount namespace file
89
+
to join. The special *PATH* empty-string creates a new namespace.
90
+
The special *PATH*`host` removes any existing mount namespace from the
91
+
configuration.
89
92
90
93
**--mount-cgroups**=[rw|ro|no]
91
94
Mount cgroups. The default is `no`.
@@ -102,10 +105,11 @@ inside of the container.
102
105
"system_u:object_r:usr_t:s0" might be a good label for a readonly container,
103
106
"system_u:system_r:svirt_sandbox_file_t:s0:c1,c2" for a read/write container.
104
107
105
-
**--network**=[*PATH*]
106
-
Use a network namespace. If *PATH* is set, join that namespace. If
107
-
it is unset, create a new namespace. The special *PATH*`host`
108
-
removes any existing network namespace from the configuration.
108
+
**--network**=*PATH*
109
+
Use a network namespace where *PATH* is an existing network namespace file
110
+
to join. The special *PATH* empty-string creates a new namespace.
111
+
The special *PATH*`host` removes any existing network namespace from the
112
+
configuration.
109
113
110
114
**--no-new-privileges**
111
115
Set no new privileges bit for the container process. Setting this flag
@@ -121,10 +125,11 @@ inside of the container.
121
125
**--os**=OS
122
126
Operating system used within the container
123
127
124
-
**--pid**=[*PATH*]
125
-
Use a PID namespace. If *PATH* is set, join that namespace. If it
126
-
is unset, create a new namespace. The special *PATH*`host` removes
127
-
any existing PID namespace from the configuration.
128
+
**--pid**=*PATH*
129
+
Use a PID namespace where *PATH* is an existing PID namespace file
130
+
to join. The special *PATH* empty-string creates a new namespace.
131
+
The special *PATH*`host` removes any existing PID namespace from
132
+
the configuration.
128
133
129
134
**--poststart**=CMD
130
135
Path to command to run in poststart hooks. This command will be run before
@@ -143,7 +148,7 @@ inside of the container.
143
148
Give extended privileges to this container. The default is *false*.
144
149
145
150
By default, OCI containers are
146
-
“unprivileged” (=false) and cannot do some of the things a normal root process can do.
151
+
“unprivileged” (=false) and cannot do some of the things a normal root process can do.
147
152
148
153
When the operator executes **ocitools generate --privileged**, OCI will enable access to all devices on the host as well as disable some of the confinement mechanisms like AppArmor, SELinux, and seccomp from blocking access to privileged processes. This gives the container processes nearly all the same access to the host as processes generating outside of a container on the host.
0 commit comments