|
3 | 3 | The Linux container specification uses various kernel features like namespaces, cgroups, capabilities, LSM, and file system jails to fulfill the spec.
|
4 | 4 | Additional information is needed for Linux over the [default spec configuration](config.md) in order to configure these various kernel features.
|
5 | 5 |
|
6 |
| -## Capabilities |
7 |
| - |
8 |
| -Capabilities is an array that specifies Linux capabilities that can be provided to the process inside the container. |
9 |
| -Valid values are the strings for capabilities defined in [the man page](http://man7.org/linux/man-pages/man7/capabilities.7.html) |
10 |
| - |
11 |
| -```json |
12 |
| - "capabilities": [ |
13 |
| - "CAP_AUDIT_WRITE", |
14 |
| - "CAP_KILL", |
15 |
| - "CAP_NET_BIND_SERVICE" |
16 |
| - ] |
17 |
| -``` |
18 |
| - |
19 | 6 | ## Default File Systems
|
20 | 7 |
|
21 | 8 | The Linux ABI includes both syscalls and several special file paths.
|
@@ -486,28 +473,6 @@ The kernel enforces the `soft` limit for a resource while the `hard` limit acts
|
486 | 473 | ]
|
487 | 474 | ```
|
488 | 475 |
|
489 |
| -## SELinux process label |
490 |
| - |
491 |
| -SELinux process label specifies the label with which the processes in a container are run. |
492 |
| -For more information about SELinux, see [Selinux documentation](http://selinuxproject.org/page/Main_Page) |
493 |
| - |
494 |
| -###### Example |
495 |
| - |
496 |
| -```json |
497 |
| - "selinuxProcessLabel": "system_u:system_r:svirt_lxc_net_t:s0:c124,c675" |
498 |
| -``` |
499 |
| - |
500 |
| -## Apparmor profile |
501 |
| - |
502 |
| -Apparmor profile specifies the name of the apparmor profile that will be used for the container. |
503 |
| -For more information about Apparmor, see [Apparmor documentation](https://wiki.ubuntu.com/AppArmor) |
504 |
| - |
505 |
| -###### Example |
506 |
| - |
507 |
| -```json |
508 |
| - "apparmorProfile": "acme_secure_profile" |
509 |
| -``` |
510 |
| - |
511 | 476 | ## seccomp
|
512 | 477 |
|
513 | 478 | Seccomp provides application sandboxing mechanism in the Linux kernel.
|
@@ -574,17 +539,6 @@ Its value is either slave, private, or shared.
|
574 | 539 | "rootfsPropagation": "slave",
|
575 | 540 | ```
|
576 | 541 |
|
577 |
| -## No new privileges |
578 |
| - |
579 |
| -Setting `noNewPrivileges` to true prevents the processes in the container from gaining additional privileges. |
580 |
| -[The kernel doc](https://www.kernel.org/doc/Documentation/prctl/no_new_privs.txt) has more information on how this is achieved using a prctl system call. |
581 |
| - |
582 |
| -###### Example |
583 |
| - |
584 |
| -```json |
585 |
| - "noNewPrivileges": true, |
586 |
| -``` |
587 |
| - |
588 | 542 | [cgroup-v1]: https://www.kernel.org/doc/Documentation/cgroup-v1/cgroups.txt
|
589 | 543 | [cgroup-v1-blkio]: https://www.kernel.org/doc/Documentation/cgroup-v1/blkio-controller.txt
|
590 | 544 | [cgroup-v1-cpusets]: https://www.kernel.org/doc/Documentation/cgroup-v1/cpusets.txt
|
|
0 commit comments