zoukankan      html  css  js  c++  java
  • docker security-opt

    dockerd --security-opt

    --security-opt="label=user:USER"    Set the label user for the container
    --security-opt="label=role:ROLE"    Set the label role for the container
    --security-opt="label=type:TYPE"    Set the label type for the container
    --security-opt="label=level:LEVEL"    Set the label level for the container
    --security-opt="label=disable"    Turn off label confinement for the container
    work with selinux
    --security-opt="apparmor=PROFILE" Set the apparmor profile to be applied to the container
    work with
    apparmor
    -----------------------------------------------------------------------------------------
    --security-opt="no-new-privileges:true" Disable container processes from gaining new privileges

    --security-opt="seccomp=unconfined" Turn off seccomp confinement for the container

    --security-opt="seccomp=profile.json" White-listed syscalls seccomp Json file to be used as a seccomp filter

    cap

    --cap-add    Add Linux capabilities
    --cap-drop    Drop Linux capabilities
    --privileged    Give extended privileges to this container
    --device=[]    Allows you to run devices inside the container without the --privileged flag.
    SYS_MODULE    Load and unload kernel modules.
    SYS_RAWIO    Perform I/O port operations (iopl(2) and ioperm(2)).
    SYS_PACCT    Use acct(2), switch process accounting on or off.
    SYS_ADMIN    Perform a range of system administration operations.
    SYS_NICE    Raise process nice value (nice(2), setpriority(2)) and change the nice value for arbitrary processes.
    SYS_RESOURCE    Override resource Limits.
    SYS_TIME    Set system clock (settimeofday(2), stime(2), adjtimex(2)); set real-time (hardware) clock.
    SYS_TTY_CONFIG    Use vhangup(2); employ various privileged ioctl(2) operations on virtual terminals.
    AUDIT_CONTROL    Enable and disable kernel auditing; change auditing filter rules; retrieve auditing status and filtering rules.
    MAC_ADMIN    Allow MAC configuration or state changes. Implemented for the Smack LSM.
    MAC_OVERRIDE    Override Mandatory Access Control (MAC). Implemented for the Smack Linux Security Module (LSM).
    NET_ADMIN    Perform various network-related operations.
    SYSLOG    Perform privileged syslog(2) operations.
    DAC_READ_SEARCH    Bypass file read permission checks and directory read and execute permission checks.
    LINUX_IMMUTABLE    Set the FS_APPEND_FL and FS_IMMUTABLE_FL i-node flags.
    NET_BROADCAST    Make socket broadcasts, and listen to multicasts.
    IPC_LOCK    Lock memory (mlock(2), mlockall(2), mmap(2), shmctl(2)).
    IPC_OWNER    Bypass permission checks for operations on System V IPC objects.
    SYS_PTRACE    Trace arbitrary processes using ptrace(2).
    SYS_BOOT    Use reboot(2) and kexec_load(2), reboot and load a new kernel for later execution.
    LEASE    Establish leases on arbitrary files (see fcntl(2)).
    WAKE_ALARM    Trigger something that will wake up the system.
    BLOCK_SUSPEND    Employ features that can block system suspend.
  • 相关阅读:
    [git 学习篇] git commit原理 --实践体会
    [git 学习篇]工作区和暂存区
    [git 学习篇] git文件版本回退再学习
    [git 学习篇]版本回退
    [git 学习篇] 修改文件
    [git 学习篇] 提交文件
    [git 学习篇] --创建git创库
    [测试框架学习] 测试框架的结构包含
    [python测试框架] http接口测试框架
    向SharePoint页面添加后台代码
  • 原文地址:https://www.cnblogs.com/leleyao/p/12981953.html
Copyright © 2011-2022 走看看