当前位置: 首页 >Java技术 > docker security-opt

docker security-opt

dockerd --security-opt

 

--security-opt="label=user:USER"Set the label user for the container--security-opt="label=role:ROLE"Set the label role for the container--security-opt="label=type:TYPE"Set the label type for the container--security-opt="label=level:LEVEL"Set the label level for the container--security-opt="label=disable"Tu off label confinement for the container
work with selinux
--security-opt="apparmor=PROFILE"Set the apparmor profile to be applied to the container
work with
apparmor
-----------------------------------------------------------------------------------------
--security-opt="no-new-privileges:true" Disable container processes from gaining new privileges

--security-opt="seccomp=unconfined" Tu off seccomp confinement for the container

--security-opt="seccomp=profile.json" White-listed syscalls seccomp Json file to be used as a seccomp filter

 

cap

--cap-addAdd Linux capabilities--cap-dropDrop Linux capabilities--privilegedGive extended privileges to this container--device=[]Allows you to run devices inside the container without the --privileged flag.
SYS_MODULELoad and unload keel modules.SYS_RAWIOPerform I/O port operations (iopl(2) and ioperm(2)).SYS_PACCTUse acct(2), switch process accounting on or off.SYS_ADMINPerform a range of system administration operations.SYS_NICERaise process nice value (nice(2), setpriority(2)) and change the nice value for arbitrary processes.SYS_RESOURCEOverride resource Limits.SYS_TIMESet system clock (settimeofday(2), stime(2), adjtimex(2)); set real-time (hardware) clock.SYS_TTY_CONFIGUse vhangup(2); employ various privileged ioctl(2) operations on virtual terminals.AUDIT_CONTROLEnable and disable keel auditing; change auditing filter rules; retrieve auditing status and filtering rules.MAC_ADMINAllow MAC configuration or state changes. Implemented for the Smack LSM.MAC_OVERRIDEOverride Mandatory Access Control (MAC). Implemented for the Smack Linux Security Module (LSM).NET_ADMINPerform various network-related operations.SYSLOGPerform privileged syslog(2) operations.DAC_READ_SEARCHBypass file read permission checks and directory read and execute permission checks.LINUX_IMMUTABLESet the FS_APPEND_FL and FS_IMMUTABLE_FL i-node flags.NET_BROADCASTMake socket broadcasts, and listen to multicasts.IPC_LOCKLock memory (mlock(2), mlockall(2), mmap(2), shmctl(2)).IPC_OWNERBypass permission checks for operations on System V IPC objects.SYS_PTRACETrace arbitrary processes using ptrace(2).SYS_BOOTUse reboot(2) and kexec_load(2), reboot and load a new keel for later execution.LEASEEstablish leases on arbitrary files (see fcntl(2)).WAKE_ALARMTrigger something that will wake up the system.BLOCK_SUSPENDEmploy features that can block system suspend.

 

作者:萱乐庆foreverlove
来源链接:https://www.cnblogs.com/leleyao/p/12981953.html

版权声明:
1、JavaClub(https://www.javaclub.cn)以学习交流为目的,由作者投稿、网友推荐和小编整理收藏优秀的IT技术及相关内容,包括但不限于文字、图片、音频、视频、软件、程序等,其均来自互联网,本站不享有版权,版权归原作者所有。

2、本站提供的内容仅用于个人学习、研究或欣赏,以及其他非商业性或非盈利性用途,但同时应遵守著作权法及其他相关法律的规定,不得侵犯相关权利人及本网站的合法权利。
3、本网站内容原作者如不愿意在本网站刊登内容,请及时通知本站(javaclubcn@163.com),我们将第一时间核实后及时予以删除。





本文链接:https://www.javaclub.cn/java/117153.html

标签:Security
分享给朋友: