mirror of
https://github.com/pterodactyl/documentation.git
synced 2025-12-11 14:00:27 -06:00
Add notes about new capability changes in new version
This commit is contained in:
parent
fe894cc080
commit
2eb6bc0692
@ -103,7 +103,7 @@ Please note that all of the settings above are in the `docker.policy.network.X`
|
|||||||
| Setting Path | Default Value | Notes |
|
| Setting Path | Default Value | Notes |
|
||||||
| ------------ | ------------- | ----- |
|
| ------------ | ------------- | ----- |
|
||||||
| `tmpfs` | `rw,exec,nosuid,size=50M` | These are the arguments used for mounting a `tmpfs` directory into containers to allow certain programs to run. |
|
| `tmpfs` | `rw,exec,nosuid,size=50M` | These are the arguments used for mounting a `tmpfs` directory into containers to allow certain programs to run. |
|
||||||
| `log_driver` | none | The log driver to use for containers. We default to `none` to mitigate a potential DoS attack vector if a server were to spam log output. |
|
| `log_driver` | none | :warning: This option was **removed** in `v0.6` and is forcibly set to `json-file`. The log driver to use for containers. We default to `none` to mitigate a potential DoS attack vector if a server were to spam log output. |
|
||||||
| `readonly_root` | true | Determines if the root filesystem of the container should be readonly. |
|
| `readonly_root` | true | Determines if the root filesystem of the container should be readonly. |
|
||||||
| `securityopts` | array | An array of security options to apply to a container. The default array is provided below. |
|
| `securityopts` | array | An array of security options to apply to a container. The default array is provided below. |
|
||||||
| `cap_drop` | array | An array of linux capabilities to drop from the container (in addition to ones [dropped by docker already](https://docs.docker.com/engine/security/security/#linux-kernel-capabilities). A listing of the default array is below. |
|
| `cap_drop` | array | An array of linux capabilities to drop from the container (in addition to ones [dropped by docker already](https://docs.docker.com/engine/security/security/#linux-kernel-capabilities). A listing of the default array is below. |
|
||||||
@ -118,19 +118,20 @@ Please note that all of the settings above are in the `docker.policy.container.X
|
|||||||
```
|
```
|
||||||
|
|
||||||
### Default Capabilities Drop Array
|
### Default Capabilities Drop Array
|
||||||
|
|
||||||
|
::: warning
|
||||||
|
Starting with `v0.6` of the Daemon, the following previously _dropped_ capabilities are available in containers: `chown`, `kill`, `setgid`, and `setuid`.
|
||||||
|
:::
|
||||||
|
|
||||||
``` json
|
``` json
|
||||||
[
|
[
|
||||||
'setpcap',
|
'setpcap',
|
||||||
'mknod',
|
'mknod',
|
||||||
'audit_write',
|
'audit_write',
|
||||||
'chown',
|
|
||||||
'net_raw',
|
'net_raw',
|
||||||
'dac_override',
|
'dac_override',
|
||||||
'fowner',
|
'fowner',
|
||||||
'fsetid',
|
'fsetid',
|
||||||
'kill',
|
|
||||||
'setgid',
|
|
||||||
'setuid',
|
|
||||||
'net_bind_service',
|
'net_bind_service',
|
||||||
'sys_chroot',
|
'sys_chroot',
|
||||||
'setfcap',
|
'setfcap',
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user