You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: config.md
+35-19
Original file line number
Diff line number
Diff line change
@@ -156,33 +156,48 @@ For POSIX platforms the `mounts` structure has the following fields:
156
156
***`env`** (array of strings, OPTIONAL) with the same semantics as [IEEE Std 1003.1-2008's `environ`][ieee-1003.1-2008-xbd-c8.1].
157
157
***`args`** (array of strings, REQUIRED) with similar semantics to [IEEE Std 1003.1-2008 `execvp`'s *argv*][ieee-1003.1-2008-xsh-exec].
158
158
This specification extends the IEEE standard in that at least one entry is REQUIRED, and that entry is used with the same semantics as `execvp`'s *file*.
159
-
***`capabilities`** (object, OPTIONAL) is an object containing arrays that specifies the sets of capabilities for the process.
160
-
Valid values are platform-specific.
161
-
For example, valid values for Linux are defined in the [capabilities(7)][capabilities.7] man page, such as `CAP_CHOWN`.
162
-
Any value which cannot be mapped to a relevant kernel interface MUST cause an error.
163
-
`capabilities` contains the following properties:
164
-
***`effective`** (array of strings, OPTIONAL) - the `effective` field is an array of effective capabilities that are kept for the process.
165
-
***`bounding`** (array of strings, OPTIONAL) - the `bounding` field is an array of bounding capabilities that are kept for the process.
166
-
***`inheritable`** (array of strings, OPTIONAL) - the `inheritable` field is an array of inheritable capabilities that are kept for the process.
167
-
***`permitted`** (array of strings, OPTIONAL) - the `permitted` field is an array of permitted capabilities that are kept for the process.
168
-
***`ambient`** (array of strings, OPTIONAL) - the `ambient` field is an array of ambient capabilities that are kept for the process.
159
+
160
+
### <aname="configPOSIXProcess" />POSIX process
161
+
162
+
For systems that support POSIX rlimits (for example Linux and Solaris), the `process` object supports the following process-specific properties:
163
+
169
164
***`rlimits`** (array of objects, OPTIONAL) allows setting resource limits for the process.
170
165
Each entry has the following structure:
171
166
172
-
***`type`** (string, REQUIRED) - the platform resource being limited, for example on Linux as defined in the [setrlimit(2)][setrlimit.2] man page.
173
-
***`soft`** (uint64, REQUIRED) - the value of the limit enforced for the corresponding resource.
174
-
***`hard`** (uint64, REQUIRED) - the ceiling for the soft limit that could be set by an unprivileged process.
175
-
Only a privileged process (e.g. under Linux: one with the CAP_SYS_RESOURCE capability) can raise a hard limit.
167
+
***`type`** (string, REQUIRED) the platform resource being limited.
168
+
* Linux: valid values are defined in the [`getrlimit(2)`][getrlimit.2] man page, such as `RLIMIT_MSGQUEUE`.
169
+
* Solaris: valid values are defined in the [`getrlimit(3)`][getrlimit.3] man page, such as `RLIMIT_CORE`.
176
170
177
-
If `rlimits` contains duplicated entries with same `type`, the runtime MUST error out.
171
+
The runtime MUST [generate an error](runtime.md#errors) for any values which cannot be mapped to a relevant kernel interface
172
+
For each entry in `rlimits`, a [`getrlimit(3)`][getrlimit.3] on `type` MUST succeed.
173
+
For the following properties, `rlim` refers to the status returned by the `getrlimit(3)` call.
178
174
179
-
***`noNewPrivileges`** (bool, OPTIONAL) setting `noNewPrivileges` to true prevents the process from gaining additional privileges.
180
-
As an example, the ['no_new_privs'][no-new-privs] article in the kernel documentation has information on how this is achieved using a prctl system call on Linux.
175
+
***`soft`** (uint64, REQUIRED) the value of the limit enforced for the corresponding resource.
176
+
`rlim.rlim_cur` MUST match the configured value.
177
+
***`hard`** (uint64, REQUIRED) the ceiling for the soft limit that could be set by an unprivileged process.
178
+
`rlim.rlim_max` MUST match the configured value.
179
+
Only a privileged process (e.g. one with the `CAP_SYS_RESOURCE` capability) can raise a hard limit.
181
180
182
-
For Linux-based systems the process structure supports the following process-specific fields.
181
+
If `rlimits` contains duplicated entries with same `type`, the runtime MUST [generate an error](runtime.md#errors).
182
+
183
+
### <aname="configLinuxProcess" />Linux Process
184
+
185
+
For Linux-based systems, the `process` object supports the following process-specific properties.
183
186
184
187
***`apparmorProfile`** (string, OPTIONAL) specifies the name of the AppArmor profile for the process.
185
188
For more information about AppArmor, see [AppArmor documentation][apparmor].
189
+
***`capabilities`** (object, OPTIONAL) is an object containing arrays that specifies the sets of capabilities for the process.
190
+
Valid values are defined in the [capabilities(7)][capabilities.7] man page, such as `CAP_CHOWN`.
191
+
Any value which cannot be mapped to a relevant kernel interface MUST cause an error.
192
+
`capabilities` contains the following properties:
193
+
194
+
***`effective`** (array of strings, OPTIONAL) the `effective` field is an array of effective capabilities that are kept for the process.
195
+
***`bounding`** (array of strings, OPTIONAL) the `bounding` field is an array of bounding capabilities that are kept for the process.
196
+
***`inheritable`** (array of strings, OPTIONAL) the `inheritable` field is an array of inheritable capabilities that are kept for the process.
197
+
***`permitted`** (array of strings, OPTIONAL) the `permitted` field is an array of permitted capabilities that are kept for the process.
198
+
***`ambient`** (array of strings, OPTIONAL) the `ambient` field is an array of ambient capabilities that are kept for the process.
199
+
***`noNewPrivileges`** (bool, OPTIONAL) setting `noNewPrivileges` to true prevents the process from gaining additional privileges.
200
+
As an example, the [`no_new_privs`][no-new-privs] article in the kernel documentation has information on how this is achieved using a `prctl` system call on Linux.
186
201
***`oomScoreAdj`***(int, OPTIONAL)* adjusts the oom-killer score in `[pid]/oom_score_adj` for the process's `[pid]` in a [proc pseudo-filesystem][procfs].
187
202
If `oomScoreAdj` is set, the runtime MUST set `oom_score_adj` to the given value.
188
203
If `oomScoreAdj` is not set, the runtime MUST NOT change the value of `oom_score_adj`.
@@ -838,7 +853,8 @@ Here is a full example `config.json` for reference.
0 commit comments