5b99af0079813347d90c935ea540ed7f96dcea38Stéphane Graber# This derives from the global common config
5b99af0079813347d90c935ea540ed7f96dcea38Stéphane Graberlxc.include = @LXCTEMPLATECONFIG@/common.conf
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# Uncomment these if you don't run anything that needs the capability, and
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# would like the container to run with less privilege.
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# Dropping sys_admin disables container root from doing a lot of things
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# that could be bad like re-mounting lxc fstab entries rw for example,
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# but also disables some useful things like being able to nfs mount, and
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# things that are already namespaced with ns_capable() kernel checks, like
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# lxc.cap.drop = net_raw # breaks dhcp/ping
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# lxc.cap.drop = setgid # breaks login (initgroups/setgroups)
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# lxc.cap.drop = dac_read_search # breaks login (pam unix_chkpwd)
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# lxc.cap.drop = setuid # breaks sshd,nfs statd
1ecee40b7dcb933d2c9910f07ed26c6a55e18206Michael H. Warfield# lxc.cap.drop = audit_control # breaks sshd (set_loginuid failed)
28468a67cbe3a3b1dc915c6afabefd7d666cd11e有张纸lxc.cap.drop = sys_nice sys_pacct sys_rawio