You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: man/oci-runtime-tool-generate.1.md
+10Lines changed: 10 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -372,6 +372,11 @@ read the configuration from `config.json`.
372
372
373
373
When the operator executes **oci-runtime-tool generate --privileged**, OCI will enable access to all devices on the host as well as disable some of the confinement mechanisms like AppArmor, SELinux, and seccomp from blocking access to privileged processes. This gives the container processes nearly all the same access to the host as processes generating outside of a container on the host.
374
374
375
+
**--process-cap-add**=[]
376
+
Add Linux capabilities to all 5 capability sets.
377
+
You can use this command to add multiple capabilities. Each value should be used ',' separated.
378
+
e.g. --process-cap-add CAP_FOWNER,CAP_FSETID
379
+
375
380
**--process-cap-add-ambient**=[]
376
381
Add Linux ambient capabilities.
377
382
You can use this command to add multiple capabilities. Each value should be used ',' separated.
@@ -397,6 +402,11 @@ read the configuration from `config.json`.
397
402
You can use this command to add multiple capabilities. Each value should be used ',' separated.
398
403
e.g. --process-cap-add-permitted CAP_FOWNER,CAP_FSETID
399
404
405
+
**--process-cap-drop**=[]
406
+
Drop Linux capabilities to all 5 capability sets.
407
+
You can use this command to drop multiple capabilities. Each value should be used ',' separated.
408
+
e.g. --process-cap-drop CAP_FOWNER,CAP_FSETID
409
+
400
410
**--process-cap-drop-all**=true|false
401
411
Drop all Linux capabilities
402
412
This option conflicts with other cap options, as --process-cap-*.
0 commit comments