-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding comments for container options in qm.container #678
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -35,10 +35,24 @@ LimitNOFILE=65536 | |
TasksMax=50% | ||
|
||
[Container] | ||
# AddCapability | ||
# ------------- | ||
# Grants all capabilities to the container, increasing flexibility but significantly | ||
# reducing security. | ||
AddCapability=all | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. same as above |
||
|
||
# Unmask | ||
# ------- | ||
# Unmasks all systemd services for the container, overriding masking that prevents | ||
# access to specific services. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. same as above |
||
Unmask=ALL | ||
SecurityLabelNested=true | ||
SeccompProfile=/usr/share/qm/seccomp.json | ||
|
||
# PidsLimit | ||
# --------- | ||
# Disables the PID limit for the container by setting it to -1. | ||
# Without a limit, the container can spawn unlimited processes, potentially exhausting system resources. | ||
PidsLimit=-1 | ||
|
||
# Comment DropCapability this will allow FFI Tools to surpass their defaults. | ||
|
@@ -49,7 +63,16 @@ AddDevice=-/dev/fuse | |
ContainerName=qm | ||
Exec=/sbin/init | ||
Network=private | ||
|
||
# ReadOnly | ||
# -------- | ||
# Makes the container's filesystem read-only, enhancing security by preventing modifications. | ||
ReadOnly=true | ||
|
||
# Rootfs | ||
# ------ | ||
# Defines the root filesystem location for the container. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I would specify the QM rootfs partition |
||
# The '${ROOTFS}' variable should point to a valid filesystem path. | ||
Rootfs=${ROOTFS} | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. see previous one is it a container or partitioned filesystem? |
||
|
||
SecurityLabelNested=true | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would recommend here to use man quadlet also for details