mirror of
https://github.com/truenas/charts.git
synced 2026-02-13 23:35:36 +08:00
42 lines
1.6 KiB
YAML
42 lines
1.6 KiB
YAML
runAsContext:
|
|
- userName: root
|
|
groupName: root
|
|
gid: 0
|
|
uid: 0
|
|
description: Diskover runs as root user.
|
|
- userName: root
|
|
groupName: root
|
|
gid: 0
|
|
uid: 0
|
|
description: Elastic Search runs as root user.
|
|
capabilities:
|
|
- name: CHOWN
|
|
description: Diskover and Elastic Search are able to chown files.
|
|
- name: FOWNER
|
|
description: Diskover and Elastic Search are able to bypass permission checks for it's sub-processes.
|
|
- name: SYS_CHROOT
|
|
description: Diskover and Elastic Search are able to use chroot.
|
|
- name: MKNOD
|
|
description: Diskover and Elastic Search are able to create device nodes.
|
|
- name: DAC_OVERRIDE
|
|
description: Diskover and Elastic Search are able to bypass permission checks.
|
|
- name: FSETID
|
|
description: Diskover and Elastic Search are able to set file capabilities.
|
|
- name: KILL
|
|
description: Diskover and Elastic Search are able to kill processes.
|
|
- name: SETGID
|
|
description: Diskover and Elastic Search are able to set group ID for it's sub-processes.
|
|
- name: SETUID
|
|
description: Diskover and Elastic Search are able to set user ID for it's sub-processes.
|
|
- name: SETPCAP
|
|
description: Diskover and Elastic Search are able to set process capabilities.
|
|
- name: NET_BIND_SERVICE
|
|
description: Diskover and Elastic Search are able to bind to privileged ports.
|
|
- name: SETFCAP
|
|
description: Diskover and Elastic Search are able to set file capabilities.
|
|
- name: NET_RAW
|
|
description: Diskover and Elastic Search are able to use raw sockets.
|
|
- name: AUDIT_WRITE
|
|
description: Diskover and Elastic Search are able to write to audit log.
|
|
hostMounts: []
|