-
Notifications
You must be signed in to change notification settings - Fork 197
Expand file tree
/
Copy pathdefault.cf.in
More file actions
39 lines (31 loc) · 1.26 KB
/
default.cf.in
File metadata and controls
39 lines (31 loc) · 1.26 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
# This is a configuration file for Isolate
# All sandboxes are created under this directory.
# To avoid symlink attacks, this directory and all its ancestors
# must be writeable only to root.
box_root = @BOXDIR@
# Directory where lock files are created.
lock_root = /run/isolate/locks
# Control group under which we place our subgroups
# Either an explicit path to a subdirectory in cgroupfs, or "auto:file" to read
# the path from "file", where it is put by isolate-cg-helper.
# cg_root = /sys/fs/cgroup/isolate.slice/isolate.service
cg_root = auto:/run/isolate/cgroup
# There are two ways how to configure the block of UIDs and GIDs
# used for sandboxes:
#
# - You can refer to blocks assigned in /etc/subuid and /etc/subgid
# to the subid_user. Optionally, you may specify an upper limit
# on the number of sandboxes (e.g., if you plan to pin sandboxes
# to CPUs below).
#
# - You can manually configure first_uid, first_gid, and num_boxes.
subid_user = isolate
# first_uid = 60000
# first_gid = 60000
# num_boxes = 1000
# Only root can create new sandboxes (default: 0=everybody can)
#restricted_init = 1
# Per-box settings of the set of allowed CPUs and NUMA nodes
# (see linux/Documentation/cgroups/cpusets.txt for precise syntax)
#box0.cpus = 4-7
#box0.mems = 1