亚洲国产日韩欧美一区二区三区,精品亚洲国产成人av在线,国产99视频精品免视看7,99国产精品久久久久久久成人热,欧美日韩亚洲国产综合乱

目錄 搜尋
Compose About versions and upgrading (Compose) ASP.NET Core + SQL Server on Linux (Compose) CLI environment variables (Compose) Command-line completion (Compose) Compose(組成) Compose command-line reference(組合命令行參考) Control startup order (Compose) Django and PostgreSQL (Compose) Docker stacks and distributed application bundles (Compose) docker-compose build(docker-compose構建) docker-compose bundle docker-compose config docker-compose create docker-compose down docker-compose events docker-compose exec docker-compose help docker-compose images docker-compose kill docker-compose logs docker-compose pause docker-compose port docker-compose ps docker-compose pull docker-compose push docker-compose restart docker-compose rm docker-compose run docker-compose scale docker-compose start docker-compose stop docker-compose top docker-compose unpause docker-compose up Environment file (Compose) Environment variables in Compose Extend services in Compose Frequently asked questions (Compose) Getting started (Compose) Install Compose Link environment variables (deprecated) (Compose) Networking in Compose Overview of Docker Compose Overview of docker-compose CLI Quickstart: Compose and WordPress Rails and PostgreSQL (Compose) Sample apps with Compose Using Compose in production Using Compose with Swarm Engine .NET Core application (Engine) About images, containers, and storage drivers (Engine) Add nodes to the swarm (Engine) Apply custom metadata (Engine) Apply rolling updates (Engine) apt-cacher-ng Best practices for writing Dockerfiles (Engine) Binaries (Engine) Bind container ports to the host (Engine) Breaking changes (Engine) Build your own bridge (Engine) Configure container DNS (Engine) Configure container DNS in user-defined networks (Engine) CouchDB (Engine) Create a base image (Engine) Create a swarm (Engine) Customize the docker0 bridge (Engine) Debian (Engine) Default bridge network Delete the service (Engine) Deploy a service (Engine) Deploy services to a swarm (Engine) Deprecated Engine features Docker container networking (Engine) Docker overview (Engine) Docker run reference (Engine) Dockerfile reference (Engine) Dockerize an application Drain a node (Engine) Engine FAQ (Engine) Fedora (Engine) Get started (Engine) Get started with macvlan network driver (Engine) Get started with multi-host networking (Engine) How nodes work (Engine) How services work (Engine) Image management (Engine) Inspect the service (Engine) Install Docker (Engine) IPv6 with Docker (Engine) Join nodes to a swarm (Engine) Legacy container links (Engine) Lock your swarm (Engine) Manage nodes in a swarm (Engine) Manage sensitive data with Docker secrets (Engine) Manage swarm security with PKI (Engine) Manage swarm service networks (Engine) Migrate to Engine 1.10 Optional Linux post-installation steps (Engine) Overview (Engine) PostgreSQL (Engine) Raft consensus in swarm mode (Engine) Riak (Engine) Run Docker Engine in swarm mode Scale the service (Engine) SDKs (Engine) Select a storage driver (Engine) Set up for the tutorial (Engine) SSHd (Engine) Storage driver overview (Engine) Store service configuration data (Engine) Swarm administration guide (Engine) Swarm mode key concepts (Engine) Swarm mode overlay network security model (Engine) Swarm mode overview (Engine) Understand container communication (Engine) Use multi-stage builds (Engine) Use swarm mode routing mesh (Engine) Use the AUFS storage driver (Engine) Use the Btrfs storage driver (Engine) Use the Device mapper storage driver (Engine) Use the OverlayFS storage driver (Engine) Use the VFS storage driver (Engine) Use the ZFS storage driver (Engine) Engine: Admin Guide Amazon CloudWatch logs logging driver (Engine) Bind mounts (Engine) Collect Docker metrics with Prometheus (Engine) Configuring and running Docker (Engine) Configuring logging drivers (Engine) Control and configure Docker with systemd (Engine) ETW logging driver (Engine) Fluentd logging driver (Engine) Format command and log output (Engine) Google Cloud logging driver (Engine) Graylog Extended Format (GELF) logging driver (Engine) Journald logging driver (Engine) JSON File logging driver (Engine) Keep containers alive during daemon downtime (Engine) Limit a container's resources (Engine) Link via an ambassador container (Engine) Log tags for logging driver (Engine) Logentries logging driver (Engine) PowerShell DSC usage (Engine) Prune unused Docker objects (Engine) Run multiple services in a container (Engine) Runtime metrics (Engine) Splunk logging driver (Engine) Start containers automatically (Engine) Storage overview (Engine) Syslog logging driver (Engine) tmpfs mounts Troubleshoot volume problems (Engine) Use a logging driver plugin (Engine) Using Ansible (Engine) Using Chef (Engine) Using Puppet (Engine) View a container's logs (Engine) Volumes (Engine) Engine: CLI Daemon CLI reference (dockerd) (Engine) docker docker attach docker build docker checkpoint docker checkpoint create docker checkpoint ls docker checkpoint rm docker commit docker config docker config create docker config inspect docker config ls docker config rm docker container docker container attach docker container commit docker container cp docker container create docker container diff docker container exec docker container export docker container inspect docker container kill docker container logs docker container ls docker container pause docker container port docker container prune docker container rename docker container restart docker container rm docker container run docker container start docker container stats docker container stop docker container top docker container unpause docker container update docker container wait docker cp docker create docker deploy docker diff docker events docker exec docker export docker history docker image docker image build docker image history docker image import docker image inspect docker image load docker image ls docker image prune docker image pull docker image push docker image rm docker image save docker image tag docker images docker import docker info docker inspect docker kill docker load docker login docker logout docker logs docker network docker network connect docker network create docker network disconnect docker network inspect docker network ls docker network prune docker network rm docker node docker node demote docker node inspect docker node ls docker node promote docker node ps docker node rm docker node update docker pause docker plugin docker plugin create docker plugin disable docker plugin enable docker plugin inspect docker plugin install docker plugin ls docker plugin push docker plugin rm docker plugin set docker plugin upgrade docker port docker ps docker pull docker push docker rename docker restart docker rm docker rmi docker run docker save docker search docker secret docker secret create docker secret inspect docker secret ls docker secret rm docker service docker service create docker service inspect docker service logs docker service ls docker service ps docker service rm docker service scale docker service update docker stack docker stack deploy docker stack ls docker stack ps docker stack rm docker stack services docker start docker stats docker stop docker swarm docker swarm ca docker swarm init docker swarm join docker swarm join-token docker swarm leave docker swarm unlock docker swarm unlock-key docker swarm update docker system docker system df docker system events docker system info docker system prune docker tag docker top docker unpause docker update docker version docker volume docker volume create docker volume inspect docker volume ls docker volume prune docker volume rm docker wait Use the Docker command line (Engine) Engine: Extend Access authorization plugin (Engine) Docker log driver plugins Docker network driver plugins (Engine) Extending Engine with plugins Managed plugin system (Engine) Plugin configuration (Engine) Plugins API (Engine) Volume plugins (Engine) Engine: Security AppArmor security profiles for Docker (Engine) Automation with content trust (Engine) Content trust in Docker (Engine) Delegations for content trust (Engine) Deploying Notary (Engine) Docker security (Engine) Docker security non-events (Engine) Isolate containers with a user namespace (Engine) Manage keys for content trust (Engine) Play in a content trust sandbox (Engine) Protect the Docker daemon socket (Engine) Seccomp security profiles for Docker (Engine) Secure Engine Use trusted images Using certificates for repository client verification (Engine) Engine: Tutorials Engine tutorials Network containers (Engine) Get Started Part 1: Orientation Part 2: Containers Part 3: Services Part 4: Swarms Part 5: Stacks Part 6: Deploy your app Machine Amazon Web Services (Machine) Digital Ocean (Machine) docker-machine active docker-machine config docker-machine create docker-machine env docker-machine help docker-machine inspect docker-machine ip docker-machine kill docker-machine ls docker-machine provision docker-machine regenerate-certs docker-machine restart docker-machine rm docker-machine scp docker-machine ssh docker-machine start docker-machine status docker-machine stop docker-machine upgrade docker-machine url Driver options and operating system defaults (Machine) Drivers overview (Machine) Exoscale (Machine) Generic (Machine) Get started with a local VM (Machine) Google Compute Engine (Machine) IBM Softlayer (Machine) Install Machine Machine Machine CLI overview Machine command-line completion Machine concepts and help Machine overview Microsoft Azure (Machine) Microsoft Hyper-V (Machine) Migrate from Boot2Docker to Machine OpenStack (Machine) Oracle VirtualBox (Machine) Provision AWS EC2 instances (Machine) Provision Digital Ocean Droplets (Machine) Provision hosts in the cloud (Machine) Rackspace (Machine) VMware Fusion (Machine) VMware vCloud Air (Machine) VMware vSphere (Machine) Notary Client configuration (Notary) Common Server and signer configurations (Notary) Getting started with Notary Notary changelog Notary configuration files Running a Notary service Server configuration (Notary) Signer configuration (Notary) Understand the service architecture (Notary) Use the Notary client
文字

AppArmor(應用程序防護)是一個Linux安全模塊,可保護操作系統(tǒng)及其應用程序免受安全威脅。要使用它,系統(tǒng)管理員會將AppArmor安全配置文件與每個程序相關聯(lián)。Docker希望找到加載并執(zhí)行的AppArmor策略。

Docker會自動生成并加載一個名為容器的默認配置文件docker-default。在Docker版本1.13.0和更高版本中,Docker二進制文件將生成此配置文件tmpfs,然后將其加載到內核中。在早于版本的Docker版本上1.13.0,將生成此配置文件/etc/apparmor.d/docker。

注意:此配置文件用于容器,而不是 Docker守護程序。

Docker Engine守護進程的配置文件存在,但目前沒有與deb軟件包一起安裝。如果您對守護進程配置文件的源代碼感興趣,它位于Docker Engine源代碼庫的contrib/apparmor中。

了解政策

docker-default配置文件是運行容器的默認設置。它具有適度的保護性,同時提供廣泛的應用兼容性 該配置文件是從以下模板生成的。

運行容器時,docker-default除非使用該security-opt選項覆蓋它,否則它將使用該策略。例如,以下內容明確指定了默認策略:

$ docker run --rm -it --security-opt apparmor=docker-default hello-world

加載和卸載配置文件

將新配置文件加載到AppArmor以用于容器:

$ apparmor_parser -r -W /path/to/your_profile

然后,--security-opt像這樣運行自定義配置文件:

$ docker run --rm -it --security-opt apparmor=your_profile hello-world

從AppArmor卸載配置文件:

# stop apparmor
$ /etc/init.d/apparmor stop
# unload the profile
$ apparmor_parser -R /path/to/profile
# start apparmor
$ /etc/init.d/apparmor start

編寫配置文件的資源

AppArmor中文件通配的語法與其他一些通配實現(xiàn)有點不同。強烈建議您查看關于AppArmor配置文件語法的以下某些資源。

  • 快速簡介語言

  • Globbing Syntax

Nginx示例配置文件

在本例中,您為Nginx創(chuàng)建了一個自定義AppArmor配置文件。以下是自定義配置文件。

#include <tunables/global>profile docker-nginx flags=(attach_disconnected,mediate_deleted) {
  #include <abstractions/base>

  network inet tcp,
  network inet udp,
  network inet icmp,

  deny network raw,

  deny network packet,

  file,
  umount,

  deny /bin/** wl,
  deny /boot/** wl,
  deny /dev/** wl,
  deny /etc/** wl,
  deny /home/** wl,
  deny /lib/** wl,
  deny /lib64/** wl,
  deny /media/** wl,
  deny /mnt/** wl,
  deny /opt/** wl,
  deny /proc/** wl,
  deny /root/** wl,
  deny /sbin/** wl,
  deny /srv/** wl,
  deny /tmp/** wl,
  deny /sys/** wl,
  deny /usr/** wl,

  audit /** w,

  /var/run/nginx.pid w,

  /usr/sbin/nginx ix,

  deny /bin/dash mrwklx,
  deny /bin/sh mrwklx,
  deny /usr/bin/top mrwklx,


  capability chown,
  capability dac_override,
  capability setuid,
  capability setgid,
  capability net_bind_service,

  deny @{PROC}/* w,   # deny write for all files directly in /proc (not in a subdir)
  # deny write to files not in /proc/<number>/** or /proc/sys/**
  deny @{PROC}/{[^1-9],[^1-9][^0-9],[^1-9s][^0-9y][^0-9s],[^1-9][^0-9][^0-9][^0-9]*}/** w,
  deny @{PROC}/sys/[^k]** w,  # deny /proc/sys except /proc/sys/k* (effectively /proc/sys/kernel)
  deny @{PROC}/sys/kernel/{?,??,[^s][^h][^m]**} w,  # deny everything except shm* in /proc/sys/kernel/
  deny @{PROC}/sysrq-trigger rwklx,
  deny @{PROC}/mem rwklx,
  deny @{PROC}/kmem rwklx,
  deny @{PROC}/kcore rwklx,

  deny mount,

  deny /sys/[^f]*/** wklx,
  deny /sys/f[^s]*/** wklx,
  deny /sys/fs/[^c]*/** wklx,
  deny /sys/fs/c[^g]*/** wklx,
  deny /sys/fs/cg[^r]*/** wklx,
  deny /sys/firmware/** rwklx,
  deny /sys/kernel/security/** rwklx,
}
  1. 將自定義配置文件保存到文件中的磁盤/etc/apparmor.d/containers/docker-nginx。本示例中的文件路徑不是必需的。在生產中,你可以使用另一個。

2. 加載配置文件。

$ sudo apparmor_parser -r -W /etc/apparmor.d/containers/docker-nginx

  1. 用配置文件運行一個容器。以分離模式運行nginx:$ docker run --security-opt“apparmor = docker-nginx”\ -p 80:80 -d --name apparmor-nginx nginx

2. 執(zhí)行到正在運行的容器中。

$ docker exec -it apparmor-nginx bash

2. 嘗試一些操作來測試配置文件。

root@6da5a2a930b9:~# ping 8.8.8.8 ping: Lacking privilege for raw socket.  root@6da5a2a930b9:/# top bash: /usr/bin/top: Permission denied  root@6da5a2a930b9:~# touch ~/thing touch: cannot touch 'thing': Permission denied  root@6da5a2a930b9:/# sh bash: /bin/sh: Permission denied  root@6da5a2a930b9:/# dash bash: /bin/dash: Permission denied

恭喜!您剛剛部署了一個由定制apparmor配置文件保護的容器!

調試AppArmor

您可以使用dmesg來調試問題并aa-status檢查加載的配置文件。

使用dmesg

以下是一些有用的技巧,用于調試您可能面臨的有關AppArmor的任何問題。

AppArmor發(fā)送非常詳細的消息dmesg。通常,AppArmor行如下所示:

[ 5442.864673] audit: type=1400 audit(1453830992.845:37): apparmor="ALLOWED" operation="open" profile="/usr/bin/docker" name="/home/jessie/docker/man/man1/docker-attach.1" pid=10923 comm="docker" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0

在上面的例子中,你可以看到profile=/usr/bin/docker。這意味著用戶docker-engine加載了(Docker引擎守護進程)配置文件。

注意:在Ubuntu> 14.04的版本中,這一切都很好,但Trusty用戶在嘗試時可能遇到一些問題docker exec。

看另一條日志行:

[ 3256.689120] type=1400 audit(1405454041.341:73): apparmor="DENIED" operation="ptrace" profile="docker-default" pid=17651 comm="docker" requested_mask="receive" denied_mask="receive"

這次配置文件是docker-default默認情況下在容器上運行的配置文件,除非在privileged模式下運行。該行顯示apparmor ptrace在容器中已被拒絕。這完全如預期。

使用aa_status

aa-status.產出如下:

$ sudo aa-status
apparmor module is loaded.14 profiles are loaded.1 profiles are in enforce mode.
   docker-default13 profiles are in complain mode.   /usr/bin/docker   /usr/bin/docker///bin/cat   /usr/bin/docker///bin/ps   /usr/bin/docker///sbin/apparmor_parser   /usr/bin/docker///sbin/auplink   /usr/bin/docker///sbin/blkid   /usr/bin/docker///sbin/iptables   /usr/bin/docker///sbin/mke2fs   /usr/bin/docker///sbin/modprobe   /usr/bin/docker///sbin/tune2fs   /usr/bin/docker///sbin/xtables-multi   /usr/bin/docker///sbin/zfs   /usr/bin/docker///usr/bin/xz38 processes have profiles defined.37 processes are in enforce mode.
   docker-default (6044)   ...
   docker-default (31899)1 processes are in complain mode.   /usr/bin/docker (29756)0 processes are unconfined but have a profile defined.

以上輸出顯示docker-default在各種容器PID上運行的配置文件處于enforce模式。這意味著AppArmor正在主動阻止和審核配置文件dmesg邊界之外的任何內容docker-default。

上面的輸出還顯示/usr/bin/docker(Docker引擎守護進程)配置文件正在complain模式下運行。這意味著AppArmor 只會記錄到dmesg配置文件邊界之外的活動。(除了在Ubuntu Trusty的情況下,執(zhí)行一些有趣的行為。)

貢獻Docker的AppArmor代碼

高級用戶和軟件包管理員可以在Docker Engine源代碼倉庫的contrib/apparmor/usr/bin/docker下找到(Docker Engine Daemon)的配置文件。

docker-default文檔容器存在于profiles/apparmor。

上一篇: 下一篇: