metadata.yaml 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041
  1. runAsContext:
  2. - userName: root
  3. groupName: root
  4. gid: 0
  5. uid: 0
  6. description: Diskover runs as root user.
  7. - userName: root
  8. groupName: root
  9. gid: 0
  10. uid: 0
  11. description: Elastic Search runs as root user.
  12. capabilities:
  13. - name: CHOWN
  14. description: Diskover and Elastic Search are able to chown files.
  15. - name: FOWNER
  16. description: Diskover and Elastic Search are able to bypass permission checks for it's sub-processes.
  17. - name: SYS_CHROOT
  18. description: Diskover and Elastic Search are able to use chroot.
  19. - name: MKNOD
  20. description: Diskover and Elastic Search are able to create device nodes.
  21. - name: DAC_OVERRIDE
  22. description: Diskover and Elastic Search are able to bypass permission checks.
  23. - name: FSETID
  24. description: Diskover and Elastic Search are able to set file capabilities.
  25. - name: KILL
  26. description: Diskover and Elastic Search are able to kill processes.
  27. - name: SETGID
  28. description: Diskover and Elastic Search are able to set group ID for it's sub-processes.
  29. - name: SETUID
  30. description: Diskover and Elastic Search are able to set user ID for it's sub-processes.
  31. - name: SETPCAP
  32. description: Diskover and Elastic Search are able to set process capabilities.
  33. - name: NET_BIND_SERVICE
  34. description: Diskover and Elastic Search are able to bind to privileged ports.
  35. - name: SETFCAP
  36. description: Diskover and Elastic Search are able to set file capabilities.
  37. - name: NET_RAW
  38. description: Diskover and Elastic Search are able to use raw sockets.
  39. - name: AUDIT_WRITE
  40. description: Diskover and Elastic Search are able to write to audit log.
  41. hostMounts: []