Skip to content

Commit 6820579

Browse files
authored
[docker-snmp] limit privileged flag for snmp container (#16971)
Why I did it HLD implementation: Container Hardening (sonic-net/SONiC#1364) Work item tracking Microsoft ADO (number only): 14807420 How I did it Reduce linux capabilities in privileged flag How to verify it Run snmp sonic-mgmt tests Check container's settings: Privileged is false and container only has default Linux caps, does not have extended caps. admin@vlab-01:~$ docker inspect snmp | grep Privi "Privileged": false, admin@vlab-01:~$ docker exec -it snmp bash root@vlab-01:/# capsh --print Current: cap_chown,cap_dac_override,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_net_bind_service,cap_net_raw,cap_sys_chroot,cap_mknod,cap_audit_write,cap_setfcap=ep Bounding set =cap_chown,cap_dac_override,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_net_bind_se
1 parent 922a8ac commit 6820579

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

rules/docker-snmp.mk

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ SONIC_DOCKER_DBG_IMAGES += $(DOCKER_SNMP_DBG)
2828
SONIC_INSTALL_DOCKER_DBG_IMAGES += $(DOCKER_SNMP_DBG)
2929

3030
$(DOCKER_SNMP)_CONTAINER_NAME = snmp
31-
$(DOCKER_SNMP)_RUN_OPT += --privileged -t
31+
$(DOCKER_SNMP)_RUN_OPT += -t
3232
$(DOCKER_SNMP)_RUN_OPT += -v /etc/sonic:/etc/sonic:ro
3333
$(DOCKER_SNMP)_RUN_OPT += -v /etc/timezone:/etc/timezone:ro
3434
$(DOCKER_SNMP)_FILES += $(SUPERVISOR_PROC_EXIT_LISTENER_SCRIPT)

0 commit comments

Comments
 (0)