1SYSTEMD.NSPAWN(5) systemd.nspawn SYSTEMD.NSPAWN(5)
2
3
4
6 systemd.nspawn - Container settings
7
9 /etc/systemd/nspawn/machine.nspawn
10
11 /run/systemd/nspawn/machine.nspawn
12
13 /var/lib/machines/machine.nspawn
14
16 An nspawn container settings file (suffix .nspawn) contains runtime
17 configuration for a local container, and is used used by systemd-
18 nspawn(1). Files of this type are named after the containers they
19 define settings for. They are optional, and only required for
20 containers whose execution environment shall differ from the defaults.
21 Files of this type mostly contain settings that may also be set on the
22 systemd-nspawn command line, and make it easier to persistently attach
23 specific settings to specific containers. The syntax of these files is
24 inspired by .desktop files, similarly to other configuration files
25 supported by the systemd project. See systemd.syntax(7) for an
26 overview.
27
29 Files are searched for by appending the .nspawn suffix to the machine
30 name of the container, as specified with the --machine= switch of
31 systemd-nspawn, or derived from the directory or image file name. This
32 file is first searched for in /etc/systemd/nspawn/ and
33 /run/systemd/nspawn/. If found there, the settings are read and all of
34 them take full effect (but may still be overridden by corresponding
35 command line arguments). Otherwise, the file will then be searched for
36 next to the image file or in the immediate parent of the root directory
37 of the container. If the file is found there, only a subset of the
38 settings will take effect however. All settings that possibly elevate
39 privileges or grant additional access to resources of the host (such as
40 files or directories) are ignored. To which options this applies is
41 documented below.
42
43 Persistent settings files created and maintained by the administrator
44 (and thus trusted) should be placed in /etc/systemd/nspawn/, while
45 automatically downloaded (and thus potentially untrusted) settings
46 files are placed in /var/lib/machines/ instead (next to the container
47 images), where their security impact is limited. In order to add
48 privileged settings to .nspawn files acquired from the image vendor, it
49 is recommended to copy the settings files into /etc/systemd/nspawn/ and
50 edit them there, so that the privileged options become available. The
51 precise algorithm for how the files are searched and interpreted may be
52 configured with systemd-nspawn's --settings= switch, see systemd-
53 nspawn(1) for details.
54
56 Settings files may include an [Exec] section, which carries various
57 execution parameters:
58
59 Boot=
60 Takes a boolean argument, which defaults to off. If enabled,
61 systemd-nspawn will automatically search for an init executable and
62 invoke it. In this case, the specified parameters using Parameters=
63 are passed as additional arguments to the init process. This
64 setting corresponds to the --boot switch on the systemd-nspawn
65 command line. This option may not be combined with ProcessTwo=yes.
66 This option is specified by default in the systemd-nspawn@.service
67 template unit.
68
69 Ephemeral=
70 Takes a boolean argument, which defaults to off, If enabled, the
71 container is run with a temporary snapshot of its file system that
72 is removed immediately when the container terminates. This is
73 equivalent to the --ephemeral command line switch. See systemd-
74 nspawn(1) for details about the specific options supported.
75
76 ProcessTwo=
77 Takes a boolean argument, which defaults to off. If enabled, the
78 specified program is run as PID 2. A stub init process is run as
79 PID 1. This setting corresponds to the --as-pid2 switch on the
80 systemd-nspawn command line. This option may not be combined with
81 Boot=yes.
82
83 Parameters=
84 Takes a whitespace-separated list of arguments. Single ("'") and
85 double (""") quotes may be used around arguments with whitespace.
86 This is either a command line, beginning with the binary name to
87 execute, or – if Boot= is enabled – the list of arguments to pass
88 to the init process. This setting corresponds to the command line
89 parameters passed on the systemd-nspawn command line.
90
91 Note: Boot=no, Parameters=a b "c c" is the same as systemd-nspawn a
92 b "c c", and Boot=yes, Parameters=b 'c c' is the same as
93 systemd-nspawn --boot b 'c c'.
94
95 Environment=
96 Takes an environment variable assignment consisting of key and
97 value, separated by "=". Sets an environment variable for the main
98 process invoked in the container. This setting may be used multiple
99 times to set multiple environment variables. It corresponds to the
100 --setenv= command line switch.
101
102 User=
103 Takes a UNIX user name. Specifies the user name to invoke the main
104 process of the container as. This user must be known in the
105 container's user database. This corresponds to the --user= command
106 line switch.
107
108 WorkingDirectory=
109 Selects the working directory for the process invoked in the
110 container. Expects an absolute path in the container's file system
111 namespace. This corresponds to the --chdir= command line switch.
112
113 PivotRoot=
114 Selects a directory to pivot to / inside the container when
115 starting up. Takes a single path, or a pair of two paths separated
116 by a colon. Both paths must be absolute, and are resolved in the
117 container's file system namespace. This corresponds to the
118 --pivot-root= command line switch.
119
120 Capability=, DropCapability=
121 Takes a space-separated list of Linux process capabilities (see
122 capabilities(7) for details). The Capability= setting specifies
123 additional capabilities to pass on top of the default set of
124 capabilities. The DropCapability= setting specifies capabilities to
125 drop from the default set. These settings correspond to the
126 --capability= and --drop-capability= command line switches. Note
127 that Capability= is a privileged setting, and only takes effect in
128 .nspawn files in /etc/systemd/nspawn/ and /run/system/nspawn/ (see
129 above). On the other hand, DropCapability= takes effect in all
130 cases. If the special value "all" is passed, all capabilities are
131 retained (or dropped).
132
133 These settings change the bounding set of capabilities which also
134 limits the ambient capabilities as given with the
135 AmbientCapability=.
136
137 AmbientCapability=
138 Takes a space-separated list of Linux process capabilities (see
139 capabilities(7) for details). The AmbientCapability= setting
140 specifies capability which will be passed to the started program in
141 the inheritable and ambient capability sets. This will grant these
142 capabilities to this process. This setting correspond to the
143 --ambient-capability= command line switch.
144
145 The value "all" is not supported for this setting.
146
147 The setting of AmbientCapability= must be covered by the bounding
148 set settings which were established by Capability= and
149 DropCapability=.
150
151 Note that AmbientCapability= is a privileged setting (see above).
152
153 NoNewPrivileges=
154 Takes a boolean argument that controls the PR_SET_NO_NEW_PRIVS flag
155 for the container payload. This is equivalent to the
156 --no-new-privileges= command line switch. See systemd-nspawn(1) for
157 details.
158
159 KillSignal=
160 Specify the process signal to send to the container's PID 1 when
161 nspawn itself receives SIGTERM, in order to trigger an orderly
162 shutdown of the container. Defaults to SIGRTMIN+3 if Boot= is used
163 (on systemd-compatible init systems SIGRTMIN+3 triggers an orderly
164 shutdown). For a list of valid signals, see signal(7).
165
166 Personality=
167 Configures the kernel personality for the container. This is
168 equivalent to the --personality= switch.
169
170 MachineID=
171 Configures the 128-bit machine ID (UUID) to pass to the container.
172 This is equivalent to the --uuid= command line switch. This option
173 is privileged (see above).
174
175 PrivateUsers=
176 Configures support for usernamespacing. This is equivalent to the
177 --private-users= command line switch, and takes the same options.
178 This option is privileged (see above). This option is the default
179 if the systemd-nspawn@.service template unit file is used.
180
181 NotifyReady=
182 Configures support for notifications from the container's init
183 process. This is equivalent to the --notify-ready= command line
184 switch, and takes the same parameters. See systemd-nspawn(1) for
185 details about the specific options supported.
186
187 SystemCallFilter=
188 Configures the system call filter applied to containers. This is
189 equivalent to the --system-call-filter= command line switch, and
190 takes the same list parameter. See systemd-nspawn(1) for details.
191
192 LimitCPU=, LimitFSIZE=, LimitDATA=, LimitSTACK=, LimitCORE=, LimitRSS=,
193 LimitNOFILE=, LimitAS=, LimitNPROC=, LimitMEMLOCK=, LimitLOCKS=,
194 LimitSIGPENDING=, LimitMSGQUEUE=, LimitNICE=, LimitRTPRIO=,
195 LimitRTTIME=
196 Configures various types of resource limits applied to containers.
197 This is equivalent to the --rlimit= command line switch, and takes
198 the same arguments. See systemd-nspawn(1) for details.
199
200 OOMScoreAdjust=
201 Configures the OOM score adjustment value. This is equivalent to
202 the --oom-score-adjust= command line switch, and takes the same
203 argument. See systemd-nspawn(1) for details.
204
205 CPUAffinity=
206 Configures the CPU affinity. This is equivalent to the
207 --cpu-affinity= command line switch, and takes the same argument.
208 See systemd-nspawn(1) for details.
209
210 Hostname=
211 Configures the kernel hostname set for the container. This is
212 equivalent to the --hostname= command line switch, and takes the
213 same argument. See systemd-nspawn(1) for details.
214
215 ResolvConf=
216 Configures how /etc/resolv.conf in the container shall be handled.
217 This is equivalent to the --resolv-conf= command line switch, and
218 takes the same argument. See systemd-nspawn(1) for details.
219
220 Timezone=
221 Configures how /etc/localtime in the container shall be handled.
222 This is equivalent to the --timezone= command line switch, and
223 takes the same argument. See systemd-nspawn(1) for details.
224
225 LinkJournal=
226 Configures how to link host and container journal setups. This is
227 equivalent to the --link-journal= command line switch, and takes
228 the same parameter. See systemd-nspawn(1) for details.
229
231 Settings files may include a [Files] section, which carries various
232 parameters configuring the file system of the container:
233
234 ReadOnly=
235 Takes a boolean argument, which defaults to off. If specified, the
236 container will be run with a read-only file system. This setting
237 corresponds to the --read-only command line switch.
238
239 Volatile=
240 Takes a boolean argument, or the special value "state". This
241 configures whether to run the container with volatile state and/or
242 configuration. This option is equivalent to --volatile=, see
243 systemd-nspawn(1) for details about the specific options supported.
244
245 Bind=, BindReadOnly=
246 Adds a bind mount from the host into the container. Takes a single
247 path, a pair of two paths separated by a colon, or a triplet of two
248 paths plus an option string separated by colons. This option may be
249 used multiple times to configure multiple bind mounts. This option
250 is equivalent to the command line switches --bind= and --bind-ro=,
251 see systemd-nspawn(1) for details about the specific options
252 supported. This setting is privileged (see above).
253
254 BindUser=
255 Binds a user from the host into the container. This option is
256 equivalent to the command line switch --bind-user=, see systemd-
257 nspawn(1) for details about the specific options supported. This
258 setting is privileged (see above).
259
260 TemporaryFileSystem=
261 Adds a "tmpfs" mount to the container. Takes a path or a pair of
262 path and option string, separated by a colon. This option may be
263 used multiple times to configure multiple "tmpfs" mounts. This
264 option is equivalent to the command line switch --tmpfs=, see
265 systemd-nspawn(1) for details about the specific options supported.
266 This setting is privileged (see above).
267
268 Inaccessible=
269 Masks the specified file or directory in the container, by
270 over-mounting it with an empty file node of the same type with the
271 most restrictive access mode. Takes a file system path as argument.
272 This option may be used multiple times to mask multiple files or
273 directories. This option is equivalent to the command line switch
274 --inaccessible=, see systemd-nspawn(1) for details about the
275 specific options supported. This setting is privileged (see above).
276
277 Overlay=, OverlayReadOnly=
278 Adds an overlay mount point. Takes a colon-separated list of paths.
279 This option may be used multiple times to configure multiple
280 overlay mounts. This option is equivalent to the command line
281 switches --overlay= and --overlay-ro=, see systemd-nspawn(1) for
282 details about the specific options supported. This setting is
283 privileged (see above).
284
285 PrivateUsersOwnership=
286 Configures whether the ownership of the files and directories in
287 the container tree shall be adjusted to the UID/GID range used, if
288 necessary and user namespacing is enabled. This is equivalent to
289 the --private-users-ownership= command line switch. This option is
290 privileged (see above).
291
293 Settings files may include a [Network] section, which carries various
294 parameters configuring the network connectivity of the container:
295
296 Private=
297 Takes a boolean argument, which defaults to off. If enabled, the
298 container will run in its own network namespace and not share
299 network interfaces and configuration with the host. This setting
300 corresponds to the --private-network command line switch.
301
302 VirtualEthernet=
303 Takes a boolean argument. Configures whether to create a virtual
304 Ethernet connection ("veth") between host and the container. This
305 setting implies Private=yes. This setting corresponds to the
306 --network-veth command line switch. This option is privileged (see
307 above). This option is the default if the systemd-nspawn@.service
308 template unit file is used.
309
310 VirtualEthernetExtra=
311 Takes a colon-separated pair of interface names. Configures an
312 additional virtual Ethernet connection ("veth") between host and
313 the container. The first specified name is the interface name on
314 the host, the second the interface name in the container. The
315 latter may be omitted in which case it is set to the same name as
316 the host side interface. This setting implies Private=yes. This
317 setting corresponds to the --network-veth-extra= command line
318 switch, and maybe be used multiple times. It is independent of
319 VirtualEthernet=. Note that this option is unrelated to the Bridge=
320 setting below, and thus any connections created this way are not
321 automatically added to any bridge device on the host side. This
322 option is privileged (see above).
323
324 Interface=
325 Takes a space-separated list of interfaces to add to the container.
326 This option corresponds to the --network-interface= command line
327 switch and implies Private=yes. This option is privileged (see
328 above).
329
330 MACVLAN=, IPVLAN=
331 Takes a space-separated list of interfaces to add MACLVAN or IPVLAN
332 interfaces to, which are then added to the container. These options
333 correspond to the --network-macvlan= and --network-ipvlan= command
334 line switches and imply Private=yes. These options are privileged
335 (see above).
336
337 Bridge=
338 Takes an interface name. This setting implies VirtualEthernet=yes
339 and Private=yes and has the effect that the host side of the
340 created virtual Ethernet link is connected to the specified bridge
341 interface. This option corresponds to the --network-bridge= command
342 line switch. This option is privileged (see above).
343
344 Zone=
345 Takes a network zone name. This setting implies VirtualEthernet=yes
346 and Private=yes and has the effect that the host side of the
347 created virtual Ethernet link is connected to an automatically
348 managed bridge interface named after the passed argument, prefixed
349 with "vz-". This option corresponds to the --network-zone= command
350 line switch. This option is privileged (see above).
351
352 Port=
353 Exposes a TCP or UDP port of the container on the host. This option
354 corresponds to the --port= command line switch, see systemd-
355 nspawn(1) for the precise syntax of the argument this option takes.
356 This option is privileged (see above).
357
359 systemd(1), systemd-nspawn(1), systemd.directives(7)
360
361
362
363systemd 249 SYSTEMD.NSPAWN(5)