Blame config.json.template

c3353fb
{
c3353fb
    "ociVersion": "1.0.0",
c3353fb
    "platform": {
c3353fb
        "os": "linux",
c3353fb
        "arch": "amd64"
c3353fb
    },
c3353fb
    "process": {
c3353fb
        "terminal": false,
c3353fb
        "user": {
51b38c0
            "uid": 996,
51b38c0
            "gid": 994
c3353fb
        },
c3353fb
        "args": [
c3353fb
            "/usr/bin/kube-apiserver-docker.sh"
c3353fb
        ],
c3353fb
        "env": [
c3353fb
            "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
c3353fb
            "TERM=xterm"
c3353fb
        ],
c3353fb
        "cwd": "/",
c3353fb
        "capabilities": {
c3353fb
            "bounding": [
c3353fb
                "CAP_AUDIT_WRITE",
c3353fb
                "CAP_KILL",
c3353fb
                "CAP_NET_BIND_SERVICE",
c3353fb
                "CAP_DAC_READ_SEARCH"
c3353fb
            ],
c3353fb
            "permitted": [
c3353fb
                "CAP_AUDIT_WRITE",
c3353fb
                "CAP_KILL",
c3353fb
                "CAP_NET_BIND_SERVICE",
c3353fb
                "CAP_DAC_READ_SEARCH"
c3353fb
            ],
c3353fb
            "inheritable": [
c3353fb
                "CAP_AUDIT_WRITE",
c3353fb
                "CAP_KILL",
c3353fb
                "CAP_NET_BIND_SERVICE",
c3353fb
                "CAP_DAC_READ_SEARCH"
c3353fb
            ],
c3353fb
            "effective": [
c3353fb
                "CAP_AUDIT_WRITE",
c3353fb
                "CAP_KILL",
c3353fb
                "CAP_NET_BIND_SERVICE",
c3353fb
                "CAP_DAC_READ_SEARCH"
c3353fb
            ],
c3353fb
            "ambient": [
c3353fb
                "CAP_AUDIT_WRITE",
c3353fb
                "CAP_KILL",
c3353fb
                "CAP_NET_BIND_SERVICE",
c3353fb
                "CAP_DAC_READ_SEARCH"
c3353fb
            ]
c3353fb
        },
c3353fb
        "rlimits": [
c3353fb
            {
c3353fb
                "type": "RLIMIT_NOFILE",
c3353fb
                "hard": 1024,
c3353fb
                "soft": 1024
c3353fb
            }
c3353fb
        ]
c3353fb
    },
c3353fb
    "root": {
c3353fb
        "path": "rootfs",
c3353fb
        "readonly": true
c3353fb
    },
c3353fb
    "mounts": [
c3353fb
        {
c3353fb
            "destination": "/proc",
c3353fb
            "type": "proc",
c3353fb
            "source": "proc"
c3353fb
        },
c3353fb
        {
c3353fb
            "destination": "/dev",
c3353fb
            "type": "tmpfs",
c3353fb
            "source": "tmpfs",
c3353fb
            "options": [
c3353fb
                "nosuid",
c3353fb
                "strictatime",
c3353fb
                "mode=755",
c3353fb
                "size=65536k"
c3353fb
            ]
c3353fb
        },
c3353fb
        {
c3353fb
            "destination": "/dev/pts",
c3353fb
            "type": "devpts",
c3353fb
            "source": "devpts",
c3353fb
            "options": [
c3353fb
                "nosuid",
c3353fb
                "noexec",
c3353fb
                "newinstance",
c3353fb
                "ptmxmode=0666",
c3353fb
                "mode=0620",
c3353fb
                "gid=5"
c3353fb
            ]
c3353fb
        },
c3353fb
        {
c3353fb
            "destination": "/dev/shm",
c3353fb
            "type": "tmpfs",
c3353fb
            "source": "shm",
c3353fb
            "options": [
c3353fb
                "nosuid",
c3353fb
                "noexec",
c3353fb
                "nodev",
c3353fb
                "mode=1777",
c3353fb
                "size=65536k"
c3353fb
            ]
c3353fb
        },
c3353fb
        {
c3353fb
            "destination": "/dev/mqueue",
c3353fb
            "type": "mqueue",
c3353fb
            "source": "mqueue",
c3353fb
            "options": [
c3353fb
                "nosuid",
c3353fb
                "noexec",
c3353fb
                "nodev"
c3353fb
            ]
c3353fb
        },
c3353fb
        {
c3353fb
            "destination": "/sys",
c3353fb
            "type": "sysfs",
c3353fb
            "source": "sysfs",
c3353fb
            "options": [
c3353fb
                "nosuid",
c3353fb
                "noexec",
c3353fb
                "nodev"
c3353fb
            ]
c3353fb
        },
c3353fb
        {
c3353fb
            "destination": "/sys/fs/cgroup",
c3353fb
            "type": "cgroup",
c3353fb
            "source": "cgroup",
c3353fb
            "options": [
c3353fb
                "nosuid",
c3353fb
                "noexec",
c3353fb
                "nodev",
c3353fb
                "relatime",
c3353fb
                "ro"
c3353fb
            ]
c3353fb
        },
c3353fb
        {
c3353fb
            "type": "bind",
c3353fb
            "source": "/etc/kubernetes",
c3353fb
            "destination": "/etc/kubernetes",
c3353fb
            "options": [
c3353fb
                "rbind",
c3353fb
                "ro",
c3353fb
                "rprivate"
c3353fb
            ]
c3353fb
         },
c3353fb
         {
c3353fb
            "destination": "/etc/resolv.conf",
c3353fb
            "type": "bind",
c3353fb
            "source": "/etc/resolv.conf",
c3353fb
            "options": [
c3353fb
                "ro",
c3353fb
                "rbind",
c3353fb
                "rprivate"
c3353fb
             ]
51b38c0
          },
51b38c0
          {
51b38c0
            "destination": "/var/run/kubernetes",
51b38c0
            "type": "bind",
51b38c0
            "source": "/var/run/kubernetes",
51b38c0
            "options": [
51b38c0
                "rw",
51b38c0
                "rbind"
51b38c0
             ]
c3353fb
          }
c3353fb
    ],
c3353fb
    "linux": {
c3353fb
        "resources": {
c3353fb
            "devices": [
c3353fb
                {
c3353fb
                    "allow": false,
c3353fb
                    "access": "rwm"
c3353fb
                }
c3353fb
            ]
c3353fb
        },
c3353fb
        "namespaces": [
c3353fb
            {
c3353fb
                "type": "pid"
c3353fb
            },
c3353fb
            {
c3353fb
                "type": "ipc"
c3353fb
            },
c3353fb
            {
c3353fb
                "type": "mount"
c3353fb
            }
c3353fb
        ],
c3353fb
        "devices": null,
c3353fb
        "apparmorProfile": "",
c3353fb
        "selinuxProcessLabel": ""
c3353fb
    }
c3353fb
}