Blame config.json.template
|
|
3663f96 |
{
|
|
|
3663f96 |
"ociVersion": "1.0.0",
|
|
|
3663f96 |
"platform": {
|
|
|
3663f96 |
"os": "linux",
|
|
|
3663f96 |
"arch": "amd64"
|
|
|
3663f96 |
},
|
|
|
3663f96 |
"process": {
|
|
|
3663f96 |
"terminal": false,
|
|
|
3663f96 |
"user": {
|
|
|
3663f96 |
"uid": 994,
|
|
|
3663f96 |
"gid": 996
|
|
|
3663f96 |
},
|
|
|
3663f96 |
"args": [
|
|
|
3663f96 |
"/usr/bin/kube-controller-manager-docker.sh"
|
|
|
3663f96 |
],
|
|
|
3663f96 |
"env": [
|
|
|
3663f96 |
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
|
|
|
3663f96 |
"TERM=xterm"
|
|
|
3663f96 |
],
|
|
|
3663f96 |
"cwd": "/",
|
|
|
3663f96 |
"capabilities": {
|
|
|
3663f96 |
"bounding": [
|
|
|
3663f96 |
"CAP_AUDIT_WRITE",
|
|
|
3663f96 |
"CAP_KILL",
|
|
|
3663f96 |
"CAP_NET_BIND_SERVICE",
|
|
|
3663f96 |
"CAP_DAC_READ_SEARCH"
|
|
|
3663f96 |
],
|
|
|
3663f96 |
"permitted": [
|
|
|
3663f96 |
"CAP_AUDIT_WRITE",
|
|
|
3663f96 |
"CAP_KILL",
|
|
|
3663f96 |
"CAP_NET_BIND_SERVICE",
|
|
|
3663f96 |
"CAP_DAC_READ_SEARCH"
|
|
|
3663f96 |
],
|
|
|
3663f96 |
"inheritable": [
|
|
|
3663f96 |
"CAP_AUDIT_WRITE",
|
|
|
3663f96 |
"CAP_KILL",
|
|
|
3663f96 |
"CAP_NET_BIND_SERVICE",
|
|
|
3663f96 |
"CAP_DAC_READ_SEARCH"
|
|
|
3663f96 |
],
|
|
|
3663f96 |
"effective": [
|
|
|
3663f96 |
"CAP_AUDIT_WRITE",
|
|
|
3663f96 |
"CAP_KILL",
|
|
|
3663f96 |
"CAP_NET_BIND_SERVICE",
|
|
|
3663f96 |
"CAP_DAC_READ_SEARCH"
|
|
|
3663f96 |
],
|
|
|
3663f96 |
"ambient": [
|
|
|
3663f96 |
"CAP_AUDIT_WRITE",
|
|
|
3663f96 |
"CAP_KILL",
|
|
|
3663f96 |
"CAP_NET_BIND_SERVICE",
|
|
|
3663f96 |
"CAP_DAC_READ_SEARCH"
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
"rlimits": [
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"type": "RLIMIT_NOFILE",
|
|
|
3663f96 |
"hard": 1024,
|
|
|
3663f96 |
"soft": 1024
|
|
|
3663f96 |
}
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
"root": {
|
|
|
3663f96 |
"path": "rootfs",
|
|
|
3663f96 |
"readonly": true
|
|
|
3663f96 |
},
|
|
|
3663f96 |
"mounts": [
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"destination": "/proc",
|
|
|
3663f96 |
"type": "proc",
|
|
|
3663f96 |
"source": "proc"
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"destination": "/dev",
|
|
|
3663f96 |
"type": "tmpfs",
|
|
|
3663f96 |
"source": "tmpfs",
|
|
|
3663f96 |
"options": [
|
|
|
3663f96 |
"nosuid",
|
|
|
3663f96 |
"strictatime",
|
|
|
3663f96 |
"mode=755",
|
|
|
3663f96 |
"size=65536k"
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"destination": "/dev/pts",
|
|
|
3663f96 |
"type": "devpts",
|
|
|
3663f96 |
"source": "devpts",
|
|
|
3663f96 |
"options": [
|
|
|
3663f96 |
"nosuid",
|
|
|
3663f96 |
"noexec",
|
|
|
3663f96 |
"newinstance",
|
|
|
3663f96 |
"ptmxmode=0666",
|
|
|
3663f96 |
"mode=0620",
|
|
|
3663f96 |
"gid=5"
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"destination": "/dev/shm",
|
|
|
3663f96 |
"type": "tmpfs",
|
|
|
3663f96 |
"source": "shm",
|
|
|
3663f96 |
"options": [
|
|
|
3663f96 |
"nosuid",
|
|
|
3663f96 |
"noexec",
|
|
|
3663f96 |
"nodev",
|
|
|
3663f96 |
"mode=1777",
|
|
|
3663f96 |
"size=65536k"
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"destination": "/dev/mqueue",
|
|
|
3663f96 |
"type": "mqueue",
|
|
|
3663f96 |
"source": "mqueue",
|
|
|
3663f96 |
"options": [
|
|
|
3663f96 |
"nosuid",
|
|
|
3663f96 |
"noexec",
|
|
|
3663f96 |
"nodev"
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"destination": "/sys",
|
|
|
3663f96 |
"type": "sysfs",
|
|
|
3663f96 |
"source": "sysfs",
|
|
|
3663f96 |
"options": [
|
|
|
3663f96 |
"nosuid",
|
|
|
3663f96 |
"noexec",
|
|
|
3663f96 |
"nodev"
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"destination": "/sys/fs/cgroup",
|
|
|
3663f96 |
"type": "cgroup",
|
|
|
3663f96 |
"source": "cgroup",
|
|
|
3663f96 |
"options": [
|
|
|
3663f96 |
"nosuid",
|
|
|
3663f96 |
"noexec",
|
|
|
3663f96 |
"nodev",
|
|
|
3663f96 |
"relatime",
|
|
|
3663f96 |
"ro"
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"type": "bind",
|
|
|
3663f96 |
"source": "/etc/kubernetes",
|
|
|
3663f96 |
"destination": "/etc/kubernetes",
|
|
|
3663f96 |
"options": [
|
|
|
3663f96 |
"rbind",
|
|
|
3663f96 |
"ro",
|
|
|
3663f96 |
"rprivate"
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"destination": "/etc/resolv.conf",
|
|
|
3663f96 |
"type": "bind",
|
|
|
3663f96 |
"source": "/etc/resolv.conf",
|
|
|
3663f96 |
"options": [
|
|
|
3663f96 |
"ro",
|
|
|
3663f96 |
"rbind",
|
|
|
3663f96 |
"rprivate"
|
|
|
3663f96 |
]
|
|
|
3663f96 |
}
|
|
|
3663f96 |
],
|
|
|
3663f96 |
"linux": {
|
|
|
3663f96 |
"resources": {
|
|
|
3663f96 |
"devices": [
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"allow": false,
|
|
|
3663f96 |
"access": "rwm"
|
|
|
3663f96 |
}
|
|
|
3663f96 |
]
|
|
|
3663f96 |
},
|
|
|
3663f96 |
"namespaces": [
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"type": "pid"
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"type": "ipc"
|
|
|
3663f96 |
},
|
|
|
3663f96 |
{
|
|
|
3663f96 |
"type": "mount"
|
|
|
3663f96 |
}
|
|
|
3663f96 |
],
|
|
|
3663f96 |
"devices": null,
|
|
|
3663f96 |
"apparmorProfile": "",
|
|
|
3663f96 |
"selinuxProcessLabel": ""
|
|
|
3663f96 |
}
|
|
|
3663f96 |
}
|