Blame config.json.template

3663f96
{
3663f96
    "ociVersion": "1.0.0",
3663f96
    "platform": {
3663f96
        "os": "linux",
3663f96
        "arch": "amd64"
3663f96
    },
3663f96
    "process": {
3663f96
        "terminal": false,
3663f96
        "user": {
3663f96
            "uid": 994,
3663f96
            "gid": 996
3663f96
        },
3663f96
        "args": [
3663f96
            "/usr/bin/kube-controller-manager-docker.sh"
3663f96
        ],
3663f96
        "env": [
3663f96
            "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
3663f96
            "TERM=xterm"
3663f96
        ],
3663f96
        "cwd": "/",
3663f96
        "capabilities": {
3663f96
            "bounding": [
3663f96
                "CAP_AUDIT_WRITE",
3663f96
                "CAP_KILL",
3663f96
                "CAP_NET_BIND_SERVICE",
3663f96
                "CAP_DAC_READ_SEARCH"
3663f96
            ],
3663f96
            "permitted": [
3663f96
                "CAP_AUDIT_WRITE",
3663f96
                "CAP_KILL",
3663f96
                "CAP_NET_BIND_SERVICE",
3663f96
                "CAP_DAC_READ_SEARCH"
3663f96
            ],
3663f96
            "inheritable": [
3663f96
                "CAP_AUDIT_WRITE",
3663f96
                "CAP_KILL",
3663f96
                "CAP_NET_BIND_SERVICE",
3663f96
                "CAP_DAC_READ_SEARCH"
3663f96
            ],
3663f96
            "effective": [
3663f96
                "CAP_AUDIT_WRITE",
3663f96
                "CAP_KILL",
3663f96
                "CAP_NET_BIND_SERVICE",
3663f96
                "CAP_DAC_READ_SEARCH"
3663f96
            ],
3663f96
            "ambient": [
3663f96
                "CAP_AUDIT_WRITE",
3663f96
                "CAP_KILL",
3663f96
                "CAP_NET_BIND_SERVICE",
3663f96
                "CAP_DAC_READ_SEARCH"
3663f96
            ]
3663f96
        },
3663f96
        "rlimits": [
3663f96
            {
3663f96
                "type": "RLIMIT_NOFILE",
3663f96
                "hard": 1024,
3663f96
                "soft": 1024
3663f96
            }
3663f96
        ]
3663f96
    },
3663f96
    "root": {
3663f96
        "path": "rootfs",
3663f96
        "readonly": true
3663f96
    },
3663f96
    "mounts": [
3663f96
        {
3663f96
            "destination": "/proc",
3663f96
            "type": "proc",
3663f96
            "source": "proc"
3663f96
        },
3663f96
        {
3663f96
            "destination": "/dev",
3663f96
            "type": "tmpfs",
3663f96
            "source": "tmpfs",
3663f96
            "options": [
3663f96
                "nosuid",
3663f96
                "strictatime",
3663f96
                "mode=755",
3663f96
                "size=65536k"
3663f96
            ]
3663f96
        },
3663f96
        {
3663f96
            "destination": "/dev/pts",
3663f96
            "type": "devpts",
3663f96
            "source": "devpts",
3663f96
            "options": [
3663f96
                "nosuid",
3663f96
                "noexec",
3663f96
                "newinstance",
3663f96
                "ptmxmode=0666",
3663f96
                "mode=0620",
3663f96
                "gid=5"
3663f96
            ]
3663f96
        },
3663f96
        {
3663f96
            "destination": "/dev/shm",
3663f96
            "type": "tmpfs",
3663f96
            "source": "shm",
3663f96
            "options": [
3663f96
                "nosuid",
3663f96
                "noexec",
3663f96
                "nodev",
3663f96
                "mode=1777",
3663f96
                "size=65536k"
3663f96
            ]
3663f96
        },
3663f96
        {
3663f96
            "destination": "/dev/mqueue",
3663f96
            "type": "mqueue",
3663f96
            "source": "mqueue",
3663f96
            "options": [
3663f96
                "nosuid",
3663f96
                "noexec",
3663f96
                "nodev"
3663f96
            ]
3663f96
        },
3663f96
        {
3663f96
            "destination": "/sys",
3663f96
            "type": "sysfs",
3663f96
            "source": "sysfs",
3663f96
            "options": [
3663f96
                "nosuid",
3663f96
                "noexec",
3663f96
                "nodev"
3663f96
            ]
3663f96
        },
3663f96
        {
3663f96
            "destination": "/sys/fs/cgroup",
3663f96
            "type": "cgroup",
3663f96
            "source": "cgroup",
3663f96
            "options": [
3663f96
                "nosuid",
3663f96
                "noexec",
3663f96
                "nodev",
3663f96
                "relatime",
3663f96
                "ro"
3663f96
            ]
3663f96
        },
3663f96
        {
3663f96
            "type": "bind",
3663f96
            "source": "/etc/kubernetes",
3663f96
            "destination": "/etc/kubernetes",
3663f96
            "options": [
3663f96
                "rbind",
3663f96
                "ro",
3663f96
                "rprivate"
3663f96
            ]
3663f96
         },
3663f96
         {
3663f96
            "destination": "/etc/resolv.conf",
3663f96
            "type": "bind",
3663f96
            "source": "/etc/resolv.conf",
3663f96
            "options": [
3663f96
                "ro",
3663f96
                "rbind",
3663f96
                "rprivate"
3663f96
             ]
3663f96
          }
3663f96
    ],
3663f96
    "linux": {
3663f96
        "resources": {
3663f96
            "devices": [
3663f96
                {
3663f96
                    "allow": false,
3663f96
                    "access": "rwm"
3663f96
                }
3663f96
            ]
3663f96
        },
3663f96
        "namespaces": [
3663f96
            {
3663f96
                "type": "pid"
3663f96
            },
3663f96
            {
3663f96
                "type": "ipc"
3663f96
            },
3663f96
            {
3663f96
                "type": "mount"
3663f96
            }
3663f96
        ],
3663f96
        "devices": null,
3663f96
        "apparmorProfile": "",
3663f96
        "selinuxProcessLabel": ""
3663f96
    }
3663f96
}