Blame config.json.template

8bf131d
{
8bf131d
    "ociVersion": "1.0.0",
8bf131d
    "platform": {
8bf131d
        "os": "linux",
8bf131d
        "arch": "amd64"
8bf131d
    },
8bf131d
    "process": {
8bf131d
        "terminal": false,
8bf131d
        "user": {},
8bf131d
        "args": [
8bf131d
            "/usr/bin/kubelet-docker.sh"
8bf131d
        ],
8bf131d
        "env": [
8bf131d
            "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
8bf131d
            "TERM=xterm"
8bf131d
        ],
8bf131d
        "noNewPrivileges": false,
8bf131d
        "cwd": "/",
8bf131d
        "capabilities": {
8bf131d
            "bounding": [
8bf131d
                "CAP_CHOWN",
8bf131d
                "CAP_DAC_OVERRIDE",
8bf131d
                "CAP_DAC_READ_SEARCH",
8bf131d
                "CAP_FOWNER",
8bf131d
                "CAP_FSETID",
8bf131d
                "CAP_KILL",
8bf131d
                "CAP_SETGID",
8bf131d
                "CAP_SETUID",
8bf131d
                "CAP_SETPCAP",
8bf131d
                "CAP_LINUX_IMMUTABLE",
8bf131d
                "CAP_NET_BIND_SERVICE",
8bf131d
                "CAP_NET_BROADCAST",
8bf131d
                "CAP_NET_ADMIN",
8bf131d
                "CAP_NET_RAW",
8bf131d
                "CAP_IPC_LOCK",
8bf131d
                "CAP_IPC_OWNER",
8bf131d
                "CAP_SYS_MODULE",
8bf131d
                "CAP_SYS_RAWIO",
8bf131d
                "CAP_SYS_CHROOT",
8bf131d
                "CAP_SYS_PTRACE",
8bf131d
                "CAP_SYS_PACCT",
8bf131d
                "CAP_SYS_ADMIN",
8bf131d
                "CAP_SYS_BOOT",
8bf131d
                "CAP_SYS_NICE",
8bf131d
                "CAP_SYS_RESOURCE",
8bf131d
                "CAP_SYS_TIME",
8bf131d
                "CAP_SYS_TTY_CONFIG",
8bf131d
                "CAP_MKNOD",
8bf131d
                "CAP_LEASE",
8bf131d
                "CAP_AUDIT_WRITE",
8bf131d
                "CAP_AUDIT_CONTROL",
8bf131d
                "CAP_SETFCAP",
8bf131d
                "CAP_MAC_OVERRIDE",
8bf131d
                "CAP_MAC_ADMIN",
8bf131d
                "CAP_SYSLOG",
8bf131d
                "CAP_WAKE_ALARM",
8bf131d
                "CAP_BLOCK_SUSPEND"
8bf131d
            ],
8bf131d
            "permitted": [
8bf131d
                "CAP_CHOWN",
8bf131d
                "CAP_DAC_OVERRIDE",
8bf131d
                "CAP_DAC_READ_SEARCH",
8bf131d
                "CAP_FOWNER",
8bf131d
                "CAP_FSETID",
8bf131d
                "CAP_KILL",
8bf131d
                "CAP_SETGID",
8bf131d
                "CAP_SETUID",
8bf131d
                "CAP_SETPCAP",
8bf131d
                "CAP_LINUX_IMMUTABLE",
8bf131d
                "CAP_NET_BIND_SERVICE",
8bf131d
                "CAP_NET_BROADCAST",
8bf131d
                "CAP_NET_ADMIN",
8bf131d
                "CAP_NET_RAW",
8bf131d
                "CAP_IPC_LOCK",
8bf131d
                "CAP_IPC_OWNER",
8bf131d
                "CAP_SYS_MODULE",
8bf131d
                "CAP_SYS_RAWIO",
8bf131d
                "CAP_SYS_CHROOT",
8bf131d
                "CAP_SYS_PTRACE",
8bf131d
                "CAP_SYS_PACCT",
8bf131d
                "CAP_SYS_ADMIN",
8bf131d
                "CAP_SYS_BOOT",
8bf131d
                "CAP_SYS_NICE",
8bf131d
                "CAP_SYS_RESOURCE",
8bf131d
                "CAP_SYS_TIME",
8bf131d
                "CAP_SYS_TTY_CONFIG",
8bf131d
                "CAP_MKNOD",
8bf131d
                "CAP_LEASE",
8bf131d
                "CAP_AUDIT_WRITE",
8bf131d
                "CAP_AUDIT_CONTROL",
8bf131d
                "CAP_SETFCAP",
8bf131d
                "CAP_MAC_OVERRIDE",
8bf131d
                "CAP_MAC_ADMIN",
8bf131d
                "CAP_SYSLOG",
8bf131d
                "CAP_WAKE_ALARM",
8bf131d
                "CAP_BLOCK_SUSPEND"
8bf131d
            ],
8bf131d
            "inheritable": [
8bf131d
                "CAP_CHOWN",
8bf131d
                "CAP_DAC_OVERRIDE",
8bf131d
                "CAP_DAC_READ_SEARCH",
8bf131d
                "CAP_FOWNER",
8bf131d
                "CAP_FSETID",
8bf131d
                "CAP_KILL",
8bf131d
                "CAP_SETGID",
8bf131d
                "CAP_SETUID",
8bf131d
                "CAP_SETPCAP",
8bf131d
                "CAP_LINUX_IMMUTABLE",
8bf131d
                "CAP_NET_BIND_SERVICE",
8bf131d
                "CAP_NET_BROADCAST",
8bf131d
                "CAP_NET_ADMIN",
8bf131d
                "CAP_NET_RAW",
8bf131d
                "CAP_IPC_LOCK",
8bf131d
                "CAP_IPC_OWNER",
8bf131d
                "CAP_SYS_MODULE",
8bf131d
                "CAP_SYS_RAWIO",
8bf131d
                "CAP_SYS_CHROOT",
8bf131d
                "CAP_SYS_PTRACE",
8bf131d
                "CAP_SYS_PACCT",
8bf131d
                "CAP_SYS_ADMIN",
8bf131d
                "CAP_SYS_BOOT",
8bf131d
                "CAP_SYS_NICE",
8bf131d
                "CAP_SYS_RESOURCE",
8bf131d
                "CAP_SYS_TIME",
8bf131d
                "CAP_SYS_TTY_CONFIG",
8bf131d
                "CAP_MKNOD",
8bf131d
                "CAP_LEASE",
8bf131d
                "CAP_AUDIT_WRITE",
8bf131d
                "CAP_AUDIT_CONTROL",
8bf131d
                "CAP_SETFCAP",
8bf131d
                "CAP_MAC_OVERRIDE",
8bf131d
                "CAP_MAC_ADMIN",
8bf131d
                "CAP_SYSLOG",
8bf131d
                "CAP_WAKE_ALARM",
8bf131d
                "CAP_BLOCK_SUSPEND"
8bf131d
            ],
8bf131d
            "effective": [
8bf131d
                "CAP_CHOWN",
8bf131d
                "CAP_DAC_OVERRIDE",
8bf131d
                "CAP_DAC_READ_SEARCH",
8bf131d
                "CAP_FOWNER",
8bf131d
                "CAP_FSETID",
8bf131d
                "CAP_KILL",
8bf131d
                "CAP_SETGID",
8bf131d
                "CAP_SETUID",
8bf131d
                "CAP_SETPCAP",
8bf131d
                "CAP_LINUX_IMMUTABLE",
8bf131d
                "CAP_NET_BIND_SERVICE",
8bf131d
                "CAP_NET_BROADCAST",
8bf131d
                "CAP_NET_ADMIN",
8bf131d
                "CAP_NET_RAW",
8bf131d
                "CAP_IPC_LOCK",
8bf131d
                "CAP_IPC_OWNER",
8bf131d
                "CAP_SYS_MODULE",
8bf131d
                "CAP_SYS_RAWIO",
8bf131d
                "CAP_SYS_CHROOT",
8bf131d
                "CAP_SYS_PTRACE",
8bf131d
                "CAP_SYS_PACCT",
8bf131d
                "CAP_SYS_ADMIN",
8bf131d
                "CAP_SYS_BOOT",
8bf131d
                "CAP_SYS_NICE",
8bf131d
                "CAP_SYS_RESOURCE",
8bf131d
                "CAP_SYS_TIME",
8bf131d
                "CAP_SYS_TTY_CONFIG",
8bf131d
                "CAP_MKNOD",
8bf131d
                "CAP_LEASE",
8bf131d
                "CAP_AUDIT_WRITE",
8bf131d
                "CAP_AUDIT_CONTROL",
8bf131d
                "CAP_SETFCAP",
8bf131d
                "CAP_MAC_OVERRIDE",
8bf131d
                "CAP_MAC_ADMIN",
8bf131d
                "CAP_SYSLOG",
8bf131d
                "CAP_WAKE_ALARM",
8bf131d
                "CAP_BLOCK_SUSPEND"
8bf131d
            ],
8bf131d
            "ambient": [
8bf131d
                "CAP_CHOWN",
8bf131d
                "CAP_DAC_OVERRIDE",
8bf131d
                "CAP_DAC_READ_SEARCH",
8bf131d
                "CAP_FOWNER",
8bf131d
                "CAP_FSETID",
8bf131d
                "CAP_KILL",
8bf131d
                "CAP_SETGID",
8bf131d
                "CAP_SETUID",
8bf131d
                "CAP_SETPCAP",
8bf131d
                "CAP_LINUX_IMMUTABLE",
8bf131d
                "CAP_NET_BIND_SERVICE",
8bf131d
                "CAP_NET_BROADCAST",
8bf131d
                "CAP_NET_ADMIN",
8bf131d
                "CAP_NET_RAW",
8bf131d
                "CAP_IPC_LOCK",
8bf131d
                "CAP_IPC_OWNER",
8bf131d
                "CAP_SYS_MODULE",
8bf131d
                "CAP_SYS_RAWIO",
8bf131d
                "CAP_SYS_CHROOT",
8bf131d
                "CAP_SYS_PTRACE",
8bf131d
                "CAP_SYS_PACCT",
8bf131d
                "CAP_SYS_ADMIN",
8bf131d
                "CAP_SYS_BOOT",
8bf131d
                "CAP_SYS_NICE",
8bf131d
                "CAP_SYS_RESOURCE",
8bf131d
                "CAP_SYS_TIME",
8bf131d
                "CAP_SYS_TTY_CONFIG",
8bf131d
                "CAP_MKNOD",
8bf131d
                "CAP_LEASE",
8bf131d
                "CAP_AUDIT_WRITE",
8bf131d
                "CAP_AUDIT_CONTROL",
8bf131d
                "CAP_SETFCAP",
8bf131d
                "CAP_MAC_OVERRIDE",
8bf131d
                "CAP_MAC_ADMIN",
8bf131d
                "CAP_SYSLOG",
8bf131d
                "CAP_WAKE_ALARM",
8bf131d
                "CAP_BLOCK_SUSPEND"
8bf131d
            ]
8bf131d
        },
8bf131d
        "rlimits": [
8bf131d
            {
8bf131d
                "type": "RLIMIT_NOFILE",
8bf131d
                "hard": 1024,
8bf131d
                "soft": 1024
8bf131d
            }
8bf131d
        ]
8bf131d
    },
8bf131d
    "root": {
8bf131d
        "path": "rootfs",
8bf131d
        "readonly": true
8bf131d
    },
8bf131d
    "mounts": [
8bf131d
        {
8bf131d
            "destination": "/proc",
8bf131d
            "type": "proc",
8bf131d
            "source": "proc"
8bf131d
        },
8bf131d
        {
8bf131d
            "destination": "/dev",
6f2ac8f
            "type": "bind",
6f2ac8f
            "source": "/dev",
8bf131d
            "options": [
6f2ac8f
                "rbind",
6f2ac8f
                "rslave"
8bf131d
            ]
8bf131d
        },
8bf131d
        {
8bf131d
            "destination": "/dev/pts",
8bf131d
            "type": "devpts",
8bf131d
            "source": "devpts",
8bf131d
            "options": [
8bf131d
                "nosuid",
8bf131d
                "noexec",
8bf131d
                "newinstance",
8bf131d
                "ptmxmode=0666",
8bf131d
                "mode=0620",
8bf131d
                "gid=5"
8bf131d
            ]
8bf131d
        },
8bf131d
        {
8bf131d
            "destination": "/dev/shm",
8bf131d
            "type": "tmpfs",
8bf131d
            "source": "shm",
8bf131d
            "options": [
8bf131d
                "nosuid",
8bf131d
                "noexec",
8bf131d
                "nodev",
8bf131d
                "mode=1777",
8bf131d
                "size=65536k"
8bf131d
            ]
8bf131d
        },
8bf131d
        {
8bf131d
            "destination": "/sys",
8bf131d
            "type": "sysfs",
8bf131d
            "source": "sysfs",
8bf131d
            "options": [
8bf131d
                "nosuid",
8bf131d
                "noexec",
8bf131d
                "nodev"
8bf131d
            ]
8bf131d
        },
8bf131d
        {
8bf131d
            "destination": "/sys/fs/cgroup",
8bf131d
            "type": "cgroup",
8bf131d
            "source": "cgroup",
8bf131d
            "options": [
8bf131d
                "nosuid",
8bf131d
                "noexec",
8bf131d
                "nodev",
8bf131d
                "relatime",
8bf131d
                "ro"
8bf131d
            ]
8bf131d
        },
8bf131d
        {
8bf131d
            "type": "bind",
8bf131d
            "source": "/etc/kubernetes",
8bf131d
            "destination": "/etc/kubernetes",
8bf131d
            "options": [
8bf131d
                "rbind",
8bf131d
                "ro",
8bf131d
                "rprivate"
8bf131d
            ]
8bf131d
         },
8bf131d
         {
8bf131d
            "destination": "/etc/resolv.conf",
8bf131d
            "type": "bind",
8bf131d
            "source": "/etc/resolv.conf",
8bf131d
            "options": [
8bf131d
                "ro",
8bf131d
                "rbind",
8bf131d
                "rprivate"
8bf131d
             ]
8bf131d
          },
8bf131d
          {
8bf131d
            "type": "bind",
8bf131d
            "source": "/",
8bf131d
            "destination": "/rootfs",
8bf131d
            "options": [
8bf131d
                "rbind",
8bf131d
                "rslave",
8bf131d
                "ro"
8bf131d
             ]
8bf131d
          },
8bf131d
          {
8bf131d
            "type": "bind",
8bf131d
            "source": "/var/run/",
8bf131d
            "destination": "/var/run/",
8bf131d
            "options": [
8bf131d
                "rbind",
8bf131d
                "rw",
8bf131d
                "mode=755"
8bf131d
             ]
8bf131d
          },
8bf131d
          {
8bf131d
            "type": "bind",
8bf131d
            "source": "/run",
8bf131d
            "destination": "/run",
8bf131d
            "options": [
8bf131d
                "rbind",
8bf131d
                "rw",
8bf131d
                "mode=755"
8bf131d
             ]
8bf131d
          },
8bf131d
          {
8bf131d
            "type": "bind",
8bf131d
            "source": "/var/lib",
8bf131d
            "destination": "/var/lib",
8bf131d
            "options": [
8bf131d
                "bind",
8bf131d
                "rw",
8bf131d
                "mode=755"
8bf131d
             ]
8bf131d
          },
8bf131d
          {
8bf131d
            "type": "bind",
8bf131d
            "source": "/var/lib/kubelet",
8bf131d
            "destination": "/var/lib/kubelet",
8bf131d
            "options": [
8bf131d
                "rbind",
8bf131d
                "rslave",
8bf131d
                "rw",
8bf131d
                "mode=755"
8bf131d
             ]
8bf131d
          },
8bf131d
          {
8bf131d
            "type": "bind",
8bf131d
            "source": "/var/log",
8bf131d
            "destination": "/var/log",
8bf131d
            "options": [
8bf131d
                "bind",
8bf131d
                "rw",
8bf131d
                "mode=755"
8bf131d
             ]
8bf131d
          }
8bf131d
    ],
8bf131d
    "linux": {
8bf131d
        "rootfsPropagation": "rslave",
8bf131d
        "resources": {
8bf131d
            "devices": [
8bf131d
                {
6f2ac8f
                    "allow": true,
8bf131d
                    "access": "rwm"
8bf131d
                }
8bf131d
            ]
8bf131d
        },
8bf131d
        "namespaces": [
8bf131d
            {
8bf131d
                "type": "mount"
8bf131d
            }
8bf131d
        ],
8bf131d
        "devices": null,
8bf131d
        "apparmorProfile": "",
8bf131d
        "selinuxProcessLabel": ""
8bf131d
    }
8bf131d
}