Guest User

Untitled

a guest
Jan 20th, 2018
72
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.66 KB | None | 0 0
  1. {
  2. "ociVersion": "1.0.0",
  3. "process": {
  4. "terminal": true,
  5. "user": {
  6. "uid": 0,
  7. "gid": 0
  8. },
  9. "args": [
  10. "sh"
  11. ],
  12. "env": [
  13. "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
  14. "TERM=xterm"
  15. ],
  16. "cwd": "/",
  17. "capabilities": {
  18. "bounding": [
  19. "CAP_CHOWN",
  20. "CAP_DAC_OVERRIDE",
  21. "CAP_FSETID",
  22. "CAP_FOWNER",
  23. "CAP_MKNOD",
  24. "CAP_NET_RAW",
  25. "CAP_SETGID",
  26. "CAP_SETUID",
  27. "CAP_SETFCAP",
  28. "CAP_SETPCAP",
  29. "CAP_NET_BIND_SERVICE",
  30. "CAP_SYS_CHROOT",
  31. "CAP_KILL",
  32. "CAP_AUDIT_WRITE"
  33. ],
  34. "effective": [
  35. "CAP_CHOWN",
  36. "CAP_DAC_OVERRIDE",
  37. "CAP_FSETID",
  38. "CAP_FOWNER",
  39. "CAP_MKNOD",
  40. "CAP_NET_RAW",
  41. "CAP_SETGID",
  42. "CAP_SETUID",
  43. "CAP_SETFCAP",
  44. "CAP_SETPCAP",
  45. "CAP_NET_BIND_SERVICE",
  46. "CAP_SYS_CHROOT",
  47. "CAP_KILL",
  48. "CAP_AUDIT_WRITE"
  49. ],
  50. "inheritable": [
  51. "CAP_CHOWN",
  52. "CAP_DAC_OVERRIDE",
  53. "CAP_FSETID",
  54. "CAP_FOWNER",
  55. "CAP_MKNOD",
  56. "CAP_NET_RAW",
  57. "CAP_SETGID",
  58. "CAP_SETUID",
  59. "CAP_SETFCAP",
  60. "CAP_SETPCAP",
  61. "CAP_NET_BIND_SERVICE",
  62. "CAP_SYS_CHROOT",
  63. "CAP_KILL",
  64. "CAP_AUDIT_WRITE"
  65. ],
  66. "permitted": [
  67. "CAP_CHOWN",
  68. "CAP_DAC_OVERRIDE",
  69. "CAP_FSETID",
  70. "CAP_FOWNER",
  71. "CAP_MKNOD",
  72. "CAP_NET_RAW",
  73. "CAP_SETGID",
  74. "CAP_SETUID",
  75. "CAP_SETFCAP",
  76. "CAP_SETPCAP",
  77. "CAP_NET_BIND_SERVICE",
  78. "CAP_SYS_CHROOT",
  79. "CAP_KILL",
  80. "CAP_AUDIT_WRITE"
  81. ],
  82. "ambient": [
  83. "CAP_CHOWN",
  84. "CAP_DAC_OVERRIDE",
  85. "CAP_FSETID",
  86. "CAP_FOWNER",
  87. "CAP_MKNOD",
  88. "CAP_NET_RAW",
  89. "CAP_SETGID",
  90. "CAP_SETUID",
  91. "CAP_SETFCAP",
  92. "CAP_SETPCAP",
  93. "CAP_NET_BIND_SERVICE",
  94. "CAP_SYS_CHROOT",
  95. "CAP_KILL",
  96. "CAP_AUDIT_WRITE"
  97. ]
  98. },
  99. "rlimits": [
  100. {
  101. "type": "RLIMIT_NOFILE",
  102. "hard": 1024,
  103. "soft": 1024
  104. }
  105. ],
  106. "noNewPrivileges": true
  107. },
  108. "root": {
  109. "path": "rootfs",
  110. "readonly": false
  111. },
  112. "hostname": "runc",
  113. "mounts": [
  114. {
  115. "destination": "/proc",
  116. "type": "proc",
  117. "source": "proc"
  118. },
  119. {
  120. "destination": "/dev",
  121. "type": "tmpfs",
  122. "source": "tmpfs",
  123. "options": [
  124. "nosuid",
  125. "strictatime",
  126. "mode=755",
  127. "size=65536k"
  128. ]
  129. },
  130. {
  131. "destination": "/dev/pts",
  132. "type": "devpts",
  133. "source": "devpts",
  134. "options": [
  135. "nosuid",
  136. "noexec",
  137. "newinstance",
  138. "ptmxmode=0666",
  139. "mode=0620",
  140. "gid=5"
  141. ]
  142. },
  143. {
  144. "destination": "/dev/shm",
  145. "type": "tmpfs",
  146. "source": "shm",
  147. "options": [
  148. "nosuid",
  149. "noexec",
  150. "nodev",
  151. "mode=1777",
  152. "size=65536k"
  153. ]
  154. },
  155. {
  156. "destination": "/dev/mqueue",
  157. "type": "mqueue",
  158. "source": "mqueue",
  159. "options": [
  160. "nosuid",
  161. "noexec",
  162. "nodev"
  163. ]
  164. },
  165. {
  166. "destination": "/sys",
  167. "type": "sysfs",
  168. "source": "sysfs",
  169. "options": [
  170. "nosuid",
  171. "noexec",
  172. "nodev",
  173. "ro"
  174. ]
  175. },
  176. {
  177. "destination": "/sys/fs/cgroup",
  178. "type": "cgroup",
  179. "source": "cgroup",
  180. "options": [
  181. "nosuid",
  182. "noexec",
  183. "nodev",
  184. "relatime",
  185. "ro"
  186. ]
  187. }
  188. ],
  189. "linux": {
  190. "resources": {
  191. "devices": [
  192. {
  193. "allow": false,
  194. "access": "rwm"
  195. }
  196. ]
  197. },
  198. "namespaces": [
  199. {
  200. "type": "pid"
  201. },
  202. {
  203. "type": "ipc"
  204. },
  205. {
  206. "type": "uts"
  207. },
  208. {
  209. "type": "mount"
  210. }
  211. ],
  212. "maskedPaths": [
  213. "/proc/kcore",
  214. "/proc/latency_stats",
  215. "/proc/timer_list",
  216. "/proc/timer_stats",
  217. "/proc/sched_debug",
  218. "/sys/firmware",
  219. "/proc/scsi"
  220. ],
  221. "readonlyPaths": [
  222. "/proc/asound",
  223. "/proc/bus",
  224. "/proc/fs",
  225. "/proc/irq",
  226. "/proc/sys",
  227. "/proc/sysrq-trigger"
  228. ]
  229. }
  230. }
Add Comment
Please, Sign In to add comment