Config 2
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"ociVersion": "1.0.0", | |
"process": { | |
"terminal": true, | |
"user": { | |
"uid": 0, | |
"gid": 0 | |
}, | |
"args": [ | |
"/docker-entrypoint.sh", | |
"nginx", | |
"-g", | |
"daemon off;" | |
], | |
"env": [ | |
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", | |
"TERM=xterm", | |
"NGINX_VERSION=1.21.0", | |
"NJS_VERSION=0.5.3", | |
"PKG_RELEASE=1~buster", | |
"HOME=/root" | |
], | |
"cwd": "/", | |
"capabilities": { | |
"bounding": [ | |
"CAP_AUDIT_WRITE", | |
"CAP_DAC_OVERRIDE", | |
"CAP_NET_RAW", | |
"CAP_MKNOD", | |
"CAP_SYS_CHROOT", | |
"CAP_KILL", | |
"CAP_CHOWN", | |
"CAP_SETGID", | |
"CAP_SETUID", | |
"CAP_NET_BIND_SERVICE" | |
], | |
"effective": [ | |
"CAP_AUDIT_WRITE", | |
"CAP_DAC_OVERRIDE", | |
"CAP_NET_RAW", | |
"CAP_MKNOD", | |
"CAP_SYS_CHROOT", | |
"CAP_KILL", | |
"CAP_CHOWN", | |
"CAP_SETGID", | |
"CAP_SETUID", | |
"CAP_NET_BIND_SERVICE" | |
], | |
"inheritable": [ | |
"CAP_AUDIT_WRITE", | |
"CAP_DAC_OVERRIDE", | |
"CAP_NET_RAW", | |
"CAP_MKNOD", | |
"CAP_SYS_CHROOT", | |
"CAP_KILL", | |
"CAP_CHOWN", | |
"CAP_SETGID", | |
"CAP_SETUID", | |
"CAP_NET_BIND_SERVICE" | |
], | |
"permitted": [ | |
"CAP_AUDIT_WRITE", | |
"CAP_DAC_OVERRIDE", | |
"CAP_NET_RAW", | |
"CAP_MKNOD", | |
"CAP_SYS_CHROOT", | |
"CAP_KILL", | |
"CAP_CHOWN", | |
"CAP_SETGID", | |
"CAP_SETUID", | |
"CAP_NET_BIND_SERVICE" | |
], | |
"ambient": [ | |
"CAP_AUDIT_WRITE", | |
"CAP_DAC_OVERRIDE", | |
"CAP_NET_RAW", | |
"CAP_MKNOD", | |
"CAP_SYS_CHROOT", | |
"CAP_KILL", | |
"CAP_CHOWN", | |
"CAP_SETGID", | |
"CAP_SETUID", | |
"CAP_NET_BIND_SERVICE" | |
] | |
}, | |
"rlimits": [ | |
{ | |
"type": "RLIMIT_NOFILE", | |
"hard": 1024, | |
"soft": 1024 | |
} | |
], | |
"noNewPrivileges": true | |
}, | |
"root": { | |
"path": "rootfs" | |
}, | |
"hostname": "umoci-default", | |
"mounts": [ | |
{ | |
"destination": "/proc", | |
"type": "proc", | |
"source": "proc" | |
}, | |
{ | |
"destination": "/dev", | |
"type": "tmpfs", | |
"source": "tmpfs", | |
"options": [ | |
"nosuid", | |
"strictatime", | |
"mode=755", | |
"size=65536k" | |
] | |
}, | |
{ | |
"destination": "/dev/pts", | |
"type": "devpts", | |
"source": "devpts", | |
"options": [ | |
"nosuid", | |
"noexec", | |
"newinstance", | |
"ptmxmode=0666", | |
"mode=0620", | |
"gid=5" | |
] | |
}, | |
{ | |
"destination": "/dev/shm", | |
"type": "tmpfs", | |
"source": "shm", | |
"options": [ | |
"nosuid", | |
"noexec", | |
"nodev", | |
"mode=1777", | |
"size=65536k" | |
] | |
}, | |
{ | |
"destination": "/dev/mqueue", | |
"type": "mqueue", | |
"source": "mqueue", | |
"options": [ | |
"nosuid", | |
"noexec", | |
"nodev" | |
] | |
}, | |
{ | |
"destination": "/sys", | |
"type": "sysfs", | |
"source": "sysfs", | |
"options": [ | |
"nosuid", | |
"noexec", | |
"nodev", | |
"ro" | |
] | |
}, | |
{ | |
"destination": "/sys/fs/cgroup", | |
"type": "cgroup", | |
"source": "cgroup", | |
"options": [ | |
"nosuid", | |
"noexec", | |
"nodev", | |
"relatime", | |
"ro" | |
] | |
} | |
], | |
"annotations": { | |
"maintainer": "NGINX Docker Maintainers \u003cdocker-maint@nginx.com\u003e", | |
"org.opencontainers.image.architecture": "amd64", | |
"org.opencontainers.image.author": "", | |
"org.opencontainers.image.created": "2021-05-25T15:43:43.382480482Z", | |
"org.opencontainers.image.exposedPorts": "80/tcp", | |
"org.opencontainers.image.os": "linux", | |
"org.opencontainers.image.stopSignal": "SIGQUIT" | |
}, | |
"linux": { | |
"resources": { | |
"devices": [ | |
{ | |
"allow": false, | |
"access": "rwm" | |
} | |
] | |
}, | |
"namespaces": [ | |
{ | |
"type": "pid" | |
}, | |
{ | |
"type": "network" | |
}, | |
{ | |
"type": "ipc" | |
}, | |
{ | |
"type": "uts" | |
}, | |
{ | |
"type": "mount" | |
} | |
], | |
"maskedPaths": [ | |
"/proc/kcore", | |
"/proc/latency_stats", | |
"/proc/timer_list", | |
"/proc/timer_stats", | |
"/proc/sched_debug", | |
"/sys/firmware", | |
"/proc/scsi" | |
], | |
"readonlyPaths": [ | |
"/proc/asound", | |
"/proc/bus", | |
"/proc/fs", | |
"/proc/irq", | |
"/proc/sys", | |
"/proc/sysrq-trigger" | |
] | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment