-
-
Save thehajime/450bddd34052d43067cc742fbd7a4317 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| root@kind-control-plane:/# ctr -n k8s.io c info de310650a741c6439fd47fa38f77bc58de04294bda645a5061f820b10f8a603f | |
| { | |
| "ID": "de310650a741c6439fd47fa38f77bc58de04294bda645a5061f820b10f8a603f", | |
| "Labels": { | |
| "io.cri-containerd.kind": "container", | |
| "io.kubernetes.container.name": "helloworld-runu", | |
| "io.kubernetes.pod.name": "helloworld-runu-5bdf77696c-sbkm2", | |
| "io.kubernetes.pod.namespace": "default", | |
| "io.kubernetes.pod.uid": "06a08edc-6ad6-452b-9211-8461a8af0fff" | |
| }, | |
| "Image": "docker.io/thehajime/runu-base:0.3", | |
| "Runtime": { | |
| "Name": "io.containerd.runtime.v1.linux", | |
| "Options": { | |
| "type_url": "containerd.linux.runc.RuncOptions", | |
| "value": "Cg0vdXNyL2Jpbi9ydW51" | |
| } | |
| }, | |
| "SnapshotKey": "de310650a741c6439fd47fa38f77bc58de04294bda645a5061f820b10f8a603f", | |
| "Snapshotter": "overlayfs", | |
| "CreatedAt": "2020-08-07T05:26:12.547763823Z", | |
| "UpdatedAt": "2020-08-07T05:26:12.547763823Z", | |
| "Extensions": { | |
| "io.cri-containerd.container.metadata": { | |
| "type_url": "github.com/containerd/cri/pkg/store/container/Metadata", | |
| "value": "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" | |
| } | |
| }, | |
| "Spec": { | |
| "ociVersion": "1.0.1-dev", | |
| "process": { | |
| "user": { | |
| "uid": 0, | |
| "gid": 0 | |
| }, | |
| "args": [ | |
| "ping", | |
| "-c", | |
| "50", | |
| "8.8.8.8" | |
| ], | |
| "env": [ | |
| "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", | |
| "HOSTNAME=helloworld-runu-5bdf77696c-sbkm2", | |
| "RUMP_VERBOSE=1", | |
| "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", | |
| "KUBERNETES_SERVICE_HOST=10.96.0.1", | |
| "KUBERNETES_SERVICE_PORT=443", | |
| "KUBERNETES_SERVICE_PORT_HTTPS=443", | |
| "KUBERNETES_PORT=tcp://10.96.0.1:443", | |
| "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", | |
| "KUBERNETES_PORT_443_TCP_PROTO=tcp", | |
| "KUBERNETES_PORT_443_TCP_PORT=443" | |
| ], | |
| "cwd": "/", | |
| "capabilities": { | |
| "bounding": [ | |
| "CAP_CHOWN", | |
| "CAP_DAC_OVERRIDE", | |
| "CAP_FSETID", | |
| "CAP_FOWNER", | |
| "CAP_MKNOD", | |
| "CAP_NET_RAW", | |
| "CAP_SETGID", | |
| "CAP_SETUID", | |
| "CAP_SETFCAP", | |
| "CAP_SETPCAP", | |
| "CAP_NET_BIND_SERVICE", | |
| "CAP_SYS_CHROOT", | |
| "CAP_KILL", | |
| "CAP_AUDIT_WRITE" | |
| ], | |
| "effective": [ | |
| "CAP_CHOWN", | |
| "CAP_DAC_OVERRIDE", | |
| "CAP_FSETID", | |
| "CAP_FOWNER", | |
| "CAP_MKNOD", | |
| "CAP_NET_RAW", | |
| "CAP_SETGID", | |
| "CAP_SETUID", | |
| "CAP_SETFCAP", | |
| "CAP_SETPCAP", | |
| "CAP_NET_BIND_SERVICE", | |
| "CAP_SYS_CHROOT", | |
| "CAP_KILL", | |
| "CAP_AUDIT_WRITE" | |
| ], | |
| "inheritable": [ | |
| "CAP_CHOWN", | |
| "CAP_DAC_OVERRIDE", | |
| "CAP_FSETID", | |
| "CAP_FOWNER", | |
| "CAP_MKNOD", | |
| "CAP_NET_RAW", | |
| "CAP_SETGID", | |
| "CAP_SETUID", | |
| "CAP_SETFCAP", | |
| "CAP_SETPCAP", | |
| "CAP_NET_BIND_SERVICE", | |
| "CAP_SYS_CHROOT", | |
| "CAP_KILL", | |
| "CAP_AUDIT_WRITE" | |
| ], | |
| "permitted": [ | |
| "CAP_CHOWN", | |
| "CAP_DAC_OVERRIDE", | |
| "CAP_FSETID", | |
| "CAP_FOWNER", | |
| "CAP_MKNOD", | |
| "CAP_NET_RAW", | |
| "CAP_SETGID", | |
| "CAP_SETUID", | |
| "CAP_SETFCAP", | |
| "CAP_SETPCAP", | |
| "CAP_NET_BIND_SERVICE", | |
| "CAP_SYS_CHROOT", | |
| "CAP_KILL", | |
| "CAP_AUDIT_WRITE" | |
| ] | |
| }, | |
| "oomScoreAdj": 1000 | |
| }, | |
| "root": { | |
| "path": "rootfs" | |
| }, | |
| "mounts": [ | |
| { | |
| "destination": "/proc", | |
| "type": "proc", | |
| "source": "proc", | |
| "options": [ | |
| "nosuid", | |
| "noexec", | |
| "nodev" | |
| ] | |
| }, | |
| { | |
| "destination": "/dev", | |
| "type": "tmpfs", | |
| "source": "tmpfs", | |
| "options": [ | |
| "nosuid", | |
| "strictatime", | |
| "mode=755", | |
| "size=65536k" | |
| ] | |
| }, | |
| { | |
| "destination": "/dev/pts", | |
| "type": "devpts", | |
| "source": "devpts", | |
| "options": [ | |
| "nosuid", | |
| "noexec", | |
| "newinstance", | |
| "ptmxmode=0666", | |
| "mode=0620", | |
| "gid=5" | |
| ] | |
| }, | |
| { | |
| "destination": "/dev/mqueue", | |
| "type": "mqueue", | |
| "source": "mqueue", | |
| "options": [ | |
| "nosuid", | |
| "noexec", | |
| "nodev" | |
| ] | |
| }, | |
| { | |
| "destination": "/sys", | |
| "type": "sysfs", | |
| "source": "sysfs", | |
| "options": [ | |
| "nosuid", | |
| "noexec", | |
| "nodev", | |
| "ro" | |
| ] | |
| }, | |
| { | |
| "destination": "/sys/fs/cgroup", | |
| "type": "cgroup", | |
| "source": "cgroup", | |
| "options": [ | |
| "nosuid", | |
| "noexec", | |
| "nodev", | |
| "relatime", | |
| "ro" | |
| ] | |
| }, | |
| { | |
| "destination": "/etc/hosts", | |
| "type": "bind", | |
| "source": "/var/lib/kubelet/pods/06a08edc-6ad6-452b-9211-8461a8af0fff/etc-hosts", | |
| "options": [ | |
| "rbind", | |
| "rprivate", | |
| "rw" | |
| ] | |
| }, | |
| { | |
| "destination": "/dev/termination-log", | |
| "type": "bind", | |
| "source": "/var/lib/kubelet/pods/06a08edc-6ad6-452b-9211-8461a8af0fff/containers/helloworld-runu/54a5daee", | |
| "options": [ | |
| "rbind", | |
| "rprivate", | |
| "rw" | |
| ] | |
| }, | |
| { | |
| "destination": "/etc/hostname", | |
| "type": "bind", | |
| "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7c52867af2d8eb45aa1e9367bbb2e783b2153696ca81844103d35b1509658699/hostname", | |
| "options": [ | |
| "rbind", | |
| "rprivate", | |
| "rw" | |
| ] | |
| }, | |
| { | |
| "destination": "/etc/resolv.conf", | |
| "type": "bind", | |
| "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7c52867af2d8eb45aa1e9367bbb2e783b2153696ca81844103d35b1509658699/resolv.conf", | |
| "options": [ | |
| "rbind", | |
| "rprivate", | |
| "rw" | |
| ] | |
| }, | |
| { | |
| "destination": "/dev/shm", | |
| "type": "bind", | |
| "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/7c52867af2d8eb45aa1e9367bbb2e783b2153696ca81844103d35b1509658699/shm", | |
| "options": [ | |
| "rbind", | |
| "rprivate", | |
| "rw" | |
| ] | |
| }, | |
| { | |
| "destination": "/var/run/secrets/kubernetes.io/serviceaccount", | |
| "type": "bind", | |
| "source": "/var/lib/kubelet/pods/06a08edc-6ad6-452b-9211-8461a8af0fff/volumes/kubernetes.io~secret/default-token-ffpx2", | |
| "options": [ | |
| "rbind", | |
| "rprivate", | |
| "ro" | |
| ] | |
| } | |
| ], | |
| "annotations": { | |
| "io.kubernetes.cri.container-type": "container", | |
| "io.kubernetes.cri.sandbox-id": "7c52867af2d8eb45aa1e9367bbb2e783b2153696ca81844103d35b1509658699" | |
| }, | |
| "linux": { | |
| "resources": { | |
| "devices": [ | |
| { | |
| "allow": false, | |
| "access": "rwm" | |
| } | |
| ], | |
| "memory": {}, | |
| "cpu": { | |
| "shares": 2, | |
| "period": 100000 | |
| } | |
| }, | |
| "cgroupsPath": "/kubepods/besteffort/pod06a08edc-6ad6-452b-9211-8461a8af0fff/de310650a741c6439fd47fa38f77bc58de04294bda645a5061f820b10f8a603f", | |
| "namespaces": [ | |
| { | |
| "type": "pid" | |
| }, | |
| { | |
| "type": "ipc", | |
| "path": "/proc/1245/ns/ipc" | |
| }, | |
| { | |
| "type": "uts", | |
| "path": "/proc/1245/ns/uts" | |
| }, | |
| { | |
| "type": "mount" | |
| }, | |
| { | |
| "type": "network", | |
| "path": "/proc/1245/ns/net" | |
| } | |
| ], | |
| "maskedPaths": [ | |
| "/proc/acpi", | |
| "/proc/kcore", | |
| "/proc/keys", | |
| "/proc/latency_stats", | |
| "/proc/timer_list", | |
| "/proc/timer_stats", | |
| "/proc/sched_debug", | |
| "/proc/scsi", | |
| "/sys/firmware" | |
| ], | |
| "readonlyPaths": [ | |
| "/proc/asound", | |
| "/proc/bus", | |
| "/proc/fs", | |
| "/proc/irq", | |
| "/proc/sys", | |
| "/proc/sysrq-trigger" | |
| ] | |
| } | |
| } | |
| } |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment