profile
viewpoint
Kir Kolyshkin kolyshkin Red Hat East Renton Highlands, WA, USA

kolyshkin/docker-volume-ploop 6

Docker volume plugin supporting Virtuozzo Storage and ploop

kolyshkin/Amass 0

In-depth Attack Surface Mapping and Asset Discovery

kolyshkin/arduino-builder 0

A command line tool for compiling Arduino sketches

kolyshkin/Arduino_STM32 0

Arduino STM32. Hardware files to support STM32 boards, on Arduino IDE 1.8.x including LeafLabs Maple and other generic STM32F103 boards

kolyshkin/asciidoctor 0

:gem: A fast, open source text processor and publishing toolchain, written in Ruby, for converting AsciiDoc content to HTML 5, DocBook 5, and other formats.

kolyshkin/binc 0

Binc data interchange format

kolyshkin/blackfriday 0

Blackfriday: a markdown processor for Go

kolyshkin/buildah 0

A tool that facilitates building OCI images

kolyshkin/certificate-transparency-go 0

Auditing for TLS certificates, Go code.

issue closeddocker/for-linux

Slow to access google cloud storage

<!-- This issue tracker is for bug reports and feature requests. For questions, and getting help on using docker:

  • Docker documentation - https://docs.docker.com
  • Docker Forums - https://forums.docker.com
  • Docker community Slack - https://dockercommunity.slack.com/ (register here: http://dockr.ly/community)
  • Post a question on StackOverflow, using the Docker tag -->
  • [x] This is a bug report
  • [ ] This is a feature request
  • [ ] I searched existing issues before opening this one

<!-- DO NOT report security issues publicly! If you suspect you discovered a security issue, send your report privately to security@docker.com. -->

Question

I run the docker container on my local host. It is slow to access the google cloud storage about 10Mbps, but the host server accesses the cloud in 100Mbps. The container has 10x slower. Appreciate it if anyone has ideas about this problem.

<!-- Describe the exact steps to reproduce. If possible, provide a minimum reproduction example; take into account that others do not have access to your private images, source code, and environment.

REMOVE SENSITIVE DATA BEFORE POSTING (replace those parts with "REDACTED") -->

Output of docker version:

Client: Docker Engine - Community
 Version:           19.03.0
 API version:       1.40
 Go version:        go1.12.5
 Git commit:        aeac9490dc
 Built:             Wed Jul 17 18:15:40 2019
 OS/Arch:           linux/amd64
 Experimental:      false

Server: Docker Engine - Community
 Engine:
  Version:          19.03.0
  API version:      1.40 (minimum version 1.12)
  Go version:       go1.12.5
  Git commit:       aeac9490dc
  Built:            Wed Jul 17 18:14:16 2019
  OS/Arch:          linux/amd64
  Experimental:     false
 containerd:
  Version:          1.2.6
  GitCommit:        894b81a4b802e4eb2a91d1ce216b8817763c29fb
 nvidia:
  Version:          1.0.0-rc8
  GitCommit:        425e105d5a03fabd737a126ad93d62a9eeede87f
 docker-init:
  Version:          0.18.0
  GitCommit:        fec3683

Output of docker info:

Server:
 Server Version: 19.03.0
 Storage Driver: overlay2
  Backing Filesystem: xfs
  Supports d_type: true
  Native Overlay Diff: true
 Logging Driver: json-file
 Cgroup Driver: cgroupfs
 Plugins:
  Volume: local
  Network: bridge host ipvlan macvlan null overlay
  Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog
 Swarm: active
 Kernel Version: 3.10.0-957.12.2.el7.x86_64
 Operating System: CentOS Linux 7 (Core)
 OSType: linux
 Architecture: x86_64```

**Additional environment details (AWS, VirtualBox, physical, etc.)**

closed time in an hour

MikeChenfu

issue commentdocker/for-linux

Permission denied to read disk

Same issue here. Broken on Ubuntu 20.04

andreisusanu

comment created time in 4 hours

issue commentdocker/for-linux

Issue not solved, but closed

Well, I suspect that closed issues are not monitored by the maintainers. At least I cannot see any further progress/interest here. So I was not sure how else to raise attention to this topic.

If you have a suggestion, I will take that into account in future.

Regards, Hendrik

henfri

comment created time in 5 hours

issue openedopencontainers/runc

Cannot run SCHED_FIFO process inside runc

I was trying to run a SCHED_FIFO process inside the container. I was able to achieve that by adding "CAP_SYS_NICE" to the capabilities in config.json file on my XPS 13 laptop running ubuntu 18.04. However, I did the same on Raspberry Pi 3B running Raspbian stretch 4.14. But here inside runc it does not have the permission to set real-time scheduler for the process. I tried to use "CAP_SYS_ADMIN" but it didn't work either.

Here's how I set the container up:

docker export $(docker create ubuntu:18.04) | tar -C rootfs -xvf -
cp fifo_process rootfs
runc spec
# add CAP_SYS_NICE to config.json file
sudo runc run mycontainer

I did meet some problems trying to install runc on Raspberry Pi. Instead of following the normal make procedure, I have to give up some build tag so that it can build successfully. And when using sudo make install for runc, it will install but report make: go: Command not found though golang is definitely installed.

go get github.com/opencontainers/runc
cd $GOPATH/src/github.com/opencontainers/runc
make BUILDTAGS=""
sudo make install

I tried to build runc the same way without build tags on my laptop and it didn't affect it's ability to run fifo process.

Any help is appreciated. Thank you.

created time in 9 hours

issue commentopencontainers/runc

support seccomp flags such as SECCOMP_FILTER_FLAG_SPEC_ALLOW (OCI Runtime Spec v1.0.2)

libseccomp v2.4.3 which is the latest release does not include SCMP_FLTATR_CTL_SSB crun does not use libseccomp but runc uses it. We need to wait for next release of libseccomp.

AkihiroSuda

comment created time in 10 hours

issue commentopencontainers/runc

support seccomp flags such as SECCOMP_FILTER_FLAG_SPEC_ALLOW (OCI Runtime Spec v1.0.2)

@AkihiroSuda I think https://github.com/seccomp/libseccomp-golang needs to support SECCOMP_FILTER_FLAG_SPEC_ALLOW at first.I'll create the issue in https://github.com/seccomp/libseccomp-golang

In addition to that, we may need to consider disabling IBPB/STIBP if the goal of this issue is to improve the performance impact on bytecode interpreters.Below is the related commit from enroot. https://github.com/NVIDIA/enroot/commit/1f0c9cef797d8be41ccf3066a81b8ae7a9415af0#diff-0cfa9b5d3d6e047420d58d5cb1836a40R172

AkihiroSuda

comment created time in 10 hours

release opencontainers/selinux

v1.5.2

released time in 12 hours

created tagopencontainers/selinux

tagv1.5.2

common selinux implementation

created time in 12 hours

push eventopencontainers/selinux

Daniel J Walsh

commit sha c688bba66d7ecb448819836b96f9c416da8b0746

Bump to v1.5.2 Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>

view details

Daniel J Walsh

commit sha ef4c1be6a7d2a4120048e381648eba55b77a0470

Move to v1.5.3-dev Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>

view details

Daniel J Walsh

commit sha 8b15b5a6ef167759368799b5affde390ef14e018

Merge pull request #99 from rhatdan/version Bump to v1.5.2

view details

push time in 12 hours

PR merged opencontainers/selinux

Bump to v1.5.2
+1 -1

0 comment

1 changed file

rhatdan

pr closed time in 12 hours

PR opened opencontainers/selinux

Bump to v1.5.2
+1 -1

0 comment

1 changed file

pr created time in 12 hours

issue openedopencontainers/runc

support seccomp flags such as SECCOMP_FILTER_FLAG_SPEC_ALLOW (OCI Runtime Spec v1.0.2)

OCI Runtime Spec v1.0.2 supports specifying three seccomp flags: SECCOMP_FILTER_FLAG_TSYNC, SECCOMP_FILTER_FLAG_LOG, and SECCOMP_FILTER_FLAG_SPEC_ALLOW (https://github.com/opencontainers/runtime-spec/commit/d1ef109cd0b39239ff82c267df314f7ed2da576b). However, these flags are currently unimplemented by runc (but implemented by crun).

Notably we should support SECCOMP_FILTER_FLAG_SPEC_ALLOW (Disable Speculative Store Bypass mitigation, since Linux 4.17). The mitigation is enabled by default when a seccomp profile is specified and has serious performance impact on bytecode interpreters including Ruby and Python.

http://mamememo.blogspot.com/2020/05/cpu-intensive-rubypython-code-runs.html

On the host:

$ ruby -ve 't = Time.now; i=0;while i<100_000_000;i+=1;end; puts "#{ Time.now - t } sec"'
ruby 2.7.1p83 (2020-03-31 revision a0c7c23c9c) [x86_64-linux]
1.321703922 sec

On a Docker container:

$ docker run -it --rm ruby:2.7 ruby -ve 't = Time.now; i=0;while i<100_000_000;i+=1;end; puts "#{ Time.now - t } sec"'
ruby 2.7.1p83 (2020-03-31 revision a0c7c23c9c) [x86_64-linux]
2.452876383 sec

If you specify an option "--security-opt seccomp=unconfined" for docker run command, it runs as fast as the host.

$ docker run --security-opt seccomp=unconfined -it --rm ruby:2.7 ruby -ve 't = Time.now; i=0;while i<100_000_000;i+=1;end; puts "#{ Time.now - t } sec"'
 ruby 2.7.1p83 (2020-03-31 revision a0c7c23c9c) [x86_64-linux]
 1.333669449 sec

created time in 12 hours

push eventopencontainers/selinux

Daniel J Walsh

commit sha 6c21d6d7d890ea9e0424dadd3dff9e8f5e1fddb0

Remote potential race condition, where mcs label is freed Theorectially if you do not change the MCS Label then we free it and two commands later reserve it. If some other process was grabbing MCS Labels at the same time, the other process could get the same label. Now we only release the label, if we have changed the MCSlevel. Coverity was complaining about the selinux.GetEnabled() not being checked. Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>

view details

Daniel J Walsh

commit sha d8b4de9116cd823603abad7626f8d01f4675dfe7

Merge pull request #98 from rhatdan/Makefile Remote potential race condition, where mcs label is freed

view details

push time in 12 hours

PR merged opencontainers/selinux

Remote potential race condition, where mcs label is freed

Theorectially if you do not change the MCS Label then we free it and two commands later reserve it. If some other process was grabbing MCS Labels at the same time, the other process could get the same label.

Now we only release the label, if we have changed the MCSlevel.

Coverity was complaining about the selinux.GetEnabled() not being checked.

Signed-off-by: Daniel J Walsh dwalsh@redhat.com

+11 -6

2 comments

2 changed files

rhatdan

pr closed time in 12 hours

issue commentdocker/for-linux

Permission denied to read disk

I have removed docker 18 and tried docker 19, from snap store, with the same results. here we are on docker 19:

Ahm, yes, I think there's issues with the snap installs. Those are built and maintained by Canonical, so I don't think we'd be able to help with those. If possible, I'd recommend trying to install the official packages instead (https://docs.docker.com/engine/install/ubuntu/).

Let me close this ticket because of the above, but feel free to continue the conversation

I has similar issue, couldn't build images. Seems like error was with snap install. I installed again using official repo, worked like charm.

andreisusanu

comment created time in 15 hours

issue commentdocker/for-linux

Issue not solved, but closed

commenting on the issue instead of making a whole new issue?

henfri

comment created time in 15 hours

pull request commentopencontainers/runc

Cpu quota fixes

The indentation seems broken. Other parts look good.

kolyshkin

comment created time in 15 hours

issue commentdocker/for-linux

Issue not solved, but closed

What alternative do you propose?

henfri

comment created time in 15 hours

Pull request review commentopencontainers/runc

Cpu quota fixes

 EOF     check_systemd_value "TasksMax" 20 } -@test "update cgroup v1 cpu limits" {-    [[ "$ROOTLESS" -ne 0 ]] && requires rootless_cgroup-    requires cgroups_v1+function check_cpu_quota() {+	local quota=$1+	local period=$2+	local sd_quota=$3++	if [ "$CGROUP_UNIFIED" = "yes" ]; then+		if [ "$quota" = "-1" ]; then+			quota="max"+		fi+		check_cgroup_value "cpu.max" "$quota $period"+		check_systemd_value "CPUQuotaPerSecUSec" $sd_quota+	else+		check_cgroup_value "cpu.cfs_quota_us" $quota+		check_cgroup_value "cpu.cfs_period_us" $period+		# no systemd support in v1+	fi+} -    # run a few busyboxes detached-    runc run -d --console-socket $CONSOLE_SOCKET test_update-    [ "$status" -eq 0 ]+function check_cpu_shares() {+	local shares=$1++	if [ "$CGROUP_UNIFIED" = "yes" ]; then+		local weight=$((1 + ((shares - 2) * 9999) / 262142))+		check_cgroup_value "cpu.weight" $weight+		check_systemd_value "CPUWeight" $weight+	else+		check_cgroup_value "cpu.shares" $shares+		check_systemd_value "CPUShares" $shares+	fi+} -    # check that initial values were properly set-    check_cgroup_value "cpu.cfs_period_us" 1000000-    check_cgroup_value "cpu.cfs_quota_us" 500000-    check_systemd_value "CPUQuotaPerSecUSec" 500ms+@test "update cgroup cpu limits" {+	[[ "$ROOTLESS" -ne 0 ]] && requires rootless_cgroup -    check_cgroup_value "cpu.shares" 100-    check_systemd_value "CPUShares" 100+	# run a few busyboxes detached+	runc run -d --console-socket $CONSOLE_SOCKET test_update+	[ "$status" -eq 0 ] -    # systemd driver does not allow to update quota and period separately-    if [ -z "$RUNC_USE_SYSTEMD" ]; then-        # update cpu period-        runc update test_update --cpu-period 900000-        [ "$status" -eq 0 ]-        check_cgroup_value "cpu.cfs_period_us" 900000+	# check that initial values were properly set+	check_cpu_quota 500000 1000000 "500ms"+	check_cpu_shares 100++	# updating cpu period alone is not allowed+	runc update test_update --cpu-period 900000+	[ "$status" -eq 1 ] -        # update cpu quota-        runc update test_update --cpu-quota 600000+	# update cpu quota+	runc update test_update --cpu-quota 600000+	[ "$status" -eq 0 ]+	check_cpu_quota 600000 1000000 "600ms"++        # remove cpu quota

nit: indent

kolyshkin

comment created time in 15 hours

issue commentdocker/for-linux

DNS Not Resolving under Network [CentOS8]

@lfiraza That's work! Thank you very mush. <3

arpadgabor

comment created time in 15 hours

pull request commentopencontainers/runc

libct/cgroups/utils: fix/separate cgroupv1 code

LGTM

kolyshkin

comment created time in 15 hours

issue commentdocker/for-linux

Issue not solved, but closed

i don't think this should be here

henfri

comment created time in 15 hours

issue openeddocker/for-linux

error when running dockerd

<!-- This issue tracker is for bug reports and feature requests. For questions, and getting help on using docker:

  • Docker documentation - https://docs.docker.com
  • Docker Forums - https://forums.docker.com
  • Docker community Slack - https://dockercommunity.slack.com/ (register here: http://dockr.ly/community)
  • Post a question on StackOverflow, using the Docker tag -->
  • [x] This is a bug report
  • [ ] This is a feature request
  • [x] I searched existing issues before opening this one

<!-- DO NOT report security issues publicly! If you suspect you discovered a security issue, send your report privately to security@docker.com. -->

Expected behavior

for the docker daemon to be running

Actual behavior

crashes, heres the log

Steps to reproduce the behavior

run dockerd (probably just my laptop)

Output of docker version:

Client:
 Version:           19.03.9-ce
 API version:       1.40
 Go version:        go1.14.3
 Git commit:        9d988398e7
 Built:             Tue May 19 22:11:18 2020
 OS/Arch:           linux/amd64
 Experimental:      false
Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Get "http://%2Fvar%2Frun%2Fdocker.soc: dial unix /var/run/docker.sock: connect: permission denied

Output of docker info:

Client:
 Debug Mode: false

Server:
ERROR: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Get "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/info": dial unix /var/run/docker.sock: connect: permission denied
errors pretty printing info

Additional environment details (AWS, VirtualBox, physical, etc.) I am running Arch Linux, heres my uname -a output: Linux no 5.6.13-arch1-1 #1 SMP PREEMPT Thu, 14 May 2020 06:52:53 +0000 x86_64 GNU/Linux

created time in 15 hours

issue commentdocker/for-linux

could you tell me the reason why does the container exit with code 139?

Hello @GitSoftwareNow,

This article will explain you a bit what exit code 139 means: https://medium.com/better-programming/understanding-docker-container-exit-codes-5ee79a1d58f6. You might need to enable anbox debug logs to have more details about what happens before that segfault. Also, as your issue is specific to anbox, you might find more help by asking to anbox community :wink:

GitSoftwareNow

comment created time in 16 hours

push eventopencontainers/runc

lifubang

commit sha a67dab0ac2dd3829858e35ba643613a1e358ba87

Revert "CreateCgroupPath: only enable needed controllers" 1. Partially revert "CreateCgroupPath: only enable needed controllers" If we update a resource which did not limited in the beginning, it will have no effective. 2. Returns err if we use an non enabled controller, or else the user may feel success, but actually there are no effective. Signed-off-by: lifubang <lifubang@acmcoder.com>

view details

lifubang

commit sha 275157193cf9e739a53e1be9973f9bb85d1e4129

add testcase for enable all supported controllers in cgroupv2 Signed-off-by: lifubang <lifubang@acmcoder.com>

view details

Akihiro Suda

commit sha 7673bee6bfbc28c8cfbc64165eea29b83e9957f0

Merge pull request #2395 from lifubang/updateCgroupv2 Partially revert "CreateCgroupPath: only enable needed controllers"

view details

push time in 18 hours

PR merged opencontainers/runc

Partially revert "CreateCgroupPath: only enable needed controllers"

fix #2394

  1. Partially revert "CreateCgroupPath: only enable needed controllers" Because if we update a resource which did not limited in the beginning, it will have no effective.
  2. Returns err if we use an non enabled controller, or else the user may feel success, but actually there are no effective.

For #2367 , I think we don't need fully revert https://github.com/opencontainers/runc/commit/4b4bc995ad4ee4679ffbe38f1672be01c24256fc , because rootless need some part in it to check errors.

Signed-off-by: lifubang lifubang@acmcoder.com

+65 -69

11 comments

3 changed files

lifubang

pr closed time in 18 hours

issue closedopencontainers/runc

`runc update` broken in cgroup v2

If we update a resource which did not limited in the beginning, it will have no effective. For example: We use default config.json to create a container, and then run:

runc update --cpu-quota 1 test
runc update --cpuset-cpus 1 test

It has no error input, but actually it has no effective.

closed time in 18 hours

lifubang

issue openeddocker/for-linux

could you tell me the reason why does the container exit with code 139?

docker inspect 9fe1ca121488 [ { "Id": "9fe1ca121488962834bd736cc6f6ae4865725f692b83a308884bc6a0f858ea5c", "Created": "2020-05-25T03:36:31.996101656Z", "Path": "/anbox-init.sh", "Args": [], "State": { "Status": "exited", "Running": false, "Paused": false, "Restarting": false, "OOMKilled": false, "Dead": false, "Pid": 0, "ExitCode": 139, "Error": "", "StartedAt": "2020-05-25T03:36:32.962399129Z", "FinishedAt": "2020-05-25T03:36:32.992004756Z" }, "Image": "sha256:d4be56c2e73b7ed1da1515ce4c885bd1cb24a1ae4cea79339fe44c8c4c3f8c1e", "ResolvConfPath": "/var/lib/docker/containers/9fe1ca121488962834bd736cc6f6ae4865725f692b83a308884bc6a0f858ea5c/resolv.conf", "HostnamePath": "/var/lib/docker/containers/9fe1ca121488962834bd736cc6f6ae4865725f692b83a308884bc6a0f858ea5c/hostname", "HostsPath": "/var/lib/docker/containers/9fe1ca121488962834bd736cc6f6ae4865725f692b83a308884bc6a0f858ea5c/hosts", "LogPath": "/var/lib/docker/containers/9fe1ca121488962834bd736cc6f6ae4865725f692b83a308884bc6a0f858ea5c/9fe1ca121488962834bd736cc6f6ae4865725f692b83a308884bc6a0f858ea5c-json.log", "Name": "/pedantic_sinoussi", "RestartCount": 0, "Driver": "overlay2", "Platform": "linux", "MountLabel": "", "ProcessLabel": "", "AppArmorProfile": "", "ExecIDs": null, "HostConfig": { "Binds": null, "ContainerIDFile": "", "LogConfig": { "Type": "json-file", "Config": {} }, "NetworkMode": "default", "PortBindings": {}, "RestartPolicy": { "Name": "no", "MaximumRetryCount": 0 }, "AutoRemove": false, "VolumeDriver": "", "VolumesFrom": null, "CapAdd": null, "CapDrop": null, "Dns": [], "DnsOptions": [], "DnsSearch": [], "ExtraHosts": null, "GroupAdd": null, "IpcMode": "shareable", "Cgroup": "", "Links": null, "OomScoreAdj": 0, "PidMode": "", "Privileged": false, "PublishAllPorts": false, "ReadonlyRootfs": false, "SecurityOpt": null, "UTSMode": "", "UsernsMode": "", "ShmSize": 67108864, "Runtime": "runc", "ConsoleSize": [ 0, 0 ], "Isolation": "", "CpuShares": 0, "Memory": 0, "NanoCpus": 0, "CgroupParent": "", "BlkioWeight": 0, "BlkioWeightDevice": [], "BlkioDeviceReadBps": null, "BlkioDeviceWriteBps": null, "BlkioDeviceReadIOps": null, "BlkioDeviceWriteIOps": null, "CpuPeriod": 0, "CpuQuota": 0, "CpuRealtimePeriod": 0, "CpuRealtimeRuntime": 0, "CpusetCpus": "", "CpusetMems": "", "Devices": [], "DeviceCgroupRules": null, "DiskQuota": 0, "KernelMemory": 0, "MemoryReservation": 0, "MemorySwap": 0, "MemorySwappiness": null, "OomKillDisable": false, "PidsLimit": 0, "Ulimits": null, "CpuCount": 0, "CpuPercent": 0, "IOMaximumIOps": 0, "IOMaximumBandwidth": 0 }, "GraphDriver": { "Data": { "LowerDir": "/var/lib/docker/overlay2/86d6d56582338dbda0dbcb7ddde19013b74c67e2c9ebe6910700ba5981839435-init/diff:/var/lib/docker/overlay2/21c3335b85a964b0ce3acf2e8a41033aadab2117d6ee4f2cd15aee3f36e59a8e/diff", "MergedDir": "/var/lib/docker/overlay2/86d6d56582338dbda0dbcb7ddde19013b74c67e2c9ebe6910700ba5981839435/merged", "UpperDir": "/var/lib/docker/overlay2/86d6d56582338dbda0dbcb7ddde19013b74c67e2c9ebe6910700ba5981839435/diff", "WorkDir": "/var/lib/docker/overlay2/86d6d56582338dbda0dbcb7ddde19013b74c67e2c9ebe6910700ba5981839435/work" }, "Name": "overlay2" }, "Mounts": [], "Config": { "Hostname": "9fe1ca121488", "Domainname": "", "User": "", "AttachStdin": false, "AttachStdout": false, "AttachStderr": false, "Tty": true, "OpenStdin": true, "StdinOnce": false, "Env": null, "Cmd": [ "/anbox-init.sh" ], "Image": "android:latest", "Volumes": null, "WorkingDir": "", "Entrypoint": null, "OnBuild": null, "Labels": {} }, "NetworkSettings": { "Bridge": "", "SandboxID": "8cd6043b8b0f9f84f1847e8371e91a614ad38e5c160b19dacf618c641651551d", "HairpinMode": false, "LinkLocalIPv6Address": "", "LinkLocalIPv6PrefixLen": 0, "Ports": {}, "SandboxKey": "/var/run/docker/netns/8cd6043b8b0f", "SecondaryIPAddresses": null, "SecondaryIPv6Addresses": null, "EndpointID": "", "Gateway": "", "GlobalIPv6Address": "", "GlobalIPv6PrefixLen": 0, "IPAddress": "", "IPPrefixLen": 0, "IPv6Gateway": "", "MacAddress": "", "Networks": { "bridge": { "IPAMConfig": null, "Links": null, "Aliases": null, "NetworkID": "a7b89d6e768d3f52aab73b46546656f0056bc621b1cd54ba1563f0d08b98e93e", "EndpointID": "", "Gateway": "", "IPAddress": "", "IPPrefixLen": 0, "IPv6Gateway": "", "GlobalIPv6Address": "", "GlobalIPv6PrefixLen": 0, "MacAddress": "", "DriverOpts": null } } } } ]

created time in 18 hours

more