@@ -36,7 +36,6 @@ import (
3636 imagespec "github.com/opencontainers/image-spec/specs-go/v1"
3737 "github.com/opencontainers/runc/libcontainer/devices"
3838 runtimespec "github.com/opencontainers/runtime-spec/specs-go"
39- "github.com/opencontainers/runtime-tools/generate"
4039 "github.com/opencontainers/runtime-tools/validate"
4140 "github.com/opencontainers/selinux/go-selinux/label"
4241 "github.com/pkg/errors"
@@ -501,7 +500,7 @@ func (c *criService) generateContainerMounts(sandboxID string, config *runtime.C
501500
502501// setOCIProcessArgs sets process args. It returns error if the final arg list
503502// is empty.
504- func setOCIProcessArgs (g * generate. Generator , config * runtime.ContainerConfig , imageConfig * imagespec.ImageConfig ) error {
503+ func setOCIProcessArgs (g * generator , config * runtime.ContainerConfig , imageConfig * imagespec.ImageConfig ) error {
505504 command , args := config .GetCommand (), config .GetArgs ()
506505 // The following logic is migrated from https://github.com/moby/moby/blob/master/daemon/commit.go
507506 // TODO(random-liu): Clearly define the commands overwrite behavior.
@@ -523,7 +522,7 @@ func setOCIProcessArgs(g *generate.Generator, config *runtime.ContainerConfig, i
523522
524523// addImageEnvs adds environment variables from image config. It returns error if
525524// an invalid environment variable is encountered.
526- func addImageEnvs (g * generate. Generator , imageEnvs []string ) error {
525+ func addImageEnvs (g * generator , imageEnvs []string ) error {
527526 for _ , e := range imageEnvs {
528527 kv := strings .SplitN (e , "=" , 2 )
529528 if len (kv ) != 2 {
@@ -534,7 +533,7 @@ func addImageEnvs(g *generate.Generator, imageEnvs []string) error {
534533 return nil
535534}
536535
537- func setOCIPrivileged (g * generate. Generator , config * runtime.ContainerConfig ) error {
536+ func setOCIPrivileged (g * generator , config * runtime.ContainerConfig ) error {
538537 // Add all capabilities in privileged mode.
539538 g .SetupPrivileged (true )
540539 setOCIBindMountsPrivileged (g )
@@ -555,7 +554,7 @@ func clearReadOnly(m *runtimespec.Mount) {
555554}
556555
557556// addDevices set device mapping without privilege.
558- func (c * criService ) addOCIDevices (g * generate. Generator , devs []* runtime.Device ) error {
557+ func (c * criService ) addOCIDevices (g * generator , devs []* runtime.Device ) error {
559558 spec := g .Spec ()
560559 for _ , device := range devs {
561560 path , err := c .os .ResolveSymbolicLink (device .HostPath )
@@ -587,7 +586,7 @@ func (c *criService) addOCIDevices(g *generate.Generator, devs []*runtime.Device
587586}
588587
589588// addDevices set device mapping with privilege.
590- func setOCIDevicesPrivileged (g * generate. Generator ) error {
589+ func setOCIDevicesPrivileged (g * generator ) error {
591590 spec := g .Spec ()
592591 hostDevices , err := devices .HostDevices ()
593592 if err != nil {
@@ -618,7 +617,7 @@ func setOCIDevicesPrivileged(g *generate.Generator) error {
618617}
619618
620619// addOCIBindMounts adds bind mounts.
621- func (c * criService ) addOCIBindMounts (g * generate. Generator , mounts []* runtime.Mount , mountLabel string ) error {
620+ func (c * criService ) addOCIBindMounts (g * generator , mounts []* runtime.Mount , mountLabel string ) error {
622621 // Sort mounts in number of parts. This ensures that high level mounts don't
623622 // shadow other mounts.
624623 sort .Sort (orderedMounts (mounts ))
@@ -713,7 +712,7 @@ func (c *criService) addOCIBindMounts(g *generate.Generator, mounts []*runtime.M
713712 return nil
714713}
715714
716- func setOCIBindMountsPrivileged (g * generate. Generator ) {
715+ func setOCIBindMountsPrivileged (g * generator ) {
717716 spec := g .Spec ()
718717 // clear readonly for /sys and cgroup
719718 for i , m := range spec .Mounts {
@@ -728,8 +727,8 @@ func setOCIBindMountsPrivileged(g *generate.Generator) {
728727 spec .Linux .MaskedPaths = nil
729728}
730729
731- // setOCILinuxResource set container resource limit.
732- func setOCILinuxResource (g * generate. Generator , resources * runtime.LinuxContainerResources ) {
730+ // setOCILinuxResource set container cgroup resource limit.
731+ func setOCILinuxResource (g * generator , resources * runtime.LinuxContainerResources ) {
733732 if resources == nil {
734733 return
735734 }
@@ -755,7 +754,7 @@ func getOCICapabilitiesList() []string {
755754}
756755
757756// setOCICapabilities adds/drops process capabilities.
758- func setOCICapabilities (g * generate. Generator , capabilities * runtime.Capability ) error {
757+ func setOCICapabilities (g * generator , capabilities * runtime.Capability ) error {
759758 if capabilities == nil {
760759 return nil
761760 }
@@ -801,7 +800,7 @@ func setOCICapabilities(g *generate.Generator, capabilities *runtime.Capability)
801800}
802801
803802// setOCINamespaces sets namespaces.
804- func setOCINamespaces (g * generate. Generator , namespaces * runtime.NamespaceOption , sandboxPid uint32 ) {
803+ func setOCINamespaces (g * generator , namespaces * runtime.NamespaceOption , sandboxPid uint32 ) {
805804 g .AddOrReplaceLinuxNamespace (string (runtimespec .NetworkNamespace ), getNetworkNamespace (sandboxPid )) // nolint: errcheck
806805 g .AddOrReplaceLinuxNamespace (string (runtimespec .IPCNamespace ), getIPCNamespace (sandboxPid )) // nolint: errcheck
807806 g .AddOrReplaceLinuxNamespace (string (runtimespec .UTSNamespace ), getUTSNamespace (sandboxPid )) // nolint: errcheck
0 commit comments