@@ -36,7 +36,6 @@ import (
3636 imagespec "github.com/opencontainers/image-spec/specs-go/v1"
3737 "github.com/opencontainers/runc/libcontainer/devices"
3838 runtimespec "github.com/opencontainers/runtime-spec/specs-go"
39- "github.com/opencontainers/runtime-tools/generate"
4039 "github.com/opencontainers/runtime-tools/validate"
4140 "github.com/opencontainers/selinux/go-selinux/label"
4241 "github.com/pkg/errors"
@@ -77,6 +76,7 @@ func init() {
7776// CreateContainer creates a new container in the given PodSandbox.
7877func (c * criService ) CreateContainer (ctx context.Context , r * runtime.CreateContainerRequest ) (_ * runtime.CreateContainerResponse , retErr error ) {
7978 config := r .GetConfig ()
79+ logrus .Debugf ("Container config %+v" , config )
8080 sandboxConfig := r .GetSandboxConfig ()
8181 sandbox , err := c .sandboxStore .Get (r .GetPodSandboxId ())
8282 if err != nil {
@@ -507,7 +507,7 @@ func (c *criService) generateContainerMounts(sandboxID string, config *runtime.C
507507
508508// setOCIProcessArgs sets process args. It returns error if the final arg list
509509// is empty.
510- func setOCIProcessArgs (g * generate. Generator , config * runtime.ContainerConfig , imageConfig * imagespec.ImageConfig ) error {
510+ func setOCIProcessArgs (g * generator , config * runtime.ContainerConfig , imageConfig * imagespec.ImageConfig ) error {
511511 command , args := config .GetCommand (), config .GetArgs ()
512512 // The following logic is migrated from https://github.com/moby/moby/blob/master/daemon/commit.go
513513 // TODO(random-liu): Clearly define the commands overwrite behavior.
@@ -529,7 +529,7 @@ func setOCIProcessArgs(g *generate.Generator, config *runtime.ContainerConfig, i
529529
530530// addImageEnvs adds environment variables from image config. It returns error if
531531// an invalid environment variable is encountered.
532- func addImageEnvs (g * generate. Generator , imageEnvs []string ) error {
532+ func addImageEnvs (g * generator , imageEnvs []string ) error {
533533 for _ , e := range imageEnvs {
534534 kv := strings .SplitN (e , "=" , 2 )
535535 if len (kv ) != 2 {
@@ -540,7 +540,7 @@ func addImageEnvs(g *generate.Generator, imageEnvs []string) error {
540540 return nil
541541}
542542
543- func setOCIPrivileged (g * generate. Generator , config * runtime.ContainerConfig ) error {
543+ func setOCIPrivileged (g * generator , config * runtime.ContainerConfig ) error {
544544 // Add all capabilities in privileged mode.
545545 g .SetupPrivileged (true )
546546 setOCIBindMountsPrivileged (g )
@@ -561,7 +561,7 @@ func clearReadOnly(m *runtimespec.Mount) {
561561}
562562
563563// addDevices set device mapping without privilege.
564- func (c * criService ) addOCIDevices (g * generate. Generator , devs []* runtime.Device ) error {
564+ func (c * criService ) addOCIDevices (g * generator , devs []* runtime.Device ) error {
565565 spec := g .Spec ()
566566 for _ , device := range devs {
567567 path , err := c .os .ResolveSymbolicLink (device .HostPath )
@@ -593,7 +593,7 @@ func (c *criService) addOCIDevices(g *generate.Generator, devs []*runtime.Device
593593}
594594
595595// addDevices set device mapping with privilege.
596- func setOCIDevicesPrivileged (g * generate. Generator ) error {
596+ func setOCIDevicesPrivileged (g * generator ) error {
597597 spec := g .Spec ()
598598 hostDevices , err := devices .HostDevices ()
599599 if err != nil {
@@ -624,7 +624,7 @@ func setOCIDevicesPrivileged(g *generate.Generator) error {
624624}
625625
626626// addOCIBindMounts adds bind mounts.
627- func (c * criService ) addOCIBindMounts (g * generate. Generator , mounts []* runtime.Mount , mountLabel string ) error {
627+ func (c * criService ) addOCIBindMounts (g * generator , mounts []* runtime.Mount , mountLabel string ) error {
628628 // Sort mounts in number of parts. This ensures that high level mounts don't
629629 // shadow other mounts.
630630 sort .Sort (orderedMounts (mounts ))
@@ -719,7 +719,7 @@ func (c *criService) addOCIBindMounts(g *generate.Generator, mounts []*runtime.M
719719 return nil
720720}
721721
722- func setOCIBindMountsPrivileged (g * generate. Generator ) {
722+ func setOCIBindMountsPrivileged (g * generator ) {
723723 spec := g .Spec ()
724724 // clear readonly for /sys and cgroup
725725 for i , m := range spec .Mounts {
@@ -734,8 +734,8 @@ func setOCIBindMountsPrivileged(g *generate.Generator) {
734734 spec .Linux .MaskedPaths = nil
735735}
736736
737- // setOCILinuxResource set container resource limit.
738- func setOCILinuxResource (g * generate. Generator , resources * runtime.LinuxContainerResources ) {
737+ // setOCILinuxResource set container cgroup resource limit.
738+ func setOCILinuxResource (g * generator , resources * runtime.LinuxContainerResources ) {
739739 if resources == nil {
740740 return
741741 }
@@ -761,7 +761,7 @@ func getOCICapabilitiesList() []string {
761761}
762762
763763// setOCICapabilities adds/drops process capabilities.
764- func setOCICapabilities (g * generate. Generator , capabilities * runtime.Capability ) error {
764+ func setOCICapabilities (g * generator , capabilities * runtime.Capability ) error {
765765 if capabilities == nil {
766766 return nil
767767 }
@@ -807,7 +807,7 @@ func setOCICapabilities(g *generate.Generator, capabilities *runtime.Capability)
807807}
808808
809809// setOCINamespaces sets namespaces.
810- func setOCINamespaces (g * generate. Generator , namespaces * runtime.NamespaceOption , sandboxPid uint32 ) {
810+ func setOCINamespaces (g * generator , namespaces * runtime.NamespaceOption , sandboxPid uint32 ) {
811811 g .AddOrReplaceLinuxNamespace (string (runtimespec .NetworkNamespace ), getNetworkNamespace (sandboxPid )) // nolint: errcheck
812812 g .AddOrReplaceLinuxNamespace (string (runtimespec .IPCNamespace ), getIPCNamespace (sandboxPid )) // nolint: errcheck
813813 g .AddOrReplaceLinuxNamespace (string (runtimespec .UTSNamespace ), getUTSNamespace (sandboxPid )) // nolint: errcheck
0 commit comments