oci

package
v24.0.2+incompatible Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 25, 2023 License: Apache-2.0 Imports: 10 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func AppendDevicePermissionsFromCgroupRules

func AppendDevicePermissionsFromCgroupRules(devPermissions []specs.LinuxDeviceCgroup, rules []string) ([]specs.LinuxDeviceCgroup, error)

AppendDevicePermissionsFromCgroupRules takes rules for the devices cgroup to append to the default set

func DefaultLinuxSpec

func DefaultLinuxSpec() specs.Spec

DefaultLinuxSpec create a default spec for running Linux containers

func DefaultPathEnv

func DefaultPathEnv(os string) string

DefaultPathEnv is unix style list of directories to search for executables. Each directory is separated from the next by a colon ':' character . For Windows containers, an empty string is returned as the default path will be set by the container, and Docker has no context of what the default path should be.

TODO(thaJeztah) align Windows default with BuildKit; see https://github.com/moby/buildkit/pull/1747 TODO(thaJeztah) use defaults from containerd (but align it with BuildKit; see https://github.com/moby/buildkit/pull/1747)

func DefaultSpec

func DefaultSpec() specs.Spec

DefaultSpec returns the default spec used by docker for the current Platform

func DefaultWindowsSpec

func DefaultWindowsSpec() specs.Spec

DefaultWindowsSpec create a default spec for running Windows containers

func DevicesFromPath

func DevicesFromPath(pathOnHost, pathInContainer, cgroupPermissions string) (devs []specs.LinuxDevice, devPermissions []specs.LinuxDeviceCgroup, err error)

DevicesFromPath computes a list of devices and device permissions from paths (pathOnHost and pathInContainer) and cgroup permissions.

func RemoveNamespace

func RemoveNamespace(s *specs.Spec, nsType specs.LinuxNamespaceType)

RemoveNamespace removes the `nsType` namespace from OCI spec `s`

func SetCapabilities

func SetCapabilities(s *specs.Spec, caplist []string) error

SetCapabilities sets the provided capabilities on the spec All capabilities are added if privileged is true.

Types

This section is empty.

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL