Update runtime-spec to current upstream
runc currently fails to build against the upstream version of
runtime-spec/specs-go.
```
# github.com/opencontainers/runc
./spec.go:189: cannot use specs.Linux literal (type specs.Linux) as type *specs.Linux in field value
```
on account of 63231576ec (diff-7f24d60f0cbb9c433e165467e3d34838R25)
This commit updates the dependency to current runtime-spec master and
fixes the type mismatch.
Fixes #1035
Signed-off-by: Adam Thomason <ad@mthomason.net>
This commit is contained in:
parent
37f1747aec
commit
fcbde0ce9f
|
@ -58,8 +58,8 @@
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"ImportPath": "github.com/opencontainers/runtime-spec/specs-go",
|
"ImportPath": "github.com/opencontainers/runtime-spec/specs-go",
|
||||||
"Comment": "v1.0.0-rc1",
|
"Comment": "v1.0.0-rc1-89-g7a36e7e",
|
||||||
"Rev": "06479209bdc0d4135911688c18157bd39bd99c22"
|
"Rev": "7a36e7ed86ee3b4c6dbcdbd02052ec1ef6787c3c"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"ImportPath": "github.com/seccomp/libseccomp-golang",
|
"ImportPath": "github.com/seccomp/libseccomp-golang",
|
||||||
|
|
44
Godeps/_workspace/src/github.com/opencontainers/runtime-spec/specs-go/config.go
generated
vendored
44
Godeps/_workspace/src/github.com/opencontainers/runtime-spec/specs-go/config.go
generated
vendored
|
@ -4,27 +4,27 @@ import "os"
|
||||||
|
|
||||||
// Spec is the base configuration for the container.
|
// Spec is the base configuration for the container.
|
||||||
type Spec struct {
|
type Spec struct {
|
||||||
// Version is the version of the specification that is supported.
|
// Version of the Open Container Runtime Specification with which the bundle complies.
|
||||||
Version string `json:"ociVersion"`
|
Version string `json:"ociVersion"`
|
||||||
// Platform is the host information for OS and Arch.
|
// Platform specifies the configuration's target platform.
|
||||||
Platform Platform `json:"platform"`
|
Platform Platform `json:"platform"`
|
||||||
// Process is the container's main process.
|
// Process configures the container process.
|
||||||
Process Process `json:"process"`
|
Process Process `json:"process"`
|
||||||
// Root is the root information for the container's filesystem.
|
// Root configures the container's root filesystem.
|
||||||
Root Root `json:"root"`
|
Root Root `json:"root"`
|
||||||
// Hostname is the container's host name.
|
// Hostname configures the container's hostname.
|
||||||
Hostname string `json:"hostname,omitempty"`
|
Hostname string `json:"hostname,omitempty"`
|
||||||
// Mounts profile configuration for adding mounts to the container's filesystem.
|
// Mounts configures additional mounts (on top of Root).
|
||||||
Mounts []Mount `json:"mounts,omitempty"`
|
Mounts []Mount `json:"mounts,omitempty"`
|
||||||
// Hooks are the commands run at various lifecycle events of the container.
|
// Hooks configures callbacks for container lifecycle events.
|
||||||
Hooks Hooks `json:"hooks"`
|
Hooks Hooks `json:"hooks"`
|
||||||
// Annotations is an unstructured key value map that may be set by external tools to store and retrieve arbitrary metadata.
|
// Annotations contains arbitrary metadata for the container.
|
||||||
Annotations map[string]string `json:"annotations,omitempty"`
|
Annotations map[string]string `json:"annotations,omitempty"`
|
||||||
|
|
||||||
// Linux is platform specific configuration for Linux based containers.
|
// Linux is platform specific configuration for Linux based containers.
|
||||||
Linux Linux `json:"linux" platform:"linux,omitempty"`
|
Linux *Linux `json:"linux,omitempty" platform:"linux"`
|
||||||
// Solaris is platform specific configuration for Solaris containers.
|
// Solaris is platform specific configuration for Solaris containers.
|
||||||
Solaris Solaris `json:"solaris" platform:"solaris,omitempty"`
|
Solaris *Solaris `json:"solaris,omitempty" platform:"solaris"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Process contains information to start a specific application inside the container.
|
// Process contains information to start a specific application inside the container.
|
||||||
|
@ -47,21 +47,21 @@ type Process struct {
|
||||||
// NoNewPrivileges controls whether additional privileges could be gained by processes in the container.
|
// NoNewPrivileges controls whether additional privileges could be gained by processes in the container.
|
||||||
NoNewPrivileges bool `json:"noNewPrivileges,omitempty"`
|
NoNewPrivileges bool `json:"noNewPrivileges,omitempty"`
|
||||||
|
|
||||||
// ApparmorProfile specified the apparmor profile for the container. (this field is platform dependent)
|
// ApparmorProfile specifies the apparmor profile for the container. (this field is platform dependent)
|
||||||
ApparmorProfile string `json:"apparmorProfile,omitempty" platform:"linux"`
|
ApparmorProfile string `json:"apparmorProfile,omitempty" platform:"linux"`
|
||||||
// SelinuxLabel specifies the selinux context that the container process is run as. (this field is platform dependent)
|
// SelinuxLabel specifies the selinux context that the container process is run as. (this field is platform dependent)
|
||||||
SelinuxLabel string `json:"selinuxLabel,omitempty" platform:"linux"`
|
SelinuxLabel string `json:"selinuxLabel,omitempty" platform:"linux"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// User specifies Linux specific user and group information for the container's
|
// User specifies Linux/Solaris specific user and group information
|
||||||
// main process.
|
// for the container process.
|
||||||
type User struct {
|
type User struct {
|
||||||
// UID is the user id. (this field is platform dependent)
|
// UID is the user id. (this field is platform dependent)
|
||||||
UID uint32 `json:"uid" platform:"linux"`
|
UID uint32 `json:"uid" platform:"linux,solaris"`
|
||||||
// GID is the group id. (this field is platform dependent)
|
// GID is the group id. (this field is platform dependent)
|
||||||
GID uint32 `json:"gid" platform:"linux"`
|
GID uint32 `json:"gid" platform:"linux,solaris"`
|
||||||
// AdditionalGids are additional group ids set for the container's process. (this field is platform dependent)
|
// AdditionalGids are additional group ids set for the container's process. (this field is platform dependent)
|
||||||
AdditionalGids []uint32 `json:"additionalGids,omitempty" platform:"linux"`
|
AdditionalGids []uint32 `json:"additionalGids,omitempty" platform:"linux,solaris"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Root contains information about the container's root filesystem on the host.
|
// Root contains information about the container's root filesystem on the host.
|
||||||
|
@ -262,7 +262,7 @@ type Memory struct {
|
||||||
// Kernel memory limit (in bytes).
|
// Kernel memory limit (in bytes).
|
||||||
Kernel *uint64 `json:"kernel,omitempty"`
|
Kernel *uint64 `json:"kernel,omitempty"`
|
||||||
// Kernel memory limit for tcp (in bytes)
|
// Kernel memory limit for tcp (in bytes)
|
||||||
KernelTCP *uint64 `json:"kernelTCP"`
|
KernelTCP *uint64 `json:"kernelTCP,omitempty"`
|
||||||
// How aggressive the kernel will swap memory pages. Range from 0 to 100.
|
// How aggressive the kernel will swap memory pages. Range from 0 to 100.
|
||||||
Swappiness *uint64 `json:"swappiness,omitempty"`
|
Swappiness *uint64 `json:"swappiness,omitempty"`
|
||||||
}
|
}
|
||||||
|
@ -294,15 +294,15 @@ type Pids struct {
|
||||||
// Network identification and priority configuration
|
// Network identification and priority configuration
|
||||||
type Network struct {
|
type Network struct {
|
||||||
// Set class identifier for container's network packets
|
// Set class identifier for container's network packets
|
||||||
ClassID *uint32 `json:"classID"`
|
ClassID *uint32 `json:"classID,omitempty"`
|
||||||
// Set priority of network traffic for container
|
// Set priority of network traffic for container
|
||||||
Priorities []InterfacePriority `json:"priorities,omitempty"`
|
Priorities []InterfacePriority `json:"priorities,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Resources has container runtime resource constraints
|
// Resources has container runtime resource constraints
|
||||||
type Resources struct {
|
type Resources struct {
|
||||||
// Devices are a list of device rules for the whitelist controller
|
// Devices configures the device whitelist.
|
||||||
Devices []DeviceCgroup `json:"devices"`
|
Devices []DeviceCgroup `json:"devices,omitempty"`
|
||||||
// DisableOOMKiller disables the OOM killer for out of memory conditions
|
// DisableOOMKiller disables the OOM killer for out of memory conditions
|
||||||
DisableOOMKiller *bool `json:"disableOOMKiller,omitempty"`
|
DisableOOMKiller *bool `json:"disableOOMKiller,omitempty"`
|
||||||
// Specify an oom_score_adj for the container.
|
// Specify an oom_score_adj for the container.
|
||||||
|
@ -371,9 +371,9 @@ type Solaris struct {
|
||||||
// Specification for automatic creation of network resources for this container.
|
// Specification for automatic creation of network resources for this container.
|
||||||
Anet []Anet `json:"anet,omitempty"`
|
Anet []Anet `json:"anet,omitempty"`
|
||||||
// Set limit on the amount of CPU time that can be used by container.
|
// Set limit on the amount of CPU time that can be used by container.
|
||||||
CappedCPU CappedCPU `json:"cappedCPU,omitempty"`
|
CappedCPU *CappedCPU `json:"cappedCPU,omitempty"`
|
||||||
// The physical and swap caps on the memory that can be used by this container.
|
// The physical and swap caps on the memory that can be used by this container.
|
||||||
CappedMemory CappedMemory `json:"cappedMemory,omitempty"`
|
CappedMemory *CappedMemory `json:"cappedMemory,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// CappedCPU allows users to set limit on the amount of CPU time that can be used by container.
|
// CappedCPU allows users to set limit on the amount of CPU time that can be used by container.
|
||||||
|
|
|
@ -8,7 +8,7 @@ type State struct {
|
||||||
ID string `json:"id"`
|
ID string `json:"id"`
|
||||||
// Status is the runtime state of the container.
|
// Status is the runtime state of the container.
|
||||||
Status string `json:"status"`
|
Status string `json:"status"`
|
||||||
// Pid is the process id for the container's main process.
|
// Pid is the process ID for the container process.
|
||||||
Pid int `json:"pid"`
|
Pid int `json:"pid"`
|
||||||
// BundlePath is the path to the container's bundle directory.
|
// BundlePath is the path to the container's bundle directory.
|
||||||
BundlePath string `json:"bundlePath"`
|
BundlePath string `json:"bundlePath"`
|
||||||
|
|
2
Godeps/_workspace/src/github.com/opencontainers/runtime-spec/specs-go/version.go
generated
vendored
2
Godeps/_workspace/src/github.com/opencontainers/runtime-spec/specs-go/version.go
generated
vendored
|
@ -11,7 +11,7 @@ const (
|
||||||
VersionPatch = 0
|
VersionPatch = 0
|
||||||
|
|
||||||
// VersionDev indicates development branch. Releases will be empty string.
|
// VersionDev indicates development branch. Releases will be empty string.
|
||||||
VersionDev = "-rc1"
|
VersionDev = "-rc1-dev"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Version is the specification version that the package types support.
|
// Version is the specification version that the package types support.
|
||||||
|
|
2
spec.go
2
spec.go
|
@ -145,7 +145,7 @@ container on your host.`,
|
||||||
Options: []string{"nosuid", "noexec", "nodev", "relatime", "ro"},
|
Options: []string{"nosuid", "noexec", "nodev", "relatime", "ro"},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
Linux: specs.Linux{
|
Linux: &specs.Linux{
|
||||||
MaskedPaths: []string{
|
MaskedPaths: []string{
|
||||||
"/proc/kcore",
|
"/proc/kcore",
|
||||||
"/proc/latency_stats",
|
"/proc/latency_stats",
|
||||||
|
|
Loading…
Reference in New Issue