Update code for latest k8s
Signed-off-by: Mrunal Patel <mrunalp@gmail.com>
This commit is contained in:
parent
8f5e37a83c
commit
5f7ac28059
792 changed files with 25023 additions and 19841 deletions
|
@ -23,7 +23,7 @@ import (
|
|||
"github.com/opencontainers/selinux/go-selinux/label"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/sirupsen/logrus"
|
||||
pb "k8s.io/kubernetes/pkg/kubelet/apis/cri/v1alpha1/runtime"
|
||||
pb "k8s.io/kubernetes/pkg/kubelet/apis/cri/runtime/v1alpha2"
|
||||
"k8s.io/kubernetes/pkg/kubelet/network/hostport"
|
||||
)
|
||||
|
||||
|
@ -340,7 +340,10 @@ func (c *ContainerServer) LoadSandbox(id string) error {
|
|||
|
||||
privileged := isTrue(m.Annotations[annotations.PrivilegedRuntime])
|
||||
trusted := isTrue(m.Annotations[annotations.TrustedSandbox])
|
||||
hostNetwork := isTrue(m.Annotations[annotations.HostNetwork])
|
||||
nsOpts := pb.NamespaceOption{}
|
||||
if err := json.Unmarshal([]byte(m.Annotations[annotations.NamespaceOptions]), &nsOpts); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
sb, err := sandbox.New(id, m.Annotations[annotations.Namespace], name, m.Annotations[annotations.KubeName], filepath.Dir(m.Annotations[annotations.LogPath]), labels, kubeAnnotations, processLabel, mountLabel, &metadata, m.Annotations[annotations.ShmPath], m.Annotations[annotations.CgroupParent], privileged, trusted, m.Annotations[annotations.ResolvPath], m.Annotations[annotations.HostName], portMappings)
|
||||
if err != nil {
|
||||
|
@ -349,7 +352,7 @@ func (c *ContainerServer) LoadSandbox(id string) error {
|
|||
sb.AddHostnamePath(m.Annotations[annotations.HostnamePath])
|
||||
sb.AddIP(ip)
|
||||
sb.SetSeccompProfilePath(spp)
|
||||
sb.SetHostNetwork(hostNetwork)
|
||||
sb.SetNamespaceOptions(&nsOpts)
|
||||
|
||||
// We add a netNS only if we can load a permanent one.
|
||||
// Otherwise, the sandbox will live in the host namespace.
|
||||
|
|
|
@ -4,7 +4,7 @@ import (
|
|||
"encoding/json"
|
||||
"path/filepath"
|
||||
|
||||
"k8s.io/kubernetes/pkg/kubelet/apis/cri/v1alpha1/runtime"
|
||||
runtime "k8s.io/kubernetes/pkg/kubelet/apis/cri/runtime/v1alpha2"
|
||||
|
||||
"github.com/docker/docker/pkg/ioutils"
|
||||
"github.com/kubernetes-incubator/cri-o/oci"
|
||||
|
|
|
@ -16,7 +16,7 @@ import (
|
|||
"github.com/sirupsen/logrus"
|
||||
"golang.org/x/sys/unix"
|
||||
"k8s.io/apimachinery/pkg/fields"
|
||||
pb "k8s.io/kubernetes/pkg/kubelet/apis/cri/v1alpha1/runtime"
|
||||
pb "k8s.io/kubernetes/pkg/kubelet/apis/cri/runtime/v1alpha2"
|
||||
"k8s.io/kubernetes/pkg/kubelet/network/hostport"
|
||||
)
|
||||
|
||||
|
@ -147,6 +147,7 @@ type Sandbox struct {
|
|||
mountLabel string
|
||||
netns *NetNs
|
||||
metadata *pb.PodSandboxMetadata
|
||||
nsOpts *pb.NamespaceOption
|
||||
shmPath string
|
||||
cgroupParent string
|
||||
privileged bool
|
||||
|
@ -225,14 +226,14 @@ func (s *Sandbox) AddIP(ip string) {
|
|||
s.ip = ip
|
||||
}
|
||||
|
||||
// SetHostNetwork sets whether the pod is running using host network
|
||||
func (s *Sandbox) SetHostNetwork(hn bool) {
|
||||
s.hostNetwork = hn
|
||||
// SetNamespaceOptions sets whether the pod is running using host network
|
||||
func (s *Sandbox) SetNamespaceOptions(nsOpts *pb.NamespaceOption) {
|
||||
s.nsOpts = nsOpts
|
||||
}
|
||||
|
||||
// HostNetwork returns whether the pod is using host network
|
||||
func (s *Sandbox) HostNetwork() bool {
|
||||
return s.hostNetwork
|
||||
// NamespaceOptions returns the namespace options for the sandbox
|
||||
func (s *Sandbox) NamespaceOptions() *pb.NamespaceOption {
|
||||
return s.nsOpts
|
||||
}
|
||||
|
||||
// IP returns the ip of the sandbox
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue