vendor: bump runtime-tools to fix caps drop handling
Signed-off-by: Antonio Murdaca <runcom@redhat.com>
This commit is contained in:
parent
ebb88f9a67
commit
c718f15d47
5 changed files with 39 additions and 27 deletions
20
vendor/github.com/opencontainers/runtime-tools/generate/generate.go
generated
vendored
20
vendor/github.com/opencontainers/runtime-tools/generate/generate.go
generated
vendored
|
@ -914,12 +914,6 @@ func (g *Generator) ClearPreStartHooks() {
|
|||
// AddPreStartHook add a prestart hook into g.spec.Hooks.Prestart.
|
||||
func (g *Generator) AddPreStartHook(preStartHook rspec.Hook) error {
|
||||
g.initSpecHooks()
|
||||
for i, hook := range g.spec.Hooks.Prestart {
|
||||
if hook.Path == preStartHook.Path {
|
||||
g.spec.Hooks.Prestart[i] = preStartHook
|
||||
return nil
|
||||
}
|
||||
}
|
||||
g.spec.Hooks.Prestart = append(g.spec.Hooks.Prestart, preStartHook)
|
||||
return nil
|
||||
}
|
||||
|
@ -935,12 +929,6 @@ func (g *Generator) ClearPostStopHooks() {
|
|||
// AddPostStopHook adds a poststop hook into g.spec.Hooks.Poststop.
|
||||
func (g *Generator) AddPostStopHook(postStopHook rspec.Hook) error {
|
||||
g.initSpecHooks()
|
||||
for i, hook := range g.spec.Hooks.Poststop {
|
||||
if hook.Path == postStopHook.Path {
|
||||
g.spec.Hooks.Poststop[i] = postStopHook
|
||||
return nil
|
||||
}
|
||||
}
|
||||
g.spec.Hooks.Poststop = append(g.spec.Hooks.Poststop, postStopHook)
|
||||
return nil
|
||||
}
|
||||
|
@ -956,12 +944,6 @@ func (g *Generator) ClearPostStartHooks() {
|
|||
// AddPostStartHook adds a poststart hook into g.spec.Hooks.Poststart.
|
||||
func (g *Generator) AddPostStartHook(postStartHook rspec.Hook) error {
|
||||
g.initSpecHooks()
|
||||
for i, hook := range g.spec.Hooks.Poststart {
|
||||
if hook.Path == postStartHook.Path {
|
||||
g.spec.Hooks.Poststart[i] = postStartHook
|
||||
return nil
|
||||
}
|
||||
}
|
||||
g.spec.Hooks.Poststart = append(g.spec.Hooks.Poststart, postStartHook)
|
||||
return nil
|
||||
}
|
||||
|
@ -1225,7 +1207,7 @@ func (g *Generator) DropProcessCapabilityPermitted(c string) error {
|
|||
cp := strings.ToUpper(c)
|
||||
for i, cap := range g.spec.Process.Capabilities.Permitted {
|
||||
if strings.ToUpper(cap) == cp {
|
||||
g.spec.Process.Capabilities.Ambient = removeFunc(g.spec.Process.Capabilities.Ambient, i)
|
||||
g.spec.Process.Capabilities.Permitted = removeFunc(g.spec.Process.Capabilities.Permitted, i)
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue