diff --git a/server/container_create.go b/server/container_create.go index 38fc3c6f..f4af1eb2 100644 --- a/server/container_create.go +++ b/server/container_create.go @@ -399,32 +399,32 @@ func (s *Server) createSandboxContainer(ctx context.Context, containerID string, } } - capabilities := linux.GetSecurityContext().GetCapabilities() - toCAPPrefixed := func(cap string) string { - if !strings.HasPrefix(strings.ToLower(cap), "cap_") { - return "CAP_" + cap - } - return cap - } - if capabilities != nil { - addCaps := capabilities.AddCapabilities - if addCaps != nil { - for _, cap := range addCaps { - if err := specgen.AddProcessCapability(toCAPPrefixed(cap)); err != nil { - return nil, err - } - } - } + //capabilities := linux.GetSecurityContext().GetCapabilities() + //toCAPPrefixed := func(cap string) string { + //if !strings.HasPrefix(strings.ToLower(cap), "cap_") { + //return "CAP_" + cap + //} + //return cap + //} + //if capabilities != nil { + //addCaps := capabilities.AddCapabilities + //if addCaps != nil { + //for _, cap := range addCaps { + //if err := specgen.AddProcessCapability(toCAPPrefixed(cap)); err != nil { + //return nil, err + //} + //} + //} - dropCaps := capabilities.DropCapabilities - if dropCaps != nil { - for _, cap := range dropCaps { - if err := specgen.DropProcessCapability(toCAPPrefixed(cap)); err != nil { - return nil, err - } - } - } - } + //dropCaps := capabilities.DropCapabilities + //if dropCaps != nil { + //for _, cap := range dropCaps { + //if err := specgen.DropProcessCapability(toCAPPrefixed(cap)); err != nil { + //return nil, err + //} + //} + //} + //} specgen.SetProcessSelinuxLabel(sb.processLabel) specgen.SetLinuxMountLabel(sb.mountLabel)