oci: appendOSMounts(): remove unused error, and move

This function was added in ae22854e2b, but never
returned an error, and the error-return was not handled on the callsite. This
patch removes the unused error return, and moves it to a file related to mounts,
which allowed for some of the stubs to be removed and shared between non-FreeBSD
platforms.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
This commit is contained in:
Sebastiaan van Stijn 2022-12-27 10:20:09 +01:00
parent bae8fb9142
commit 94c68aa001
No known key found for this signature in database
GPG Key ID: 76698F39D527CE8C
6 changed files with 31 additions and 79 deletions

View File

@ -68,3 +68,6 @@ func defaultMounts() []specs.Mount {
},
}
}
// appendOSMounts is only used on FreeBSD, and a no-op on other platforms.
func appendOSMounts(_ *Spec, _ string) {}

View File

@ -35,3 +35,31 @@ func defaultMounts() []specs.Mount {
},
}
}
// appendOSMounts modifies the mount spec to mount emulated Linux filesystems on FreeBSD,
// as per: https://wiki.freebsd.org/LinuxJails
func appendOSMounts(s *Spec, os string) {
// No-op for FreeBSD containers
if os != "linux" {
return
}
/* The nosuid noexec options are for consistency with Linux mounts: on FreeBSD it is
by default impossible to execute anything from these filesystems.
*/
var mounts = []specs.Mount{
{
Destination: "/proc",
Type: "linprocfs",
Source: "linprocfs",
Options: []string{"nosuid", "noexec"},
},
{
Destination: "/sys",
Type: "linsysfs",
Source: "linsysfs",
Options: []string{"nosuid", "noexec", "nodev"},
},
}
s.Mounts = append(mounts, s.Mounts...)
}

View File

@ -1,21 +0,0 @@
/*
Copyright The containerd Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package oci
func appendOSMounts(s *Spec, os string) error {
return nil
}

View File

@ -1,50 +0,0 @@
/*
Copyright The containerd Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package oci
import (
specs "github.com/opencontainers/runtime-spec/specs-go"
)
// appendOSMounts modifies the mount spec to mount emulated Linux filesystems on FreeBSD,
// as per: https://wiki.freebsd.org/LinuxJails
func appendOSMounts(s *Spec, os string) error {
// No-op for FreeBSD containers
if os != "linux" {
return nil
}
/* The nosuid noexec options are for consistency with Linux mounts: on FreeBSD it is
by default impossible to execute anything from these filesystems.
*/
var mounts = []specs.Mount{
{
Destination: "/proc",
Type: "linprocfs",
Source: "linprocfs",
Options: []string{"nosuid", "noexec"},
},
{
Destination: "/sys",
Type: "linsysfs",
Source: "linsysfs",
Options: []string{"nosuid", "noexec", "nodev"},
},
}
s.Mounts = append(mounts, s.Mounts...)
return nil
}

View File

@ -176,7 +176,3 @@ func WithRdt(closID, l3CacheSchema, memBwSchema string) SpecOpts {
func escapeAndCombineArgs(args []string) string {
panic("not supported")
}
func appendOSMounts(s *Spec, os string) error {
return nil
}

View File

@ -115,7 +115,3 @@ func escapeAndCombineArgs(args []string) string {
}
return strings.Join(escaped, " ")
}
func appendOSMounts(s *Spec, os string) error {
return nil
}