Fix capabilities support.
Signed-off-by: Lantao Liu <lantaol@google.com>
This commit is contained in:
parent
e9a930b28b
commit
f247a0819d
@ -467,14 +467,15 @@ func setOCICapabilities(g *generate.Generator, capabilities *runtime.Capability,
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Capabilities in CRI doesn't have `CAP_` prefix, so add it.
|
||||||
for _, c := range capabilities.GetAddCapabilities() {
|
for _, c := range capabilities.GetAddCapabilities() {
|
||||||
if err := g.AddProcessCapability(c); err != nil {
|
if err := g.AddProcessCapability("CAP_" + c); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, c := range capabilities.GetDropCapabilities() {
|
for _, c := range capabilities.GetDropCapabilities() {
|
||||||
if err := g.DropProcessCapability(c); err != nil {
|
if err := g.DropProcessCapability("CAP_" + c); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -77,8 +77,8 @@ func getStartContainerTestData() (*runtime.ContainerConfig, *runtime.PodSandboxC
|
|||||||
},
|
},
|
||||||
SecurityContext: &runtime.LinuxContainerSecurityContext{
|
SecurityContext: &runtime.LinuxContainerSecurityContext{
|
||||||
Capabilities: &runtime.Capability{
|
Capabilities: &runtime.Capability{
|
||||||
AddCapabilities: []string{"CAP_SYS_ADMIN"},
|
AddCapabilities: []string{"SYS_ADMIN"},
|
||||||
DropCapabilities: []string{"CAP_CHOWN"},
|
DropCapabilities: []string{"CHOWN"},
|
||||||
},
|
},
|
||||||
SupplementalGroups: []int64{1111, 2222},
|
SupplementalGroups: []int64{1111, 2222},
|
||||||
},
|
},
|
||||||
|
Loading…
Reference in New Issue
Block a user