containerd/sys
Derek McGowan 528a9d87ac
Create socket parent directory with correct permissions
Often the socket is put into the directory /run/containerd.
When this directory does not exist, it gets created with the
default uid/gid and permission 0660. When the user has specified
a uid or gid, this should be used to set the ownership of that
parent directory and the permissions should be 0770. This worked
in a previous version of containerd but regressed after a refactor.

Signed-off-by: Derek McGowan <derek@mcgstyle.net>
2017-07-17 13:08:02 -07:00
..
epoll.go Remove C implementation of epoll on arm64 2017-05-26 13:30:57 -04:00
fds.go Move osutil to sys package 2016-11-29 15:38:24 -08:00
filesys_windows.go new package: compression (ported from docker/pkg/archive) 2017-03-16 05:29:27 +00:00
oom_unix.go Set oom score for containerd and shims 2017-04-12 11:34:32 -07:00
oom_windows.go Set oom score for containerd and shims 2017-04-12 11:34:32 -07:00
prctl_solaris.go Move osutil to sys package 2016-11-29 15:38:24 -08:00
prctl.go [bin] Replace syscall with /x/sys/unix 2017-04-10 12:01:33 -07:00
proc.go Move osutil to sys package 2016-11-29 15:38:24 -08:00
reaper.go [bin] Replace syscall with /x/sys/unix 2017-04-10 12:01:33 -07:00
socket_unix.go Create socket parent directory with correct permissions 2017-07-17 13:08:02 -07:00
socket_windows.go Initial windows runtime work 2017-04-07 09:20:44 -07:00