mirror of
https://github.com/containers/podman.git
synced 2025-05-22 09:36:57 +08:00
vendor: bump c/common to v0.56.1-0.20231002091908-745eaa498509
Signed-off-by: Aditya R <arajan@redhat.com>
This commit is contained in:
2
vendor/github.com/opencontainers/runtime-tools/generate/generate.go
generated
vendored
2
vendor/github.com/opencontainers/runtime-tools/generate/generate.go
generated
vendored
@ -323,7 +323,7 @@ func createEnvCacheMap(env []string) map[string]int {
|
||||
//
|
||||
// Deprecated: Replace with:
|
||||
//
|
||||
// Use generator.Config = config
|
||||
// Use generator.Config = config
|
||||
func (g *Generator) SetSpec(config *rspec.Spec) {
|
||||
g.Config = config
|
||||
}
|
||||
|
6
vendor/github.com/opencontainers/runtime-tools/generate/seccomp/parse_action.go
generated
vendored
6
vendor/github.com/opencontainers/runtime-tools/generate/seccomp/parse_action.go
generated
vendored
@ -23,8 +23,10 @@ type SyscallOpts struct {
|
||||
func ParseSyscallFlag(args SyscallOpts, config *rspec.LinuxSeccomp) error {
|
||||
var arguments []string
|
||||
if args.Index != "" && args.Value != "" && args.ValueTwo != "" && args.Operator != "" {
|
||||
arguments = []string{args.Action, args.Syscall, args.Index, args.Value,
|
||||
args.ValueTwo, args.Operator}
|
||||
arguments = []string{
|
||||
args.Action, args.Syscall, args.Index, args.Value,
|
||||
args.ValueTwo, args.Operator,
|
||||
}
|
||||
} else {
|
||||
arguments = []string{args.Action, args.Syscall}
|
||||
}
|
||||
|
2
vendor/github.com/opencontainers/runtime-tools/generate/seccomp/seccomp_default.go
generated
vendored
2
vendor/github.com/opencontainers/runtime-tools/generate/seccomp/seccomp_default.go
generated
vendored
@ -32,7 +32,6 @@ func arches() []rspec.Arch {
|
||||
|
||||
// DefaultProfile defines the whitelist for the default seccomp profile.
|
||||
func DefaultProfile(rs *specs.Spec) *rspec.LinuxSeccomp {
|
||||
|
||||
syscalls := []rspec.LinuxSyscall{
|
||||
{
|
||||
Names: []string{
|
||||
@ -535,7 +534,6 @@ func DefaultProfile(rs *specs.Spec) *rspec.LinuxSeccomp {
|
||||
},
|
||||
},
|
||||
}...)
|
||||
|
||||
}
|
||||
|
||||
arch := runtime.GOARCH
|
||||
|
Reference in New Issue
Block a user