mirror of
https://github.com/containers/podman.git
synced 2025-06-24 03:08:13 +08:00
2
Makefile
2
Makefile
@ -267,7 +267,7 @@ test/version/version: version/version.go
|
||||
|
||||
.PHONY: codespell
|
||||
codespell:
|
||||
codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,swagger.yaml,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L pullrequest,uint,iff,od,seeked,splitted,marge,erro,hist,ether -w
|
||||
codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,swagger.yaml,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L clos,ans,pullrequest,uint,iff,od,seeked,splitted,marge,erro,hist,ether -w
|
||||
|
||||
.PHONY: validate
|
||||
validate: lint .gitvalidation validate.completions man-page-check swagger-check tests-included tests-expect-exit pr-removes-fixed-skips
|
||||
|
@ -69,21 +69,21 @@ func (c *Container) restore(ctx context.Context, options ContainerCheckpointOpti
|
||||
|
||||
// getHostsEntries returns the container ip host entries for the correct netmode
|
||||
func (c *Container) getHostsEntries() (etchosts.HostEntries, error) {
|
||||
return nil, errors.New("unspported (*Container) getHostsEntries")
|
||||
return nil, errors.New("unsupported (*Container) getHostsEntries")
|
||||
}
|
||||
|
||||
// Fix ownership and permissions of the specified volume if necessary.
|
||||
func (c *Container) fixVolumePermissions(v *ContainerNamedVolume) error {
|
||||
return errors.New("unspported (*Container) fixVolumePermissions")
|
||||
return errors.New("unsupported (*Container) fixVolumePermissions")
|
||||
}
|
||||
|
||||
func (c *Container) expectPodCgroup() (bool, error) {
|
||||
return false, errors.New("unspported (*Container) expectPodCgroup")
|
||||
return false, errors.New("unsupported (*Container) expectPodCgroup")
|
||||
}
|
||||
|
||||
// Get cgroup path in a format suitable for the OCI spec
|
||||
func (c *Container) getOCICgroupPath() (string, error) {
|
||||
return "", errors.New("unspported (*Container) getOCICgroupPath")
|
||||
return "", errors.New("unsupported (*Container) getOCICgroupPath")
|
||||
}
|
||||
|
||||
func getLocalhostHostEntry(c *Container) etchosts.HostEntries {
|
||||
|
@ -11,8 +11,8 @@ const (
|
||||
// ExecErrorCodeGeneric is the default error code to return from an exec session if libpod failed
|
||||
// prior to calling the runtime
|
||||
ExecErrorCodeGeneric = 125
|
||||
// ExecErrorCodeCannotInvoke is the error code to return when the runtime fails to invoke a command
|
||||
// an example of this can be found by trying to execute a directory:
|
||||
// ExecErrorCodeCannotInvoke is the error code to return when the runtime fails to invoke a command.
|
||||
// An example of this can be found by trying to execute a directory:
|
||||
// `podman exec -l /etc`
|
||||
ExecErrorCodeCannotInvoke = 126
|
||||
// ExecErrorCodeNotFound is the error code to return when a command cannot be found
|
||||
|
@ -175,7 +175,7 @@ func (rc RemoteConnectionType) MakeSSHURL(host, path, port, userName string) url
|
||||
return uri
|
||||
}
|
||||
|
||||
// GetCacheDir returns the dir where VM images are downladed into when pulled
|
||||
// GetCacheDir returns the dir where VM images are downloaded into when pulled
|
||||
func GetCacheDir(vmType string) (string, error) {
|
||||
dataDir, err := GetDataDir(vmType)
|
||||
if err != nil {
|
||||
|
@ -37,7 +37,7 @@ func TestWaitAndClose(t *testing.T) {
|
||||
time.Sleep(250 * time.Millisecond)
|
||||
select {
|
||||
case err := <-ch:
|
||||
t.Fatalf("Should stil be waiting but received %v", err)
|
||||
t.Fatalf("Should still be waiting but received %v", err)
|
||||
default:
|
||||
}
|
||||
|
||||
|
@ -228,7 +228,7 @@ var _ = Describe("Podman restart", func() {
|
||||
Expect(beforeRestart.OutputToString()).To(Equal(afterRestart.OutputToString()))
|
||||
})
|
||||
|
||||
It("podman restart all stoped containers with --all", func() {
|
||||
It("podman restart all stopped containers with --all", func() {
|
||||
session := podmanTest.RunTopContainer("")
|
||||
session.WaitWithDefaultTimeout()
|
||||
Expect(session).Should(Exit(0))
|
||||
|
Reference in New Issue
Block a user