mirror of
https://github.com/containers/podman.git
synced 2025-05-21 00:56:36 +08:00
2
Makefile
2
Makefile
@ -282,7 +282,7 @@ test/version/version: .gopathok version/version.go
|
||||
|
||||
.PHONY: codespell
|
||||
codespell:
|
||||
codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L uint,iff,od,seeked,splitted,marge,ERRO,hist,ether -w
|
||||
codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,swagger.yaml,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L uint,iff,od,seeked,splitted,marge,ERRO,hist,ether -w
|
||||
|
||||
.PHONY: validate
|
||||
validate: gofmt lint .gitvalidation validate.completions man-page-check swagger-check tests-included tests-expect-exit
|
||||
|
@ -32,7 +32,7 @@ Valid placeholders for the Go template are listed below:
|
||||
| .DiskSize | Disk size of machine |
|
||||
| .LastUp | Time machine was last up |
|
||||
| .LastUp | Time since the VM was last run |
|
||||
| .Memory | Allocated memeory for machine |
|
||||
| .Memory | Allocated memory for machine |
|
||||
| .Name | VM name |
|
||||
| .Running | Is machine running |
|
||||
| .Stream | Stream name |
|
||||
|
@ -274,7 +274,7 @@ func (c *Container) GetInspectMounts(namedVolumes []*ContainerNamedVolume, image
|
||||
return inspectMounts, nil
|
||||
}
|
||||
|
||||
// GetSecurityOptions retrives and returns the security related annotations and process information upon inspection
|
||||
// GetSecurityOptions retrieves and returns the security related annotations and process information upon inspection
|
||||
func (c *Container) GetSecurityOptions() []string {
|
||||
ctrSpec := c.config.Spec
|
||||
SecurityOpt := []string{}
|
||||
|
@ -31,7 +31,7 @@ var largeAuthFileValues = map[string]types.DockerAuthConfig{
|
||||
|
||||
// systemContextForAuthFile returns a types.SystemContext with AuthFilePath pointing
|
||||
// to a temporary file with fileContents, or nil if fileContents is empty; and a cleanup
|
||||
// function the calle rmust arrange to call.
|
||||
// function the caller must arrange to call.
|
||||
func systemContextForAuthFile(t *testing.T, fileContents string) (*types.SystemContext, func()) {
|
||||
if fileContents == "" {
|
||||
return nil, func() {}
|
||||
|
@ -714,7 +714,7 @@ var _ = Describe("Podman containers ", func() {
|
||||
var name = "top"
|
||||
cid, err := bt.RunTopContainer(&name, nil)
|
||||
Expect(err).To(BeNil())
|
||||
// Forcably Removing running container should succeed
|
||||
// Forcibly Removing running container should succeed
|
||||
rmResponse, err := containers.Remove(bt.conn, cid, new(containers.RemoveOptions).WithForce(true))
|
||||
Expect(err).To(BeNil())
|
||||
Expect(len(reports.RmReportsErrs(rmResponse))).To(Equal(0))
|
||||
|
@ -567,7 +567,7 @@ func installWslKernel() error {
|
||||
}
|
||||
// In case of unusual circumstances (e.g. race with installer actions)
|
||||
// retry a few times
|
||||
message = "An error occured attempting the WSL Kernel update, retrying..."
|
||||
message = "An error occurred attempting the WSL Kernel update, retrying..."
|
||||
fmt.Println(message)
|
||||
fmt.Fprintln(log, message)
|
||||
time.Sleep(backoff)
|
||||
|
@ -94,7 +94,7 @@ type PodNetworkConfig struct {
|
||||
// Only available if NetNS is set to Bridge or Slirp.
|
||||
// Optional.
|
||||
PortMappings []types.PortMapping `json:"portmappings,omitempty"`
|
||||
// Map of networks names ot ids the container should join to.
|
||||
// Map of networks names to ids the container should join to.
|
||||
// You can request additional settings for each network, you can
|
||||
// set network aliases, static ips, static mac address and the
|
||||
// network interface name for this container on the specific network.
|
||||
|
@ -223,7 +223,7 @@ type ContainerStorageConfig struct {
|
||||
// Conflicts with Image.
|
||||
// At least one of Image or Rootfs must be specified.
|
||||
Rootfs string `json:"rootfs,omitempty"`
|
||||
// RootfsOverlay tells if rootfs is actuall an overlay on top of base path
|
||||
// RootfsOverlay tells if rootfs is actually an overlay on top of base path
|
||||
RootfsOverlay bool `json:"rootfs_overlay,omitempty"`
|
||||
// ImageVolumeMode indicates how image volumes will be created.
|
||||
// Supported modes are "ignore" (do not create), "tmpfs" (create as
|
||||
@ -423,7 +423,7 @@ type ContainerNetworkConfig struct {
|
||||
// PublishExposedPorts is set.
|
||||
// Optional.
|
||||
Expose map[uint16]string `json:"expose,omitempty"`
|
||||
// Map of networks names ot ids the container should join to.
|
||||
// Map of networks names or ids that the container should join.
|
||||
// You can request additional settings for each network, you can
|
||||
// set network aliases, static ips, static mac address and the
|
||||
// network interface name for this container on the specific network.
|
||||
|
@ -893,7 +893,7 @@ func parseSecrets(secrets []string) ([]specgen.Secret, map[string]string, error)
|
||||
source = kv[1]
|
||||
case "type":
|
||||
if secretType != "" {
|
||||
return nil, nil, errors.Wrap(secretParseError, "cannot set more tha one secret type")
|
||||
return nil, nil, errors.Wrap(secretParseError, "cannot set more than one secret type")
|
||||
}
|
||||
if kv[1] != "mount" && kv[1] != "env" {
|
||||
return nil, nil, errors.Wrapf(secretParseError, "type %s is invalid", kv[1])
|
||||
|
@ -173,7 +173,7 @@ LABEL marge=mom
|
||||
err = writeYaml(testYAML, filepath.Join(yamlDir, "top.yaml"))
|
||||
Expect(err).To(BeNil())
|
||||
|
||||
// build an image called foobar but make sure it doesnt have
|
||||
// build an image called foobar but make sure it doesn't have
|
||||
// the same label as the yaml buildfile, so we can check that
|
||||
// the image is NOT rebuilt.
|
||||
err = writeYaml(prebuiltImage, filepath.Join(yamlDir, "Containerfile"))
|
||||
@ -220,7 +220,7 @@ LABEL marge=mom
|
||||
err = writeYaml(testYAML, filepath.Join(yamlDir, "top.yaml"))
|
||||
Expect(err).To(BeNil())
|
||||
|
||||
// build an image called foobar but make sure it doesnt have
|
||||
// build an image called foobar but make sure it doesn't have
|
||||
// the same label as the yaml buildfile, so we can check that
|
||||
// the image is NOT rebuilt.
|
||||
err = writeYaml(prebuiltImage, filepath.Join(yamlDir, "Containerfile"))
|
||||
|
@ -144,7 +144,7 @@ var _ = Describe("Podman volume create", func() {
|
||||
Expect(inspectGID).Should(Exit(0))
|
||||
Expect(inspectGID.OutputToString()).To(Equal(gid))
|
||||
|
||||
// options should containt `uid=3000,gid=4000:3000:4000`
|
||||
// options should contain `uid=3000,gid=4000:3000:4000`
|
||||
optionFormat := `{{ .Options.o }}:{{ .Options.UID }}:{{ .Options.GID }}`
|
||||
optionStrFormatExpect := fmt.Sprintf(`uid=%s,gid=%s:%s:%s`, uid, gid, uid, gid)
|
||||
inspectOpts := podmanTest.Podman([]string{"volume", "inspect", "--format", optionFormat, volName})
|
||||
|
@ -375,7 +375,7 @@ NeedsChown | true
|
||||
|
||||
run_podman run --rm --volume $myvolume:/etc $IMAGE ls /etc/passwd
|
||||
run_podman volume inspect --format '{{ .NeedsCopyUp }}' $myvolume
|
||||
is "${output}" "false" "If content in dest '/etc' non-empty NeedsCopyUP should still have happend and be false"
|
||||
is "${output}" "false" "If content in dest '/etc' non-empty NeedsCopyUP should still have happened and be false"
|
||||
|
||||
run_podman volume inspect --format '{{.Mountpoint}}' $myvolume
|
||||
mountpoint="$output"
|
||||
|
@ -689,7 +689,7 @@ file `/etc/systemd/system/user@.service.d/delegate.conf` with the contents:
|
||||
[Service]
|
||||
Delegate=memory pids cpu io
|
||||
|
||||
After logging out and loggin back in, you should have permission to set CPU
|
||||
After logging out and logging back in, you should have permission to set CPU
|
||||
limits.
|
||||
|
||||
### 26) `exec container process '/bin/sh': Exec format error` (or another binary than `bin/sh`)
|
||||
|
Reference in New Issue
Block a user