summaryrefslogtreecommitdiff
path: root/pkg/spec/spec.go
diff options
context:
space:
mode:
authorMatthew Heon <matthew.heon@gmail.com>2018-09-17 15:49:50 -0400
committerAtomic Bot <atomic-devel@projectatomic.io>2018-09-17 22:13:42 +0000
commite4770b82895659278b67a1bddb1a5acd8d785f59 (patch)
tree4d93b02adcbeb609a097e7bc23b1f2b7033f7752 /pkg/spec/spec.go
parent28a2bf827ae9f592ddd9e5c11277606d32cf329c (diff)
downloadpodman-e4770b82895659278b67a1bddb1a5acd8d785f59.tar.gz
podman-e4770b82895659278b67a1bddb1a5acd8d785f59.tar.bz2
podman-e4770b82895659278b67a1bddb1a5acd8d785f59.zip
Small updates to OCI spec generation
Firstly, when adding the privileged catch-all resource device, first remove the spec's default catch-all resource device. Second, remove our default rootfs propogation config - Docker does not set this by default, so I don't think we should either. Signed-off-by: Matthew Heon <matthew.heon@gmail.com> Closes: #1491 Approved by: TomSweeneyRedHat
Diffstat (limited to 'pkg/spec/spec.go')
-rw-r--r--pkg/spec/spec.go3
1 files changed, 0 insertions, 3 deletions
diff --git a/pkg/spec/spec.go b/pkg/spec/spec.go
index 5757a36fe..3634b0b33 100644
--- a/pkg/spec/spec.go
+++ b/pkg/spec/spec.go
@@ -337,9 +337,6 @@ func CreateConfigToOCISpec(config *CreateConfig) (*spec.Spec, error) { //nolint
configSpec.Mounts = mounts
}
- if err := g.SetLinuxRootPropagation("shared"); err != nil {
- return nil, errors.Wrapf(err, "failed to set propagation to rslave")
- }
if canAddResources {
// BLOCK IO
blkio, err := config.CreateBlockIO()