diff options
author | OpenShift Merge Robot <openshift-merge-robot@users.noreply.github.com> | 2022-01-19 10:01:02 -0500 |
---|---|---|
committer | GitHub <noreply@github.com> | 2022-01-19 10:01:02 -0500 |
commit | 1c81b67341300853d7fe9b6568b247e579c34969 (patch) | |
tree | 4b3f236c3b632187eddfbc89c89b8d9a04ea3e4c /vendor/github.com/opencontainers/runc/libcontainer/configs/cgroup_linux.go | |
parent | 8301a7cd828c4576c1e581cb2dd376f42a363a11 (diff) | |
parent | a0165a64b9efc3201bda69e4271ecf0f149bc59c (diff) | |
download | podman-1c81b67341300853d7fe9b6568b247e579c34969.tar.gz podman-1c81b67341300853d7fe9b6568b247e579c34969.tar.bz2 podman-1c81b67341300853d7fe9b6568b247e579c34969.zip |
Merge pull request #12921 from containers/dependabot/go_modules/github.com/opencontainers/runc-1.1.0
Bump github.com/opencontainers/runc from 1.0.3 to 1.1.0
Diffstat (limited to 'vendor/github.com/opencontainers/runc/libcontainer/configs/cgroup_linux.go')
-rw-r--r-- | vendor/github.com/opencontainers/runc/libcontainer/configs/cgroup_linux.go | 20 |
1 files changed, 16 insertions, 4 deletions
diff --git a/vendor/github.com/opencontainers/runc/libcontainer/configs/cgroup_linux.go b/vendor/github.com/opencontainers/runc/libcontainer/configs/cgroup_linux.go index 5ea9d940c..2d4a89871 100644 --- a/vendor/github.com/opencontainers/runc/libcontainer/configs/cgroup_linux.go +++ b/vendor/github.com/opencontainers/runc/libcontainer/configs/cgroup_linux.go @@ -28,17 +28,26 @@ type Cgroup struct { // ScopePrefix describes prefix for the scope name ScopePrefix string `json:"scope_prefix"` - // Paths represent the absolute cgroups paths to join. - // This takes precedence over Path. - Paths map[string]string - // Resources contains various cgroups settings to apply *Resources + // Systemd tells if systemd should be used to manage cgroups. + Systemd bool + // SystemdProps are any additional properties for systemd, // derived from org.systemd.property.xxx annotations. // Ignored unless systemd is used for managing cgroups. SystemdProps []systemdDbus.Property `json:"-"` + + // Rootless tells if rootless cgroups should be used. + Rootless bool + + // The host UID that should own the cgroup, or nil to accept + // the default ownership. This should only be set when the + // cgroupfs is to be mounted read/write. + // Not all cgroup manager implementations support changing + // the ownership. + OwnerUID *int `json:"owner_uid,omitempty"` } type Resources struct { @@ -117,6 +126,9 @@ type Resources struct { // Set class identifier for container's network packets NetClsClassid uint32 `json:"net_cls_classid_u"` + // Rdma resource restriction configuration + Rdma map[string]LinuxRdma `json:"rdma"` + // Used on cgroups v2: // CpuWeight sets a proportional bandwidth limit. |