summaryrefslogtreecommitdiff
path: root/vendor/github.com/uber/jaeger-client-go
diff options
context:
space:
mode:
authorDaniel J Walsh <dwalsh@redhat.com>2021-03-07 06:11:54 -0500
committerDaniel J Walsh <dwalsh@redhat.com>2021-03-08 06:14:08 -0500
commit0e36e65eaa1bab89b5d0a7a66253338e723429c5 (patch)
treef1a443a24fcfdb6fa3389558a6ed1d8a65ca843e /vendor/github.com/uber/jaeger-client-go
parentb7c00f2cc03499d5d385a7aa7e8cd35d0ab994d7 (diff)
downloadpodman-0e36e65eaa1bab89b5d0a7a66253338e723429c5.tar.gz
podman-0e36e65eaa1bab89b5d0a7a66253338e723429c5.tar.bz2
podman-0e36e65eaa1bab89b5d0a7a66253338e723429c5.zip
Allow users to generate a kubernetes yaml off non running containers
Currently if you attempt to create a kube.yaml file off of a non running container where the container runs as a specific User, the creation fails because the storage container is not mounted. Podman is supposed to read the /etc/passwd entry inside of the container but since the container is not mounted, the c.State.Mountpoint == "". Podman incorrectly attempts to read /etc/passwd on the host, and fails if the specified user is not in the hosts /etc/passwd. This PR mounts the storage container, if it was not mounted so the read succeeds. Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
Diffstat (limited to 'vendor/github.com/uber/jaeger-client-go')
0 files changed, 0 insertions, 0 deletions