mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
bcd996f4c3
Make sure to always explicitly set namespace for all kernel bound network operations irrespective of whether the operation is performed in init namespace or a user defined namespace. This already happens for user defined netns. But doesn't happen for initial netns that libnetwork runs in. Signed-off-by: Jana Radhakrishnan <mrjana@docker.com>
35 lines
861 B
Go
35 lines
861 B
Go
package osl
|
|
|
|
import "testing"
|
|
|
|
// GenerateKey generates a sandbox key based on the passed
|
|
// container id.
|
|
func GenerateKey(containerID string) string {
|
|
maxLen := 12
|
|
if len(containerID) < maxLen {
|
|
maxLen = len(containerID)
|
|
}
|
|
|
|
return containerID[:maxLen]
|
|
}
|
|
|
|
// NewSandbox provides a new sandbox instance created in an os specific way
|
|
// provided a key which uniquely identifies the sandbox
|
|
func NewSandbox(key string, osCreate bool) (Sandbox, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
// GC triggers garbage collection of namespace path right away
|
|
// and waits for it.
|
|
func GC() {
|
|
}
|
|
|
|
// InitOSContext initializes OS context while configuring network resources
|
|
func InitOSContext() func() {
|
|
return func() {}
|
|
}
|
|
|
|
// SetupTestOSContext sets up a separate test OS context in which tests will be executed.
|
|
func SetupTestOSContext(t *testing.T) func() {
|
|
return func() {}
|
|
}
|