@@ -10,7 +10,7 @@ import (
1010
1111 rspec "github.com/opencontainers/runtime-spec/specs-go"
1212 "github.com/opencontainers/runtime-tools/generate/seccomp"
13- "github.com/opencontainers/runtime-tools/validate"
13+ capsCheck "github.com/opencontainers/runtime-tools/validate/capabilities "
1414 "github.com/syndtr/gocapability/capability"
1515)
1616
@@ -1140,7 +1140,7 @@ func (g *Generator) SetupPrivileged(privileged bool) {
11401140 if privileged { // Add all capabilities in privileged mode.
11411141 var finalCapList []string
11421142 for _ , cap := range capability .List () {
1143- if g .HostSpecific && cap > validate .LastCap () {
1143+ if g .HostSpecific && cap > capsCheck .LastCap () {
11441144 continue
11451145 }
11461146 finalCapList = append (finalCapList , fmt .Sprintf ("CAP_%s" , strings .ToUpper (cap .String ())))
@@ -1174,7 +1174,7 @@ func (g *Generator) ClearProcessCapabilities() {
11741174// AddProcessCapability adds a process capability into all 5 capability sets.
11751175func (g * Generator ) AddProcessCapability (c string ) error {
11761176 cp := strings .ToUpper (c )
1177- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1177+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
11781178 return err
11791179 }
11801180
@@ -1237,7 +1237,7 @@ func (g *Generator) AddProcessCapability(c string) error {
12371237// AddProcessCapabilityAmbient adds a process capability into g.Config.Process.Capabilities.Ambient.
12381238func (g * Generator ) AddProcessCapabilityAmbient (c string ) error {
12391239 cp := strings .ToUpper (c )
1240- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1240+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
12411241 return err
12421242 }
12431243
@@ -1261,7 +1261,7 @@ func (g *Generator) AddProcessCapabilityAmbient(c string) error {
12611261// AddProcessCapabilityBounding adds a process capability into g.Config.Process.Capabilities.Bounding.
12621262func (g * Generator ) AddProcessCapabilityBounding (c string ) error {
12631263 cp := strings .ToUpper (c )
1264- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1264+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
12651265 return err
12661266 }
12671267
@@ -1284,7 +1284,7 @@ func (g *Generator) AddProcessCapabilityBounding(c string) error {
12841284// AddProcessCapabilityEffective adds a process capability into g.Config.Process.Capabilities.Effective.
12851285func (g * Generator ) AddProcessCapabilityEffective (c string ) error {
12861286 cp := strings .ToUpper (c )
1287- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1287+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
12881288 return err
12891289 }
12901290
@@ -1307,7 +1307,7 @@ func (g *Generator) AddProcessCapabilityEffective(c string) error {
13071307// AddProcessCapabilityInheritable adds a process capability into g.Config.Process.Capabilities.Inheritable.
13081308func (g * Generator ) AddProcessCapabilityInheritable (c string ) error {
13091309 cp := strings .ToUpper (c )
1310- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1310+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
13111311 return err
13121312 }
13131313
@@ -1330,7 +1330,7 @@ func (g *Generator) AddProcessCapabilityInheritable(c string) error {
13301330// AddProcessCapabilityPermitted adds a process capability into g.Config.Process.Capabilities.Permitted.
13311331func (g * Generator ) AddProcessCapabilityPermitted (c string ) error {
13321332 cp := strings .ToUpper (c )
1333- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1333+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
13341334 return err
13351335 }
13361336
@@ -1383,7 +1383,7 @@ func (g *Generator) DropProcessCapability(c string) error {
13831383 }
13841384 }
13851385
1386- return validate .CapValid (cp , false )
1386+ return capsCheck .CapValid (cp , false )
13871387}
13881388
13891389// DropProcessCapabilityAmbient drops a process capability from g.Config.Process.Capabilities.Ambient.
@@ -1399,7 +1399,7 @@ func (g *Generator) DropProcessCapabilityAmbient(c string) error {
13991399 }
14001400 }
14011401
1402- return validate .CapValid (cp , false )
1402+ return capsCheck .CapValid (cp , false )
14031403}
14041404
14051405// DropProcessCapabilityBounding drops a process capability from g.Config.Process.Capabilities.Bounding.
@@ -1415,7 +1415,7 @@ func (g *Generator) DropProcessCapabilityBounding(c string) error {
14151415 }
14161416 }
14171417
1418- return validate .CapValid (cp , false )
1418+ return capsCheck .CapValid (cp , false )
14191419}
14201420
14211421// DropProcessCapabilityEffective drops a process capability from g.Config.Process.Capabilities.Effective.
@@ -1431,7 +1431,7 @@ func (g *Generator) DropProcessCapabilityEffective(c string) error {
14311431 }
14321432 }
14331433
1434- return validate .CapValid (cp , false )
1434+ return capsCheck .CapValid (cp , false )
14351435}
14361436
14371437// DropProcessCapabilityInheritable drops a process capability from g.Config.Process.Capabilities.Inheritable.
@@ -1447,7 +1447,7 @@ func (g *Generator) DropProcessCapabilityInheritable(c string) error {
14471447 }
14481448 }
14491449
1450- return validate .CapValid (cp , false )
1450+ return capsCheck .CapValid (cp , false )
14511451}
14521452
14531453// DropProcessCapabilityPermitted drops a process capability from g.Config.Process.Capabilities.Permitted.
@@ -1463,7 +1463,7 @@ func (g *Generator) DropProcessCapabilityPermitted(c string) error {
14631463 }
14641464 }
14651465
1466- return validate .CapValid (cp , false )
1466+ return capsCheck .CapValid (cp , false )
14671467}
14681468
14691469func mapStrToNamespace (ns string , path string ) (rspec.LinuxNamespace , error ) {
0 commit comments