@@ -10,7 +10,7 @@ import (
1010
1111 rspec "github.com/opencontainers/runtime-spec/specs-go"
1212 "github.com/opencontainers/runtime-tools/generate/seccomp"
13- "github.com/opencontainers/runtime-tools/validate"
13+ capsCheck "github.com/opencontainers/runtime-tools/validate/capabilities "
1414 "github.com/syndtr/gocapability/capability"
1515)
1616
@@ -1136,7 +1136,7 @@ func (g *Generator) SetupPrivileged(privileged bool) {
11361136 if privileged { // Add all capabilities in privileged mode.
11371137 var finalCapList []string
11381138 for _ , cap := range capability .List () {
1139- if g .HostSpecific && cap > validate .LastCap () {
1139+ if g .HostSpecific && cap > capsCheck .LastCap () {
11401140 continue
11411141 }
11421142 finalCapList = append (finalCapList , fmt .Sprintf ("CAP_%s" , strings .ToUpper (cap .String ())))
@@ -1170,7 +1170,7 @@ func (g *Generator) ClearProcessCapabilities() {
11701170// AddProcessCapability adds a process capability into all 5 capability sets.
11711171func (g * Generator ) AddProcessCapability (c string ) error {
11721172 cp := strings .ToUpper (c )
1173- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1173+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
11741174 return err
11751175 }
11761176
@@ -1233,7 +1233,7 @@ func (g *Generator) AddProcessCapability(c string) error {
12331233// AddProcessCapabilityAmbient adds a process capability into g.Config.Process.Capabilities.Ambient.
12341234func (g * Generator ) AddProcessCapabilityAmbient (c string ) error {
12351235 cp := strings .ToUpper (c )
1236- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1236+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
12371237 return err
12381238 }
12391239
@@ -1257,7 +1257,7 @@ func (g *Generator) AddProcessCapabilityAmbient(c string) error {
12571257// AddProcessCapabilityBounding adds a process capability into g.Config.Process.Capabilities.Bounding.
12581258func (g * Generator ) AddProcessCapabilityBounding (c string ) error {
12591259 cp := strings .ToUpper (c )
1260- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1260+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
12611261 return err
12621262 }
12631263
@@ -1280,7 +1280,7 @@ func (g *Generator) AddProcessCapabilityBounding(c string) error {
12801280// AddProcessCapabilityEffective adds a process capability into g.Config.Process.Capabilities.Effective.
12811281func (g * Generator ) AddProcessCapabilityEffective (c string ) error {
12821282 cp := strings .ToUpper (c )
1283- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1283+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
12841284 return err
12851285 }
12861286
@@ -1303,7 +1303,7 @@ func (g *Generator) AddProcessCapabilityEffective(c string) error {
13031303// AddProcessCapabilityInheritable adds a process capability into g.Config.Process.Capabilities.Inheritable.
13041304func (g * Generator ) AddProcessCapabilityInheritable (c string ) error {
13051305 cp := strings .ToUpper (c )
1306- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1306+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
13071307 return err
13081308 }
13091309
@@ -1326,7 +1326,7 @@ func (g *Generator) AddProcessCapabilityInheritable(c string) error {
13261326// AddProcessCapabilityPermitted adds a process capability into g.Config.Process.Capabilities.Permitted.
13271327func (g * Generator ) AddProcessCapabilityPermitted (c string ) error {
13281328 cp := strings .ToUpper (c )
1329- if err := validate .CapValid (cp , g .HostSpecific ); err != nil {
1329+ if err := capsCheck .CapValid (cp , g .HostSpecific ); err != nil {
13301330 return err
13311331 }
13321332
@@ -1379,7 +1379,7 @@ func (g *Generator) DropProcessCapability(c string) error {
13791379 }
13801380 }
13811381
1382- return validate .CapValid (cp , false )
1382+ return capsCheck .CapValid (cp , false )
13831383}
13841384
13851385// DropProcessCapabilityAmbient drops a process capability from g.Config.Process.Capabilities.Ambient.
@@ -1395,7 +1395,7 @@ func (g *Generator) DropProcessCapabilityAmbient(c string) error {
13951395 }
13961396 }
13971397
1398- return validate .CapValid (cp , false )
1398+ return capsCheck .CapValid (cp , false )
13991399}
14001400
14011401// DropProcessCapabilityBounding drops a process capability from g.Config.Process.Capabilities.Bounding.
@@ -1411,7 +1411,7 @@ func (g *Generator) DropProcessCapabilityBounding(c string) error {
14111411 }
14121412 }
14131413
1414- return validate .CapValid (cp , false )
1414+ return capsCheck .CapValid (cp , false )
14151415}
14161416
14171417// DropProcessCapabilityEffective drops a process capability from g.Config.Process.Capabilities.Effective.
@@ -1427,7 +1427,7 @@ func (g *Generator) DropProcessCapabilityEffective(c string) error {
14271427 }
14281428 }
14291429
1430- return validate .CapValid (cp , false )
1430+ return capsCheck .CapValid (cp , false )
14311431}
14321432
14331433// DropProcessCapabilityInheritable drops a process capability from g.Config.Process.Capabilities.Inheritable.
@@ -1443,7 +1443,7 @@ func (g *Generator) DropProcessCapabilityInheritable(c string) error {
14431443 }
14441444 }
14451445
1446- return validate .CapValid (cp , false )
1446+ return capsCheck .CapValid (cp , false )
14471447}
14481448
14491449// DropProcessCapabilityPermitted drops a process capability from g.Config.Process.Capabilities.Permitted.
@@ -1459,7 +1459,7 @@ func (g *Generator) DropProcessCapabilityPermitted(c string) error {
14591459 }
14601460 }
14611461
1462- return validate .CapValid (cp , false )
1462+ return capsCheck .CapValid (cp , false )
14631463}
14641464
14651465func mapStrToNamespace (ns string , path string ) (rspec.LinuxNamespace , error ) {
0 commit comments