Skip to content

Conversation

@zaibon
Copy link
Contributor

@zaibon zaibon commented Nov 15, 2019

fixes #381
Now that we have coreX build staticly, we can just mount the binary into
the container. We don't need to do the chroot hack

Let's wait we have a new base image with static coreX binary before merging this.

fixes #381
Now that we have coreX build staticly, we can just mount the binary into
the container. We don't need to do the chroot hack
@codecov
Copy link

codecov bot commented Nov 15, 2019

Codecov Report

Merging #385 into master will increase coverage by 0.13%.
The diff coverage is 5.71%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master     #385      +/-   ##
==========================================
+ Coverage   40.82%   40.96%   +0.13%     
==========================================
  Files          62       62              
  Lines        3868     3850      -18     
==========================================
- Hits         1579     1577       -2     
+ Misses       2077     2061      -16     
  Partials      212      212
Impacted Files Coverage Δ
pkg/provision/zdb.go 36.36% <0%> (+0.64%) ⬆️
pkg/container/opts.go 0% <0%> (ø) ⬆️
pkg/container/container.go 0% <0%> (ø) ⬆️
pkg/provision/container.go 53.17% <100%> (-0.74%) ⬇️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 72c7794...6d9e2dc. Read the comment docs.

Copy link
Member

@muhamadazmy muhamadazmy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, only 1 minor comment

type MountInfo struct {
Source string // source of the mount point on the host
Target string // target of mount inside the container
Type string // mount type
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good

for _, linxNS := range spec.Linux.Namespaces {
log.Info().Msgf("namespace %+v", linxNS.Type)
}
log.Info().Msgf("mounts %+v", spec.Mounts)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this should be Debug() not info

@zaibon zaibon marked this pull request as ready for review November 15, 2019 16:24
@zaibon zaibon merged commit 45123fc into master Nov 15, 2019
@zaibon zaibon deleted the corex_volumes branch November 15, 2019 16:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

provisiond: failed to mount volume in container when using coreX

3 participants