pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/sysutils/podman/files



Module Name:    pkgsrc
Committed By:   wiz
Date:           Sat Jun 29 14:15:41 UTC 2024

Added Files:
        pkgsrc/sysutils/podman/files: config_netbsd.go default_netbsd.go
            ignition_netbsd.go options_netbsd.go

Log Message:
podman: add files/ from wip package


To generate a diff of this commit:
cvs rdiff -u -r0 -r1.1 pkgsrc/sysutils/podman/files/config_netbsd.go \
    pkgsrc/sysutils/podman/files/default_netbsd.go \
    pkgsrc/sysutils/podman/files/ignition_netbsd.go \
    pkgsrc/sysutils/podman/files/options_netbsd.go

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Added files:

Index: pkgsrc/sysutils/podman/files/config_netbsd.go
diff -u /dev/null pkgsrc/sysutils/podman/files/config_netbsd.go:1.1
--- /dev/null   Sat Jun 29 14:15:41 2024
+++ pkgsrc/sysutils/podman/files/config_netbsd.go       Sat Jun 29 14:15:41 2024
@@ -0,0 +1,18 @@
+package config
+
+const (
+       // OverrideContainersConfig holds the default config path overridden by the root user
+       OverrideContainersConfig = "@PKG_SYSCONFDIR@" + _configPath
+
+       // DefaultContainersConfig holds the default containers config path
+       DefaultContainersConfig = "@PREFIX@/share/" + _configPath
+
+       // DefaultSignaturePolicyPath is the default value for the
+       // policy.json file.
+       DefaultSignaturePolicyPath = "@PKG_SYSCONFDIR@/containers/policy.json"
+)
+
+var defaultHelperBinariesDir = []string{
+       // pkgsrc paths
+       "@PREFIX@/bin",
+}
Index: pkgsrc/sysutils/podman/files/default_netbsd.go
diff -u /dev/null pkgsrc/sysutils/podman/files/default_netbsd.go:1.1
--- /dev/null   Sat Jun 29 14:15:41 2024
+++ pkgsrc/sysutils/podman/files/default_netbsd.go      Sat Jun 29 14:15:41 2024
@@ -0,0 +1,31 @@
+package config
+
+func getDefaultCgroupsMode() string {
+       return "enabled"
+}
+
+// In theory, FreeBSD should be able to use shm locks but in practice,
+// this causes cryptic error messages from the kernel that look like:
+//
+//     comm podman pid 90813: handling rb error 22
+//
+// These seem to be related to fork/exec code paths. Fall back to
+// file-based locks.
+func getDefaultLockType() string {
+       return "file"
+}
+
+func getLibpodTmpDir() string {
+       return "@VARBASE@/run/libpod"
+}
+
+// getDefaultMachineVolumes returns default mounted volumes (possibly with env vars, which will be expanded)
+func getDefaultMachineVolumes() []string {
+       /* XXXTNN this doesn't work yet. Needs virtio-9p in QEMU */
+//     return []string{"$HOME:$HOME"}
+       return []string{}
+}
+
+func getDefaultComposeProviders() []string {
+       return defaultUnixComposeProviders
+}
Index: pkgsrc/sysutils/podman/files/ignition_netbsd.go
diff -u /dev/null pkgsrc/sysutils/podman/files/ignition_netbsd.go:1.1
--- /dev/null   Sat Jun 29 14:15:41 2024
+++ pkgsrc/sysutils/podman/files/ignition_netbsd.go     Sat Jun 29 14:15:41 2024
@@ -0,0 +1,7 @@
+//go:build netbsd
+
+package ignition
+
+func getLocalTimeZone() (string, error) {
+       return "", nil
+}
Index: pkgsrc/sysutils/podman/files/options_netbsd.go
diff -u /dev/null pkgsrc/sysutils/podman/files/options_netbsd.go:1.1
--- /dev/null   Sat Jun 29 14:15:41 2024
+++ pkgsrc/sysutils/podman/files/options_netbsd.go      Sat Jun 29 14:15:41 2024
@@ -0,0 +1,21 @@
+//go:build netbsd
+
+package types
+
+const (
+       // these are default path for run and graph root for rootful users
+       // for rootless path is constructed via getRootlessStorageOpts
+       defaultRunRoot   string = "@VARBASE@/run/containers/storage"
+       defaultGraphRoot string = "@VARBASE@/db/containers/storage"
+       SystemConfigFile        = "@PREFIX@/share/containers/storage.conf"
+)
+
+// defaultConfigFile path to the system wide storage.conf file
+var (
+       defaultOverrideConfigFile = "@PKG_SYSCONFDIR@/containers/storage.conf"
+)
+
+// canUseRootlessOverlay returns true if the overlay driver can be used for rootless containers
+func canUseRootlessOverlay(home, runhome string) bool {
+       return false
+}



Home | Main Index | Thread Index | Old Index