diff options
author | Kevin Krakauer <krakauer@google.com> | 2018-06-19 21:42:21 -0700 |
---|---|---|
committer | Shentubot <shentubot@google.com> | 2018-06-19 21:44:33 -0700 |
commit | 5397963b5d4d57bd3d3668df880b5314ca2fc3d8 (patch) | |
tree | 1e56b21b1248c0d74772e7daf368a6ab91e35911 /runsc/cmd/ps.go | |
parent | db66e383c33228c43efbe16ad3b14ae9833879dc (diff) |
runsc: Enable container creation within existing sandboxes.
Containers are created as processes in the sandbox. Of the many things that
don't work yet, the biggest issue is that the fsgofer is launched with its root
as the sandbox's root directory. Thus, when a container is started and wants to
read anything (including the init binary of the container), the gofer tries to
serve from sandbox's root (which basically just has pause), not the container's.
PiperOrigin-RevId: 201294560
Change-Id: I6423aa8830538959c56ae908ce067e4199d627b1
Diffstat (limited to 'runsc/cmd/ps.go')
-rw-r--r-- | runsc/cmd/ps.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/runsc/cmd/ps.go b/runsc/cmd/ps.go index 9f9f4d15e..5d219bfdc 100644 --- a/runsc/cmd/ps.go +++ b/runsc/cmd/ps.go @@ -62,7 +62,7 @@ func (ps *PS) Execute(ctx context.Context, f *flag.FlagSet, args ...interface{}) c, err := container.Load(conf.RootDir, id) if err != nil { - Fatalf("error loading sandox: %v", err) + Fatalf("error loading sandbox: %v", err) } pList, err := c.Processes() if err != nil { |