Skip to content
GitLab
  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
  • Sign in
  • N Nomad
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • Issues 0
    • Issues 0
    • List
    • Boards
    • Service Desk
    • Milestones
    • Requirements
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
    • Test Cases
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Code review
    • Insights
    • Issue
    • Repository
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • 小 白蛋
  • Nomad
  • Repository
Switch branch/tag
  • nomad
  • drivers
  • shared
  • executor
  • executor_linux.go
Find file BlameHistoryPermalink
  • Mahmood Ali's avatar
    exec: use an independent name=systemd cgroup path · c72bf13f
    Mahmood Ali authored Jun 10, 2019
    We aim for containers to be part of a new cgroups hierarchy independent
    from nomad agent.  However, we've been setting a relative path as
    libcontainer `cfg.Cgroups.Path`, which makes libcontainer concatinate
    the executor process cgroup with passed cgroup, as set in [1].
    
    By setting an absolute path, we ensure that all cgroups subsystem
    (including `name=systemd` get a dedicated one).  This matches behavior
    in Nomad 0.8, and behavior of how Docker and OCI sets CgroupsPath[2]
    
    Fixes #5736
    
    [1] https://github.com/hashicorp/nomad/blob/d7edf9b2e42348865908735996359c7869fb16b5/vendor/github.com/opencontainers/runc/libcontainer/cgroups/fs/apply_raw.go#L326-L340
    [2] https://github.com/moby/moby/blob/238f8eaa31aa74be843c81703fabf774863ec30c/vendor/github.com/containerd/containerd/oci/spec.go#L229
    c72bf13f

免费DevSecOps平台,让您的项目体验完整的DevSecOps流程,让项目更安全