@@ -446,42 +446,3 @@ func cleanResourcePath(path string) string {
446446func (container * Container ) EnableServiceDiscoveryOnDefaultNetwork () bool {
447447 return false
448448}
449-
450- // SecretMountRHEL returns the Secret Mount point
451- func (container * Container ) SecretMountRHEL (rootUID , rootGID int ) (* Mount , error ) {
452- secretsPath , err := container .GetRootResourcePath ("secrets" )
453- if err != nil {
454- return nil , fmt .Errorf ("GetSecretsPath failed: %v" , err )
455- }
456-
457- if err := os .RemoveAll (secretsPath ); err != nil {
458- return nil , fmt .Errorf ("RemoveSecretsPath failed: %v" , err )
459- }
460-
461- if err := os .MkdirAll (secretsPath , 0755 ); err != nil {
462- return nil , fmt .Errorf ("MakeDirSecretsPath failed: %v" , err )
463- }
464-
465- data , err := getHostSecretData ()
466- if err != nil {
467- return nil , fmt .Errorf ("GetHostSecretData failed: %v" , err )
468- }
469- for _ , s := range data {
470- s .SaveTo (secretsPath )
471- }
472-
473- if rootUID != 0 {
474- callback := func (p string , info os.FileInfo , err error ) error {
475- return os .Chown (p , rootUID , rootGID )
476- }
477-
478- filepath .Walk (secretsPath , callback )
479- }
480- label .Relabel (secretsPath , container .MountLabel , false )
481-
482- m := & Mount {}
483- m .Source = secretsPath
484- m .Destination = "/run/secrets"
485- m .Writable = true
486- return m , nil
487- }
0 commit comments