Update runc to resolve selinux issues
Signed-off-by: Michael Crosby <crosbymichael@gmail.com>
This commit is contained in:
		
							
								
								
									
										37
									
								
								vendor/github.com/opencontainers/selinux/go-selinux/selinux_stub.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										37
									
								
								vendor/github.com/opencontainers/selinux/go-selinux/selinux_stub.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -96,15 +96,44 @@ func SetExecLabel(label string) error {
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
SetSocketLabel sets the SELinux label that the kernel will use for any programs
 | 
			
		||||
that are executed by the current process thread, or an error.
 | 
			
		||||
*/
 | 
			
		||||
func SetSocketLabel(label string) error {
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SocketLabel retrieves the current socket label setting
 | 
			
		||||
func SocketLabel() (string, error) {
 | 
			
		||||
	return "", nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SetKeyLabel takes a process label and tells the kernel to assign the
 | 
			
		||||
// label to the next kernel keyring that gets created
 | 
			
		||||
func SetKeyLabel(label string) error {
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// KeyLabel retrieves the current kernel keyring label setting
 | 
			
		||||
func KeyLabel() (string, error) {
 | 
			
		||||
	return "", nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Get returns the Context as a string
 | 
			
		||||
func (c Context) Get() string {
 | 
			
		||||
	return ""
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// NewContext creates a new Context struct from the specified label
 | 
			
		||||
func NewContext(label string) Context {
 | 
			
		||||
func NewContext(label string) (Context, error) {
 | 
			
		||||
	c := make(Context)
 | 
			
		||||
	return c
 | 
			
		||||
	return c, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ClearLabels clears all reserved MLS/MCS levels
 | 
			
		||||
func ClearLabels() {
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ReserveLabel reserves the MLS/MCS level component of the specified label
 | 
			
		||||
@@ -177,8 +206,8 @@ func Chcon(fpath string, label string, recurse bool) error {
 | 
			
		||||
 | 
			
		||||
// DupSecOpt takes an SELinux process label and returns security options that
 | 
			
		||||
// can be used to set the SELinux Type and Level for future container processes.
 | 
			
		||||
func DupSecOpt(src string) []string {
 | 
			
		||||
	return nil
 | 
			
		||||
func DupSecOpt(src string) ([]string, error) {
 | 
			
		||||
	return nil, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DisableSecOpt returns a security opt that can be used to disable SELinux
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user