remove "selinux" build tag
The build tag was removed in go-selinux v1.8.0: opencontainers/selinux#132
Related: remove "apparmor" build tag: 0a9147f3aa
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
			
			
This commit is contained in:
		
							
								
								
									
										41
									
								
								vendor/github.com/opencontainers/selinux/go-selinux/selinux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										41
									
								
								vendor/github.com/opencontainers/selinux/go-selinux/selinux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -30,6 +30,11 @@ var (
 | 
			
		||||
	// ErrLevelSyntax is returned when a sensitivity or category do not have correct syntax in a level
 | 
			
		||||
	ErrLevelSyntax = errors.New("invalid level syntax")
 | 
			
		||||
 | 
			
		||||
	// ErrContextMissing is returned if a requested context is not found in a file.
 | 
			
		||||
	ErrContextMissing = errors.New("context does not have a match")
 | 
			
		||||
	// ErrVerifierNil is returned when a context verifier function is nil.
 | 
			
		||||
	ErrVerifierNil = errors.New("verifier function is nil")
 | 
			
		||||
 | 
			
		||||
	// CategoryRange allows the upper bound on the category range to be adjusted
 | 
			
		||||
	CategoryRange = DefaultCategoryRange
 | 
			
		||||
)
 | 
			
		||||
@@ -63,8 +68,12 @@ func FileLabel(fpath string) (string, error) {
 | 
			
		||||
	return fileLabel(fpath)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SetFSCreateLabel tells kernel the label to create all file system objects
 | 
			
		||||
// created by this task. Setting label="" to return to default.
 | 
			
		||||
// SetFSCreateLabel tells the kernel what label to use for all file system objects
 | 
			
		||||
// created by this task.
 | 
			
		||||
// Set the label to an empty string to return to the default label. Calls to SetFSCreateLabel
 | 
			
		||||
// should be wrapped in runtime.LockOSThread()/runtime.UnlockOSThread() until file system
 | 
			
		||||
// objects created by this task are finished to guarantee another goroutine does not migrate
 | 
			
		||||
// to the current thread before execution is complete.
 | 
			
		||||
func SetFSCreateLabel(label string) error {
 | 
			
		||||
	return setFSCreateLabel(label)
 | 
			
		||||
}
 | 
			
		||||
@@ -113,19 +122,27 @@ func CalculateGlbLub(sourceRange, targetRange string) (string, error) {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SetExecLabel sets the SELinux label that the kernel will use for any programs
 | 
			
		||||
// that are executed by the current process thread, or an error.
 | 
			
		||||
// that are executed by the current process thread, or an error. Calls to SetExecLabel
 | 
			
		||||
// should  be wrapped in runtime.LockOSThread()/runtime.UnlockOSThread() until execution
 | 
			
		||||
// of the program is finished to guarantee another goroutine does not migrate to the current
 | 
			
		||||
// thread before execution is complete.
 | 
			
		||||
func SetExecLabel(label string) error {
 | 
			
		||||
	return setExecLabel(label)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SetTaskLabel sets the SELinux label for the current thread, or an error.
 | 
			
		||||
// This requires the dyntransition permission.
 | 
			
		||||
// This requires the dyntransition permission. Calls to SetTaskLabel should
 | 
			
		||||
// be wrapped in runtime.LockOSThread()/runtime.UnlockOSThread() to guarantee
 | 
			
		||||
// the current thread does not run in a new mislabeled thread.
 | 
			
		||||
func SetTaskLabel(label string) error {
 | 
			
		||||
	return setTaskLabel(label)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SetSocketLabel takes a process label and tells the kernel to assign the
 | 
			
		||||
// label to the next socket that gets created
 | 
			
		||||
// label to the next socket that gets created. Calls to SetSocketLabel
 | 
			
		||||
// should be wrapped in runtime.LockOSThread()/runtime.UnlockOSThread() until
 | 
			
		||||
// the the socket is created to guarantee another goroutine does not migrate
 | 
			
		||||
// to the current thread before execution is complete.
 | 
			
		||||
func SetSocketLabel(label string) error {
 | 
			
		||||
	return setSocketLabel(label)
 | 
			
		||||
}
 | 
			
		||||
@@ -141,7 +158,10 @@ func PeerLabel(fd uintptr) (string, error) {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SetKeyLabel takes a process label and tells the kernel to assign the
 | 
			
		||||
// label to the next kernel keyring that gets created
 | 
			
		||||
// label to the next kernel keyring that gets created. Calls to SetKeyLabel
 | 
			
		||||
// should be wrapped in runtime.LockOSThread()/runtime.UnlockOSThread() until
 | 
			
		||||
// the kernel keyring is created to guarantee another goroutine does not migrate
 | 
			
		||||
// to the current thread before execution is complete.
 | 
			
		||||
func SetKeyLabel(label string) error {
 | 
			
		||||
	return setKeyLabel(label)
 | 
			
		||||
}
 | 
			
		||||
@@ -247,3 +267,12 @@ func DupSecOpt(src string) ([]string, error) {
 | 
			
		||||
func DisableSecOpt() []string {
 | 
			
		||||
	return disableSecOpt()
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// GetDefaultContextWithLevel gets a single context for the specified SELinux user
 | 
			
		||||
// identity that is reachable from the specified scon context. The context is based
 | 
			
		||||
// on the per-user /etc/selinux/{SELINUXTYPE}/contexts/users/<username> if it exists,
 | 
			
		||||
// and falls back to the global /etc/selinux/{SELINUXTYPE}/contexts/default_contexts
 | 
			
		||||
// file.
 | 
			
		||||
func GetDefaultContextWithLevel(user, level, scon string) (string, error) {
 | 
			
		||||
	return getDefaultContextWithLevel(user, level, scon)
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user