Update to selinux 1.5.1
Changes are listed here: https://github.com/opencontainers/selinux/compare/v1.3.3...v1.5.1 Not urgent as such, just keep up with eco-system. Signed-off-by: Davanum Srinivas <davanum@gmail.com>
This commit is contained in:
		
							
								
								
									
										28
									
								
								vendor/github.com/opencontainers/selinux/go-selinux/selinux_stub.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										28
									
								
								vendor/github.com/opencontainers/selinux/go-selinux/selinux_stub.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -1,4 +1,4 @@
 | 
			
		||||
// +build !selinux
 | 
			
		||||
// +build !selinux !linux
 | 
			
		||||
 | 
			
		||||
package selinux
 | 
			
		||||
 | 
			
		||||
@@ -35,6 +35,11 @@ func GetEnabled() bool {
 | 
			
		||||
	return false
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ClassIndex returns the int index for an object class in the loaded policy, or -1 and an error
 | 
			
		||||
func ClassIndex(class string) (int, error) {
 | 
			
		||||
	return -1, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SetFileLabel sets the SELinux label for this path or returns an error.
 | 
			
		||||
func SetFileLabel(fpath string, label string) error {
 | 
			
		||||
	return nil
 | 
			
		||||
@@ -88,6 +93,13 @@ func CanonicalizeContext(val string) (string, error) {
 | 
			
		||||
	return "", nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
ComputeCreateContext requests the type transition from source to target for class  from the kernel.
 | 
			
		||||
*/
 | 
			
		||||
func ComputeCreateContext(source string, target string, class string) (string, error) {
 | 
			
		||||
	return "", nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
SetExecLabel sets the SELinux label that the kernel will use for any programs
 | 
			
		||||
that are executed by the current process thread, or an error.
 | 
			
		||||
@@ -101,7 +113,7 @@ SetTaskLabel sets the SELinux label for the current thread, or an error.
 | 
			
		||||
This requires the dyntransition permission.
 | 
			
		||||
*/
 | 
			
		||||
func SetTaskLabel(label string) error {
 | 
			
		||||
        return nil
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
@@ -189,6 +201,18 @@ func ROFileLabel() string {
 | 
			
		||||
	return ""
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// KVMContainerLabels returns the default processLabel and mountLabel to be used
 | 
			
		||||
// for kvm containers by the calling process.
 | 
			
		||||
func KVMContainerLabels() (string, string) {
 | 
			
		||||
	return "", ""
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// InitContainerLabels returns the default processLabel and file labels to be
 | 
			
		||||
// used for containers running an init system like systemd by the calling
 | 
			
		||||
func InitContainerLabels() (string, string) {
 | 
			
		||||
	return "", ""
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
ContainerLabels returns an allocated processLabel and fileLabel to be used for
 | 
			
		||||
container labeling by the calling process.
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user