
This is to check if runc 1.0.0 (to be released shortly) works with k8s. The commands used were (roughly): hack/pin-dependency.sh github.com/opencontainers/runc v1.0.0 hack/lint-dependencies.sh # Follow its recommendations. hack/pin-dependency.sh github.com/cilium/ebpf v0.6.1 hack/pin-dependency.sh github.com/opencontainers/selinux v1.8.2 hack/pin-dependency.sh github.com/sirupsen/logrus v1.8.1 # Recheck. hack/lint-dependencies.sh GO111MODULE=on go mod edit -dropreplace github.com/willf/bitset hack/update-vendor.sh # Recheck. hack/lint-dependencies.sh hack/update-internal-modules.sh # Recheck. hack/lint-dependencies.sh [v2: rebased, updated runc 3a0234e1fe2e82 -> 2f8e8e9d977500] [v3: testing master + runc pr 3019] [v4: updated to 93a01cd4d0b7a0f08a] [v5: updated to f093cca13d3cf8a484] [v6: rebased] [v7: updated to runc v1.0.0] [v8: rebased] Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
155 lines
2.3 KiB
Go
155 lines
2.3 KiB
Go
// +build !linux
|
|
|
|
package selinux
|
|
|
|
const privContainerMountLabel = ""
|
|
|
|
func setDisabled() {
|
|
}
|
|
|
|
func getEnabled() bool {
|
|
return false
|
|
}
|
|
|
|
func classIndex(class string) (int, error) {
|
|
return -1, nil
|
|
}
|
|
|
|
func setFileLabel(fpath string, label string) error {
|
|
return nil
|
|
}
|
|
|
|
func fileLabel(fpath string) (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func setFSCreateLabel(label string) error {
|
|
return nil
|
|
}
|
|
|
|
func fsCreateLabel() (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func currentLabel() (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func pidLabel(pid int) (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func execLabel() (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func canonicalizeContext(val string) (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func computeCreateContext(source string, target string, class string) (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func calculateGlbLub(sourceRange, targetRange string) (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func setExecLabel(label string) error {
|
|
return nil
|
|
}
|
|
|
|
func setTaskLabel(label string) error {
|
|
return nil
|
|
}
|
|
|
|
func setSocketLabel(label string) error {
|
|
return nil
|
|
}
|
|
|
|
func socketLabel() (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func peerLabel(fd uintptr) (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func setKeyLabel(label string) error {
|
|
return nil
|
|
}
|
|
|
|
func keyLabel() (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func (c Context) get() string {
|
|
return ""
|
|
}
|
|
|
|
func newContext(label string) (Context, error) {
|
|
c := make(Context)
|
|
return c, nil
|
|
}
|
|
|
|
func clearLabels() {
|
|
}
|
|
|
|
func reserveLabel(label string) {
|
|
}
|
|
|
|
func enforceMode() int {
|
|
return Disabled
|
|
}
|
|
|
|
func setEnforceMode(mode int) error {
|
|
return nil
|
|
}
|
|
|
|
func defaultEnforceMode() int {
|
|
return Disabled
|
|
}
|
|
|
|
func releaseLabel(label string) {
|
|
}
|
|
|
|
func roFileLabel() string {
|
|
return ""
|
|
}
|
|
|
|
func kvmContainerLabels() (string, string) {
|
|
return "", ""
|
|
}
|
|
|
|
func initContainerLabels() (string, string) {
|
|
return "", ""
|
|
}
|
|
|
|
func containerLabels() (processLabel string, fileLabel string) {
|
|
return "", ""
|
|
}
|
|
|
|
func securityCheckContext(val string) error {
|
|
return nil
|
|
}
|
|
|
|
func copyLevel(src, dest string) (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
func chcon(fpath string, label string, recurse bool) error {
|
|
return nil
|
|
}
|
|
|
|
func dupSecOpt(src string) ([]string, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
func disableSecOpt() []string {
|
|
return []string{"disable"}
|
|
}
|
|
|
|
func getDefaultContextWithLevel(user, level, scon string) (string, error) {
|
|
return "", nil
|
|
}
|