mirror of
https://github.com/containers/podman.git
synced 2025-05-20 16:47:39 +08:00

Before, there were SELinux denials when a volume was bind-mounted by podman play kube. Partially fix this by setting the default private label for mounts created by play kube (with DirectoryOrCreate) For volumes mounted as Directory, the user will have to set their own SELinux permissions on the mount point also remove left over debugging print statement Signed-off-by: Peter Hunt <pehunt@redhat.com>
30 lines
862 B
Go
30 lines
862 B
Go
// +build !linux
|
|
|
|
package libpod
|
|
|
|
import (
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
func systemdSliceFromPath(parent, name string) (string, error) {
|
|
return "", errors.Wrapf(ErrOSNotSupported, "cgroups are not supported on non-linux OSes")
|
|
}
|
|
|
|
func makeSystemdCgroup(path string) error {
|
|
return errors.Wrapf(ErrOSNotSupported, "cgroups are not supported on non-linux OSes")
|
|
}
|
|
|
|
func deleteSystemdCgroup(path string) error {
|
|
return errors.Wrapf(ErrOSNotSupported, "cgroups are not supported on non-linux OSes")
|
|
}
|
|
|
|
func assembleSystemdCgroupName(baseSlice, newSlice string) (string, error) {
|
|
return "", errors.Wrapf(ErrOSNotSupported, "cgroups are not supported on non-linux OSes")
|
|
}
|
|
|
|
// LabelVolumePath takes a mount path for a volume and gives it an
|
|
// selinux label of either shared or not
|
|
func LabelVolumePath(path string, shared bool) error {
|
|
return ErrNotImplemented
|
|
}
|