mirror of
https://github.com/flatcar/scripts.git
synced 2025-12-15 22:31:59 +01:00
app-emulation/docker-runc: adapt patches for runc 1.0.0-rc91
To fix builds, adapt patches for runc 1.0.0-rc91.
This commit is contained in:
parent
63adddc590
commit
e6b8d5175a
@ -26,7 +26,7 @@ index 3b42f301..bace067d 100644
|
||||
return fmt.Errorf("unable to restrict sys entries without a private MNT namespace")
|
||||
}
|
||||
- if config.ProcessLabel != "" && !selinux.GetEnabled() {
|
||||
- return fmt.Errorf("selinux label is specified in config, but selinux is disabled or not supported")
|
||||
- return errors.New("selinux label is specified in config, but selinux is disabled or not supported")
|
||||
- }
|
||||
|
||||
return nil
|
||||
@ -41,14 +41,14 @@ index b05e7b60..ce50db14 100644
|
||||
"github.com/opencontainers/runtime-spec/specs-go"
|
||||
- selinux "github.com/opencontainers/selinux/go-selinux"
|
||||
|
||||
"github.com/coreos/go-systemd/activation"
|
||||
"github.com/coreos/go-systemd/v22/activation"
|
||||
"github.com/pkg/errors"
|
||||
@@ -388,9 +387,6 @@ func validateProcessSpec(spec *specs.Process) error {
|
||||
if len(spec.Args) == 0 {
|
||||
return fmt.Errorf("args must not be empty")
|
||||
}
|
||||
- if spec.SelinuxLabel != "" && !selinux.GetEnabled() {
|
||||
- return fmt.Errorf("selinux label is specified in config, but selinux is disabled or not supported")
|
||||
- return errors.New("selinux label is specified in config, but selinux is disabled or not supported")
|
||||
- }
|
||||
return nil
|
||||
}
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user