runc/label
Dan Walsh 7f60c92d65 Do not check if SELinux is enabled on lowlevel calls to set processlabel
docker exec changes the mount namespace which fools selinux bindings
into thinking SELinux is disabled.  Bindings should just check if
a label is passed in and attempt to use it.  Docker will not call these
functions with a label if SELinux is disabled.

Docker-DCO-1.1-Signed-off-by: Dan Walsh <dwalsh@redhat.com> (github: rhatdan)
2014-10-11 06:04:52 -04:00
..
label.go Allow docker to free container labels when containers are removed. 2014-08-20 17:07:38 -04:00
label_selinux.go Do not check if SELinux is enabled on lowlevel calls to set processlabel 2014-10-11 06:04:52 -04:00
label_selinux_test.go Add label.InitLabels functioni. Allows generation of labels based on options 2014-07-28 16:09:17 -04:00