mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
Merge pull request #24468 from yongtang/24374-docker-info-seccomp
Fix seccomp output in `docker info`
This commit is contained in:
commit
bc5fa7c5e0
4 changed files with 11 additions and 2 deletions
|
@ -71,7 +71,7 @@ func (daemon *Daemon) SystemInfo() (*types.Info, error) {
|
|||
if sysInfo.AppArmor {
|
||||
securityOptions = append(securityOptions, "apparmor")
|
||||
}
|
||||
if sysInfo.Seccomp {
|
||||
if sysInfo.Seccomp && supportsSeccomp {
|
||||
securityOptions = append(securityOptions, "seccomp")
|
||||
}
|
||||
if selinuxEnabled() {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
// +build !seccomp,!windows
|
||||
// +build linux,!seccomp
|
||||
|
||||
package daemon
|
||||
|
||||
|
@ -9,6 +9,8 @@ import (
|
|||
"github.com/opencontainers/specs/specs-go"
|
||||
)
|
||||
|
||||
var supportsSeccomp = false
|
||||
|
||||
func setSeccomp(daemon *Daemon, rs *specs.Spec, c *container.Container) error {
|
||||
if c.SeccompProfile != "" && c.SeccompProfile != "unconfined" {
|
||||
return fmt.Errorf("seccomp profiles are not supported on this daemon, you cannot specify a custom seccomp profile")
|
||||
|
|
|
@ -11,6 +11,8 @@ import (
|
|||
"github.com/opencontainers/specs/specs-go"
|
||||
)
|
||||
|
||||
var supportsSeccomp = true
|
||||
|
||||
func setSeccomp(daemon *Daemon, rs *specs.Spec, c *container.Container) error {
|
||||
var profile *specs.Seccomp
|
||||
var err error
|
||||
|
|
5
daemon/seccomp_unsupported.go
Normal file
5
daemon/seccomp_unsupported.go
Normal file
|
@ -0,0 +1,5 @@
|
|||
// +build !linux
|
||||
|
||||
package daemon
|
||||
|
||||
var supportsSeccomp = false
|
Loading…
Add table
Reference in a new issue