|
@@ -1,4 +1,4 @@
|
|
-// +build !seccomp,!windows
|
|
|
|
|
|
+// +build linux,!seccomp
|
|
|
|
|
|
package daemon
|
|
package daemon
|
|
|
|
|
|
@@ -9,6 +9,8 @@ import (
|
|
"github.com/opencontainers/specs/specs-go"
|
|
"github.com/opencontainers/specs/specs-go"
|
|
)
|
|
)
|
|
|
|
|
|
|
|
+var supportsSeccomp = false
|
|
|
|
+
|
|
func setSeccomp(daemon *Daemon, rs *specs.Spec, c *container.Container) error {
|
|
func setSeccomp(daemon *Daemon, rs *specs.Spec, c *container.Container) error {
|
|
if c.SeccompProfile != "" && c.SeccompProfile != "unconfined" {
|
|
if c.SeccompProfile != "" && c.SeccompProfile != "unconfined" {
|
|
return fmt.Errorf("seccomp profiles are not supported on this daemon, you cannot specify a custom seccomp profile")
|
|
return fmt.Errorf("seccomp profiles are not supported on this daemon, you cannot specify a custom seccomp profile")
|