Files
docker-cli/components/engine/integration-cli
Phil Estes 86be218c45 Only chown network files within container metadata
If the user specifies a mountpath from the host, we should not be
attempting to chown files outside the daemon's metadata directory
(represented by `daemon.repository` at init time).

This forces users who want to use user namespaces to handle the
ownership needs of any external files mounted as network files
(/etc/resolv.conf, /etc/hosts, /etc/hostname) separately from the
daemon. In all other volume/bind mount situations we have taken this
same line--we don't chown host file content.

Docker-DCO-1.1-Signed-off-by: Phil Estes <estesp@linux.vnet.ibm.com>
Upstream-commit: 42716dcf5c986e4cbb51f480f2782c05e5bd0b41
Component: engine
2017-11-01 10:14:01 -04:00
..
2017-08-30 13:13:18 -04:00
2017-08-22 17:15:26 -04:00
2017-09-15 16:01:15 +02:00
2017-08-25 12:07:30 -04:00
2017-10-07 00:10:24 +08:00
2017-07-03 13:13:09 -07:00
2017-09-15 16:01:15 +02:00
2017-09-15 16:01:15 +02:00
2017-09-14 19:27:09 +02:00
2017-08-25 12:07:30 -04:00