Files
docker-cli/components/engine/daemon
Phil Estes 86be218c45 Only chown network files within container metadata
If the user specifies a mountpath from the host, we should not be
attempting to chown files outside the daemon's metadata directory
(represented by `daemon.repository` at init time).

This forces users who want to use user namespaces to handle the
ownership needs of any external files mounted as network files
(/etc/resolv.conf, /etc/hosts, /etc/hostname) separately from the
daemon. In all other volume/bind mount situations we have taken this
same line--we don't chown host file content.

Docker-DCO-1.1-Signed-off-by: Phil Estes <estesp@linux.vnet.ibm.com>
Upstream-commit: 42716dcf5c986e4cbb51f480f2782c05e5bd0b41
Component: engine
2017-11-01 10:14:01 -04:00
..
2017-09-08 18:23:21 -04:00
2017-10-24 15:39:34 -04:00
2017-08-24 15:08:31 -04:00
2017-10-18 10:26:58 +08:00
2017-10-24 15:39:34 -04:00
2017-09-06 12:05:19 -04:00
2017-07-31 13:16:46 -07:00
2017-10-24 15:39:34 -04:00
2017-05-16 14:25:32 -07:00
2017-07-31 13:16:46 -07:00
2017-10-24 15:39:34 -04:00
2017-07-31 13:16:46 -07:00
2017-07-13 12:35:00 -07:00
2017-09-08 18:23:21 -04:00
2017-07-31 13:16:46 -07:00
2017-10-19 11:09:29 -07:00
2017-07-31 13:16:46 -07:00
2017-07-31 13:16:46 -07:00
2017-08-21 18:18:50 -04:00
2017-08-18 17:09:27 -07:00
2017-08-18 17:09:27 -07:00
2017-08-18 17:09:27 -07:00
2017-08-18 17:09:27 -07:00
2017-08-18 17:09:27 -07:00
2017-08-24 15:08:31 -04:00
2017-10-09 13:47:28 -07:00
2017-07-18 12:09:26 +08:00
2017-07-31 13:16:46 -07:00
2017-09-12 12:09:59 -04:00
2017-10-24 15:39:34 -04:00
2017-07-31 13:16:46 -07:00
2016-12-27 21:46:52 +08:00
2017-07-31 13:16:46 -07:00
2017-05-16 11:30:06 -07:00
2017-07-31 13:16:46 -07:00
2017-10-24 15:39:34 -04:00
2017-09-07 09:44:08 +08:00
2017-09-06 12:05:19 -04:00
2017-09-06 12:05:19 -04:00
2017-07-03 13:13:09 -07:00
2017-05-16 15:11:39 -07:00
2017-06-07 11:45:33 -04:00