Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

repo: Don't try to perform labeling if SELinux is disabled #1665

Merged
merged 1 commit into from
Jun 19, 2024

Commits on Jun 4, 2024

  1. repo: Don't try to perform labeling if SELinux is disabled

    The default for container execution is that `/sys/fs/selinux`
    is not mounted, and the libselinux library function `is_selinux_enabled`
    should be used to dynamically check if the system should attempt to perform SELinux labeling.
    
    This is how it's done by rpm, ostree, and systemd for example.
    
    But this code unconditionally tries to label if it finds a policy,
    which breaks in an obscure corner case
    when executed inside a container that includes policy files (e.g.
    fedora/rhel-bootc) but when we're not using overlayfs for the backend
    (with BUILDAH_BACKEND=vfs).
    cgwalters committed Jun 4, 2024
    Configuration menu
    Copy the full SHA
    098ec4f View commit details
    Browse the repository at this point in the history