vendor: github.com/opencontainers/selinux v1.10.2
full diff: https://github.com/opencontainers/selinux/compare/v1.10.1...v1.10.2 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
This commit is contained in:
parent
31f9d13f0c
commit
e2d8f3859a
2
go.mod
2
go.mod
@ -47,7 +47,7 @@ require (
|
|||||||
github.com/opencontainers/image-spec v1.0.3-0.20220303224323-02efb9a75ee1
|
github.com/opencontainers/image-spec v1.0.3-0.20220303224323-02efb9a75ee1
|
||||||
github.com/opencontainers/runc v1.1.4
|
github.com/opencontainers/runc v1.1.4
|
||||||
github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417
|
github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417
|
||||||
github.com/opencontainers/selinux v1.10.1
|
github.com/opencontainers/selinux v1.10.2
|
||||||
github.com/pelletier/go-toml v1.9.3
|
github.com/pelletier/go-toml v1.9.3
|
||||||
github.com/prometheus/client_golang v1.12.1
|
github.com/prometheus/client_golang v1.12.1
|
||||||
github.com/sirupsen/logrus v1.8.1
|
github.com/sirupsen/logrus v1.8.1
|
||||||
|
5
go.sum
5
go.sum
@ -784,8 +784,8 @@ github.com/opencontainers/selinux v1.6.0/go.mod h1:VVGKuOLlE7v4PJyT6h7mNWvq1rzqi
|
|||||||
github.com/opencontainers/selinux v1.8.0/go.mod h1:RScLhm78qiWa2gbVCcGkC7tCGdgk3ogry1nUQF8Evvo=
|
github.com/opencontainers/selinux v1.8.0/go.mod h1:RScLhm78qiWa2gbVCcGkC7tCGdgk3ogry1nUQF8Evvo=
|
||||||
github.com/opencontainers/selinux v1.8.2/go.mod h1:MUIHuUEvKB1wtJjQdOyYRgOnLD2xAPP8dBsCoU0KuF8=
|
github.com/opencontainers/selinux v1.8.2/go.mod h1:MUIHuUEvKB1wtJjQdOyYRgOnLD2xAPP8dBsCoU0KuF8=
|
||||||
github.com/opencontainers/selinux v1.10.0/go.mod h1:2i0OySw99QjzBBQByd1Gr9gSjvuho1lHsJxIJ3gGbJI=
|
github.com/opencontainers/selinux v1.10.0/go.mod h1:2i0OySw99QjzBBQByd1Gr9gSjvuho1lHsJxIJ3gGbJI=
|
||||||
github.com/opencontainers/selinux v1.10.1 h1:09LIPVRP3uuZGQvgR+SgMSNBd1Eb3vlRbGqQpoHsF8w=
|
github.com/opencontainers/selinux v1.10.2 h1:NFy2xCsjn7+WspbfZkUd5zyVeisV7VFbPSP96+8/ha4=
|
||||||
github.com/opencontainers/selinux v1.10.1/go.mod h1:2i0OySw99QjzBBQByd1Gr9gSjvuho1lHsJxIJ3gGbJI=
|
github.com/opencontainers/selinux v1.10.2/go.mod h1:cARutUbaUrlRClyvxOICCgKixCs6L05aUsohzA3EkHQ=
|
||||||
github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
||||||
github.com/pascaldekloe/goe v0.0.0-20180627143212-57f6aae5913c/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc=
|
github.com/pascaldekloe/goe v0.0.0-20180627143212-57f6aae5913c/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc=
|
||||||
github.com/pelletier/go-toml v1.2.0/go.mod h1:5z9KED0ma1S8pY6P1sdut58dfprrGBbd/94hg7ilaic=
|
github.com/pelletier/go-toml v1.2.0/go.mod h1:5z9KED0ma1S8pY6P1sdut58dfprrGBbd/94hg7ilaic=
|
||||||
@ -1287,6 +1287,7 @@ golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e/go.mod h1:oPkhp1MJrh7nUepCBc
|
|||||||
golang.org/x/sys v0.0.0-20220114195835-da31bd327af9/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220114195835-da31bd327af9/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220209214540-3681064d5158/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220209214540-3681064d5158/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220915200043-7b5979e65e41 h1:ohgcoMbSofXygzo6AD2I1kz3BFmW1QArPYTtwEM3UXc=
|
golang.org/x/sys v0.0.0-20220915200043-7b5979e65e41 h1:ohgcoMbSofXygzo6AD2I1kz3BFmW1QArPYTtwEM3UXc=
|
||||||
golang.org/x/sys v0.0.0-20220915200043-7b5979e65e41/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220915200043-7b5979e65e41/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw=
|
golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw=
|
||||||
|
@ -51,7 +51,7 @@ require (
|
|||||||
github.com/moby/sys/signal v0.7.0 // indirect
|
github.com/moby/sys/signal v0.7.0 // indirect
|
||||||
github.com/opencontainers/runc v1.1.4 // indirect
|
github.com/opencontainers/runc v1.1.4 // indirect
|
||||||
github.com/opencontainers/runtime-tools v0.0.0-20190417131837-cd1349b7c47e // indirect
|
github.com/opencontainers/runtime-tools v0.0.0-20190417131837-cd1349b7c47e // indirect
|
||||||
github.com/opencontainers/selinux v1.10.1 // indirect
|
github.com/opencontainers/selinux v1.10.2 // indirect
|
||||||
github.com/pelletier/go-toml v1.9.3 // indirect
|
github.com/pelletier/go-toml v1.9.3 // indirect
|
||||||
github.com/pkg/errors v0.9.1 // indirect
|
github.com/pkg/errors v0.9.1 // indirect
|
||||||
github.com/pmezard/go-difflib v1.0.0 // indirect
|
github.com/pmezard/go-difflib v1.0.0 // indirect
|
||||||
|
@ -547,8 +547,8 @@ github.com/opencontainers/runtime-tools v0.0.0-20190417131837-cd1349b7c47e h1:2T
|
|||||||
github.com/opencontainers/runtime-tools v0.0.0-20190417131837-cd1349b7c47e/go.mod h1:r3f7wjNzSs2extwzU3Y+6pKfobzPh+kKFJ3ofN+3nfs=
|
github.com/opencontainers/runtime-tools v0.0.0-20190417131837-cd1349b7c47e/go.mod h1:r3f7wjNzSs2extwzU3Y+6pKfobzPh+kKFJ3ofN+3nfs=
|
||||||
github.com/opencontainers/selinux v1.8.2/go.mod h1:MUIHuUEvKB1wtJjQdOyYRgOnLD2xAPP8dBsCoU0KuF8=
|
github.com/opencontainers/selinux v1.8.2/go.mod h1:MUIHuUEvKB1wtJjQdOyYRgOnLD2xAPP8dBsCoU0KuF8=
|
||||||
github.com/opencontainers/selinux v1.10.0/go.mod h1:2i0OySw99QjzBBQByd1Gr9gSjvuho1lHsJxIJ3gGbJI=
|
github.com/opencontainers/selinux v1.10.0/go.mod h1:2i0OySw99QjzBBQByd1Gr9gSjvuho1lHsJxIJ3gGbJI=
|
||||||
github.com/opencontainers/selinux v1.10.1 h1:09LIPVRP3uuZGQvgR+SgMSNBd1Eb3vlRbGqQpoHsF8w=
|
github.com/opencontainers/selinux v1.10.2 h1:NFy2xCsjn7+WspbfZkUd5zyVeisV7VFbPSP96+8/ha4=
|
||||||
github.com/opencontainers/selinux v1.10.1/go.mod h1:2i0OySw99QjzBBQByd1Gr9gSjvuho1lHsJxIJ3gGbJI=
|
github.com/opencontainers/selinux v1.10.2/go.mod h1:cARutUbaUrlRClyvxOICCgKixCs6L05aUsohzA3EkHQ=
|
||||||
github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
||||||
github.com/pascaldekloe/goe v0.0.0-20180627143212-57f6aae5913c/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc=
|
github.com/pascaldekloe/goe v0.0.0-20180627143212-57f6aae5913c/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc=
|
||||||
github.com/pelletier/go-toml v1.2.0/go.mod h1:5z9KED0ma1S8pY6P1sdut58dfprrGBbd/94hg7ilaic=
|
github.com/pelletier/go-toml v1.2.0/go.mod h1:5z9KED0ma1S8pY6P1sdut58dfprrGBbd/94hg7ilaic=
|
||||||
@ -963,6 +963,7 @@ golang.org/x/sys v0.0.0-20220209214540-3681064d5158/go.mod h1:oPkhp1MJrh7nUepCBc
|
|||||||
golang.org/x/sys v0.0.0-20220405210540-1e041c57c461/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220405210540-1e041c57c461/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220412211240-33da011f77ad/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220412211240-33da011f77ad/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220915200043-7b5979e65e41 h1:ohgcoMbSofXygzo6AD2I1kz3BFmW1QArPYTtwEM3UXc=
|
golang.org/x/sys v0.0.0-20220915200043-7b5979e65e41 h1:ohgcoMbSofXygzo6AD2I1kz3BFmW1QArPYTtwEM3UXc=
|
||||||
|
1
vendor/github.com/opencontainers/selinux/go-selinux/doc.go
generated
vendored
1
vendor/github.com/opencontainers/selinux/go-selinux/doc.go
generated
vendored
@ -9,6 +9,5 @@ Usage:
|
|||||||
if selinux.EnforceMode() != selinux.Enforcing {
|
if selinux.EnforceMode() != selinux.Enforcing {
|
||||||
selinux.SetEnforceMode(selinux.Enforcing)
|
selinux.SetEnforceMode(selinux.Enforcing)
|
||||||
}
|
}
|
||||||
|
|
||||||
*/
|
*/
|
||||||
package selinux
|
package selinux
|
||||||
|
46
vendor/github.com/opencontainers/selinux/go-selinux/label/label_linux.go
generated
vendored
46
vendor/github.com/opencontainers/selinux/go-selinux/label/label_linux.go
generated
vendored
@ -3,8 +3,6 @@ package label
|
|||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
|
||||||
"os/user"
|
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/opencontainers/selinux/go-selinux"
|
"github.com/opencontainers/selinux/go-selinux"
|
||||||
@ -113,50 +111,6 @@ func Relabel(path string, fileLabel string, shared bool) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
exclude_paths := map[string]bool{
|
|
||||||
"/": true,
|
|
||||||
"/bin": true,
|
|
||||||
"/boot": true,
|
|
||||||
"/dev": true,
|
|
||||||
"/etc": true,
|
|
||||||
"/etc/passwd": true,
|
|
||||||
"/etc/pki": true,
|
|
||||||
"/etc/shadow": true,
|
|
||||||
"/home": true,
|
|
||||||
"/lib": true,
|
|
||||||
"/lib64": true,
|
|
||||||
"/media": true,
|
|
||||||
"/opt": true,
|
|
||||||
"/proc": true,
|
|
||||||
"/root": true,
|
|
||||||
"/run": true,
|
|
||||||
"/sbin": true,
|
|
||||||
"/srv": true,
|
|
||||||
"/sys": true,
|
|
||||||
"/tmp": true,
|
|
||||||
"/usr": true,
|
|
||||||
"/var": true,
|
|
||||||
"/var/lib": true,
|
|
||||||
"/var/log": true,
|
|
||||||
}
|
|
||||||
|
|
||||||
if home := os.Getenv("HOME"); home != "" {
|
|
||||||
exclude_paths[home] = true
|
|
||||||
}
|
|
||||||
|
|
||||||
if sudoUser := os.Getenv("SUDO_USER"); sudoUser != "" {
|
|
||||||
if usr, err := user.Lookup(sudoUser); err == nil {
|
|
||||||
exclude_paths[usr.HomeDir] = true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if path != "/" {
|
|
||||||
path = strings.TrimSuffix(path, "/")
|
|
||||||
}
|
|
||||||
if exclude_paths[path] {
|
|
||||||
return fmt.Errorf("SELinux relabeling of %s is not allowed", path)
|
|
||||||
}
|
|
||||||
|
|
||||||
if shared {
|
if shared {
|
||||||
c, err := selinux.NewContext(fileLabel)
|
c, err := selinux.NewContext(fileLabel)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
1
vendor/github.com/opencontainers/selinux/go-selinux/label/label_stub.go
generated
vendored
1
vendor/github.com/opencontainers/selinux/go-selinux/label/label_stub.go
generated
vendored
@ -1,3 +1,4 @@
|
|||||||
|
//go:build !linux
|
||||||
// +build !linux
|
// +build !linux
|
||||||
|
|
||||||
package label
|
package label
|
||||||
|
12
vendor/github.com/opencontainers/selinux/go-selinux/rchcon.go
generated
vendored
12
vendor/github.com/opencontainers/selinux/go-selinux/rchcon.go
generated
vendored
@ -1,3 +1,4 @@
|
|||||||
|
//go:build linux && go1.16
|
||||||
// +build linux,go1.16
|
// +build linux,go1.16
|
||||||
|
|
||||||
package selinux
|
package selinux
|
||||||
@ -11,7 +12,18 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func rchcon(fpath, label string) error {
|
func rchcon(fpath, label string) error {
|
||||||
|
fastMode := false
|
||||||
|
// If the current label matches the new label, assume
|
||||||
|
// other labels are correct.
|
||||||
|
if cLabel, err := lFileLabel(fpath); err == nil && cLabel == label {
|
||||||
|
fastMode = true
|
||||||
|
}
|
||||||
return pwalkdir.Walk(fpath, func(p string, _ fs.DirEntry, _ error) error {
|
return pwalkdir.Walk(fpath, func(p string, _ fs.DirEntry, _ error) error {
|
||||||
|
if fastMode {
|
||||||
|
if cLabel, err := lFileLabel(fpath); err == nil && cLabel == label {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
e := lSetFileLabel(p, label)
|
e := lSetFileLabel(p, label)
|
||||||
// Walk a file tree can race with removal, so ignore ENOENT.
|
// Walk a file tree can race with removal, so ignore ENOENT.
|
||||||
if errors.Is(e, os.ErrNotExist) {
|
if errors.Is(e, os.ErrNotExist) {
|
||||||
|
1
vendor/github.com/opencontainers/selinux/go-selinux/rchcon_go115.go
generated
vendored
1
vendor/github.com/opencontainers/selinux/go-selinux/rchcon_go115.go
generated
vendored
@ -1,3 +1,4 @@
|
|||||||
|
//go:build linux && !go1.16
|
||||||
// +build linux,!go1.16
|
// +build linux,!go1.16
|
||||||
|
|
||||||
package selinux
|
package selinux
|
||||||
|
80
vendor/github.com/opencontainers/selinux/go-selinux/selinux_linux.go
generated
vendored
80
vendor/github.com/opencontainers/selinux/go-selinux/selinux_linux.go
generated
vendored
@ -11,6 +11,7 @@ import (
|
|||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"math/big"
|
"math/big"
|
||||||
"os"
|
"os"
|
||||||
|
"os/user"
|
||||||
"path"
|
"path"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strconv"
|
"strconv"
|
||||||
@ -1072,21 +1073,6 @@ func copyLevel(src, dest string) (string, error) {
|
|||||||
return tcon.Get(), nil
|
return tcon.Get(), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Prevent users from relabeling system files
|
|
||||||
func badPrefix(fpath string) error {
|
|
||||||
if fpath == "" {
|
|
||||||
return ErrEmptyPath
|
|
||||||
}
|
|
||||||
|
|
||||||
badPrefixes := []string{"/usr"}
|
|
||||||
for _, prefix := range badPrefixes {
|
|
||||||
if strings.HasPrefix(fpath, prefix) {
|
|
||||||
return fmt.Errorf("relabeling content in %s is not allowed", prefix)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// chcon changes the fpath file object to the SELinux label label.
|
// chcon changes the fpath file object to the SELinux label label.
|
||||||
// If fpath is a directory and recurse is true, then chcon walks the
|
// If fpath is a directory and recurse is true, then chcon walks the
|
||||||
// directory tree setting the label.
|
// directory tree setting the label.
|
||||||
@ -1097,12 +1083,70 @@ func chcon(fpath string, label string, recurse bool) error {
|
|||||||
if label == "" {
|
if label == "" {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
if err := badPrefix(fpath); err != nil {
|
|
||||||
return err
|
exclude_paths := map[string]bool{
|
||||||
|
"/": true,
|
||||||
|
"/bin": true,
|
||||||
|
"/boot": true,
|
||||||
|
"/dev": true,
|
||||||
|
"/etc": true,
|
||||||
|
"/etc/passwd": true,
|
||||||
|
"/etc/pki": true,
|
||||||
|
"/etc/shadow": true,
|
||||||
|
"/home": true,
|
||||||
|
"/lib": true,
|
||||||
|
"/lib64": true,
|
||||||
|
"/media": true,
|
||||||
|
"/opt": true,
|
||||||
|
"/proc": true,
|
||||||
|
"/root": true,
|
||||||
|
"/run": true,
|
||||||
|
"/sbin": true,
|
||||||
|
"/srv": true,
|
||||||
|
"/sys": true,
|
||||||
|
"/tmp": true,
|
||||||
|
"/usr": true,
|
||||||
|
"/var": true,
|
||||||
|
"/var/lib": true,
|
||||||
|
"/var/log": true,
|
||||||
|
}
|
||||||
|
|
||||||
|
if home := os.Getenv("HOME"); home != "" {
|
||||||
|
exclude_paths[home] = true
|
||||||
|
}
|
||||||
|
|
||||||
|
if sudoUser := os.Getenv("SUDO_USER"); sudoUser != "" {
|
||||||
|
if usr, err := user.Lookup(sudoUser); err == nil {
|
||||||
|
exclude_paths[usr.HomeDir] = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if fpath != "/" {
|
||||||
|
fpath = strings.TrimSuffix(fpath, "/")
|
||||||
|
}
|
||||||
|
if exclude_paths[fpath] {
|
||||||
|
return fmt.Errorf("SELinux relabeling of %s is not allowed", fpath)
|
||||||
}
|
}
|
||||||
|
|
||||||
if !recurse {
|
if !recurse {
|
||||||
return setFileLabel(fpath, label)
|
err := lSetFileLabel(fpath, label)
|
||||||
|
if err != nil {
|
||||||
|
// Check if file doesn't exist, must have been removed
|
||||||
|
if errors.Is(err, os.ErrNotExist) {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// Check if current label is correct on disk
|
||||||
|
flabel, nerr := lFileLabel(fpath)
|
||||||
|
if nerr == nil && flabel == label {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// Check if file doesn't exist, must have been removed
|
||||||
|
if errors.Is(nerr, os.ErrNotExist) {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
return rchcon(fpath, label)
|
return rchcon(fpath, label)
|
||||||
|
1
vendor/github.com/opencontainers/selinux/go-selinux/selinux_stub.go
generated
vendored
1
vendor/github.com/opencontainers/selinux/go-selinux/selinux_stub.go
generated
vendored
@ -1,3 +1,4 @@
|
|||||||
|
//go:build !linux
|
||||||
// +build !linux
|
// +build !linux
|
||||||
|
|
||||||
package selinux
|
package selinux
|
||||||
|
2
vendor/modules.txt
vendored
2
vendor/modules.txt
vendored
@ -342,7 +342,7 @@ github.com/opencontainers/runtime-tools/generate
|
|||||||
github.com/opencontainers/runtime-tools/generate/seccomp
|
github.com/opencontainers/runtime-tools/generate/seccomp
|
||||||
github.com/opencontainers/runtime-tools/specerror
|
github.com/opencontainers/runtime-tools/specerror
|
||||||
github.com/opencontainers/runtime-tools/validate
|
github.com/opencontainers/runtime-tools/validate
|
||||||
# github.com/opencontainers/selinux v1.10.1
|
# github.com/opencontainers/selinux v1.10.2
|
||||||
## explicit; go 1.13
|
## explicit; go 1.13
|
||||||
github.com/opencontainers/selinux/go-selinux
|
github.com/opencontainers/selinux/go-selinux
|
||||||
github.com/opencontainers/selinux/go-selinux/label
|
github.com/opencontainers/selinux/go-selinux/label
|
||||||
|
Loading…
Reference in New Issue
Block a user