mirror of
https://github.com/containers/podman.git
synced 2025-09-28 17:25:31 +08:00

Make sure buildah uses the new network stack. Signed-off-by: Paul Holzinger <pholzing@redhat.com>
42 lines
1.2 KiB
Go
42 lines
1.2 KiB
Go
// +build linux
|
|
|
|
package buildah
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/opencontainers/runtime-tools/generate"
|
|
selinux "github.com/opencontainers/selinux/go-selinux"
|
|
"github.com/opencontainers/selinux/go-selinux/label"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
func selinuxGetEnabled() bool {
|
|
return selinux.GetEnabled()
|
|
}
|
|
|
|
func setupSelinux(g *generate.Generator, processLabel, mountLabel string) {
|
|
if processLabel != "" && selinux.GetEnabled() {
|
|
g.SetProcessSelinuxLabel(processLabel)
|
|
g.SetLinuxMountLabel(mountLabel)
|
|
}
|
|
}
|
|
|
|
func runLabelStdioPipes(stdioPipe [][]int, processLabel, mountLabel string) error {
|
|
if !selinuxGetEnabled() || processLabel == "" || mountLabel == "" {
|
|
// SELinux is completely disabled, or we're not doing anything at all with labeling
|
|
return nil
|
|
}
|
|
pipeContext, err := selinux.ComputeCreateContext(processLabel, mountLabel, "fifo_file")
|
|
if err != nil {
|
|
return errors.Wrapf(err, "computing file creation context for pipes")
|
|
}
|
|
for i := range stdioPipe {
|
|
pipeFdName := fmt.Sprintf("/proc/self/fd/%d", stdioPipe[i][0])
|
|
if err := label.Relabel(pipeFdName, pipeContext, false); err != nil {
|
|
return errors.Wrapf(err, "setting file label on %q", pipeFdName)
|
|
}
|
|
}
|
|
return nil
|
|
}
|