Skip to content

Commit

Permalink
gpg: Check is_selinux_enabled() before trying to label
Browse files Browse the repository at this point in the history
The default for container execution is that `/sys/fs/selinux`
is not mounted, and the libselinux library function
`is_selinux_enabled` should be used to dynamically check
if the system should attempt to perform SELinux labeling.

This is how it's done by rpm, ostree, and systemd for example.

But this code unconditionally tries to label if it finds
a policy, which breaks in an obscure corner case
when executed inside a container when we're not using
overlayfs for the backend.
  • Loading branch information
cgwalters committed Jun 4, 2024
1 parent ba5365f commit b0318e6
Showing 1 changed file with 13 additions and 11 deletions.
24 changes: 13 additions & 11 deletions librepo/gpg_gpgme.c
Original file line number Diff line number Diff line change
Expand Up @@ -86,17 +86,19 @@ lr_gpg_ensure_socket_dir_exists()
int old_default_context_was_retrieved = 0;
struct selabel_handle *labeling_handle = NULL;

/* A purpose of this piece of code is to deal with applications whose
* security policy overrides a file context for temporary files but don't
* know that librepo executes GnuPG which expects a default file context. */
if (0 == getfscreatecon(&old_default_context)) {
old_default_context_was_retrieved = 1;
} else {
g_debug("Failed to retrieve a default SELinux context");
}
labeling_handle = selabel_open(SELABEL_CTX_FILE, NULL, 0);
if (labeling_handle == NULL) {
g_debug("Failed to open a SELinux labeling handle: %s", strerror(errno));
if (is_selinux_enabled()) {
/* A purpose of this piece of code is to deal with applications whose
* security policy overrides a file context for temporary files but don't
* know that librepo executes GnuPG which expects a default file context. */
if (0 == getfscreatecon(&old_default_context)) {
old_default_context_was_retrieved = 1;
} else {
g_debug("Failed to retrieve a default SELinux context");
}
labeling_handle = selabel_open(SELABEL_CTX_FILE, NULL, 0);
if (labeling_handle == NULL) {
g_debug("Failed to open a SELinux labeling handle: %s", strerror(errno));
}
}
#endif

Expand Down

0 comments on commit b0318e6

Please sign in to comment.