-
Notifications
You must be signed in to change notification settings - Fork 37
Adjusted RPM packaging to be avoid failed installs when selinux-policy version is not sufficient #2019
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
57f6113 to
bf0846e
Compare
bf0846e to
c9858c7
Compare
c9858c7 to
b0b61f8
Compare
|
I will do testing of these packages tomorrow. I suspect they will work as-designed. |
4dc0c12 to
6c520f7
Compare
…y version is not sufficient As a workaround, if the cfengine-enterprise selinux module fails to install we set binaries to unconfined domain with bin_t type. Ticket: ENT-12980 Changelog: title
6c520f7 to
190c974
Compare
|
Testing looks good. Let's give it a go: @cf-bottom jenkins with exotics please. Thanks. |
|
Alright, I triggered a build: (with exotics) Jenkins: https://ci.cfengine.com/job/pr-pipeline/13007/ Packages: http://buildcache.cfengine.com/packages/testing-pr/jenkins-pr-pipeline-13007/ |
|
more failures with time_based_vars as in cfengine/masterfiles#3074. Maybe that failing is a flake of running at a particular time of day? Let's retry without deployment tests: |
vpodzime
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me otherwise.
| Requires: selinux-policy >= @@SELINUX_POLICY_VERSION@@ | ||
| Recommends: selinux-policy >= @@SELINUX_POLICY_VERSION@@ | ||
| # Also we Recommend policycoreutils-python-utils as it contains semanage which is used by the fallback labeling script. | ||
| Recommends: policycoreutils-python-utils |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm, this will try to install policycoreutils-python-utils even to systems that have the desired version of selinux-policy. I'm not sure we can do this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Right! I was hopimg there was an alt way to set fcontext. Any ideas?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not aware of any. We would probably have to write something ourselves (based on libselinux) and make it part of our packages.
| and then restarting services with \ | ||
| \ | ||
| systemctl restart cfengine3" | ||
| cf_console echo "warning! semodule import failed, as a fallback all binaries in $PREFIX will be labeled bin_t aka unconfined. \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Preexisting, but I think warning: is more common than warning!, esp. now that we also have notice:. And maybe we should also add some info: messages telling the users what's happening?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Makes sense.
We have found that this requirement cannot be met in the field so we are investigating other ways to ensure the latest SELinux policy can be put in place during install.
Ticket: ENT-12980
Changelog: title
together
#2019
cfengine/core#5934