mirror of
https://github.com/kata-containers/kata-containers.git
synced 2025-09-17 14:58:16 +00:00
runtime: Update remove methods
In selinux v1.12.0, `label.SetProcessLabel`, was removed to be replaced by `selinux.SetExecLabel` Signed-off-by: stevenhorsman <steven@uk.ibm.com>
This commit is contained in:
@@ -32,7 +32,7 @@ import (
|
||||
|
||||
"github.com/containerd/console"
|
||||
chclient "github.com/kata-containers/kata-containers/src/runtime/virtcontainers/pkg/cloud-hypervisor/client"
|
||||
"github.com/opencontainers/selinux/go-selinux/label"
|
||||
selinux "github.com/opencontainers/selinux/go-selinux"
|
||||
"github.com/pkg/errors"
|
||||
log "github.com/sirupsen/logrus"
|
||||
|
||||
@@ -708,10 +708,10 @@ func (clh *cloudHypervisor) StartVM(ctx context.Context, timeout int) error {
|
||||
// notwant to run them under confinement.
|
||||
if !clh.config.DisableSeLinux {
|
||||
|
||||
if err := label.SetProcessLabel(clh.config.SELinuxProcessLabel); err != nil {
|
||||
if err := selinux.SetExecLabel(clh.config.SELinuxProcessLabel); err != nil {
|
||||
return err
|
||||
}
|
||||
defer label.SetProcessLabel("")
|
||||
defer selinux.SetExecLabel("")
|
||||
}
|
||||
|
||||
err = clh.setupVirtiofsDaemon(ctx)
|
||||
|
@@ -38,7 +38,7 @@ import (
|
||||
"github.com/containerd/fifo"
|
||||
httptransport "github.com/go-openapi/runtime/client"
|
||||
"github.com/go-openapi/strfmt"
|
||||
"github.com/opencontainers/selinux/go-selinux/label"
|
||||
selinux "github.com/opencontainers/selinux/go-selinux"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/sirupsen/logrus"
|
||||
)
|
||||
@@ -788,10 +788,10 @@ func (fc *firecracker) StartVM(ctx context.Context, timeout int) error {
|
||||
// them under confinement.
|
||||
if !fc.config.DisableSeLinux {
|
||||
|
||||
if err := label.SetProcessLabel(fc.config.SELinuxProcessLabel); err != nil {
|
||||
if err := selinux.SetExecLabel(fc.config.SELinuxProcessLabel); err != nil {
|
||||
return err
|
||||
}
|
||||
defer label.SetProcessLabel("")
|
||||
defer selinux.SetExecLabel("")
|
||||
}
|
||||
|
||||
err = fc.fcInit(ctx, fcTimeout)
|
||||
|
@@ -35,7 +35,7 @@ import (
|
||||
"github.com/kata-containers/kata-containers/src/runtime/virtcontainers/pkg/rootless"
|
||||
|
||||
govmmQemu "github.com/kata-containers/kata-containers/src/runtime/pkg/govmm/qemu"
|
||||
"github.com/opencontainers/selinux/go-selinux/label"
|
||||
selinux "github.com/opencontainers/selinux/go-selinux"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/sirupsen/logrus"
|
||||
"golang.org/x/sys/unix"
|
||||
@@ -1210,10 +1210,10 @@ func (q *qemu) StartVM(ctx context.Context, timeout int) error {
|
||||
// the SELinux label. If these processes require privileged, we do
|
||||
// notwant to run them under confinement.
|
||||
if !q.config.DisableSeLinux {
|
||||
if err := label.SetProcessLabel(q.config.SELinuxProcessLabel); err != nil {
|
||||
if err := selinux.SetExecLabel(q.config.SELinuxProcessLabel); err != nil {
|
||||
return err
|
||||
}
|
||||
defer label.SetProcessLabel("")
|
||||
defer selinux.SetExecLabel("")
|
||||
}
|
||||
if q.config.SharedFS == config.VirtioFS || q.config.SharedFS == config.VirtioFSNydus {
|
||||
err = q.setupVirtiofsDaemon(ctx)
|
||||
|
Reference in New Issue
Block a user