代码拉取完成,页面将自动刷新
同步操作将从 tupelo-shen/mysnapd 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
// -*- Mode: Go; indent-tabs-mode: t -*-
/*
* Copyright (C) 2018 Canonical Ltd
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 3 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
package selinux
import (
"os"
"os/exec"
"regexp"
"gitee.com/mysnapcore/mysnapd/osutil"
)
var (
// actual matchpathcon -V output:
// /home/guest/snap has context unconfined_u:object_r:user_home_t:s0, should be unconfined_u:object_r:snappy_home_t:s0
matchIncorrectLabel = regexp.MustCompile("^.* has context .* should be .*\n$")
)
// VerifyPathContext checks whether a given path is labeled according to its default
// SELinux context
func VerifyPathContext(aPath string) (bool, error) {
if _, err := os.Stat(aPath); err != nil {
// path that cannot be accessed cannot be verified
return false, err
}
// matchpathcon -V verifies whether the context of a path matches the
// default
cmd := exec.Command("matchpathcon", "-V", aPath)
cmd.Env = append(os.Environ(), "LC_ALL=C")
out, err := cmd.Output()
if err == nil {
// the path was verified
return true, nil
}
exit, _ := osutil.ExitCode(err)
// exits with 1 when the verification failed or other error occurred,
// when verification failed a message like this will be printed to
// stdout:
// <the-path> has context <some-context>, should be <some-other-context>
// match the message so that we can distinguish a failed verification
// case from other errors
if exit == 1 && matchIncorrectLabel.Match(out) {
return false, nil
}
return false, err
}
// RestoreContext restores the default SELinux context of given path
func RestoreContext(aPath string, mode RestoreMode) error {
if _, err := os.Stat(aPath); err != nil {
// path that cannot be accessed cannot be restored
return err
}
args := make([]string, 0, 2)
if mode.Recursive {
// -R: recursive
args = append(args, "-R")
}
args = append(args, aPath)
return exec.Command("restorecon", args...).Run()
}
// SnapMountContext finds out the right context for mounting snaps
func SnapMountContext() string {
// TODO: consider reading this from an external configuration file, such
// as per app contexts, from
// /etc/selinux/targeted/contexts/snapd_contexts like go-selinux and
// podman do for container volumes.
return "system_u:object_r:snappy_snap_t:s0"
}
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。