-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Disable xattrs on rsync #694
Conversation
For systems with selinux enabled, this makes impossible to generate the proper files as its being blocked Signed-off-by: Itxaka <[email protected]>
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #694 +/- ##
==========================================
+ Coverage 48.19% 48.25% +0.06%
==========================================
Files 48 48
Lines 6161 6169 +8
==========================================
+ Hits 2969 2977 +8
Misses 2912 2912
Partials 280 280 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
I don't know much about selinux but |
I think the issue here is, when building or rsyncing stuff in a host that has selinux, it autosets those selinux contexts to the extracted data, and then on copying those attrs cannot be maintained. For building images, it will always fail when rsyncing stuff into a FAT partition as its impossible to save thos attributes in FAT. Also, the question is, are those attrs the ones originally from the extracted OCI artifact, or are they new and set by the host on data extraction? If they are set on data extraction, due to the host that extracts it having selinux, then that data is useless, as its new and not appropiate to the final system. AFAIK we dont save any selinux content on OCI artifact creation so thats why this only happens to fail in selinux hosts that build images. IMHO, this is only a workaround for now. When we start dealing with selinux we will need to rework this properly to maintain the original selinux context if any and to deal with hosts that have selinux enabled and try to label things when we extract it :( |
Some flags already include the rest, explain what they do Signed-off-by: Itxaka <[email protected]>
Signed-off-by: Itxaka <[email protected]>
Ther eis also the possibility of having this wrong in the context of, you dont need to keep the original selinux labels as on first boot it should relabel everything. |
Signed-off-by: Itxaka <[email protected]>
For systems with selinux enabled, this makes impossible to generate the proper files as its being blocked
This fixes it as tested on my Fedora with selinux.
Fixes #kairos-io/AuroraBoot#196