Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Silverblue unified core: error: Unable to load SELinux policy from / #4501

Closed
travier opened this issue Jul 14, 2023 · 2 comments
Closed

Silverblue unified core: error: Unable to load SELinux policy from / #4501

travier opened this issue Jul 14, 2023 · 2 comments

Comments

@travier
Copy link
Member

travier commented Jul 14, 2023

Silverblue/Kinoite/etc. unified core composes are failing in Fedora infra on:

error: Unable to load SELinux policy from /

See:

This is likely due to selinux-policy-targeted missing from the buildroot. Unified core composes in https://gitlab.com/fedora/ostree/ci-test have been working for a while, with selinux-policy-targeted in the buildroot: https://gitlab.com/fedora/ostree/buildroot/-/blob/main/Containerfile#L26

I'm looking at adding this package to the Fedora buildroot but I'm wondering if we should really require the policy to be available for a build given that we relabel everything at the end if I understood correctly.

Host system details

Fedora build infrastructure.

Expected vs actual behavior

Successful compose even if no SELinux policy is available.

Steps to reproduce it

Build Silverblue in unified core mode in Fedora infra.

Would you like to work on the issue?

Yes, I can do the code change if this is what we agree on.

*Related issues, potential duplicates

@cgwalters
Copy link
Member

I'm looking at adding this package to the Fedora buildroot but I'm wondering if we should really require the policy to be available for a build given that we relabel everything at the end if I understood correctly.

Unified core is about trying to do the same thing for "base image builds" as we do for client side layering.

We do indeed relabel everything at the start, but it's just logically easier to require some policy be present (even if it's not the exact matching version).

Given that the fix is "install a package" which is kind of what Fedora is all about 😄 that sounds not very onerous to me...

So...tentatively closing because I don't think the cost/benefit here is worth it. (But if someone showed up and wanted to hack the rpm-ostree selinux code to handle this case, sure... this also strongly relates to to #971 which is basically the same thing)

@cgwalters cgwalters closed this as not planned Won't fix, can't repro, duplicate, stale Jul 14, 2023
@travier
Copy link
Member Author

travier commented Jul 17, 2023

Indeed, this makes complete sense. Being focused on the server side for this issue, I had forgotten about the client side.

Thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants