Make AppArmor message applicabel to SELinux too
This commit is contained in:
@@ -95,9 +95,18 @@ func logSeccomp() error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func logAppArmor() error {
|
// logSecurityAttributes logs the security attributes of the current process.
|
||||||
s := container.AppArmorProfile()
|
// The security attributes indicate whether AppArmor or SELinux are being used,
|
||||||
log.Printf("AppArmor profile: %v", s)
|
// and what the level of confinement is.
|
||||||
|
func logSecurityAttributes() error {
|
||||||
|
a, err := readProc("/proc/self/attr/current")
|
||||||
|
// On some systems, if AppArmor or SELinux are not installed, you get an
|
||||||
|
// error when you try and read `/proc/self/attr/current`, even though the
|
||||||
|
// file exists.
|
||||||
|
if err != nil || a == "" {
|
||||||
|
a = "none"
|
||||||
|
}
|
||||||
|
log.Printf("Process security attributes: %v", a)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -156,7 +165,7 @@ func logConfig() error {
|
|||||||
logUser()
|
logUser()
|
||||||
logCapabilities()
|
logCapabilities()
|
||||||
logSeccomp()
|
logSeccomp()
|
||||||
logAppArmor()
|
logSecurityAttributes()
|
||||||
err = readMounts()
|
err = readMounts()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
|||||||
Reference in New Issue
Block a user