summaryrefslogtreecommitdiff
path: root/contrib/sepgsql/label.c
diff options
context:
space:
mode:
authorMichael Paquier2020-08-14 00:30:34 +0000
committerMichael Paquier2020-08-14 00:30:34 +0000
commit1f32136a9960df2e135e7b36363ea1f087b514a0 (patch)
treec6bee482c9c45d74e235232b368d8368851c7ee5 /contrib/sepgsql/label.c
parenta9306f10b95992ec7229cae3de507a9fa2f6aa3c (diff)
Fix compilation warnings with libselinux 3.1 in contrib/sepgsql/
Upstream SELinux has recently marked security_context_t as officially deprecated, causing warnings with -Wdeprecated-declarations. This is considered as legacy code for some time now by upstream as security_context_t got removed from most of the code tree during the development of 2.3 back in 2014. This removes all the references to security_context_t in sepgsql/ to be consistent with SELinux, fixing the warnings. Note that this does not impact the minimum version of libselinux supported. Reviewed-by: Tom Lane Discussion: https://postgr.es/m/20200813012735.GC11663@paquier.xyz
Diffstat (limited to 'contrib/sepgsql/label.c')
-rw-r--r--contrib/sepgsql/label.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/contrib/sepgsql/label.c b/contrib/sepgsql/label.c
index 32e405530bb..b00b91df5aa 100644
--- a/contrib/sepgsql/label.c
+++ b/contrib/sepgsql/label.c
@@ -120,7 +120,7 @@ sepgsql_set_client_label(const char *new_label)
tcontext = client_label_peer;
else
{
- if (security_check_context_raw((security_context_t) new_label) < 0)
+ if (security_check_context_raw(new_label) < 0)
ereport(ERROR,
(errcode(ERRCODE_INVALID_NAME),
errmsg("SELinux: invalid security label: \"%s\"",
@@ -453,9 +453,9 @@ sepgsql_get_label(Oid classId, Oid objectId, int32 subId)
object.objectSubId = subId;
label = GetSecurityLabel(&object, SEPGSQL_LABEL_TAG);
- if (!label || security_check_context_raw((security_context_t) label))
+ if (!label || security_check_context_raw(label))
{
- security_context_t unlabeled;
+ char *unlabeled;
if (security_get_initial_context_raw("unlabeled", &unlabeled) < 0)
ereport(ERROR,
@@ -487,7 +487,7 @@ sepgsql_object_relabel(const ObjectAddress *object, const char *seclabel)
* context of selinux.
*/
if (seclabel &&
- security_check_context_raw((security_context_t) seclabel) < 0)
+ security_check_context_raw(seclabel) < 0)
ereport(ERROR,
(errcode(ERRCODE_INVALID_NAME),
errmsg("SELinux: invalid security label: \"%s\"", seclabel)));
@@ -725,7 +725,7 @@ exec_object_restorecon(struct selabel_handle *sehnd, Oid catalogId)
char *objname;
int objtype = 1234;
ObjectAddress object;
- security_context_t context;
+ char *context;
/*
* The way to determine object name depends on object classes. So, any