summaryrefslogtreecommitdiff
path: root/contrib/sepgsql/uavc.c
diff options
context:
space:
mode:
authorMichael Paquier <michael@paquier.xyz>2022-11-09 09:40:02 +0900
committerMichael Paquier <michael@paquier.xyz>2022-11-09 09:40:02 +0900
commit40064e103b117a3ea82c81e7fc694f955855c792 (patch)
tree0c264ee8b166080b2182b137c323764aed247407 /contrib/sepgsql/uavc.c
parent377b37cf7bf3ca1357a35f9ceae2bce36d2721d5 (diff)
downloadpostgresql-40064e103b117a3ea82c81e7fc694f955855c792.tar.gz
Fix compilation warnings with libselinux 3.1 in contrib/sepgsql/
Upstream SELinux has recently marked security_context_t as officially deprecated, causing warnings with -Wdeprecated-declarations. This is considered as legacy code for some time now by upstream as security_context_t got removed from most of the code tree during the development of 2.3 back in 2014. This removes all the references to security_context_t in sepgsql/ to be consistent with SELinux, fixing the warnings. Note that this does not impact the minimum version of libselinux supported. This has been applied first as 1f32136 for 14~, but no other branches got the call. This is in line with the recent project policy to have no warnings in branches where builds should still be supported (9.2~ as of today). Per discussion with Tom Lane and Álvaro Herrera. Reviewed-by: Tom Lane Discussion: https://postgr.es/m/20200813012735.GC11663@paquier.xyz Discussion: https://postgr.es/m/20221103181028.raqta27jcuypor4l@alvherre.pgsql Backpatch-through: 9.2
Diffstat (limited to 'contrib/sepgsql/uavc.c')
-rw-r--r--contrib/sepgsql/uavc.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/contrib/sepgsql/uavc.c b/contrib/sepgsql/uavc.c
index 428bf89d7e..ccd65ea5c2 100644
--- a/contrib/sepgsql/uavc.c
+++ b/contrib/sepgsql/uavc.c
@@ -177,7 +177,7 @@ sepgsql_avc_unlabeled(void)
{
if (!avc_unlabeled)
{
- security_context_t unlabeled;
+ char *unlabeled;
if (security_get_initial_context_raw("unlabeled", &unlabeled) < 0)
ereport(ERROR,
@@ -225,7 +225,7 @@ sepgsql_avc_compute(const char *scontext, const char *tcontext, uint16 tclass)
* policy is reloaded, validation status shall be kept, so we also cache
* whether the supplied security context was valid, or not.
*/
- if (security_check_context_raw((security_context_t) tcontext) != 0)
+ if (security_check_context_raw(tcontext) != 0)
ucontext = sepgsql_avc_unlabeled();
/*