-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
install-multi-user: check if selinux is enabled and if it is then abort #6639
Conversation
If you create a cachix cache using the naming convention in #4577 and add a secret with the token, the CI run in your fork can generate and test the installer (well--confirm it doesn't cause trouble on ubuntu or macOS). |
Thanks! could someone add it to https://github.com/NixOS/nix/blob/master/doc/manual/src/contributing/hacking.md so more people would know about it? |
the installer tests succeeded https://github.com/Artturin/nix/actions/runs/2472299209 |
If anyone around is set up to confirm (from a Fedora VM?), you can use the generated installer URL (and stable tarball-url-prefix) from the test: https://github.com/Artturin/nix/runs/6824433318?check_suite_focus=true#step:4:3 You just invoke the install like:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think technically someone could create proper Nix SELinux rules before installation. It's not that Nix isn't compatible with SELinux, it's just that most users will not have the correct rules in place before trying to install. I think there should be a prompt that says something like "SELinux is enabled on your machine. The installation process is likely to fail due to permission errors since Nix does not include SELinux rules. Abort? (Y/n)"
I think the error message is fine as is. It's concise, to the point, and links to the relevant issue. |
Prevents messed up installs and manual cleanup #2374
Not tested yet