@@ -10,8 +10,8 @@ pub mod utils;
1010pub mod sandbox;
1111
1212use std:: { env, path:: PathBuf } ;
13-
14- use log:: { error, warn, info} ;
13+ use std :: path :: Path ;
14+ // use log::{error, warn, info};
1515
1616use cli:: CliArgs ;
1717use once_cell:: sync:: Lazy ;
@@ -62,28 +62,28 @@ fn run() -> Result<()> {
6262fn init_sandbox ( allowed_dir : & Path ) {
6363
6464 if std:: env:: var ( "CI" ) . is_ok ( ) {
65- warn ! ( "Landlock sandboxing is disabled in CI environments." ) ;
65+ // warn!("Landlock sandboxing is disabled in CI environments.");
6666 return ;
6767 }
6868
6969
7070 if utils:: landlock_support:: is_landlock_supported ( ) {
71- info ! ( "Landlock is supported and can be enabled." ) ;
71+ // info!("Landlock is supported and can be enabled.");
7272
7373 let path_str = allowed_dir. to_str ( ) . expect ( "Cannot convert path" ) ;
7474 match sandbox:: restrict_paths ( & [ path_str] ) {
7575 Ok ( status) => {
76- if !status. is_restricted ( ) {
77- warn ! ( "Landlock restriction was not successfully applied." ) ;
78- }
76+ // if !status.is_restricted() {
77+ // warn!("Landlock restriction was not successfully applied.");
78+ // }
7979 }
8080 Err ( e) => {
81- error ! ( "Failed to build the Landlock ruleset: {e}" ) ;
81+ // error!("Failed to build the Landlock ruleset: {e}");
8282 std:: process:: exit ( EXIT_FAILURE ) ;
8383 }
8484 }
8585 } else {
86- warn ! ( "Landlock is NOT supported on this platform or kernel (<5.19)." ) ;
86+ // warn!("Landlock is NOT supported on this platform or kernel (<5.19).");
8787 }
8888
8989}
0 commit comments