Merge pull request #192 from sfromm/selinux
Update secontext behavior in file module
This commit is contained in:
commit
9dc1b6d79d
2 changed files with 42 additions and 21 deletions
18
examples/playbooks/file_secontext.yml
Normal file
18
examples/playbooks/file_secontext.yml
Normal file
|
@ -0,0 +1,18 @@
|
||||||
|
---
|
||||||
|
# This is a demo of how to manage the selinux context using the file module
|
||||||
|
- hosts: test
|
||||||
|
user: root
|
||||||
|
tasks:
|
||||||
|
- name: Change setype of /etc/exports to non-default value
|
||||||
|
action: file path=/etc/exports setype=etc_t
|
||||||
|
- name: Change seuser of /etc/exports to non-default value
|
||||||
|
action: file path=/etc/exports seuser=unconfined_u
|
||||||
|
- name: Set selinux context back to default value
|
||||||
|
action: file path=/etc/exports context=default
|
||||||
|
- name: Create empty file
|
||||||
|
action: command /bin/touch /tmp/foo
|
||||||
|
- name: Change setype of /tmp/foo
|
||||||
|
action: file path=/tmp/foo setype=default_t
|
||||||
|
- name: Try to set secontext to default, but this will fail
|
||||||
|
because of the lack of a default in the policy
|
||||||
|
action: file path=/tmp/foo context=default
|
45
library/file
45
library/file
|
@ -72,6 +72,21 @@ def add_path_info(kwargs):
|
||||||
kwargs['state'] = 'absent'
|
kwargs['state'] = 'absent'
|
||||||
return kwargs
|
return kwargs
|
||||||
|
|
||||||
|
# If selinux fails to find a default, return an array of None
|
||||||
|
def selinux_default_context(path, mode=0):
|
||||||
|
context = [None, None, None, None]
|
||||||
|
if not HAVE_SELINUX:
|
||||||
|
return context
|
||||||
|
try:
|
||||||
|
ret = selinux.matchpathcon(path, mode)
|
||||||
|
except OSError:
|
||||||
|
return context
|
||||||
|
if ret[0] == -1:
|
||||||
|
return context
|
||||||
|
context = ret[1].split(':')
|
||||||
|
debug("got default secontext=%s" % ret[1])
|
||||||
|
return context
|
||||||
|
|
||||||
# ===========================================
|
# ===========================================
|
||||||
|
|
||||||
argfile = sys.argv[1]
|
argfile = sys.argv[1]
|
||||||
|
@ -107,8 +122,16 @@ seuser = params.get('seuser', None)
|
||||||
serole = params.get('serole', None)
|
serole = params.get('serole', None)
|
||||||
setype = params.get('setype', None)
|
setype = params.get('setype', None)
|
||||||
selevel = params.get('serange', 's0')
|
selevel = params.get('serange', 's0')
|
||||||
|
context = params.get('context', None)
|
||||||
secontext = [seuser, serole, setype, selevel]
|
secontext = [seuser, serole, setype, selevel]
|
||||||
|
|
||||||
|
if context is not None:
|
||||||
|
if context != 'default':
|
||||||
|
fail_json(msg='invalid context: %s' % context)
|
||||||
|
if seuser is not None or serole is not None or setype is not None:
|
||||||
|
fail_json(msg='cannot define context=default and seuser, serole or setype')
|
||||||
|
secontext = selinux_default_context(path)
|
||||||
|
|
||||||
if state not in [ 'file', 'directory', 'link', 'absent']:
|
if state not in [ 'file', 'directory', 'link', 'absent']:
|
||||||
fail_json(msg='invalid state: %s' % state)
|
fail_json(msg='invalid state: %s' % state)
|
||||||
|
|
||||||
|
@ -148,34 +171,14 @@ def selinux_context(path):
|
||||||
debug("got current secontext=%s" % ret[1])
|
debug("got current secontext=%s" % ret[1])
|
||||||
return context
|
return context
|
||||||
|
|
||||||
# If selinux fails to find a default, return an array of None
|
|
||||||
def selinux_default_context(path, mode=0):
|
|
||||||
context = [None, None, None, None]
|
|
||||||
print >>sys.stderr, path
|
|
||||||
if not HAVE_SELINUX:
|
|
||||||
return context
|
|
||||||
try:
|
|
||||||
ret = selinux.matchpathcon(path, mode)
|
|
||||||
except OSError:
|
|
||||||
return context
|
|
||||||
if ret[0] == -1:
|
|
||||||
return context
|
|
||||||
context = ret[1].split(':')
|
|
||||||
debug("got default secontext=%s" % ret[1])
|
|
||||||
return context
|
|
||||||
|
|
||||||
def set_context_if_different(path, context, changed):
|
def set_context_if_different(path, context, changed):
|
||||||
if not HAVE_SELINUX:
|
if not HAVE_SELINUX:
|
||||||
return changed
|
return changed
|
||||||
cur_context = selinux_context(path)
|
cur_context = selinux_context(path)
|
||||||
new_context = selinux_default_context(path)
|
new_context = list(cur_context)
|
||||||
for i in range(len(context)):
|
for i in range(len(context)):
|
||||||
if context[i] is not None and context[i] != cur_context[i]:
|
if context[i] is not None and context[i] != cur_context[i]:
|
||||||
debug('new context was %s' % new_context[i])
|
|
||||||
new_context[i] = context[i]
|
new_context[i] = context[i]
|
||||||
debug('new context is %s' % new_context[i])
|
|
||||||
elif new_context[i] is None:
|
|
||||||
new_context[i] = cur_context[i]
|
|
||||||
debug("current secontext is %s" % ':'.join(cur_context))
|
debug("current secontext is %s" % ':'.join(cur_context))
|
||||||
debug("new secontext is %s" % ':'.join(new_context))
|
debug("new secontext is %s" % ':'.join(new_context))
|
||||||
if cur_context != new_context:
|
if cur_context != new_context:
|
||||||
|
|
Loading…
Reference in a new issue