Bug 843730
| Summary: | Need update of selinux policy related to SSSD | |||
|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Jan Zeleny <jzeleny> | |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> | |
| Status: | CLOSED RAWHIDE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | |
| Severity: | unspecified | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | rawhide | CC: | dominick.grift, dwalsh, jhrozek, mgrepl | |
| Target Milestone: | --- | |||
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | Bug Fix | ||
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 843814 848751 849567 (view as bug list) | Environment: | ||
| Last Closed: | 2012-08-07 13:33:19 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 843814, 848751, 849567 | |||
| There is one mistake in my initial description. SSSD of course writes SELinux config files into /etc/selinux/<policy>/logins/, not SSSD config files. We need a new label for the logins directory and then allowd sssd to write there. How about selinux_login_conf_t? Fine. I have just added fixes. It is going to be in today's build. (In reply to comment #5) > I have just added fixes. It is going to be in today's build. Miroslav, can you please back port the changes to Fedora 17, too? | 
In SSSD there is a new feature which writes SSSD config files into /etc/selinux/<policy>/logins/ for SELinux PAM module which then uses this information to set correct context for remote user logging in. I'd like to ask for update of SELinux policy so SSSD can write into this directory. I've set permissive mode on my machine, tried to log in several times and these are the rules that audit2allow returned: allow sssd_t selinux_config_t:dir { write remove_name add_name }; allow sssd_t selinux_config_t:file { write rename create unlink }; Please note that we don't write directly to final config files but we rather use mkstemp-style temporary files which are then renamed to the final name.