Advice needed for packaging local SELinux policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have a locally maintained package for private use that among other things constrains proliferation of files in the following directory:

 

# ls -lZd /var/lib/puppet/reports/

drwxr-x---. puppet puppet system_u:object_r:puppet_var_lib_t:s0 /var/lib/puppet/reports/

 

My rpm contains a script that uses the tmpwatch tool to do some of the work and is called by cron and ran as the puppet user.  Using the standard selinux-policy-targeted, I get this AVC (and perhaps others):

 

type=AVC msg=audit(1405588621.722:37432): avc:  denied  { read } for  pid=15113 comm="tmpwatch" name="puppet" dev="vda3" ino=260273 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:puppet_var_lib_t:s0 tclass=dir

 

I could change the job to run as root and am familiar with using audit2allow to make a local policy exception.  However, I’d like to resolve the issue via my rpm directly.  I’ve not been successful in finding any guidelines in how to best approach that task.  Do I package a bit of SEL policy or is there a way to have my script run with the puppet_var_lib_t context?

--

John Florian

 

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux