Re: Semanage, sepolicy Python code and new feature

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/07/2013 12:39 PM, Leonidas S. Barbosa wrote:
> On Fri, Oct 04, 2013 at 07:38:32AM -0400, Daniel J Walsh wrote: On
> 10/02/2013 10:56 AM, Leonidas S. Barbosa wrote:
>>>> 
>>>> Hi,
>>>> 
>>>> this is my first participation here, not sure I'd introduce myself,
>>>> but anyway, I'd like to colaborate with some pieces of code in
>>>> SElinux, and these are my first attempt to.
>>>> 
>>>> 1) In semanage file (policycoreutils/semanage/semanage) I saw that
>>>> 'import selinux' and selinux module is not used in any place. Is it
>>>> really need?
>>>> 
> Nope, probably used to be used.  I will remove it.
>>>> 2) still in semanage file I could notice that there are assignments
>>>> to a variable called 'object', object is also a Python keyword/global
>>>> variable used to create class. Wondering if it can not mess up the
>>>> things in the future? My suggest is change 'object' to '__object'.
>>>> 
> Sure send a patch.
>>>> 3) I also realized that almost of the code is not compliant with
>>>> PEP08, is there any code style to follow in order to colaborate with
>>>> these .py ?
>>>> 
>>>> In case of these ^ points (1) and (2 ) be accepted, I can send the 
>>>> patches.
>>>> 
>>>> 
>>>> Regarding sepolicy, I had a discussions with Daniel about a new 
>>>> tool/feature that will be responsible to link an unix user to a
>>>> SElinux admin user. I start to digging into sepolicy code to
>>>> understand more about what it does, since sepolicy will be/is the
>>>> tool responsible to create policies and new roles/admin roles. Once
>>>> is through these admin roles, e.g. logadm_r, that a SElinux admin is
>>>> created, I was wondering if that linker feature fits in sepolicy or
>>>> if should be a separated tool, would like to have thoughts about
>>>> that.
>>>> 
> I think we should just use sepolicy to create the policy file (te, if, fc) 
> files and then use the Makefile and semodule to install the policy.  I
> guess we could shell out to these commands to do the install.  But I would
> like the admin to know what the tool is doing, so he could reedit the te
> file if necessary.
> 
> 
>> So the better is have a separate tool here to link these admin SElinux 
>> against UNIX login.
> 
I guess this is something
> sepolicy generate is the tool we use mainly to generate policy based on
> templates.
> 
> One of my goals for Fedora 21 is to move the entire tool chain to Python3,
> so we need to become more careful on the coding standards.  If you want to
> submit patches to clean this up it would be great.
> 
>> Cool, by tool chain you mean policycoreutils, right? And regarding what 
>> code work, upstream code I believe, but what about the intervel to fedora
>> patches be applied into upstream. Just looking for the ideal scenario
>> here, work with fedora patches applied to upstream code.
> 
Yes policycoreutils, but also make sure libselinux and libsemanage python3
patches work properly.

My only problem with a new tool rather then a new sepolicy COMMAND, would be
the proliferation of SELinux tools.

I would like to move to two tool suites.  semanage and sepolicy.  Rather then
adding something brand new.


> 
> 
> 
> 
>>>> Thanks in advance, Leonidas.
>>>> 
>>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>> 
> 
>> 
> 
> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
> https://admin.fedoraproject.org/mailman/listinfo/selinux
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlJS7GkACgkQrlYvE4MpobNK+ACeIEwihkd1opU4NHf/1NyCwXvD
m08An1G7Fy5gZDQ4v9whySn6XueIh1iE
=ZBOM
-----END PGP SIGNATURE-----
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux





[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux