2005-11-11 20:13:44 +00:00
|
|
|
diff --exclude-from=exclude -N -u -r nsapolicycoreutils/scripts/genhomedircon policycoreutils-1.27.27/scripts/genhomedircon
|
2005-11-09 19:13:13 +00:00
|
|
|
--- nsapolicycoreutils/scripts/genhomedircon 2005-09-12 16:33:30.000000000 -0400
|
2005-11-14 20:26:05 +00:00
|
|
|
+++ policycoreutils-1.27.27/scripts/genhomedircon 2005-11-14 15:25:45.000000000 -0500
|
2005-11-11 20:13:44 +00:00
|
|
|
@@ -15,32 +15,19 @@
|
2005-11-09 19:13:13 +00:00
|
|
|
# The file CONTEXTDIR/files/homedir_template exists. This file is used to
|
|
|
|
# set up the home directory context for each real user.
|
|
|
|
#
|
|
|
|
-# If a user has more than one role in CONTEXTDIR/local.users, genhomedircon uses
|
|
|
|
-# the first role in the list.
|
|
|
|
+# If a user has more than one role, genhomedircon uses the first role in the list.
|
|
|
|
#
|
|
|
|
-# If a user is not listed in CONTEXTDIR/local.users, he will default to user_u, role user
|
|
|
|
+# If a user is not listed in CONTEXTDIR/seusers, he will default to user_u, role user
|
|
|
|
#
|
|
|
|
# "Real" users (as opposed to system users) are those whose UID is greater than
|
|
|
|
# or equal STARTING_UID (usually 500) and whose login is not a member of
|
|
|
|
-# EXCLUDE_LOGINS. Users who are explicitly defined in CONTEXTDIR/local.users
|
|
|
|
+# EXCLUDE_LOGINS. Users who are explicitly defined in CONTEXTDIR/seusers
|
|
|
|
# are always "real" (including root, in the default configuration).
|
|
|
|
#
|
|
|
|
#
|
|
|
|
-# Old ASSUMPTIONS:
|
|
|
|
-#
|
|
|
|
-# If a user has more than one role in FILECONTEXTDIR/users, genhomedircon uses
|
|
|
|
-# the first role in the list.
|
|
|
|
-#
|
|
|
|
-# If a user is not listed in FILECONTEXTDIR/users, genhomedircon assumes that
|
|
|
|
-# the user's home dir will be found in one of the HOME_ROOTs.
|
|
|
|
-#
|
|
|
|
-# "Real" users (as opposed to system users) are those whose UID is greater than
|
|
|
|
-# or equal STARTING_UID (usually 500) and whose login is not a member of
|
|
|
|
-# EXCLUDE_LOGINS. Users who are explicitly defined in FILECONTEXTDIR/users
|
|
|
|
-# are always "real" (including root, in the default configuration).
|
|
|
|
-#
|
|
|
|
|
|
|
|
import commands, sys, os, pwd, string, getopt, re
|
2005-11-11 20:13:44 +00:00
|
|
|
+from semanage import *;
|
2005-11-09 19:13:13 +00:00
|
|
|
|
2005-11-11 20:13:44 +00:00
|
|
|
EXCLUDE_LOGINS=["/sbin/nologin", "/bin/false"]
|
|
|
|
|
|
|
|
@@ -67,169 +54,6 @@
|
2005-11-09 19:13:13 +00:00
|
|
|
starting_uid = 500
|
|
|
|
return starting_uid
|
|
|
|
|
|
|
|
-#############################################################################
|
|
|
|
-#
|
|
|
|
-# This section is just for backwards compatability
|
|
|
|
-#
|
|
|
|
-#############################################################################
|
|
|
|
-def getPrefixes():
|
|
|
|
- ulist = pwd.getpwall()
|
|
|
|
- STARTING_UID=getStartingUID()
|
|
|
|
- prefixes = {}
|
|
|
|
- for u in ulist:
|
|
|
|
- if u[2] >= STARTING_UID and \
|
|
|
|
- not u[6] in EXCLUDE_LOGINS and \
|
|
|
|
- u[5] != "/" and \
|
|
|
|
- string.count(u[5], "/") > 1:
|
|
|
|
- prefix = u[5][:string.rfind(u[5], "/")]
|
|
|
|
- if not prefixes.has_key(prefix):
|
|
|
|
- prefixes[prefix] = ""
|
|
|
|
- return prefixes
|
|
|
|
-
|
|
|
|
-def getUsers(filecontextdir):
|
|
|
|
- rc = commands.getstatusoutput("grep ^user %s/users" % filecontextdir)
|
|
|
|
- udict = {}
|
|
|
|
- if rc[0] == 0:
|
|
|
|
- ulist = rc[1].strip().split("\n")
|
|
|
|
- for u in ulist:
|
|
|
|
- user = u.split()
|
|
|
|
- try:
|
|
|
|
- if user[1] == "user_u" or user[1] == "system_u":
|
|
|
|
- continue
|
|
|
|
- # !!! chooses first role in the list to use in the file context !!!
|
|
|
|
- role = user[3]
|
|
|
|
- if role == "{":
|
|
|
|
- role = user[4]
|
|
|
|
- role = role.split("_r")[0]
|
|
|
|
- home = pwd.getpwnam(user[1])[5]
|
|
|
|
- if home == "/":
|
|
|
|
- continue
|
|
|
|
- prefs = {}
|
|
|
|
- prefs["role"] = role
|
|
|
|
- prefs["home"] = home
|
|
|
|
- udict[user[1]] = prefs
|
|
|
|
- except KeyError:
|
|
|
|
- sys.stderr.write("The user \"%s\" is not present in the passwd file, skipping...\n" % user[1])
|
|
|
|
- return udict
|
|
|
|
-
|
|
|
|
-def update(filecontext, user, prefs):
|
|
|
|
- rc=commands.getstatusoutput("grep -h '^HOME_DIR' %s | grep -v vmware | sed -e 's|HOME_DIR|%s|' -e 's/ROLE/%s/' -e 's/system_u/%s/'" % (filecontext, prefs["home"], prefs["role"], user))
|
|
|
|
- if rc[0] == 0:
|
|
|
|
- print rc[1]
|
|
|
|
- else:
|
|
|
|
- errorExit(string.join("grep/sed error ", rc[1]))
|
|
|
|
- return rc
|
|
|
|
-
|
|
|
|
-def oldgenhomedircon(filecontextdir, filecontext):
|
|
|
|
- sys.stderr.write("Using genhomedircon in this fashion is supported for backwards compatability\n")
|
|
|
|
- sys.stderr.write("Please update to the latest policy\n")
|
|
|
|
- sys.stderr.flush()
|
|
|
|
-
|
|
|
|
- if os.path.isdir(filecontextdir) == 0:
|
|
|
|
- sys.stderr.write("New usage is the following\n")
|
|
|
|
- usage()
|
|
|
|
- #We are going to define home directory used by libuser and show-utils as a home directory root
|
|
|
|
- prefixes = {}
|
|
|
|
- rc=commands.getstatusoutput("grep -h '^HOME' /etc/default/useradd")
|
|
|
|
- if rc[0] == 0:
|
|
|
|
- homedir = rc[1].split("=")[1]
|
|
|
|
- homedir = homedir.split("#")[0]
|
|
|
|
- homedir = homedir.strip()
|
|
|
|
- if not prefixes.has_key(homedir):
|
|
|
|
- prefixes[homedir] = ""
|
|
|
|
- else:
|
|
|
|
- #rc[0] == 256 means the file was there, we read it, but the grep didn't match
|
|
|
|
- if rc[0] != 256:
|
|
|
|
- sys.stderr.write("%s\n" % rc[1])
|
|
|
|
- sys.stderr.write("You do not have access to /etc/default/useradd HOME=\n")
|
|
|
|
- sys.stderr.flush()
|
|
|
|
-
|
|
|
|
-
|
|
|
|
- rc=commands.getstatusoutput("grep -h '^LU_HOMEDIRECTORY' /etc/libuser.conf")
|
|
|
|
- if rc[0] == 0:
|
|
|
|
- homedir = rc[1].split("=")[1]
|
|
|
|
- homedir = homedir.split("#")[0]
|
|
|
|
- homedir = homedir.strip()
|
|
|
|
- homedir = re.sub(r"[^/a-zA-Z0-9].*$", "", homedir)
|
|
|
|
- if not prefixes.has_key(homedir):
|
|
|
|
- prefixes[homedir] = ""
|
|
|
|
- else:
|
|
|
|
- if rc[0] != 256:
|
|
|
|
- sys.stderr.write("%s\n" % rc[1])
|
|
|
|
- sys.stderr.write("You do not have access to /etc/libuser.conf LU_HOMEDIRECTORY=\n")
|
|
|
|
- sys.stderr.flush()
|
|
|
|
-
|
|
|
|
- #the idea is that we need to find all of the home_root_t directories we do this by just accepting
|
|
|
|
- #any default home directory defined by either /etc/libuser.conf or /etc/default/useradd
|
|
|
|
- #we then get the potential home directory roots from /etc/passwd or nis or whereever and look at
|
|
|
|
- #the defined homedir for all users with UID > STARTING_UID. This list of possible root homedirs
|
|
|
|
- #is then checked to see if it has an explicite context defined in the file_contexts. Explicit
|
|
|
|
- #is any regex that would match it which does not end with .*$ or .+$ since those are general
|
|
|
|
- #recursive matches. We then take any regex which ends with [pattern](/.*)?$ and just check against
|
|
|
|
- #[pattern]
|
|
|
|
- potential_prefixes = getPrefixes()
|
|
|
|
- prefix_regex = {}
|
|
|
|
- #this works by grepping the file_contexts for
|
|
|
|
- # 1. ^/ makes sure this is not a comment
|
|
|
|
- # 2. prints only the regex in the first column first cut on \t then on space
|
|
|
|
- rc=commands.getstatusoutput("grep \"^/\" %s | cut -f 1 | cut -f 1 -d \" \" " % (sys.argv[2]) )
|
|
|
|
- if rc[0] == 0:
|
|
|
|
- prefix_regex = rc[1].split("\n")
|
|
|
|
- else:
|
|
|
|
- sys.stderr.write("%s\n" % rc[1])
|
|
|
|
- sys.stderr.write("You do not have access to grep/cut/the file contexts\n")
|
|
|
|
- sys.stderr.flush()
|
|
|
|
- for potential in potential_prefixes.keys():
|
|
|
|
- addme = 1
|
|
|
|
- for regex in prefix_regex:
|
|
|
|
- #match a trailing (/*)? which is actually a bug in rpc_pipefs
|
|
|
|
- regex = re.sub("\(/\*\)\?$", "", regex)
|
|
|
|
- #match a trailing .+
|
|
|
|
- regex = re.sub("\.+$", "", regex)
|
|
|
|
- #match a trailing .*
|
|
|
|
- regex = re.sub("\.\*$", "", regex)
|
|
|
|
- #strip a (/.*)? which matches anything trailing to a /*$ which matches trailing /'s
|
|
|
|
- regex = re.sub("\(\/\.\*\)\?", "", regex)
|
|
|
|
- regex = regex + "/*$"
|
|
|
|
- if re.search(regex, potential, 0):
|
|
|
|
- addme = 0
|
|
|
|
- if addme == 1:
|
|
|
|
- if not prefixes.has_key(potential):
|
|
|
|
- prefixes[potential] = ""
|
|
|
|
-
|
|
|
|
-
|
|
|
|
- if prefixes.__eq__({}):
|
|
|
|
- sys.stderr.write("LU_HOMEDIRECTORY not set in /etc/libuser.conf\n")
|
|
|
|
- sys.stderr.write("HOME= not set in /etc/default/useradd\n")
|
|
|
|
- sys.stderr.write("And no users with a reasonable homedir found in passwd/nis/ldap/etc...\n")
|
|
|
|
- sys.stderr.write("Assuming /home is the root of home directories\n")
|
|
|
|
- sys.stderr.flush()
|
|
|
|
- prefixes["/home"] = ""
|
|
|
|
-
|
|
|
|
- # There may be a more elegant sed script to expand a macro to multiple lines, but this works
|
|
|
|
- sed_root = "h; s|^HOME_ROOT|%s|" % (string.join(prefixes.keys(), "|; p; g; s|^HOME_ROOT|"),)
|
|
|
|
- sed_dir = "h; s|^HOME_DIR|%s/[^/]+|; s|ROLE_|user_|" % (string.join(prefixes.keys(), "/[^/]+|; s|ROLE_|user_|; p; g; s|^HOME_DIR|"),)
|
|
|
|
-
|
|
|
|
- # Fill in HOME_ROOT, HOME_DIR, and ROLE for users not explicitly defined in /etc/security/selinux/src/policy/users
|
|
|
|
- rc=commands.getstatusoutput("sed -e \"/^HOME_ROOT/{%s}\" -e \"/^HOME_DIR/{%s}\" %s" % (sed_root, sed_dir, filecontext))
|
|
|
|
- if rc[0] == 0:
|
|
|
|
- print rc[1]
|
|
|
|
- else:
|
|
|
|
- errorExit(string.join("sed error ", rc[1]))
|
|
|
|
-
|
|
|
|
- users = getUsers(filecontextdir)
|
|
|
|
- print "\n#\n# User-specific file contexts\n#\n"
|
|
|
|
-
|
|
|
|
- # Fill in HOME and ROLE for users that are defined
|
|
|
|
- for u in users.keys():
|
|
|
|
- update(filecontext, u, users[u])
|
|
|
|
-
|
|
|
|
-#############################################################################
|
|
|
|
-#
|
|
|
|
-# End of backwards compatability section
|
|
|
|
-#
|
|
|
|
-#############################################################################
|
|
|
|
-
|
|
|
|
def getDefaultHomeDir():
|
|
|
|
ret = []
|
|
|
|
rc=commands.getstatusoutput("grep -h '^HOME' /etc/default/useradd")
|
2005-11-11 20:13:44 +00:00
|
|
|
@@ -287,6 +111,11 @@
|
|
|
|
|
|
|
|
class selinuxConfig:
|
|
|
|
def __init__(self, selinuxdir="/etc/selinux", type="targeted", usepwd=1):
|
|
|
|
+ self.semanageHandle=semanage_handle_create()
|
|
|
|
+ self.semanaged=semanage_is_managed(self.semanageHandle)
|
|
|
|
+ if self.semanaged:
|
|
|
|
+ semanage_connect(self.semanageHandle)
|
|
|
|
+ (status, self.ulist, self.usize) = semanage_user_list(self.semanageHandle)
|
|
|
|
self.type=type
|
|
|
|
self.selinuxdir=selinuxdir +"/"
|
|
|
|
self.contextdir="/contexts"
|
2005-11-14 20:26:05 +00:00
|
|
|
@@ -312,48 +141,75 @@
|
2005-11-14 18:59:33 +00:00
|
|
|
else:
|
2005-11-09 19:13:13 +00:00
|
|
|
errorExit(string.join("sed error ", rc[1]))
|
|
|
|
|
2005-11-14 18:59:33 +00:00
|
|
|
- def getUsersFile(self):
|
2005-11-09 19:13:13 +00:00
|
|
|
- return self.selinuxdir+self.type+"/users/local.users"
|
2005-11-14 18:59:33 +00:00
|
|
|
-
|
2005-11-09 19:13:13 +00:00
|
|
|
- def getSystemUsersFile(self):
|
|
|
|
- return self.selinuxdir+self.type+"/users/system.users"
|
|
|
|
-
|
|
|
|
def heading(self):
|
|
|
|
ret = "\n#\n#\n# User-specific file contexts, generated via %s\n" % sys.argv[0]
|
2005-11-14 18:59:33 +00:00
|
|
|
- ret += "# edit %s to change file_context\n#\n#\n" % self.getUsersFile()
|
|
|
|
+ if self.semanaged:
|
|
|
|
+ ret += "# use seusers command to manage system users in order to change the file_context\n#\n#\n"
|
|
|
|
+ else:
|
2005-11-14 20:26:05 +00:00
|
|
|
+ ret += "# edit %s to change file_context\n#\n#\n" % (self.selinuxdir+self.type+"/seusers")
|
2005-11-11 20:13:44 +00:00
|
|
|
return ret
|
2005-11-09 19:13:13 +00:00
|
|
|
|
2005-11-14 20:26:05 +00:00
|
|
|
- def getUsers(self):
|
|
|
|
- users=""
|
|
|
|
- rc = commands.getstatusoutput('grep "^user" %s' % self.getSystemUsersFile())
|
|
|
|
- if rc[0] == 0:
|
|
|
|
- users+=rc[1]+"\n"
|
|
|
|
- rc = commands.getstatusoutput("grep ^user %s" % self.getUsersFile())
|
2005-11-11 20:13:44 +00:00
|
|
|
+ def defaultrole(self, name):
|
|
|
|
+ for idx in range(self.usize):
|
|
|
|
+ user = semanage_user_by_idx(self.ulist, idx)
|
|
|
|
+ if semanage_user_get_name(user) == name:
|
|
|
|
+ role=semanage_user_get_defrole(user)
|
|
|
|
+ if role=="system_r":
|
|
|
|
+ # targeted policy
|
|
|
|
+ return "user_r"
|
|
|
|
+ else:
|
|
|
|
+ return role
|
|
|
|
+ return name
|
2005-11-14 20:26:05 +00:00
|
|
|
+ def getOldRole(self, role):
|
|
|
|
+ rc = commands.getstatusoutput('grep "^user %s" %s' % (role, self.selinuxdir+self.type+"/users/system.users"))
|
|
|
|
+ if rc[0] != 0:
|
|
|
|
+ rc = commands.getstatusoutput('grep "^user %s" %s' % (role, self.selinuxdir+self.type+"/users/local.users"))
|
|
|
|
if rc[0] == 0:
|
|
|
|
- users+=rc[1]
|
|
|
|
+ user=rc[1].split()
|
|
|
|
+ role = user[3]
|
|
|
|
+ if role == "{":
|
|
|
|
+ role = user[4]
|
|
|
|
+ return role
|
|
|
|
+
|
2005-11-11 20:44:12 +00:00
|
|
|
+ def adduser(self, udict, user, seuser, role):
|
2005-11-11 20:13:44 +00:00
|
|
|
+ try:
|
|
|
|
+ if seuser == "user_u" or user == "__default__":
|
|
|
|
+ return
|
|
|
|
+ # !!! chooses first role in the list to use in the file context !!!
|
|
|
|
+ if role[-2:] == "_r" or role[-2:] == "_u":
|
|
|
|
+ role = role[:-2]
|
|
|
|
+ home = pwd.getpwnam(user)[5]
|
|
|
|
+ if home == "/":
|
|
|
|
+ return
|
|
|
|
+ prefs = {}
|
|
|
|
+ prefs["role"] = role
|
|
|
|
+ prefs["home"] = home
|
|
|
|
+ udict[seuser] = prefs
|
|
|
|
+ except KeyError:
|
|
|
|
+ sys.stderr.write("The user \"%s\" is not present in the passwd file, skipping...\n" % user)
|
|
|
|
+
|
2005-11-14 20:26:05 +00:00
|
|
|
+ def getUsers(self):
|
2005-11-09 19:13:13 +00:00
|
|
|
udict = {}
|
2005-11-11 20:13:44 +00:00
|
|
|
- prefs = {}
|
|
|
|
- if users != "":
|
|
|
|
- ulist = users.split("\n")
|
2005-11-14 18:03:56 +00:00
|
|
|
- for u in ulist:
|
|
|
|
- user = u.split()
|
|
|
|
- try:
|
|
|
|
- if len(user)==0 or user[1] == "user_u" or user[1] == "system_u":
|
2005-11-11 20:13:44 +00:00
|
|
|
+ if self.semanaged:
|
|
|
|
+ (status, list, lsize) = semanage_seuser_list(self.semanageHandle)
|
|
|
|
+ for idx in range(lsize):
|
|
|
|
+ user=[]
|
|
|
|
+ seuser = semanage_seuser_by_idx(list, idx)
|
|
|
|
+ seusername=semanage_seuser_get_sename(seuser)
|
2005-11-11 20:44:12 +00:00
|
|
|
+ self.adduser(udict, semanage_seuser_get_name(seuser), seusername, self.defaultrole(seusername))
|
2005-11-11 20:13:44 +00:00
|
|
|
+
|
|
|
|
+ else:
|
2005-11-14 18:59:33 +00:00
|
|
|
+ rc = commands.getstatusoutput("grep -v '^ *#' %s" % self.selinuxdir+self.type+"/seusers")
|
2005-11-11 20:13:44 +00:00
|
|
|
+ if rc[0] == 0 and rc[1] != "":
|
|
|
|
+ ulist = rc[1].split("\n")
|
2005-11-14 18:03:56 +00:00
|
|
|
+ for u in ulist:
|
|
|
|
+ if len(u)==0:
|
|
|
|
continue
|
2005-11-11 20:13:44 +00:00
|
|
|
- # !!! chooses first role in the list to use in the file context !!!
|
2005-11-09 19:13:13 +00:00
|
|
|
- role = user[3]
|
|
|
|
- if role == "{":
|
|
|
|
- role = user[4]
|
|
|
|
- role = role.split("_r")[0]
|
|
|
|
- home = pwd.getpwnam(user[1])[5]
|
2005-11-11 20:13:44 +00:00
|
|
|
- if home == "/":
|
2005-11-14 18:03:56 +00:00
|
|
|
+ user = u.split(":")
|
|
|
|
+ if len(user) < 3:
|
|
|
|
continue
|
2005-11-11 20:13:44 +00:00
|
|
|
- prefs = {}
|
|
|
|
- prefs["role"] = role
|
|
|
|
- prefs["home"] = home
|
2005-11-09 19:13:13 +00:00
|
|
|
- udict[user[1]] = prefs
|
2005-11-11 20:13:44 +00:00
|
|
|
- except KeyError:
|
2005-11-09 19:13:13 +00:00
|
|
|
- sys.stderr.write("The user \"%s\" is not present in the passwd file, skipping...\n" % user[1])
|
2005-11-14 20:26:05 +00:00
|
|
|
+ role=self.getOldRole(user[1])
|
2005-11-14 18:59:33 +00:00
|
|
|
+ self.adduser(udict, user[0], user[1], role)
|
2005-11-09 19:13:13 +00:00
|
|
|
return udict
|
|
|
|
|
|
|
|
def getHomeDirContext(self, user, home, role):
|
2005-11-14 20:26:05 +00:00
|
|
|
@@ -362,9 +218,8 @@
|
2005-11-09 22:43:40 +00:00
|
|
|
return ret + rc[1] + "\n"
|
|
|
|
|
|
|
|
def getUserContext(self, user, sel_user, role):
|
|
|
|
- ret="\n\n#\n# Other Context for user %s\n#\n\n" % user
|
|
|
|
rc=commands.getstatusoutput("grep 'USER' %s | sed -e 's/USER/%s/' -e 's/ROLE/%s/' -e 's/system_u/%s/'" % (self.getHomeDirTemplate(), user, role, sel_user))
|
|
|
|
- return ret + rc[1] + "\n"
|
|
|
|
+ return rc[1] + "\n"
|
|
|
|
|
|
|
|
def genHomeDirContext(self):
|
|
|
|
users = self.getUsers()
|
2005-11-14 20:26:05 +00:00
|
|
|
@@ -478,10 +333,6 @@
|
2005-11-09 19:13:13 +00:00
|
|
|
if type==None:
|
|
|
|
type=getSELinuxType(directory)
|
|
|
|
|
|
|
|
- if len(cmds) == 2:
|
|
|
|
- oldgenhomedircon(cmds[0], cmds[1])
|
|
|
|
- sys.exit(0)
|
|
|
|
-
|
|
|
|
if len(cmds) != 0:
|
|
|
|
usage()
|
|
|
|
selconf=selinuxConfig(directory, type, usepwd)
|