summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorXin Ouyang <Xin.Ouyang@windriver.com>2012-09-11 14:49:18 +0800
committerXin Ouyang <Xin.Ouyang@windriver.com>2012-10-18 11:07:44 +0800
commitcc006f789e261c3d4f9efbf7d26965438297f0ed (patch)
tree238a70992cfcfdefbd753c029c89a7da7925b1a4
parent9a9acff6c74ade48986f85b6147e930edf0267c4 (diff)
downloadmeta-selinux-cc006f789e261c3d4f9efbf7d26965438297f0ed.tar.gz
policycoreutils: add pam config for newrole/run_init
Also fix missing RDEPENDS for setools-* Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
-rw-r--r--recipes-security/selinux/policycoreutils/pam.d/newrole6
-rw-r--r--recipes-security/selinux/policycoreutils/pam.d/run_init6
-rw-r--r--recipes-security/selinux/policycoreutils_2.1.10.bb24
-rw-r--r--recipes-security/selinux/policycoreutils_git.bb25
4 files changed, 52 insertions, 9 deletions
diff --git a/recipes-security/selinux/policycoreutils/pam.d/newrole b/recipes-security/selinux/policycoreutils/pam.d/newrole
new file mode 100644
index 0000000..1151600
--- /dev/null
+++ b/recipes-security/selinux/policycoreutils/pam.d/newrole
@@ -0,0 +1,6 @@
1#%PAM-1.0
2auth include common-auth
3account include common-auth
4password include common-auth
5session include common-auth
6session optional pam_xauth.so
diff --git a/recipes-security/selinux/policycoreutils/pam.d/run_init b/recipes-security/selinux/policycoreutils/pam.d/run_init
new file mode 100644
index 0000000..1151600
--- /dev/null
+++ b/recipes-security/selinux/policycoreutils/pam.d/run_init
@@ -0,0 +1,6 @@
1#%PAM-1.0
2auth include common-auth
3account include common-auth
4password include common-auth
5session include common-auth
6session optional pam_xauth.so
diff --git a/recipes-security/selinux/policycoreutils_2.1.10.bb b/recipes-security/selinux/policycoreutils_2.1.10.bb
index 73d4afb..f6e998d 100644
--- a/recipes-security/selinux/policycoreutils_2.1.10.bb
+++ b/recipes-security/selinux/policycoreutils_2.1.10.bb
@@ -5,7 +5,7 @@ load_policy to load policies, setfiles to label filesystems, newrole \
5to switch roles, and run_init to run /etc/init.d scripts in the proper \ 5to switch roles, and run_init to run /etc/init.d scripts in the proper \
6context." 6context."
7SECTION = "base" 7SECTION = "base"
8PR = "r4" 8PR = "r5"
9LICENSE = "GPLv2+" 9LICENSE = "GPLv2+"
10LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" 10LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833"
11 11
@@ -14,10 +14,16 @@ include selinux_20120216.inc
14SRC_URI[md5sum] = "fefdede2815cdd2ba8b68599fef1f257" 14SRC_URI[md5sum] = "fefdede2815cdd2ba8b68599fef1f257"
15SRC_URI[sha256sum] = "8bbbc36b7d375edff891503932da93e37553f0dd7bdceded7ce9a45c80bec3d1" 15SRC_URI[sha256sum] = "8bbbc36b7d375edff891503932da93e37553f0dd7bdceded7ce9a45c80bec3d1"
16 16
17SRC_URI += "file://policycoreutils-fix-format-security.patch" 17SRC_URI += "file://policycoreutils-fix-format-security.patch \
18 ${@base_contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
19 "
20
21PAM_SRC_URI = "file://pam.d/newrole \
22 file://pam.d/run_init \
23 "
18 24
19DEPENDS += "libsepol libselinux libsemanage" 25DEPENDS += "libsepol libselinux libsemanage"
20DEPENDS += "${@['', '${EXTRA_DEPENDS}']['${PN}' == '${BPN}']}" 26DEPENDS += "${@['', '${EXTRA_DEPENDS}']['${PN}' != '${BPN}-native']}"
21EXTRA_DEPENDS = "libcap-ng libcgroup" 27EXTRA_DEPENDS = "libcap-ng libcgroup"
22EXTRA_DEPENDS += "${@base_contains('DISTRO_FEATURES', 'pam', 'libpam audit', '', d)}" 28EXTRA_DEPENDS += "${@base_contains('DISTRO_FEATURES', 'pam', 'libpam audit', '', d)}"
23 29
@@ -36,7 +42,8 @@ RDEPENDS_${BPN} += "\
36 python-textutils \ 42 python-textutils \
37 python-ipy \ 43 python-ipy \
38 " 44 "
39RDEPENDS_${BPN} += "setools" 45
46RDEPENDS_${BPN} += "setools setools-libs ${BPN}-python"
40 47
41WARN_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${WARN_QA}', d)}" 48WARN_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${WARN_QA}', d)}"
42ERROR_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${ERROR_QA}', d)}" 49ERROR_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${ERROR_QA}', d)}"
@@ -74,3 +81,12 @@ do_install_virtclass-native() {
74 SBINDIR="${D}/${base_sbindir}" 81 SBINDIR="${D}/${base_sbindir}"
75 done 82 done
76} 83}
84
85do_install_append() {
86 test "${CLASSOVERRIDE}" = "class-native" && return 0
87
88 if [ -e ${WORKDIR}/pam.d ]; then
89 install -d ${D}${sysconfdir}/pam.d/
90 install -m 0644 ${WORKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/
91 fi
92}
diff --git a/recipes-security/selinux/policycoreutils_git.bb b/recipes-security/selinux/policycoreutils_git.bb
index 7ff4c58..2736476 100644
--- a/recipes-security/selinux/policycoreutils_git.bb
+++ b/recipes-security/selinux/policycoreutils_git.bb
@@ -5,7 +5,7 @@ load_policy to load policies, setfiles to label filesystems, newrole \
5to switch roles, and run_init to run /etc/init.d scripts in the proper \ 5to switch roles, and run_init to run /etc/init.d scripts in the proper \
6context." 6context."
7SECTION = "base" 7SECTION = "base"
8PR = "r4" 8PR = "r5"
9LICENSE = "GPLv2+" 9LICENSE = "GPLv2+"
10LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" 10LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833"
11DEFAULT_PREFERENCE = "-1" 11DEFAULT_PREFERENCE = "-1"
@@ -15,12 +15,18 @@ include selinux_git.inc
15SRCREV = "339f8079d7b9dd1e0b0138e2d096dc7c60b2092e" 15SRCREV = "339f8079d7b9dd1e0b0138e2d096dc7c60b2092e"
16PV = "2.1.10+git${SRCPV}" 16PV = "2.1.10+git${SRCPV}"
17 17
18SRC_URI += "file://policycoreutils-fix-format-security.patch" 18SRC_URI += "file://policycoreutils-fix-format-security.patch \
19 ${@base_contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
20 "
19 21
20DEPENDS += "libsepol libselinux libsemanage ${EXTRA_DEPENDS}" 22PAM_SRC_URI = "file://pam.d/newrole \
23 file://pam.d/run_init \
24 "
25
26DEPENDS += "libsepol libselinux libsemanage"
27DEPENDS += "${@['', '${EXTRA_DEPENDS}']['${PN}' != '${BPN}-native']}"
21EXTRA_DEPENDS = "libcap-ng libcgroup" 28EXTRA_DEPENDS = "libcap-ng libcgroup"
22EXTRA_DEPENDS += "${@base_contains('DISTRO_FEATURES', 'pam', 'libpam audit', '', d)}" 29EXTRA_DEPENDS += "${@base_contains('DISTRO_FEATURES', 'pam', 'libpam audit', '', d)}"
23EXTRA_DEPENDS_virtclass-native = ""
24 30
25RDEPENDS_${BPN} += "\ 31RDEPENDS_${BPN} += "\
26 libselinux-python \ 32 libselinux-python \
@@ -37,7 +43,7 @@ RDEPENDS_${BPN} += "\
37 python-textutils \ 43 python-textutils \
38 python-ipy \ 44 python-ipy \
39 " 45 "
40RDEPENDS_${BPN} += "setools" 46RDEPENDS_${BPN} += "setools setools-libs ${BPN}-python"
41 47
42WARN_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${WARN_QA}', d)}" 48WARN_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${WARN_QA}', d)}"
43ERROR_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${ERROR_QA}', d)}" 49ERROR_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${ERROR_QA}', d)}"
@@ -75,3 +81,12 @@ do_install_virtclass-native() {
75 SBINDIR="${D}/${base_sbindir}" 81 SBINDIR="${D}/${base_sbindir}"
76 done 82 done
77} 83}
84
85do_install_append() {
86 test "${CLASSOVERRIDE}" = "class-native" && return 0
87
88 if [ -e ${WORKDIR}/pam.d ]; then
89 install -d ${D}${sysconfdir}/pam.d/
90 install -m 0644 ${WORKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/
91 fi
92}