diff options
author | Manoj Srivastava <srivasta@debian.org> | 2014-02-09 16:09:49 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2016-08-07 12:18:42 +0100 |
commit | 7a7851c903e5dbb58a85014deb2c88cb718068c9 (patch) | |
tree | 3c558bbeaf0e964e6b9c55128f0f8007113c47ef /platform.c | |
parent | c027de5eb3e6cb1718990841c2a9cbc89fd53151 (diff) |
Handle SELinux authorisation roles
Rejected upstream due to discomfort with magic usernames; a better approach
will need an SSH protocol change. In the meantime, this came from Debian's
SELinux maintainer, so we'll keep it until we have something better.
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1641
Bug-Debian: http://bugs.debian.org/394795
Last-Update: 2015-08-19
Patch-Name: selinux-role.patch
Diffstat (limited to 'platform.c')
-rw-r--r-- | platform.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/platform.c b/platform.c index acf8554cd..483170680 100644 --- a/platform.c +++ b/platform.c | |||
@@ -145,7 +145,7 @@ platform_setusercontext(struct passwd *pw) | |||
145 | * called if sshd is running as root. | 145 | * called if sshd is running as root. |
146 | */ | 146 | */ |
147 | void | 147 | void |
148 | platform_setusercontext_post_groups(struct passwd *pw) | 148 | platform_setusercontext_post_groups(struct passwd *pw, const char *role) |
149 | { | 149 | { |
150 | #if !defined(HAVE_LOGIN_CAP) && defined(USE_PAM) | 150 | #if !defined(HAVE_LOGIN_CAP) && defined(USE_PAM) |
151 | /* | 151 | /* |
@@ -186,7 +186,7 @@ platform_setusercontext_post_groups(struct passwd *pw) | |||
186 | } | 186 | } |
187 | #endif /* HAVE_SETPCRED */ | 187 | #endif /* HAVE_SETPCRED */ |
188 | #ifdef WITH_SELINUX | 188 | #ifdef WITH_SELINUX |
189 | ssh_selinux_setup_exec_context(pw->pw_name); | 189 | ssh_selinux_setup_exec_context(pw->pw_name, role); |
190 | #endif | 190 | #endif |
191 | } | 191 | } |
192 | 192 | ||