summaryrefslogtreecommitdiff
path: root/platform.c
diff options
context:
space:
mode:
authorManoj Srivastava <srivasta@debian.org>2014-02-09 16:09:49 +0000
committerColin Watson <cjwatson@debian.org>2014-02-09 16:17:20 +0000
commit07f2a771c490bd68cd5c5ea9c535705e93bd94f3 (patch)
tree3e2ead17b4c91699c13b0417d46bfd750a04e0b8 /platform.c
parent950be7e1b1a01ee9b25e2a72726a6370b8acacb6 (diff)
Handle SELinux authorisation roles
Rejected upstream due to discomfort with magic usernames; a better approach will need an SSH protocol change. In the meantime, this came from Debian's SELinux maintainer, so we'll keep it until we have something better. Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1641 Bug-Debian: http://bugs.debian.org/394795 Last-Update: 2013-09-14 Patch-Name: selinux-role.patch
Diffstat (limited to 'platform.c')
-rw-r--r--platform.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/platform.c b/platform.c
index 3262b2478..a962f15b5 100644
--- a/platform.c
+++ b/platform.c
@@ -134,7 +134,7 @@ platform_setusercontext(struct passwd *pw)
134 * called if sshd is running as root. 134 * called if sshd is running as root.
135 */ 135 */
136void 136void
137platform_setusercontext_post_groups(struct passwd *pw) 137platform_setusercontext_post_groups(struct passwd *pw, const char *role)
138{ 138{
139#if !defined(HAVE_LOGIN_CAP) && defined(USE_PAM) 139#if !defined(HAVE_LOGIN_CAP) && defined(USE_PAM)
140 /* 140 /*
@@ -181,7 +181,7 @@ platform_setusercontext_post_groups(struct passwd *pw)
181 } 181 }
182#endif /* HAVE_SETPCRED */ 182#endif /* HAVE_SETPCRED */
183#ifdef WITH_SELINUX 183#ifdef WITH_SELINUX
184 ssh_selinux_setup_exec_context(pw->pw_name); 184 ssh_selinux_setup_exec_context(pw->pw_name, role);
185#endif 185#endif
186} 186}
187 187