diff options
author | Manoj Srivastava <srivasta@debian.org> | 2014-02-09 16:09:49 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2014-02-09 16:17:20 +0000 |
commit | 07f2a771c490bd68cd5c5ea9c535705e93bd94f3 (patch) | |
tree | 3e2ead17b4c91699c13b0417d46bfd750a04e0b8 /platform.c | |
parent | 950be7e1b1a01ee9b25e2a72726a6370b8acacb6 (diff) |
Handle SELinux authorisation roles
Rejected upstream due to discomfort with magic usernames; a better approach
will need an SSH protocol change. In the meantime, this came from Debian's
SELinux maintainer, so we'll keep it until we have something better.
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1641
Bug-Debian: http://bugs.debian.org/394795
Last-Update: 2013-09-14
Patch-Name: selinux-role.patch
Diffstat (limited to 'platform.c')
-rw-r--r-- | platform.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/platform.c b/platform.c index 3262b2478..a962f15b5 100644 --- a/platform.c +++ b/platform.c | |||
@@ -134,7 +134,7 @@ platform_setusercontext(struct passwd *pw) | |||
134 | * called if sshd is running as root. | 134 | * called if sshd is running as root. |
135 | */ | 135 | */ |
136 | void | 136 | void |
137 | platform_setusercontext_post_groups(struct passwd *pw) | 137 | platform_setusercontext_post_groups(struct passwd *pw, const char *role) |
138 | { | 138 | { |
139 | #if !defined(HAVE_LOGIN_CAP) && defined(USE_PAM) | 139 | #if !defined(HAVE_LOGIN_CAP) && defined(USE_PAM) |
140 | /* | 140 | /* |
@@ -181,7 +181,7 @@ platform_setusercontext_post_groups(struct passwd *pw) | |||
181 | } | 181 | } |
182 | #endif /* HAVE_SETPCRED */ | 182 | #endif /* HAVE_SETPCRED */ |
183 | #ifdef WITH_SELINUX | 183 | #ifdef WITH_SELINUX |
184 | ssh_selinux_setup_exec_context(pw->pw_name); | 184 | ssh_selinux_setup_exec_context(pw->pw_name, role); |
185 | #endif | 185 | #endif |
186 | } | 186 | } |
187 | 187 | ||