summaryrefslogtreecommitdiff
path: root/platform.c
diff options
context:
space:
mode:
authorManoj Srivastava <srivasta@debian.org>2014-02-09 16:09:49 +0000
committerColin Watson <cjwatson@debian.org>2016-08-07 12:18:42 +0100
commit7a7851c903e5dbb58a85014deb2c88cb718068c9 (patch)
tree3c558bbeaf0e964e6b9c55128f0f8007113c47ef /platform.c
parentc027de5eb3e6cb1718990841c2a9cbc89fd53151 (diff)
Handle SELinux authorisation roles
Rejected upstream due to discomfort with magic usernames; a better approach will need an SSH protocol change. In the meantime, this came from Debian's SELinux maintainer, so we'll keep it until we have something better. Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1641 Bug-Debian: http://bugs.debian.org/394795 Last-Update: 2015-08-19 Patch-Name: selinux-role.patch
Diffstat (limited to 'platform.c')
-rw-r--r--platform.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/platform.c b/platform.c
index acf8554cd..483170680 100644
--- a/platform.c
+++ b/platform.c
@@ -145,7 +145,7 @@ platform_setusercontext(struct passwd *pw)
145 * called if sshd is running as root. 145 * called if sshd is running as root.
146 */ 146 */
147void 147void
148platform_setusercontext_post_groups(struct passwd *pw) 148platform_setusercontext_post_groups(struct passwd *pw, const char *role)
149{ 149{
150#if !defined(HAVE_LOGIN_CAP) && defined(USE_PAM) 150#if !defined(HAVE_LOGIN_CAP) && defined(USE_PAM)
151 /* 151 /*
@@ -186,7 +186,7 @@ platform_setusercontext_post_groups(struct passwd *pw)
186 } 186 }
187#endif /* HAVE_SETPCRED */ 187#endif /* HAVE_SETPCRED */
188#ifdef WITH_SELINUX 188#ifdef WITH_SELINUX
189 ssh_selinux_setup_exec_context(pw->pw_name); 189 ssh_selinux_setup_exec_context(pw->pw_name, role);
190#endif 190#endif
191} 191}
192 192