Add tripleo::selinux
Adds a class to configure SELinux. The code is taken from puppet-openstack-cloud: https://github.com/redhat-cip/puppet-openstack-cloud This allows to share the same code for usage by both the Undercloud and Overcloud. Co-Authored By: Emilien Macchi <emilien@redhat.com> Co-Authored By: Yanis Guenane <yguenane@redhat.com> blueprint undercloud-elements Change-Id: If214005df733d41c2fa4e197df247d8a14baaa14
This commit is contained in:
parent
0bf0f72def
commit
8e533aaf44
96
manifests/selinux.pp
Normal file
96
manifests/selinux.pp
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
#
|
||||||
|
# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
# not use this file except in compliance with the License. You may obtain
|
||||||
|
# a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
# License for the specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
#
|
||||||
|
# == Class: tripleo::selinux
|
||||||
|
#
|
||||||
|
# Helper class to configure SELinux on nodes
|
||||||
|
#
|
||||||
|
# === Parameters:
|
||||||
|
#
|
||||||
|
# [*mode*]
|
||||||
|
# (optional) SELinux mode the system should be in
|
||||||
|
# Defaults to 'enforcing'
|
||||||
|
# Possible values : disabled, permissive, enforcing
|
||||||
|
#
|
||||||
|
# [*directory*]
|
||||||
|
# (optional) Path where to find the SELinux modules
|
||||||
|
# Defaults to '/usr/share/selinux'
|
||||||
|
#
|
||||||
|
# [*booleans*]
|
||||||
|
# (optional) Set of booleans to persistently enables
|
||||||
|
# SELinux booleans are the one getsebool -a returns
|
||||||
|
# Defaults []
|
||||||
|
# Example: ['rsync_full_access', 'haproxy_connect_any']
|
||||||
|
#
|
||||||
|
# [*modules*]
|
||||||
|
# (optional) Set of modules to load on the system
|
||||||
|
# Defaults []
|
||||||
|
# Example: ['module1', 'module2']
|
||||||
|
# Note: Those module should be in the $directory path
|
||||||
|
#
|
||||||
|
class tripleo::selinux (
|
||||||
|
$mode = 'enforcing',
|
||||||
|
$directory = '/usr/share/selinux/',
|
||||||
|
$booleans = [],
|
||||||
|
$modules = [],
|
||||||
|
) {
|
||||||
|
|
||||||
|
if $::osfamily != 'RedHat' {
|
||||||
|
fail("OS family unsuppored yet (${::osfamily}), SELinux support is only limited to RedHat family OS")
|
||||||
|
}
|
||||||
|
|
||||||
|
Selboolean {
|
||||||
|
persistent => true,
|
||||||
|
value => 'on',
|
||||||
|
}
|
||||||
|
|
||||||
|
Selmodule {
|
||||||
|
ensure => present,
|
||||||
|
selmoduledir => $directory,
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/etc/selinux/config':
|
||||||
|
ensure => present,
|
||||||
|
mode => '0444',
|
||||||
|
content => template('tripleo/selinux/sysconfig_selinux.erb')
|
||||||
|
}
|
||||||
|
|
||||||
|
$current_mode = $::selinux? {
|
||||||
|
false => 'disabled',
|
||||||
|
default => $::selinux_current_mode,
|
||||||
|
}
|
||||||
|
|
||||||
|
if $current_mode != $mode {
|
||||||
|
case $mode {
|
||||||
|
/^(disabled|permissive)$/: {
|
||||||
|
if $current_mode == 'enforcing' {
|
||||||
|
exec { '/sbin/setenforce 0': }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'enforcing': {
|
||||||
|
exec { '/sbin/setenforce 1': }
|
||||||
|
}
|
||||||
|
default: {
|
||||||
|
fail('You must specify a mode (enforcing, permissive, or disabled)')
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
selboolean { $booleans :
|
||||||
|
persistent => true,
|
||||||
|
}
|
||||||
|
selmodule { $modules: }
|
||||||
|
|
||||||
|
}
|
106
spec/classes/tripleo_selinux_spec.rb
Normal file
106
spec/classes/tripleo_selinux_spec.rb
Normal file
@ -0,0 +1,106 @@
|
|||||||
|
# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
# not use this file except in compliance with the License. You may obtain
|
||||||
|
# a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
# License for the specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
#
|
||||||
|
# Unit tests for tripleo::selinux
|
||||||
|
#
|
||||||
|
|
||||||
|
require 'spec_helper'
|
||||||
|
|
||||||
|
describe 'tripleo::selinux' do
|
||||||
|
|
||||||
|
shared_examples_for 'manage selinux' do
|
||||||
|
|
||||||
|
context 'with selinux enforcing' do
|
||||||
|
before :each do
|
||||||
|
facts.merge!( :selinux_current_mode => 'enforcing' )
|
||||||
|
end
|
||||||
|
|
||||||
|
let :params do
|
||||||
|
{ :mode => 'disabled',
|
||||||
|
:booleans => ['foo', 'bar'],
|
||||||
|
:modules => ['module1', 'module2'],
|
||||||
|
:directory => '/path/to/modules'}
|
||||||
|
end
|
||||||
|
|
||||||
|
it 'runs setenforce 0' do
|
||||||
|
is_expected.to contain_exec('/sbin/setenforce 0')
|
||||||
|
end
|
||||||
|
|
||||||
|
it 'enables the SELinux boolean' do
|
||||||
|
is_expected.to contain_selboolean('foo').with(
|
||||||
|
:persistent => true,
|
||||||
|
:value => 'on',
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
|
it 'enables the SELinux modules' do
|
||||||
|
is_expected.to contain_selmodule('module1').with(
|
||||||
|
:ensure => 'present',
|
||||||
|
:selmoduledir => '/path/to/modules',
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
||||||
|
|
||||||
|
context 'with selinux disabled' do
|
||||||
|
before :each do
|
||||||
|
facts.merge!( :selinux => 'false' )
|
||||||
|
end
|
||||||
|
|
||||||
|
let :params do
|
||||||
|
{ :mode => 'enforcing',
|
||||||
|
:booleans => ['foo', 'bar'],
|
||||||
|
:modules => ['module1', 'module2'],
|
||||||
|
:directory => '/path/to/modules'}
|
||||||
|
end
|
||||||
|
|
||||||
|
it 'runs setenforce 1' do
|
||||||
|
is_expected.to contain_exec('/sbin/setenforce 1')
|
||||||
|
end
|
||||||
|
|
||||||
|
it 'enables the SELinux boolean' do
|
||||||
|
is_expected.to contain_selboolean('foo').with(
|
||||||
|
:persistent => true,
|
||||||
|
:value => 'on',
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
|
it 'enables the SELinux modules' do
|
||||||
|
is_expected.to contain_selmodule('module1').with(
|
||||||
|
:ensure => 'present',
|
||||||
|
:selmoduledir => '/path/to/modules',
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
||||||
|
|
||||||
|
context 'on Debian platforms' do
|
||||||
|
let :facts do
|
||||||
|
{ :osfamily => 'Debian' }
|
||||||
|
end
|
||||||
|
|
||||||
|
it_raises 'a Puppet::Error', /OS family unsuppored yet \(Debian\), SELinux support is only limited to RedHat family OS/
|
||||||
|
end
|
||||||
|
|
||||||
|
context 'on RedHat platforms' do
|
||||||
|
let :facts do
|
||||||
|
{ :osfamily => 'RedHat' }
|
||||||
|
end
|
||||||
|
|
||||||
|
it_configures 'manage selinux'
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
11
templates/selinux/sysconfig_selinux.erb
Normal file
11
templates/selinux/sysconfig_selinux.erb
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# This file controls the state of SELinux on the system.
|
||||||
|
# SELINUX= can take one of these three values:
|
||||||
|
# enforcing - SELinux security policy is enforced.
|
||||||
|
# permissive - SELinux prints warnings instead of enforcing.
|
||||||
|
# disabled - No SELinux policy is loaded.
|
||||||
|
SELINUX=<%= @mode %>
|
||||||
|
# SELINUXTYPE= can take one of these two values:
|
||||||
|
# targeted - Targeted processes are protected,
|
||||||
|
# minimum - Modification of targeted policy. Only selected processes are protected.
|
||||||
|
# mls - Multi Level Security protection.
|
||||||
|
SELINUXTYPE=targeted
|
Loading…
x
Reference in New Issue
Block a user