rpms/policycoreutils/devel policycoreutils-rhat.patch,1.432,1.433

Daniel J Walsh dwalsh at fedoraproject.org
Thu Aug 20 19:51:46 UTC 2009


Author: dwalsh

Update of /cvs/extras/rpms/policycoreutils/devel
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv12773

Modified Files:
	policycoreutils-rhat.patch 
Log Message:
* Thu Aug 20 2009 Dan Walsh <dwalsh at redhat.com> 2.0.71-7
- Fix glob handling of /..


policycoreutils-rhat.patch:
 Makefile                                    |    2 
 audit2allow/audit2allow                     |   14 
 restorecond/Makefile                        |   24 -
 restorecond/org.selinux.Restorecond.service |    3 
 restorecond/restorecond.c                   |  424 +++--------------
 restorecond/restorecond.conf                |    5 
 restorecond/restorecond.desktop             |    7 
 restorecond/restorecond.h                   |   18 
 restorecond/restorecond_user.conf           |    2 
 restorecond/user.c                          |  237 +++++++++
 restorecond/watch.c                         |  254 ++++++++++
 scripts/Makefile                            |    3 
 scripts/chcat                               |    2 
 scripts/sandbox                             |  139 +++++
 scripts/sandbox.8                           |   22 
 scripts/sandbox.py                          |   67 ++
 semanage/semanage                           |   34 +
 semanage/seobject.py                        |   66 ++
 setfiles/Makefile                           |    4 
 setfiles/restore.c                          |  530 ++++++++++++++++++++++
 setfiles/restore.h                          |   50 ++
 setfiles/setfiles.c                         |  672 +++-------------------------
 22 files changed, 1611 insertions(+), 968 deletions(-)

Index: policycoreutils-rhat.patch
===================================================================
RCS file: /cvs/extras/rpms/policycoreutils/devel/policycoreutils-rhat.patch,v
retrieving revision 1.432
retrieving revision 1.433
diff -u -p -r1.432 -r1.433
--- policycoreutils-rhat.patch	20 Aug 2009 19:05:30 -0000	1.432
+++ policycoreutils-rhat.patch	20 Aug 2009 19:51:45 -0000	1.433
@@ -47,6 +47,1113 @@ diff --exclude-from=exclude --exclude=se
  
  INOTIFYH = $(shell ls /usr/include/sys/inotify.h 2>/dev/null)
  
+diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/Makefile policycoreutils-2.0.71/restorecond/Makefile
+--- nsapolicycoreutils/restorecond/Makefile	2009-08-20 15:49:21.000000000 -0400
++++ policycoreutils-2.0.71/restorecond/Makefile	2009-08-20 15:30:42.000000000 -0400
+@@ -1,17 +1,28 @@
+ # Installation directories.
+ PREFIX ?= ${DESTDIR}/usr
+ SBINDIR ?= $(PREFIX)/sbin
++LIBDIR ?= $(PREFIX)/lib
+ MANDIR = $(PREFIX)/share/man
++AUTOSTARTDIR = $(DESTDIR)/etc/xdg/autostart
++DBUSSERVICEDIR = $(DESTDIR)/usr/share/dbus-1/services
++
++autostart_DATA = sealertauto.desktop
+ INITDIR = $(DESTDIR)/etc/rc.d/init.d
+ SELINUXDIR = $(DESTDIR)/etc/selinux
+ 
++DBUSFLAGS = -DHAVE_DBUS -I/usr/include/dbus-1.0 -I/usr/lib64/dbus-1.0/include -I/usr/lib/dbus-1.0/include 
++DBUSLIB = -ldbus-glib-1 
++
+ CFLAGS ?= -g -Werror -Wall -W
+-override CFLAGS += -I$(PREFIX)/include -D_FILE_OFFSET_BITS=64
+-LDLIBS += -lselinux -L$(PREFIX)/lib
++override CFLAGS += -I$(PREFIX)/include $(DBUSFLAGS) -I/usr/include/glib-2.0 -I/usr/lib64/glib-2.0/include -I/usr/lib/glib-2.0/include
++
++LDLIBS += -lselinux $(DBUSLIB) -lglib-2.0 -L$(LIBDIR)
+ 
+ all: restorecond
+ 
+-restorecond:  restorecond.o utmpwatcher.o stringslist.o
++restorecond.o utmpwatcher.o stringslist.o user.o watch.o: restorecond.h 
++
++restorecond:  ../setfiles/restore.o restorecond.o utmpwatcher.o stringslist.o user.o watch.o
+ 	$(CC) $(LDFLAGS) -o $@ $^ $(LDLIBS)
+ 
+ install: all
+@@ -22,7 +33,12 @@
+ 	-mkdir -p $(INITDIR)
+ 	install -m 755 restorecond.init $(INITDIR)/restorecond
+ 	-mkdir -p $(SELINUXDIR)
+-	install -m 600 restorecond.conf $(SELINUXDIR)/restorecond.conf
++	install -m 644 restorecond.conf $(SELINUXDIR)/restorecond.conf
++	install -m 644 restorecond_user.conf $(SELINUXDIR)/restorecond_user.conf
++	-mkdir -p $(AUTOSTARTDIR)
++	install -m 644 restorecond.desktop $(AUTOSTARTDIR)/restorecond.desktop
++	-mkdir -p $(DBUSSERVICEDIR)
++	install -m 600 org.selinux.Restorecond.service  $(DBUSSERVICEDIR)/org.selinux.Restorecond.service
+ 
+ relabel: install
+ 	/sbin/restorecon $(SBINDIR)/restorecond 
+diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/org.selinux.Restorecond.service policycoreutils-2.0.71/restorecond/org.selinux.Restorecond.service
+--- nsapolicycoreutils/restorecond/org.selinux.Restorecond.service	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.71/restorecond/org.selinux.Restorecond.service	2009-08-20 12:53:16.000000000 -0400
+@@ -0,0 +1,3 @@
++[D-BUS Service]
++Name=org.selinux.Restorecond
++Exec=/usr/sbin/restorecond -u
+diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.c policycoreutils-2.0.71/restorecond/restorecond.c
+--- nsapolicycoreutils/restorecond/restorecond.c	2009-08-20 15:49:21.000000000 -0400
++++ policycoreutils-2.0.71/restorecond/restorecond.c	2009-08-20 15:30:44.000000000 -0400
+@@ -48,294 +48,38 @@
+ #include <signal.h>
+ #include <string.h>
+ #include <unistd.h>
+-#include <ctype.h>
++#include "../setfiles/restore.h"
+ #include <sys/types.h>
+-#include <sys/stat.h>
+ #include <syslog.h>
+ #include <limits.h>
++#include <pwd.h>
++#include <sys/stat.h>
++#include <string.h>
++#include <stdio.h>
+ #include <fcntl.h>
+-
+ #include "restorecond.h"
+-#include "stringslist.h"
+ #include "utmpwatcher.h"
+ 
+-extern char *dirname(char *path);
++const char *homedir;
+ static int master_fd = -1;
+-static int master_wd = -1;
+-static int terminate = 0;
+-
+-#include <selinux/selinux.h>
+-#include <utmp.h>
+-
+-/* size of the event structure, not counting name */
+-#define EVENT_SIZE  (sizeof (struct inotify_event))
+-/* reasonable guess as to size of 1024 events */
+-#define BUF_LEN        (1024 * (EVENT_SIZE + 16))
+-
+-static int debug_mode = 0;
+-static int verbose_mode = 0;
+-
+-static void restore(const char *filename, int exact);
+-
+-struct watchList {
+-	struct watchList *next;
+-	int wd;
+-	char *dir;
+-	struct stringsList *files;
+-};
+-struct watchList *firstDir = NULL;
+-
+-/* Compare two contexts to see if their differences are "significant",
+- * or whether the only difference is in the user. */
+-static int only_changed_user(const char *a, const char *b)
+-{
+-	char *rest_a, *rest_b;	/* Rest of the context after the user */
+-	if (!a || !b)
+-		return 0;
+-	rest_a = strchr(a, ':');
+-	rest_b = strchr(b, ':');
+-	if (!rest_a || !rest_b)
+-		return 0;
+-	return (strcmp(rest_a, rest_b) == 0);
+-}
+-
+-/* 
+-   A file was in a direcroty has been created. This function checks to 
+-   see if it is one that we are watching.
+-*/
+-
+-static int watch_list_find(int wd, const char *file)
+-{
+-	struct watchList *ptr = NULL;
+-	ptr = firstDir;
+-
+-	if (debug_mode)
+-		printf("%d: File=%s\n", wd, file);
+-	while (ptr != NULL) {
+-		if (ptr->wd == wd) {
+-			int exact=0;
+-			if (strings_list_find(ptr->files, file, &exact) == 0) {
+-				char *path = NULL;
+-				if (asprintf(&path, "%s/%s", ptr->dir, file) <
+-				    0)
+-					exitApp("Error allocating memory.");
+-				restore(path, exact);
+-				free(path);
+-				return 0;
+-			}
+-			if (debug_mode)
+-				strings_list_print(ptr->files);
+-
+-			/* Not found in this directory */
+-			return -1;
+-		}
+-		ptr = ptr->next;
+-	}
+-	/* Did not find a directory */
+-	return -1;
+-}
+-
+-static void watch_list_free(int fd)
+-{
+-	struct watchList *ptr = NULL;
+-	struct watchList *prev = NULL;
+-	ptr = firstDir;
+-
+-	while (ptr != NULL) {
+-		inotify_rm_watch(fd, ptr->wd);
+-		strings_list_free(ptr->files);
+-		free(ptr->dir);
+-		prev = ptr;
+-		ptr = ptr->next;
+-		free(prev);
+-	}
+-	firstDir = NULL;
+-}
+-
+-/* 
+-   Set the file context to the default file context for this system.
+-   Same as restorecon.
+-*/
+-static void restore(const char *filename, int exact)
+-{
+-	int retcontext = 0;
+-	security_context_t scontext = NULL;
+-	security_context_t prev_context = NULL;
+-	struct stat st;
+-	int fd = -1;
+-	if (debug_mode)
+-		printf("restore %s\n", filename);
+-
+-	fd = open(filename, O_NOFOLLOW | O_RDONLY);
+-	if (fd < 0) {
+-		if (verbose_mode)
+-			syslog(LOG_ERR, "Unable to open file (%s) %s\n",
+-			       filename, strerror(errno));
+-		return;
+-	}
+-
+-	if (fstat(fd, &st) != 0) {
+-		syslog(LOG_ERR, "Unable to stat file (%s) %s\n", filename,
+-		       strerror(errno));
+-		close(fd);
+-		return;
+-	}
+-
+-	if (!(st.st_mode & S_IFDIR) && st.st_nlink > 1) {
+-		if (exact) { 
+-			syslog(LOG_ERR,
+-			       "Will not restore a file with more than one hard link (%s) %s\n",
+-			       filename, strerror(errno));
+-		}
+-		close(fd);
+-		return;
+-	}
+-
+-	if (matchpathcon(filename, st.st_mode, &scontext) < 0) {
+-		if (errno == ENOENT)
+-			return;
+-		syslog(LOG_ERR, "matchpathcon(%s) failed %s\n", filename,
+-		       strerror(errno));
+-		return;
+-	}
+-	retcontext = fgetfilecon_raw(fd, &prev_context);
+-
+-	if (retcontext >= 0 || errno == ENODATA) {
+-		if (retcontext < 0)
+-			prev_context = NULL;
+-		if (retcontext < 0 || (strcmp(prev_context, scontext) != 0)) {
+-
+-			if (only_changed_user(scontext, prev_context) != 0) {
+-				free(scontext);
+-				free(prev_context);
+-				close(fd);
+-				return;
+-			}
+-
+-			if (fsetfilecon(fd, scontext) < 0) {
+-				if (errno != EOPNOTSUPP) 
+-					syslog(LOG_ERR,
+-					       "set context %s->%s failed:'%s'\n",
+-					       filename, scontext, strerror(errno));
+-				if (retcontext >= 0)
+-					free(prev_context);
+-				free(scontext);
+-				close(fd);
+-				return;
+-			}
+-			syslog(LOG_WARNING, "Reset file context %s: %s->%s\n",
+-			       filename, prev_context, scontext);
+-		}
+-		if (retcontext >= 0)
+-			free(prev_context);
+-	} else {
+-		if (errno != EOPNOTSUPP) 
+-			syslog(LOG_ERR, "get context on %s failed: '%s'\n",
+-			       filename, strerror(errno));
+-	}
+-	free(scontext);
+-	close(fd);
+-}
+-
+-static void process_config(int fd, FILE * cfg)
+-{
+-	char *line_buf = NULL;
+-	size_t len = 0;
+-
+-	while (getline(&line_buf, &len, cfg) > 0) {
+-		char *buffer = line_buf;
+-		while (isspace(*buffer))
+-			buffer++;
+-		if (buffer[0] == '#')
+-			continue;
+-		int l = strlen(buffer) - 1;
+-		if (l <= 0)
+-			continue;
+-		buffer[l] = 0;
+-		if (buffer[0] == '~')
+-			utmpwatcher_add(fd, &buffer[1]);
+-		else {
+-			watch_list_add(fd, buffer);
+-		}
+-	}
+-	free(line_buf);
+-}
+-
+-/* 
+-   Read config file ignoring Comment lines 
+-   Files specified one per line.  Files with "~" will be expanded to the logged in users
+-   homedirs.
+-*/
+ 
+-static void read_config(int fd)
+-{
+-	char *watch_file_path = "/etc/selinux/restorecond.conf";
++static char *server_watch_file  = "/etc/selinux/restorecond.conf";
++static char *user_watch_file  = "/etc/selinux/restorecond_user.conf";
++static char *watch_file;
++static struct restore_opts r_opts;
+ 
+-	FILE *cfg = NULL;
+-	if (debug_mode)
+-		printf("Read Config\n");
+-
+-	watch_list_free(fd);
+-
+-	cfg = fopen(watch_file_path, "r");
+-	if (!cfg)
+-		exitApp("Error reading config file.");
+-	process_config(fd, cfg);
+-	fclose(cfg);
+-
+-	inotify_rm_watch(fd, master_wd);
+-	master_wd =
+-	    inotify_add_watch(fd, watch_file_path, IN_MOVED_FROM | IN_MODIFY);
+-	if (master_wd == -1)
+-		exitApp("Error watching config file.");
+-}
++#include <selinux/selinux.h>
+ 
+-/* 
+-   Inotify watch loop 
+-*/
+-static int watch(int fd)
+-{
+-	char buf[BUF_LEN];
+-	int len, i = 0;
+-	len = read(fd, buf, BUF_LEN);
+-	if (len < 0) {
+-		if (terminate == 0) {
+-			syslog(LOG_ERR, "Read error (%s)", strerror(errno));
+-			return 0;
+-		}
+-		syslog(LOG_ERR, "terminated");
+-		return -1;
+-	} else if (!len)
+-		/* BUF_LEN too small? */
+-		return -1;
+-	while (i < len) {
+-		struct inotify_event *event;
+-		event = (struct inotify_event *)&buf[i];
+-		if (debug_mode)
+-			printf("wd=%d mask=%u cookie=%u len=%u\n",
+-			       event->wd, event->mask,
+-			       event->cookie, event->len);
+-		if (event->wd == master_wd)
+-			read_config(fd);
+-		else {
+-			switch (utmpwatcher_handle(fd, event->wd)) {
+-			case -1:	/* Message was not for utmpwatcher */
+-				if (event->len)
+-					watch_list_find(event->wd, event->name);
+-				break;
+-
+-			case 1:	/* utmp has changed need to reload */
+-				read_config(fd);
+-				break;
+-
+-			default:	/* No users logged in or out */
+-				break;
+-			}
+-		}
++int debug_mode = 0;
++int terminate = 0;
++int master_wd = -1;
++int run_as_user = 0;
+ 
+-		i += EVENT_SIZE + event->len;
+-	}
+-	return 0;
++static void done(void) {
++	watch_list_free(master_fd);
++	close(master_fd);
++	utmpwatcher_free();
++	matchpathcon_fini();
+ }
+ 
+ static const char *pidfile = "/var/run/restorecond.pid";
+@@ -374,7 +118,7 @@
+ 
+ static void usage(char *program)
+ {
+-	printf("%s [-d] [-v] \n", program);
++	printf("%s [-d] [-s] [-f restorecond_file ] [-v] \n", program);
+ 	exit(0);
+ }
+ 
+@@ -390,74 +134,35 @@
+    to see if it is one that we are watching.
+ */
+ 
+-void watch_list_add(int fd, const char *path)
+-{
+-	struct watchList *ptr = NULL;
+-	struct watchList *prev = NULL;
+-	char *x = strdup(path);
+-	if (!x)
+-		exitApp("Out of Memory");
+-	char *dir = dirname(x);
+-	char *file = basename(path);
+-	ptr = firstDir;
+-
+-	restore(path, 1);
+-
+-	while (ptr != NULL) {
+-		if (strcmp(dir, ptr->dir) == 0) {
+-			strings_list_add(&ptr->files, file);
+-			free(x);
+-			return;
+-		}
+-		prev = ptr;
+-		ptr = ptr->next;
+-	}
+-	ptr = calloc(1, sizeof(struct watchList));
+-
+-	if (!ptr)
+-		exitApp("Out of Memory");
+-
+-	ptr->wd = inotify_add_watch(fd, dir, IN_CREATE | IN_MOVED_TO);
+-	if (ptr->wd == -1) {
+-		free(ptr);
+-		syslog(LOG_ERR, "Unable to watch (%s) %s\n",
+-		       path, strerror(errno));
+-		return;
+-	}
+-
+-	ptr->dir = strdup(dir);
+-	if (!ptr->dir)
+-		exitApp("Out of Memory");
+-
+-	strings_list_add(&ptr->files, file);
+-	if (prev)
+-		prev->next = ptr;
+-	else
+-		firstDir = ptr;
+-
+-	if (debug_mode)
+-		printf("%d: Dir=%s, File=%s\n", ptr->wd, ptr->dir, file);
+-
+-	free(x);
+-}
+-
+ int main(int argc, char **argv)
+ {
+ 	int opt;
+ 	struct sigaction sa;
+ 
+-#ifndef DEBUG
+-	/* Make sure we are root */
+-	if (getuid() != 0) {
+-		fprintf(stderr, "You must be root to run this program.\n");
+-		return 1;
+-	}
+-#endif
+-	/* Make sure we are root */
+-	if (is_selinux_enabled() != 1) {
+-		fprintf(stderr, "Daemon requires SELinux be enabled to run.\n");
+-		return 1;
+-	}
++	memset(&r_opts, 0, sizeof(r_opts));
++
++	r_opts.progress = 0;
++	r_opts.count = 0;
++	r_opts.debug = 0;
++	r_opts.change = 1;
++	r_opts.verbose = 0;
++	r_opts.logging = 0;
++	r_opts.rootpath = NULL;
++	r_opts.expand_realpath = 0;
++	r_opts.rootpathlen = 0;
++	r_opts.outfile = NULL;
++	r_opts.force = 0;
++	r_opts.hard_links = 0;
++	r_opts.expand_realpath = 1;
++	r_opts.abort_on_error = 0;
++	r_opts.add_assoc = 0;
++	r_opts.fts_flags = FTS_PHYSICAL;
++	r_opts.selabel_opt_validate = NULL;
++	r_opts.selabel_opt_path = NULL;
++	
++	restore_init(&r_opts);
++	/* If we are not running SELinux then just exit */
++	if (is_selinux_enabled() != 1) return 0;
+ 
+ 	/* Register sighandlers */
+ 	sa.sa_flags = 0;
+@@ -467,38 +172,59 @@
+ 
+ 	set_matchpathcon_flags(MATCHPATHCON_NOTRANS);
+ 
+-	master_fd = inotify_init();
+-	if (master_fd < 0)
+-		exitApp("inotify_init");
+-
+-	while ((opt = getopt(argc, argv, "dv")) > 0) {
++	atexit( done );
++	while ((opt = getopt(argc, argv, "uf:dv")) > 0) {
+ 		switch (opt) {
+ 		case 'd':
+ 			debug_mode = 1;
+ 			break;
++		case 'f':
++			watch_file = optarg;
++			break;
++		case 'u':
++			run_as_user = 1;
++			break;
+ 		case 'v':
+-			verbose_mode = 1;
++			r_opts.verbose++;
+ 			break;
+ 		case '?':
+ 			usage(argv[0]);
+ 		}
+ 	}
+-	read_config(master_fd);
++
++	master_fd = inotify_init();
++	if (master_fd < 0)
++		exitApp("inotify_init");
++
++	uid_t uid = getuid();
++	struct passwd *pwd = getpwuid(uid);
++	homedir = pwd->pw_dir;
++	if (uid != 0) {
++		if (run_as_user)
++			return server(master_fd, user_watch_file);
++		if (start() != 0) 
++			return server(master_fd, user_watch_file);
++		return 0;
++	}
++
++	watch_file = server_watch_file;
++	read_config(master_fd, watch_file);
+ 
+ 	if (!debug_mode)
+ 		daemon(0, 0);
+ 
+ 	write_pid_file();
+ 
+-	while (watch(master_fd) == 0) {
++	while (watch(master_fd, watch_file) == 0) {
+ 	};
+ 
+ 	watch_list_free(master_fd);
+ 	close(master_fd);
+ 	matchpathcon_fini();
+-	utmpwatcher_free();
+ 	if (pidfile)
+ 		unlink(pidfile);
+ 
+ 	return 0;
+ }
++
++
+diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.conf policycoreutils-2.0.71/restorecond/restorecond.conf
+--- nsapolicycoreutils/restorecond/restorecond.conf	2009-08-20 15:49:21.000000000 -0400
++++ policycoreutils-2.0.71/restorecond/restorecond.conf	2009-08-20 15:30:45.000000000 -0400
+@@ -4,8 +4,5 @@
+ /etc/mtab
+ /var/run/utmp
+ /var/log/wtmp
+-~/*
+-/root/.ssh
++/root/*
+ /root/.ssh/*
+-
+-
+diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.desktop policycoreutils-2.0.71/restorecond/restorecond.desktop
+--- nsapolicycoreutils/restorecond/restorecond.desktop	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.71/restorecond/restorecond.desktop	2009-08-20 12:53:16.000000000 -0400
+@@ -0,0 +1,7 @@
++[Desktop Entry]
++Name=File Context maintainer
++Exec=/usr/sbin/restorecond -u
++Comment=Fix file context in owned by the user
++Encoding=UTF-8
++Type=Application
++StartupNotify=false
+diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.h policycoreutils-2.0.71/restorecond/restorecond.h
+--- nsapolicycoreutils/restorecond/restorecond.h	2009-08-20 15:49:21.000000000 -0400
++++ policycoreutils-2.0.71/restorecond/restorecond.h	2009-08-20 15:30:47.000000000 -0400
+@@ -24,7 +24,21 @@
+ #ifndef RESTORED_CONFIG_H
+ #define RESTORED_CONFIG_H
+ 
+-void exitApp(const char *msg);
+-void watch_list_add(int inotify_fd, const char *path);
++extern int debug_mode;
++extern const char *homedir;
++extern int terminate;
++extern int master_wd;
++extern int run_as_user;
++
++extern int start(void);
++extern int server(int, const char *watch_file);
++
++extern void exitApp(const char *msg);
++extern void read_config(int fd,	const char *watch_file);
++
++extern int watch(int fd, const char *watch_file);
++extern void watch_list_add(int inotify_fd, const char *path);
++extern int watch_list_find(int wd, const char *file);
++extern void watch_list_free(int fd);
+ 
+ #endif
+diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond_user.conf policycoreutils-2.0.71/restorecond/restorecond_user.conf
+--- nsapolicycoreutils/restorecond/restorecond_user.conf	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.71/restorecond/restorecond_user.conf	2009-08-20 12:53:16.000000000 -0400
+@@ -0,0 +1,2 @@
++~/*
++~/public_html/*
+diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/user.c policycoreutils-2.0.71/restorecond/user.c
+--- nsapolicycoreutils/restorecond/user.c	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.71/restorecond/user.c	2009-08-20 13:08:42.000000000 -0400
+@@ -0,0 +1,237 @@
++/*
++ * restorecond
++ *
++ * Copyright (C) 2006-2009 Red Hat 
++ * see file 'COPYING' for use and warranty information
++ *
++ * This program is free software; you can redistribute it and/or
++ * modify it under the terms of the GNU General Public License as
++ * published by the Free Software Foundation; either version 2 of
++ * the License, or (at your option) any later version.
++ * 
++ * This program is distributed in the hope that it will be useful,
++ * but WITHOUT ANY WARRANTY; without even the implied warranty of
++ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
++ * GNU General Public License for more details.
++.* 
++ * You should have received a copy of the GNU General Public License
++ * along with this program; if not, write to the Free Software
++ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA     
++ * 02111-1307  USA
++ *
++ * Authors:  
++ *   Dan Walsh <dwalsh at redhat.com>
++ *
++*/
++
++#define _GNU_SOURCE
++#include <sys/inotify.h>
++#include <errno.h>
++#include <stdio.h>
++#include <stdlib.h>
++#include <signal.h>
++#include <string.h>
++#include <unistd.h>
++#include <ctype.h>
++#include <sys/types.h>
++#include <sys/stat.h>
++#include <syslog.h>
++#include <limits.h>
++#include <fcntl.h>
++
++#include "restorecond.h"
++#include "stringslist.h"
++#include <glib.h>
++#ifdef HAVE_DBUS
++#include <dbus/dbus.h>
++#include <dbus/dbus-glib.h>
++#include <dbus/dbus-glib-lowlevel.h>
++
++static DBusHandlerResult signal_filter (DBusConnection *connection, DBusMessage *message, void *user_data);
++
++static const char *PATH="/org/selinux/Restorecond";
++//static const char *BUSNAME="org.selinux.Restorecond";
++static const char *INTERFACE="org.selinux.RestorecondIface";
++static const char *RULE="type='signal',interface='org.selinux.RestorecondIface'";
++
++
++static DBusHandlerResult
++signal_filter (DBusConnection *connection  __attribute__ ((__unused__)), DBusMessage *message, void *user_data)
++{
++  /* User data is the event loop we are running in */
++  GMainLoop *loop = user_data;
++
++  /* A signal from the bus saying we are about to be disconnected */
++  if (dbus_message_is_signal 
++        (message, INTERFACE, "Stop")) {
++	  
++      /* Tell the main loop to quit */
++      g_main_loop_quit (loop);
++      /* We have handled this message, don't pass it on */
++      return DBUS_HANDLER_RESULT_HANDLED;
++  }
++  /* A Ping signal on the com.burtonini.dbus.Signal interface */
++  else if (dbus_message_is_signal (message, INTERFACE, "Start")) {
++    DBusError error;
++    dbus_error_init (&error);
++    g_print("Start received\n");
++    return DBUS_HANDLER_RESULT_HANDLED;
++  }
++  return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
++}
++
++static int dbus_server(GMainLoop *loop) {
++    DBusConnection *bus;
++    DBusError error;
++    dbus_error_init (&error);
++    bus = dbus_bus_get (DBUS_BUS_SESSION, &error);
++    if (bus) {
++	dbus_connection_setup_with_g_main (bus, NULL);
++	
++	/* listening to messages from all objects as no path is specified */
++	dbus_bus_add_match (bus, RULE, &error); // see signals from the given interfacey
++	dbus_connection_add_filter (bus, signal_filter, loop, NULL);
++	return 0;
++    } 
++    return -1;
++}
++
++#endif
++#include <selinux/selinux.h>
++#include <sys/file.h>
++
++/* size of the event structure, not counting name */
++#define EVENT_SIZE  (sizeof (struct inotify_event))
++/* reasonable guess as to size of 1024 events */
++#define BUF_LEN        (1024 * (EVENT_SIZE + 16))
++
++static gboolean
++io_channel_callback
++ (GIOChannel *source,
++  GIOCondition condition,
++  gpointer data __attribute__((__unused__)))
++{
++
++  char buffer[BUF_LEN+1];
++  gsize bytes_read;
++  unsigned int i = 0;
++
++  if (condition & G_IO_IN) {
++    /* Data is available. */
++    g_io_channel_read
++      (source, buffer,
++       sizeof (buffer),
++       &bytes_read);
++
++    while (i < bytes_read) {
++	    struct inotify_event *event;
++	    event = (struct inotify_event *)&buffer[i];
++	    if (debug_mode)
++		    printf("wd=%d mask=%u cookie=%u len=%u\n",
++			   event->wd, event->mask,
++			   event->cookie, event->len);
++	    if (event->len)
++		    watch_list_find(event->wd, event->name);
++	    
++	    i += EVENT_SIZE + event->len;
++    }
++  }
++
++  /* An error happened while reading
++     the file. */
++
++  if (condition & G_IO_NVAL)
++    return FALSE;
++
++  /* We have reached the end of the
++     file. */
++
++  if (condition & G_IO_HUP) {
++    g_io_channel_close (source);
++    return FALSE;
++  }
++
++  /* Returning TRUE will make sure
++     the callback remains associated
++     to the channel. */
++
++  return TRUE;
++}
++
++int start() {
++#ifdef HAVE_DBUS
++	DBusConnection *bus;
++	DBusError error;
++	DBusMessage *message;
++	
++	/* Get a connection to the session bus */
++	dbus_error_init (&error);
++	bus = dbus_bus_get (DBUS_BUS_SESSION, &error);
++	if (!bus) {
++		if (debug_mode)
++			g_warning ("Failed to connect to the D-BUS daemon: %s", error.message);
++		dbus_error_free (&error);
++		return 1;
++	}
++	
++
++	/* Create a new signal "Start" on the interface,
++	 * from the object  */
++	message = dbus_message_new_signal (PATH,
++					   INTERFACE, "Start");
++	/* Send the signal */
++	dbus_connection_send (bus, message, NULL);
++	/* Free the signal now we have finished with it */
++	dbus_message_unref (message);
++#endif /* HAVE_DBUS */
++	return 0;
++}
++
++static int local_server() {
++	// ! dbus, run as local service
++	char *ptr=NULL;
++	asprintf(&ptr, "%s/.restorecond", homedir);
++	int fd = open(ptr, O_CREAT | O_WRONLY | O_NOFOLLOW, S_IRUSR | S_IWUSR);
++	if (debug_mode)
++		g_warning ("Lock file: %s", ptr);
++	
++	free(ptr);
++	if (fd < 0) {
++		if (debug_mode)
++			perror("open");
++		return -1;
++	}
++	if (flock(fd, LOCK_EX | LOCK_NB) < 0) {
++		if (debug_mode)
++			perror("flock");
++		return -1;
++	}
++	return 0;
++}
++
++int server(int master_fd, const char *watch_file) {
++    GMainLoop *loop;
++
++    loop = g_main_loop_new (NULL, FALSE);
++    
++#ifdef HAVE_DBUS
++    if (dbus_server(loop) != 0) 
++#endif /* HAVE_DBUS */
++	    if (local_server(loop) != 0) 
++		    return 0;
++
++    read_config(master_fd, watch_file);
++    
++    set_matchpathcon_flags(MATCHPATHCON_NOTRANS);
++    
++    GIOChannel *c = g_io_channel_unix_new(master_fd);
++    
++    g_io_add_watch_full( c,
++			 G_PRIORITY_HIGH,
++			 G_IO_IN|G_IO_ERR|G_IO_HUP,
++			 io_channel_callback, NULL, NULL);
++    
++    g_main_loop_run (loop);
++    return 0;
++}
++
+diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/watch.c policycoreutils-2.0.71/restorecond/watch.c
+--- nsapolicycoreutils/restorecond/watch.c	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.71/restorecond/watch.c	2009-08-20 13:08:19.000000000 -0400
+@@ -0,0 +1,254 @@
++#define _GNU_SOURCE
++#include <sys/inotify.h>
++#include <errno.h>
++#include <stdio.h>
++#include <stdlib.h>
++#include <string.h>
++#include <unistd.h>
++#include <ctype.h>
++#include <sys/types.h>
++#include <syslog.h>
++#include "../setfiles/restore.h"
++#include <glob.h>
++#include <libgen.h>
++#include <sys/stat.h>
++#include <string.h>
++#include <stdio.h>
++#include <fcntl.h>
++#include <selinux/selinux.h>
++#include "restorecond.h"
++#include "stringslist.h"
++#include "utmpwatcher.h"
++
++/* size of the event structure, not counting name */
++#define EVENT_SIZE  (sizeof (struct inotify_event))
++/* reasonable guess as to size of 1024 events */
++#define BUF_LEN        (1024 * (EVENT_SIZE + 16))
++
++
++struct watchList {
++	struct watchList *next;
++	int wd;
++	char *dir;
++	struct stringsList *files;
++};
++struct watchList *firstDir = NULL;
++
++
++void watch_list_add(int fd, const char *path)
++{
++	struct watchList *ptr = NULL;
++	size_t i = 0;
++	struct watchList *prev = NULL;
++	glob_t globbuf;
++	char *x = strdup(path);
++	if (!x)
++		exitApp("Out of Memory");
++	char *file = basename(x);
++	char *dir = dirname(x);
++	ptr = firstDir;
++
++	globbuf.gl_offs = 1;
++	if (glob(path, 
++		 GLOB_TILDE | GLOB_PERIOD,
++		 NULL,
++		 &globbuf) >= 0) {
++		for (i=0; i < globbuf.gl_pathc; i++) {
++		  int len = strlen(globbuf.gl_pathv[i]) -2;
++		  if (len > 0 && strcmp(&globbuf.gl_pathv[i][len--], "/.") == 0) continue;
++		  if (len > 0 && strcmp(&globbuf.gl_pathv[i][len], "/..") == 0) continue;
++		  if (process_one(globbuf.gl_pathv[i], 0) > 0)
++		    process_one(globbuf.gl_pathv[i], 1);
++		}
++		globfree(&globbuf);
++	}
++
++	while (ptr != NULL) {
++		if (strcmp(dir, ptr->dir) == 0) {
++			strings_list_add(&ptr->files, file);
++			free(x);
++			return;
++		}
++		prev = ptr;
++		ptr = ptr->next;
++	}
++	ptr = calloc(1, sizeof(struct watchList));
++
++	if (!ptr)
++		exitApp("Out of Memory");
++
++	ptr->wd = inotify_add_watch(fd, dir, IN_CREATE | IN_MOVED_TO);
++	if (ptr->wd == -1) {
++		free(ptr);
++		syslog(LOG_ERR, "Unable to watch (%s) %s\n",
++		       path, strerror(errno));
++		return;
++	}
++
++	ptr->dir = strdup(dir);
++	if (!ptr->dir)
++		exitApp("Out of Memory");
++
++	strings_list_add(&ptr->files, file);
++	if (prev)
++		prev->next = ptr;
++	else
++		firstDir = ptr;
++
++	if (debug_mode)
++		printf("%d: Dir=%s, File=%s\n", ptr->wd, ptr->dir, file);
++
++	free(x);
++}
++
++/* 
++   A file was in a direcroty has been created. This function checks to 
++   see if it is one that we are watching.
++*/
++
++int watch_list_find(int wd, const char *file)
++{
++	struct watchList *ptr = NULL;
++	ptr = firstDir;
++	if (debug_mode)
++		printf("%d: File=%s\n", wd, file);
++	while (ptr != NULL) {
++		if (ptr->wd == wd) {
++			int exact=0;
++			if (strings_list_find(ptr->files, file, &exact) == 0) {
++				char *path = NULL;
++				if (asprintf(&path, "%s/%s", ptr->dir, file) <
++				    0)
++					exitApp("Error allocating memory.");
++				
++				process_one(path, 0);
++				free(path);
++				return 0;
++			}
++			if (debug_mode)
++				strings_list_print(ptr->files);
++
++			/* Not found in this directory */
++			return -1;
++		}
++		ptr = ptr->next;
++	}
++	/* Did not find a directory */
++	return -1;
++}
++
++void watch_list_free(int fd)
++{
++	struct watchList *ptr = NULL;
++	struct watchList *prev = NULL;
++	ptr = firstDir;
++
++	while (ptr != NULL) {
++		inotify_rm_watch(fd, ptr->wd);
++		strings_list_free(ptr->files);
++		free(ptr->dir);
++		prev = ptr;
++		ptr = ptr->next;
++		free(prev);
++	}
++	firstDir = NULL;
++}
++
++/* 
++   Inotify watch loop 
++*/
++int watch(int fd, const char *watch_file)
++{
++	char buf[BUF_LEN];
++	int len, i = 0;
++	len = read(fd, buf, BUF_LEN);
++	if (len < 0) {
++		if (terminate == 0) {
++			syslog(LOG_ERR, "Read error (%s)", strerror(errno));
++			return 0;
++		}
++		syslog(LOG_ERR, "terminated");
++		return -1;
++	} else if (!len)
++		/* BUF_LEN too small? */
++		return -1;
++	while (i < len) {
++		struct inotify_event *event;
++		event = (struct inotify_event *)&buf[i];
++		if (debug_mode)
++			printf("wd=%d mask=%u cookie=%u len=%u\n",
++			       event->wd, event->mask,
++			       event->cookie, event->len);
++		if (event->wd == master_wd)
++			read_config(fd, watch_file);
++		else {
++			if (event->len)
++				watch_list_find(event->wd, event->name);
++		}
++
++		i += EVENT_SIZE + event->len;
++	}
++	return 0;
++}
++
++static void process_config(int fd, FILE * cfg)
++{
++	char *line_buf = NULL;
++	size_t len = 0;
++
++	while (getline(&line_buf, &len, cfg) > 0) {
++		char *buffer = line_buf;
++		while (isspace(*buffer))
++			buffer++;
++		if (buffer[0] == '#')
++			continue;
++		int l = strlen(buffer) - 1;
++		if (l <= 0)
++			continue;
++		buffer[l] = 0;
++		if (buffer[0] == '~') {
++			if (run_as_user) {
++				char *ptr=NULL;
++				asprintf(&ptr, "%s%s", homedir, &buffer[1]);
++				watch_list_add(fd, ptr);
++				free(ptr);
++			} else {
++				utmpwatcher_add(fd, &buffer[1]);
++			}
++		} else {
++			watch_list_add(fd, buffer);
++		}
++	}
++	free(line_buf);
++}
++
++/* 
++   Read config file ignoring Comment lines 
++   Files specified one per line.  Files with "~" will be expanded to the logged in users
++   homedirs.
++*/
++
++void read_config(int fd, const char *watch_file_path)
++{
++
++	FILE *cfg = NULL;
++	if (debug_mode)
++		printf("Read Config\n");
++
++	watch_list_free(fd);
++
++	cfg = fopen(watch_file_path, "r");
++	if (!cfg){
++		perror(watch_file_path);
++		exitApp("Error reading config file");
++	}
++	process_config(fd, cfg);
++	fclose(cfg);
++
++	inotify_rm_watch(fd, master_wd);
++	master_wd =
++	    inotify_add_watch(fd, watch_file_path, IN_MOVED_FROM | IN_MODIFY);
++	if (master_wd == -1)
++		exitApp("Error watching config file.");
++}
++
 diff --exclude-from=exclude --exclude=sepolgen-1.0.17 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/scripts/chcat policycoreutils-2.0.71/scripts/chcat
 --- nsapolicycoreutils/scripts/chcat	2009-06-23 15:36:07.000000000 -0400
 +++ policycoreutils-2.0.71/scripts/chcat	2009-08-20 12:53:16.000000000 -0400




More information about the fedora-extras-commits mailing list