From: <ssm...@us...> - 2008-05-16 13:28:18
|
Revision: 2882 http://selinux.svn.sourceforge.net/selinux/?rev=2882&view=rev Author: ssmalley Date: 2008-05-16 06:28:17 -0700 (Fri, 16 May 2008) Log Message: ----------- Remove the security_check_context() calls to validate prefixes from seobject.py. They were incorrectly checking against the host policy rather than the target policy, and hardcoding policy knowledge. Modified Paths: -------------- trunk/policycoreutils/semanage/seobject.py Modified: trunk/policycoreutils/semanage/seobject.py =================================================================== --- trunk/policycoreutils/semanage/seobject.py 2008-05-16 13:07:58 UTC (rev 2881) +++ trunk/policycoreutils/semanage/seobject.py 2008-05-16 13:28:17 UTC (rev 2882) @@ -509,8 +509,6 @@ rc = semanage_user_set_mlslevel(self.sh, u, selevel) if rc < 0: raise ValueError(_("Could not set MLS level for %s") % name) - if selinux.security_check_context("system_u:object_r:%s_home_t:s0" % prefix) != 0: - raise ValueError(_("Invalid prefix %s") % prefix) rc = semanage_user_set_prefix(self.sh, u, prefix) if rc < 0: raise ValueError(_("Could not add prefix %s for %s") % (r, prefix)) @@ -576,8 +574,6 @@ semanage_user_set_mlslevel(self.sh, u, untranslate(selevel)) if prefix != "": - if selinux.security_check_context("system_u:object_r:%s_home_t" % prefix) != 0: - raise ValueError(_("Invalid prefix %s") % prefix) semanage_user_set_prefix(self.sh, u, prefix) if len(roles) != 0: This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. |