-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 20/06/15 05:25, Tim Dunphy wrote: > Hey folks, > > Ok so I'm having another issue with SELinux. However I think I'm > pretty close to a solution and just need a nudge in the right > directtion. > > I wrote a puppet module that gets systems into bacula backups. Part > of the formula is to distribute key/cert pairs with permissions > that allow bacula to read them so that bacula can talk to the host > over TLS. It's pretty slick, I must say! > > However on adding some new hosts to bacula backups via puppet, I > noticed that I was getting permission denied errors on the keypairs > on the client hosts. > > In my audit logs I found this entry: > > type=AVC msg=audit(1434769414.956:562): avc: denied { open } for > pid=3558 comm="ruby" > path="/etc/puppet/environments/production/modules/bacula/files/monitor1/monitor1.mydomain.com.crt" > > dev="vda1" ino=1842005 scontext=system_u:system_r:passenger_t:s0 > tcontext=system_u:object_r:nfs_t:s0 tclass=file > > And audit2allow told me this: > > #grep puppet /var/log/audit/audit.log | audit2allow -M puppet > ******************** IMPORTANT *********************** To make this > policy package active, execute: > > semodule -i puppet.pp > > But in installing the module I get an error I've never seen > before: > > #semodule -i puppet.pp libsepol.print_missing_requirements: > foreman's global requirements were not met: type/attribute > puppet_var_lib_t (No such file or directory). > libsemanage.semanage_link_sandbox: Link packages failed (No such > file or directory). semodule: Failed! > > I will say that I'm getting much better at working through SELinux > issues. I've come a long way from when I was taught by a senior > admin I was working with to 'always disable selinux' to now making > an effort to work through the issues. > > So I was hoping to get some advice on how to get over this hurdle! > > Thanks, Tim > Hi, Can you give details about your puppetmasterd setup ? it seems that you're using Foreman as puppet ENC. Foreman works fine with selinux enabled : that's what we use for the centos.org infra :-) Which version of puppet/foreman are you using ? Note that foreman has the foreman-selinux package that is used to automatically tune contexts and booleans needed for this. You can still reapply those settings with /usr/sbin/foreman-selinux-{disable,enable,relabel} There is no need to recompile a custom selinux policy for foreman/puppet those days - -- Fabian Arrotin The CentOS Project | http://www.centos.org gpg key: 56BEC54E | twitter: @arrfab -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iEYEARECAAYFAlWFZQIACgkQnVkHo1a+xU41pgCfSnUrzbPJNZntNBgSbJf8tygm JbYAn3D/rV/7INYf/uHYXOvP85bq32RL =SDlY -----END PGP SIGNATURE-----