Version information
This version is compatible with:
- Puppet Enterprise 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x, 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x, 2019.0.x, 2018.1.x
- Puppet >= 5.5.8 < 8.0.0
- , , , ,
Start using this module
Add this module to your Puppetfile:
mod 'simp-vox_selinux', '3.4.0'
Learn more about managing modules with a PuppetfileDocumentation
SELinux module for Puppet
Table of Contents
- Overview
- Module Description - What the module does and why it is useful
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Defined Types
- Development - Guide for contributing to the module
- Authors
Overview
This class manages SELinux.
This module has been forked from (voxpupuli/selinux)[https://github.com/voxpupuli/puppet-selinux] so that it could be re-namespaced as
vox_selinux
for the (SIMP)[https://simp-project.com] framework.Migration to the upstream module will happen in the future after sufficient time has been provided for users to migrate away from the legacy SIMP provided module.
Any changes made here should be sent in as PRs to the upstream module and this should not deviate from the upstream release outside of the namespace if at all possible.
Per the Apache 2.0 license requirements, the following changes have been made:
- Renamed the module from
puppet/selinux
tosimp/vox_selinux
- Changed the namespace for all components to
vox_selinux
- Updated the tests to reflect the changes
- Disabled reporting to the
voxpupuli
channels on test failures- Updated .travis.yml for deployment and SIMP-style testing stages
- Updated the README.md to note the changes
You can see specifically how things were updated by reading the
simp_vox_migration.sh
script.
Requirements
- Puppet 5 or later
Module Description
This module will configure SELinux and/or deploy SELinux based modules to running system.
Get in touch
- IRC: #voxpupuli on irc.freenode.net (Freenode WebChat)
- Mailinglist: voxpupuli@groups.io (groups.io Webinterface)
Upgrading from puppet-selinux 0.8.x
-
Previously, module building always used the refpolicy framework. The default module builder is now 'simple', which uses only checkmodule. Not all features are supported with this builder.
To build modules using the refpolicy framework like previous versions did, specify the 'refpolicy' builder either explicitly per module or globally via the main class
-
The interfaces to the various helper manifests has been changed to be more in line with Puppet file resource naming conventions.
You will need to update your manifests to use the new parameter names.
-
The selinux::restorecond manifest to manage the restorecond service no longer exists
Known problems / limitations
- The
selinux_python_command
fact is now deprecated and will be removed in version 4 of the module. - If SELinux is disabled and you want to switch to permissive or enforcing you are required to reboot the system (limitation of SELinux). The module won't do this for you.
- If SELinux is disabled and the user wants enforcing mode, the module will downgrade to permissive mode instead to avoid transitioning directly from disabled to enforcing state after a reboot and potentially breaking the system. The user will receive a warning when this happens,
- If you add filecontexts with
semanage fcontext
(whatselinux::fcontext
does) the order is important. If you add /my/folder before /my/folder/subfolder only /my/folder will match (limitation of SELinux). There is no such limitation to file-contexts defined in SELinux modules. (GH-121) - If you try to remove a built-in permissive type, the operation will appear to succeed but will actually have no effect, making your puppet runs non-idempotent.
- The
selinux_port
provider may misbehave if the title does not correspond to the format it expects. Users should use theselinux::port
define instead except when purging resources - Defining port ranges that overlap with existing ranges is currently not detected, and will cause semanage to error when the resource is applied.
- On Debian systems, the defined types fcontext, permissive, and port do not work because of PA-2985.
Usage
Generated puppet strings documentation with examples is available in the REFERENCE.md
It's also included in the docs/ folder as simple html pages.
Reference
Basic usage
include selinux
This will include the module and allow you to use the provided defined types, but will not modify existing SELinux settings on the system.
More advanced usage
class { selinux:
mode => 'enforcing',
type => 'targeted',
}
This will include the module and manage the SELinux mode (possible values are
enforcing
, permissive
, and disabled
) and enforcement type (possible values
are targeted
, minimum
, and mls
). Note that disabling SELinux requires a reboot
to fully take effect. It will run in permissive
mode until then.
Deploy a custom module using the refpolicy framework
selinux::module { 'resnet-puppet':
ensure => 'present',
source_te => 'puppet:///modules/site_puppet/site-puppet.te',
source_fc => 'puppet:///modules/site_puppet/site-puppet.fc',
source_if => 'puppet:///modules/site_puppet/site-puppet.if',
builder => 'refpolicy'
}
Using pre-compiled policy packages
selinux::module { 'resnet-puppet':
ensure => 'present',
source_pp => 'puppet:///modules/site_puppet/site-puppet.pp',
}
Note that pre-compiled policy packages may not work reliably across all RHEL / CentOS releases. It's up to you as the user to test that your packages load properly.
Set a boolean value
selinux::boolean { 'puppetagent_manage_all_files': }
Defined Types
boolean
- Set seboolean valuesfcontext
- Define fcontext types and equals valuesmodule
- Manage an SELinux modulepermissive
- Set a context topermissive
.port
- Set selinux port context policies
Development
Things to remember
- The SELinux tools behave odd when SELinux is disabled
semanage
requires--noreload
while in disabled mode when adding or changing something- Only few
--list
operations work
- run acceptance tests:
./test-acceptance-with-vagrant
Facter facts
The fact values might be unexpected while in disabled mode. One could expect
the config_mode to be set, but only the boolean enabled
is set.
The most important facts:
Fact | Fact (old) | Mode: disabled | Mode: permissive | Mode: enforcing |
---|---|---|---|---|
$facts['os']['selinux']['enabled'] |
$::selinux |
false | true | true |
$facts['os']['selinux']['config_mode'] |
$::selinux_config_mode |
undef | Value of SELINUX in /etc/selinux/config | Value of SELINUX in /etc/selinux/config |
$facts['os']['selinux']['current_mode'] |
$::selinux_current_mode |
undef | Value of getenforce downcased |
Value of getenforce downcased |
Authors
- VoxPupuli voxpupuli@groups.io
- James Fryman james@fryman.io
Reference
Table of Contents
Classes
Public Classes
selinux
: Manage SELinux on RHEL based systems.
Private Classes
selinux::build
: Configure the system for module buildingselinux::config
: Configure the system to use SELinux on the system.selinux::package
: Manages additional packages required to support some of the functions.selinux::refpolicy_package
: Manages additional packages required to support some of the functions.
Defined types
selinux::boolean
: Manage the state of an SELinux boolean.selinux::exec_restorecon
: A convenience wrapper around a restorecon execselinux::fcontext
: For fcontext equivalences, see selinux::fcontext::equivalenceselinux::fcontext::equivalence
: Manage SELinux fcontext equivalencesselinux::module
: Manage a SELinux module on a running systemselinux::permissive
: Set SELinux type to permissiveselinux::port
: Manage a SELinux local network port context setting
Resource types
selinux_fcontext
: Manage SELinux fcontext definitions. You should use selinux::fcontext instead of this directly.selinux_fcontext_equivalence
: Manage SELinux fcontext equivalence definitions. You should use selinux::fcontext instead of this directly.selinux_permissive
: Manage SELinux permissive types.selinux_port
: Manage SELinux port definitions. You should use selinux::port instead of this directly.
Classes
selinux
Manage SELinux on RHEL based systems.
Examples
Enable enforcing mode with targeted policy
class { 'selinux':
mode => 'enforcing',
type => 'targeted',
}
Parameters
The following parameters are available in the selinux
class:
package_name
manage_auditd_package
refpolicy_package_name
mode
type
refpolicy_makefile
manage_package
auditd_package_name
manage_setroubleshoot_packages
setroubleshoot_package_names
module_build_root
default_builder
boolean
fcontext
module
permissive
port
exec_restorecon
package_name
Data type: Variant[String[1], Array[String[1]]]
sets the name(s) for the selinux tools package Default value: OS dependent (see data/).
manage_auditd_package
Data type: Boolean
install auditd to log SELinux violations, for OSes that do not have auditd installed by default. Default value: OS dependent (see data/)
refpolicy_package_name
Data type: String
sets the name for the refpolicy development package, required for the refpolicy module builder Default value: OS dependent (see data/)
mode
Data type: Optional[Enum['enforcing', 'permissive', 'disabled']]
sets the operating state for SELinux.
Default value: undef
type
Data type: Optional[Enum['targeted', 'minimum', 'mls']]
sets the selinux type
Default value: undef
refpolicy_makefile
Data type: Stdlib::Absolutepath
the path to the system's SELinux makefile for the refpolicy framework
Default value: '/usr/share/selinux/devel/Makefile'
manage_package
Data type: Boolean
manage the package for selinux tools and refpolicy
Default value: true
auditd_package_name
Data type: String[1]
used when manage_auditd_package
is true
Default value: 'auditd'
manage_setroubleshoot_packages
Data type: Boolean
manage the setroubleshoot packages
setroubleshoot_package_names
Data type: Array[String]
the names of the setroubleshoot packages
Default value: []
module_build_root
Data type: Stdlib::Absolutepath
directory where modules are built. Defaults to $vardir/puppet-selinux
Default value: "${facts['puppet_vardir']}/puppet-selinux"
default_builder
Data type: Enum['refpolicy', 'simple']
which builder to use by default with selinux::module
Default value: 'simple'
boolean
Data type: Optional[Hash]
Hash of selinux::boolean resource parameters
Default value: undef
fcontext
Data type: Optional[Hash]
Hash of selinux::fcontext resource parameters
Default value: undef
module
Data type: Optional[Hash]
Hash of selinux::module resource parameters
Default value: undef
permissive
Data type: Optional[Hash]
Hash of selinux::module resource parameters
Default value: undef
port
Data type: Optional[Hash]
Hash of selinux::port resource parameters
Default value: undef
exec_restorecon
Data type: Optional[Hash]
Hash of selinux::exec_restorecon resource parameters
Default value: undef
Defined types
selinux::boolean
Manage the state of an SELinux boolean.
Examples
Enable named_write_master_zones
boolean
selinux::boolean{ 'named_write_master_zones':
ensure => 'on',
}
Ensure named_write_master_zones
boolean is disabled
selinux::boolean{ 'named_write_master_zones':
ensure => 'off',
}
Parameters
The following parameters are available in the selinux::boolean
defined type:
ensure
Data type: Variant[Boolean, Enum['on', 'off', 'present', 'absent']]
Set to on or off
Default value: 'on'
persistent
Data type: Boolean
Set to false if you don't want it to survive a reboot.
Default value: true
selinux::exec_restorecon
Will execute after all other SELinux changes have been applied, but before Anchor['selinux::end']
Parameters
The following parameters are available in the selinux::exec_restorecon
defined type:
path
Data type: Stdlib::Absolutepath
The path to run restorecon on. Defaults to resource title.
Default value: $title
recurse
Data type: Boolean
Whether restorecon should recurse. Defaults to true
Default value: true
force
Data type: Boolean
Whether restorecon should use force. Defaults to false.
Default value: false
refreshonly
Data type: Boolean
see the Exec resource
Default value: true
unless
Data type: Optional[String]
see the Exec resource
Default value: undef
onlyif
Data type: Optional[String]
see the Exec resource
Default value: undef
selinux::fcontext
For fcontext equivalences, see selinux::fcontext::equivalence
- See also
- selinux::fcontext::equivalence
Examples
Add a file-context for mysql log files at non standard location
selinux::fcontext{'set-mysql-log-context':
seltype => 'mysqld_log_t',
pathspec => '/u01/log/mysql(/.*)?',
}
Add a file-context only for directory types
selinux::fcontext{'/u/users/[^/]*':
filetype => 'd',
seltype => 'user_home_dir_t' ,
}
Parameters
The following parameters are available in the selinux::fcontext
defined type:
ensure
Data type: Enum['absent', 'present']
The desired state of the resource. Default: 'present'
Default value: 'present'
seltype
Data type: Optional[String]
String A particular SELinux type, like "mysqld_log_t"
Default value: undef
seluser
Data type: Optional[String]
String A particular SELinux user, like "sysadm_u"
Default value: undef
pathspec
Data type: String
String An semanage fcontext-formatted path specification, like "/var/log/mysql(/.*)?". Defaults to title
Default value: $title
filetype
Data type: Optional[String]
File type the context applies to (i.e. regular file, directory, block device, all files, etc.)
- Types:
- a = all files (default value if not restricting filetype)
- f = regular file
- d = directory
- c = character device
- b = block device
- s = socket
- l = symbolic link
- p = named pipe
Default value: 'a'
selinux::fcontext::equivalence
Manage SELinux fcontext equivalences
Examples
Make /opt/wordpress equivalent to /usr/share/wordpress
selinux::fcontext::equivalence { '/opt/wordpress':
ensure => 'present',
target => '/usr/share/wordpress',
}
Parameters
The following parameters are available in the selinux::fcontext::equivalence
defined type:
path
Data type: String
the path to define and equivalence for. Default: Resource title
Default value: $title
target
Data type: String
the path that this resource will be equivalent to.
ensure
Data type: Enum['present', 'absent']
the desired state of the equivalence. Default: present
Default value: 'present'
selinux::module
This class will either install or uninstall a SELinux module from a running system. This module allows an admin to keep .te files in text form in a repository, while allowing the system to compile and manage SELinux modules.
Concepts incorporated from: http://stuckinadoloop.wordpress.com/2011/06/15/puppet-managed-deployment-of-selinux-modules/
Examples
compile and load the apache module - does not require make or the policy
devel package
selinux::module{ 'apache':
ensure => 'present',
source_te => 'puppet:///modules/selinux/apache.te',
builder => 'simple'
}
compile a module the refpolicy way. It will install the policy devel and
dependent packages like make.
selinux::module{ 'mymodule':
ensure => 'present',
source_te => 'puppet:///modules/profile/selinux/mymodule.te',
source_fc => 'puppet:///modules/profile/selinux/mymodule.fc',
source_if => 'puppet:///modules/profile/selinux/mymodule.if',
builder => 'refpolicy'
}
compile and load a module from inline content
$content = @("END")
policy_module(zabbix_fix, 0.1)
require {
type zabbix_t;
type unreserved_port_t;
class tcp_socket name_connect;
}
allow zabbix_t unreserved_port_t:tcp_socket name_connect;
| END
selinux::module{ 'zabbix_fix':
ensure => 'present',
content_te => $content,
builder => 'simple'
}
Parameters
The following parameters are available in the selinux::module
defined type:
ensure
Data type: Enum['absent', 'present']
present or absent
Default value: 'present'
source_pp
Data type: Optional[String]
the source file (either a puppet URI or local file) of a pre-compiled SELinux policy package. Mutually excludsive with using source files.
Default value: undef
source_te
Data type: Optional[String]
the source file (either a puppet URI or local file) of the SELinux .te file
Default value: undef
source_fc
Data type: Optional[String]
the source file (either a puppet URI or local file) of the SELinux .fc file
Default value: undef
source_if
Data type: Optional[String]
the source file (either a puppet URI or local file) of the SELinux .if file
Default value: undef
content_te
Data type: Optional[String]
content of the SELinux .te file
Default value: undef
content_fc
Data type: Optional[String]
content of the SELinux .fc file
Default value: undef
content_if
Data type: Optional[String]
content of the SELinux .if file
Default value: undef
builder
Data type: Optional[Enum['simple', 'refpolicy']]
either 'simple' or 'refpolicy'. The simple builder attempts to use checkmodule to build the module, whereas 'refpolicy' uses the refpolicy framework, but requires 'make'
Default value: undef
selinux::permissive
Set SELinux type to permissive
Examples
Mark oddjob_mkhomedir_t permissive
selinux::permissive { 'oddjob_mkhomedir_t':
ensure => 'present'
}
Parameters
The following parameters are available in the selinux::permissive
defined type:
ensure
Data type: Enum['present', 'absent']
Set to present to add or absent to remove a permissive mode of a type
Default value: 'present'
seltype
Data type: String
A particular selinux type to make permissive, like "oddjob_mkhomedir_t"
Default value: $title
selinux::port
This method will manage a local network port context setting, and will persist it across reboots.
Examples
Add port-context syslogd_port_t to port 8514/tcp
selinux::port { 'allow-syslog-relp':
ensure => 'present',
seltype => 'syslogd_port_t',
protocol => 'tcp',
port => 8514,
}
Parameters
The following parameters are available in the selinux::port
defined type:
ensure
Data type: Enum['present', 'absent']
Set to present to add or absent to remove a port context.
Default value: 'present'
seltype
Data type: String
An SELinux port type
protocol
Data type: Enum['tcp', 'udp']
Either 'tcp', 'udp', 'ipv4' or 'ipv6'
port
Data type: Optional[Integer[1,65535]]
A network port number, like 8514,
Default value: undef
port_range
Data type: Optional[Tuple[Integer[1,65535], 2, 2]]
A port-range tuple, eg. [9090, 9095].
Default value: undef
Resource types
selinux_fcontext
Manage SELinux fcontext definitions. You should use selinux::fcontext instead of this directly.
Properties
The following properties are available in the selinux_fcontext
type.
ensure
Valid values: present
, absent
The basic property that the resource should be in.
Default value: present
file_type
Valid values: %r{^[abcdflps]$}
The file type to match
Default value: a
selrange
Valid values: %r{\w+}
The SELinux range
selrole
Valid values: %r{\w+}
The SELinux role
seltype
Valid values: %r{\w+}
, <<none>>
The SELinux type to apply to the paths
seluser
Valid values: %r{\w+}
The SELinux user name
Parameters
The following parameters are available in the selinux_fcontext
type.
pathspec
Path regular expression
provider
The specific backend to use for this selinux_fcontext
resource. You will seldom need to specify this --- Puppet will
usually discover the appropriate provider for your platform.
title
The namevar. Should be of the format pathspec_filetype
selinux_fcontext_equivalence
Manage SELinux fcontext equivalence definitions. You should use selinux::fcontext instead of this directly.
Properties
The following properties are available in the selinux_fcontext_equivalence
type.
ensure
Valid values: present
, absent
The basic property that the resource should be in.
Default value: present
target
The target of the equivalence. ie. the path that this resource will be equivalent to
Parameters
The following parameters are available in the selinux_fcontext_equivalence
type.
path
The path to set equivalence for
provider
The specific backend to use for this selinux_fcontext_equivalence
resource. You will seldom need to specify this ---
Puppet will usually discover the appropriate provider for your platform.
selinux_permissive
Manage SELinux permissive types.
Properties
The following properties are available in the selinux_permissive
type.
ensure
Valid values: present
, absent
The basic property that the resource should be in.
Default value: present
Parameters
The following parameters are available in the selinux_permissive
type.
local
Valid values: true
, false
A read-only attribue indicating whether the type is locally customized
provider
The specific backend to use for this selinux_permissive
resource. You will seldom need to specify this --- Puppet will
usually discover the appropriate provider for your platform.
seltype
namevar
The SELinux type that should be permissive
selinux_port
Manage SELinux port definitions. You should use selinux::port instead of this directly.
Properties
The following properties are available in the selinux_port
type.
ensure
Valid values: present
, absent
The basic property that the resource should be in.
Default value: present
high_port
The high end of the port range to manage
low_port
The low end of the port range to manage
protocol
Valid values: tcp
, udp
The protocol of the SELinux port definition
seltype
The SELinux type of the SELinux port definition
source
Valid values: policy
, local
Source of the port configuration - either policy or local
Parameters
The following parameters are available in the selinux_port
type.
provider
The specific backend to use for this selinux_port
resource. You will seldom need to specify this --- Puppet will
usually discover the appropriate provider for your platform.
title
Should be of the form "protocol_lowport-highport" or the type may misbehave
Changelog
All notable changes to this project will be documented in this file. Each new release typically also includes the latest modulesync defaults. These should not affect the functionality of the module.
v3.4.0 (2021-05-26)
Implemented enhancements:
- Resources that use 'semanage' should have an autorequires on the various packages #345
Merged pull requests:
- Add package autorequires to native types #346 (trevor-vaughan)
v3.3.1 (2021-05-18)
Closed issues:
- Add support for Fedora 33 #343
- Add support for Puppet 7 #342
- The semanage_ports.py script needs to pick the correct version of python on a system with multiple installed #335
Merged pull requests:
- Deprecate selinux_python_command fact and move handling into provider #336 (trevor-vaughan)
v3.3.0 (2021-04-26)
Implemented enhancements:
Closed issues:
- Error finding provider when using selinux_port #337
- missing semanage tools on el8 #333
- Manage setroubleshootd/sealert? #327
- Unable to manage ports on RHEL/CentOS 8 #316
Merged pull requests:
- allow puppetlabs/stdlib 7 #340 (kenyon)
- Support Puppet 7 #339 (mattock)
- examples/enable_and_targeted.pp: match type to filename #331 (kenyon)
- Add puppet-lint-param-docs linter / regenerate REFERENCE.md #329 (bastelfreak)
- Resolve puppet-lint #326 (jcpunk)
- modulesync 3.0.0 + code reformatting because of puppet-lint updates #324 (bastelfreak)
- Update module.pp to match current version #308 (ubellavance)
v3.2.0 (2020-04-30)
Implemented enhancements:
Closed issues:
- Facter 4 compatibilty #318
- Error: Could not prefetch selinux_fcontext provider 'semanage': uninitialized constant Selinux #311
Merged pull requests:
- Fix several markdown lint issues #319 (dhoppe)
- Update example #315 (ghoneycutt)
v3.1.0 (2019-12-09)
Implemented enhancements:
- RHEL8 #293
- add partial support for Debian 10, and supporting changes #310 (tequeter)
- Avoid puppet errors when SELinux is disabled #295 (blackknight36)
Fixed bugs:
- "Could not find a suitable provider for selinux_port" on Fedora 28 #254
- Fix selinux_port on RHEL 8/CentOS 8 #298 (oranenj)
Closed issues:
- No autorelabel when enabling SELinux #309
- Just a heads-up - change in RHEL 7.7 #299
- Puppet errors on nodes with SELinux disabled #286
- Missing CentOS 8 support #301
Merged pull requests:
- update example to match current version #307 (ubellavance)
- Regenerate REFERENCE.md #306 (bastelfreak)
- Clean up acceptance spec helper #305 (ekohl)
- Change double quotes to single quotes in example in comments #304 (ubellavance)
- fix reference documentation link #302 (igalic)
- Add EL8 and Fedora 30 to the supported OS list #294 (blackknight36)
v3.0.0 (2019-06-17)
Breaking changes:
Fixed bugs:
Closed issues:
- Fcontext fails on re-run on newer platforms #288
v2.0.0 (2019-05-15)
Breaking changes:
- modulesync 2.5.1 and drop Puppet 4 #282 (bastelfreak)
Implemented enhancements:
- Allow
puppetlabs/stdlib
6.x #284 (alexjfisher) - Builder improvements and acceptance tests #281 (ekohl)
- Simplify parameter handling #280 (ekohl)
Fixed bugs:
Merged pull requests:
v1.6.1 (2018-10-05)
Merged pull requests:
- modulesync 2.1.0 & add puppet 6 support #271 (bastelfreak)
v1.6.0 (2018-09-11)
Implemented enhancements:
Closed issues:
- New release #265
Merged pull requests:
- add initial REFERENCE.md #268 (bastelfreak)
v1.5.3 (2018-08-31)
Closed issues:
- Puppet change for each selinux module for every Puppet run #261
- Calls to $::selinux facts should use the $facts hash #258
Merged pull requests:
- allow puppetlabs/stdlib 5.x #264 (bastelfreak)
- Switch to "facts" hash for SELinux facts #259 (trevor-vaughan)
- Remove docker nodesets #257 (bastelfreak)
- drop EOL OSs; fix puppet version range #256 (bastelfreak)
v1.5.2 (2018-01-20)
Fixed bugs:
- Update and check runtime SELinux status correcty #249 (weaselshit)
Closed issues:
- Skip exec "change-selinux-status-to-disabled" when current mode is enforcing or permissive #245
- Module uses deprecated hiera_hash() function #238
Merged pull requests:
v1.5.1 (2018-01-04)
Fixed bugs:
- Fixing change-selinux-status-to-disabled exec #246 (bjvrielink)
Merged pull requests:
- Release 1.5.1 #248 (bastelfreak)
v1.5.0 (2017-12-15)
Merged pull requests:
v1.4.0 (2017-11-19)
Implemented enhancements:
Merged pull requests:
- release 1.4.0 #242 (bastelfreak)
- bump puppet version dependency to >= 4.7.1 \< 6.0.0 #241 (bastelfreak)
- Remove Fedora 24 support statement #239 (vinzent)
v1.3.0 (2017-09-17)
Implemented enhancements:
Closed issues:
- Amazon Linux support #230
- Tests fail: Could not parse for environment rp_env: Illegal variable name #225
Merged pull requests:
- release 1.3.0 #236 (bastelfreak)
- Test disabling of SELinux #233 (vinzent)
- Add Amazon Linux support #231 (clinty)
- Re-enable restorecon spec test #228 (vinzent)
v1.2.0 (2017-07-02)
Implemented enhancements:
Merged pull requests:
v1.1.0 (2017-05-11)
Implemented enhancements:
- Make use of the stdlib puppet_vardir fact instead of a custom one #217 (oranenj)
- Allow specifying module content inline #214 (lightoze)
Fixed bugs:
- config.pp creates tmp as file but selinux_build_module_simple.sh wants to create a dir #215
Merged pull requests:
- Release 1.1.0 #219 (oranenj)
- Fedora 26 uses the same package_name as Fedora 25 #218 (logic)
- Ensure the module build tmp/ directory is actually a directory #216 (oranenj)
v1.0.0 (2017-04-02)
Breaking changes:
- Remove CentOS 5 support #190
- BREAKING: Redesign selinux::module parameters #178
- BREAKING: Remove restorecond management support #206 (oranenj)
- BREAKING: Remove Amazon Linux support #193 (vinzent)
- BREAKING: Remove support for EL5 and Fedora \< 24 #192 (vinzent)
- BREAKING: Selinux permissive type #183 (oranenj)
- BREAKING: Add selinux_fcontext and selinux_fcontext_equivalence types #177 (oranenj)
- BREAKING: Downgrade enforcing to permissive configuration when SELinux is disabled #175 (oranenj)
- BREAKING: Add a selinux_port type and provider #174 (oranenj)
Implemented enhancements:
- Automatically order resources to not produce runtime failures #147
- selinux::module should not manage files in /usr #146
- Remove dependency on make and selinux-policy-devel in selinux::module #141
- Add a convenience wrapper for restorecon execs #205 (oranenj)
- Replace all validate functions with datatypes #201 (bastelfreak)
- Convert selinux::boolean to puppet types #198 (oranenj)
- Document known problems / limitations #171 (vinzent)
Fixed bugs:
- Can't remove permissive domain #165
- Silently doesn't remove port context #164
- selinux class parameters boolean, fcontext, module, permissive and port are ignored #148
- This module accepts invalid config for port #119
- Actually pass ensure to the wrapped selinux_fcontext resource #210 (oranenj)
- Fix new puppet-lint complaints about ordering arrows #208 (oranenj)
- Don't accept udp6 and tcp6 as protocol name with selinux::port #181 (vinzent)
- Use declared parameters #180 (vinzent)
Closed issues:
- Release 1.0.0 #184
- order of file contexts #121
- selinux::module fails when module contains more than .te file #118
- Looking for Maintainer #106
- Puppet Agent 1.5 (Puppet 4.5 Error) #97
- Unable to modify port via port.pp #93
- When using 'module' to install selinux-module the selinux-mode is set to disabled. #64
- Problem with undef from left operand of 'in' at module.pp:38 #61
- Adding a port gets an error the first time #38
Merged pull requests:
- Prepare 1.0.0 #211 (oranenj)
- Fix resource reference issue when removing fcontexts #209 (oranenj)
- Doc fixes #204 (oranenj)
- Fix spelling for supported type in README #203 (ardrigh)
- Update strings docs #197 (vinzent)
- Remove tests for Fedora 19-23 and CentOS 5 #194 (vinzent)
- Fix puppet strings warnings and minor README.md update #191 (vinzent)
- Rubocop config fixes #182 (vinzent)
- modulesync 0.19.0 #176 (bastelfreak)
- Fix broken link to puppet strings documentation #173 (vinzent)
- Update inline doc to puppet-strings #172 (vinzent)
- Modulesync 0.18.0 #170 (bastelfreak)
- (GH-147) Add ordering of resources #167 (vinzent)
v0.8.0 (2017-01-12)
Closed issues:
- Acceptance test fails for /tmp/test_selinux_fcontext on Fedora 24 #157
- define selinux::module broken in CentOS 7.3 #142
- Module in the Puppet forge is not up to date #135
Merged pull requests:
- release 0.8.0 #168 (bastelfreak)
- modulesync 0.16.7 #163 (bastelfreak)
v0.7.1 (2016-12-28)
Closed issues:
- prefix causes repeated module reinstalls #129
Merged pull requests:
- Release 0.7.1 #160 (vinzent)
- Fix usage of non-existent $::selinux_enabled fact #159 (vinzent)
- Default to undef for syncversion parameter in selinux::module #158 (vinzent)
- Remove mentions of Ruby requirements in README #156 (juniorsysadmin)
v0.7.0 (2016-12-24)
Merged pull requests:
- release 0.7.0 #155 (bastelfreak)
- Remove custom fact selinux_custom_policy #154 (vinzent)
- Default module prefix now '' #140 (traylenator)
- Fix type doc #134 (kausar007)
v0.6.0 (2016-12-24)
Closed issues:
- Ensure a complete relabeling when switching from disabled to permissive or enforcing #149
- selinux::fcontext runs "semanage .. -f a" by default - not supported on RHEL6 #133
- Missing spec test for permissive defined type #130
- No Hiera support #104
- selinux_current_mode core fact no longer exists #74
- Amazon Linux ( CentOS ) is not supported #58
Merged pull requests:
- Modulesync 0.16.6 & Release 0.6.0 #152 (bastelfreak)
- Create /.autorelabel when switching from disabled #151 (vinzent)
- Update to puppet-strings doc in selinux class #150 (vinzent)
- Add acceptance tests #145 (vinzent)
- Set puppet minimum version_requirement to 3.8.7 #144 (juniorsysadmin)
- modulesync 0.16.4 #143 (bastelfreak)
- modulesync 0.16.3 #139 (bastelfreak)
- Fixes #133 Use semange -f 'all files' on RHEL6 #138 (traylenator)
- Use rspec-puppet-facts in all places #137 (traylenator)
- Update README with ruby 1.8 status #136 (alexjfisher)
- add argument variable for selinux::port #132 (jodast)
- Fixes Issue-130 - No rspec for permissive #131 (ryayon)
- Fixes Issue-104 - No Hiera support #128 (ryayon)
- modulesync 0.15.0 #127 (bastelfreak)
- params.pp needs to know about Fedora 25 #126 (logic)
- Rubocop fixes #125 (alexjfisher)
- Add missing badges #124 (dhoppe)
- Update based on voxpupuli/modulesync_config 0.14.1 #123 (dhoppe)
- modulesync 0.13.0 #122 (bbriggs)
v0.5.0 (2016-09-08)
Merged pull requests:
- Release 0.5.0 #120 (bastelfreak)
- Cleanups and dangling issues #117 (maage)
- Fixing operatingsystem for Amazon Linux #111 (bleiva)
v0.4.1 (2016-09-02)
Closed issues:
- missing package dependency in ::module (RHEL) #112
- fcontext should check for the existence of $filepath before running restorecon #108
- Should not be running restorecon like this #107
- fcontext detection fails if pattern contains square brackets #105
- Duplicate test? #102
- Tag a new release #96
Merged pull requests:
- modulesync 0.12.5 #116 (bastelfreak)
- Release checks fixes #113 (maage)
- Removes duplicate package test #103 (jfryman)
v0.4.0 (2016-06-02)
Closed issues:
- custom te file loads every time RE: Only allow refresh in the event that the initial .te file is updated. #95
- selinux::module works only if module name contains local_ by default #90
- selinux-module failing on RHEL 7, Makefile not there #88
- Problems with package duplicate declaration (ensure_packages?) #87
- New release #85
- Missing package selinux-policy-devel #84
- Fedora 23 package name changed #82
- selinux_custom_policy.rb:8: syntax error, unexpected ':', expecting kEND #76
- default SELinux mode and override possibility #65
- Error: CentOS- is not supported #52
Merged pull requests:
- Use ensure_packages to install policycoreutils #100 (jfryman)
- Add recursion support for restorecon. #99 (Heidistein)
- Added support for running restorecon after modifying file contexts #98 (crayfishx)
- Allow specifying selinux module content #94 (lightoze)
- Fix module installation #92 (toddnni)
- Switch to devel package for makefile on RHEL7 and Fedora 21+ #89 (ncsutmf)
- add more lint checks #86 (jlambert121)
- Add support for Factor 1.6 #55 (yannbeulque)
v0.3.1 (2016-03-08)
Closed issues:
- selinux::fcontext fails in interesting ways when pathname is regex #83
- Error: The parameter 'mode' is declared more than once #80
- tagging new release #75
- Move to selmodule/selboolean for selinux::module/boolean? #70
Merged pull requests:
- The parameter 'mode' is declared more than once #81 (edestecd)
- Add syncversion parameter #78 (mhjacks)
- Fix Issue #76 #77 (Thubo)
v0.3.0 (2015-12-13)
Closed issues:
- Allow disabling of selinux package management #71
- why is disabled the default mode? #68
- What license is this software provided under? #66
Merged pull requests:
- Pivot to internal types #73 (jyaworski)
- Allow custom package name and management #72 (jyaworski)
- Switch default behavior to not manage selinux #67 (purplexa)
- Whitespace lint fixes #63 (mld)
- Implements SELinux type checking and ensuring. #62 (ElvenSpellmaker)
- added hiera support #49 (dacron)
- Make port exec statement unique for protocol #37 (dlevene1)
v0.2.6 (2015-10-20)
Closed issues:
Merged pull requests:
- Fix for selinux::module absent case failed notify #59 (ps-jay)
- Fallback to lsbmajdistrelease, if puppet version is \< 3.0 #54 (jkroepke)
- Add Permissive to puppet-selinux module #53 (jewnix)
v0.2.5 (2015-08-05)
Closed issues:
- port match is not correct enough #39
- "checkloaded" exec always schedules build/install on RHEL7 / CentOS 7 #27
Merged pull requests:
- Fixes workaround, fixes #27 #46 (belminf)
- fix EL variant != 'RedHat' regression #44 (jhoblitt)
- fedora support #43 (jhoblitt)
- puppet 4 support #42 (jhoblitt)
- improve port match #41 (ghost)
- Bug fix for declaring multiple selinux::module types #40 (apatik)
- Use "defined" instead of "getvar" to protect against undefined variables when strict_variables=yes #34 (robinbowes)
- Workaround for RH 7 variants #33 (robrankin)
- Fix to work with strict_variables=true #32 (robinbowes)
v0.2.3 (2015-03-03)
Merged pull requests:
- add spec tests, update validations, cleanup #31 (jlambert121)
- Better compatibility with CentOS 7 #29 (djjudas21)
- fix change-selinux-status in case of selinux disabled #28 (cristifalcas)
v0.2.2 (2015-01-19)
Merged pull requests:
- reverting previous lint change #26 (robrankin)
- REPLACE config file route #25 (rmacian)
- Add OS compatibility data for Puppet Forge #24 (djjudas21)
- Lint fixes #23 (djjudas21)
- Switch to a more robust way of changing SELinux status #22 (djjudas21)
v0.2.0 (2015-01-12)
Closed issues:
- Release to Puppet Forge? #7
- module installation doesn't check current status of modules #6
- /etc/sysconfig/selinux symlink removed #2
Merged pull requests:
- Added Support for defining file types in fcontext defined type #21 (ghost)
- fix dependency name #20 (vchepkov)
- Add missing quotes to exec statement #19 (lattwood)
- puppet 3.7 complaines about 'Error: Failed to apply catalog: Parameter c... #18 (cristifalcas)
- add metadata.json #17 (cristifalcas)
- allow packages to be upgraded #16 (cristifalcas)
- adds RHEL 7 support, fixes missing dependency on package #15 (fuero)
- Linting fixes #14 (steeef)
- support for restorecond and support for restorecond #12 (franzs)
- Add semanage::port functionality #11 (mattwillsher)
- Puppet Lint/Style fixes #10 (mattiasgeniar)
- add option to build with the makefile #9 (tjikkun)
- check if module is actually loaded #8 (tjikkun)
- Updated to support different el versions #5 (thoraxe)
- File context - added method for setting file contexts #4 (thoraxe)
- Fix symlink being removed #3 (lboynton)
- Cleaned up lint errors. #1 (eshamow)
* This Changelog was automatically generated by github_changelog_generator
Dependencies
- puppetlabs/stdlib (>= 4.18.0 < 8.0.0)
Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "{}" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright James Fryman Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.