mirror of
https://github.com/ceph/ceph
synced 2025-04-04 23:42:13 +00:00
cephadm: Mounting <empty> folder for selinux only if it is needed
There are OSs without </usr/share/empty> folder. And selinux can be enabled or not. Signed-off-by: Juan Miguel Olmo Martínez <jolmomar@redhat.com>
This commit is contained in:
parent
498124f2bf
commit
c6e1cfbde2
@ -2234,7 +2234,11 @@ def get_container_mounts(ctx, fsid, daemon_type, daemon_id,
|
|||||||
if daemon_type == 'osd':
|
if daemon_type == 'osd':
|
||||||
mounts['/sys'] = '/sys' # for numa.cc, pick_address, cgroups, ...
|
mounts['/sys'] = '/sys' # for numa.cc, pick_address, cgroups, ...
|
||||||
# selinux-policy in the container may not match the host.
|
# selinux-policy in the container may not match the host.
|
||||||
mounts['/usr/share/empty'] = '/sys/fs/selinux:ro'
|
if HostFacts(ctx).selinux_enabled:
|
||||||
|
selinux_folder = '/var/lib/ceph/%s/selinux' % fsid
|
||||||
|
if not os.path.exists(selinux_folder):
|
||||||
|
os.makedirs(selinux_folder, mode=0o755)
|
||||||
|
mounts[selinux_folder] = '/sys/fs/selinux:ro'
|
||||||
mounts['/run/lvm'] = '/run/lvm'
|
mounts['/run/lvm'] = '/run/lvm'
|
||||||
mounts['/run/lock/lvm'] = '/run/lock/lvm'
|
mounts['/run/lock/lvm'] = '/run/lock/lvm'
|
||||||
|
|
||||||
@ -6150,9 +6154,9 @@ class HostFacts():
|
|||||||
|
|
||||||
@property
|
@property
|
||||||
def kernel_security(self):
|
def kernel_security(self):
|
||||||
# type: () -> Optional[Dict[str, str]]
|
# type: () -> Dict[str, str]
|
||||||
"""Determine the security features enabled in the kernel - SELinux, AppArmor"""
|
"""Determine the security features enabled in the kernel - SELinux, AppArmor"""
|
||||||
def _fetch_selinux() -> Optional[Dict[str, str]]:
|
def _fetch_selinux() -> Dict[str, str]:
|
||||||
"""Read the selinux config file to determine state"""
|
"""Read the selinux config file to determine state"""
|
||||||
security = {}
|
security = {}
|
||||||
for selinux_path in HostFacts._selinux_path_list:
|
for selinux_path in HostFacts._selinux_path_list:
|
||||||
@ -6169,9 +6173,9 @@ class HostFacts():
|
|||||||
else:
|
else:
|
||||||
security['description'] = "SELinux: Enabled({}, {})".format(security['SELINUX'], security['SELINUXTYPE'])
|
security['description'] = "SELinux: Enabled({}, {})".format(security['SELINUX'], security['SELINUXTYPE'])
|
||||||
return security
|
return security
|
||||||
return None
|
return {}
|
||||||
|
|
||||||
def _fetch_apparmor() -> Optional[Dict[str, str]]:
|
def _fetch_apparmor() -> Dict[str, str]:
|
||||||
"""Read the apparmor profiles directly, returning an overview of AppArmor status"""
|
"""Read the apparmor profiles directly, returning an overview of AppArmor status"""
|
||||||
security = {}
|
security = {}
|
||||||
for apparmor_path in HostFacts._apparmor_path_list:
|
for apparmor_path in HostFacts._apparmor_path_list:
|
||||||
@ -6196,9 +6200,9 @@ class HostFacts():
|
|||||||
security['description'] += "({})".format(summary_str)
|
security['description'] += "({})".format(summary_str)
|
||||||
|
|
||||||
return security
|
return security
|
||||||
return None
|
return {}
|
||||||
|
|
||||||
ret = None
|
ret = {}
|
||||||
if os.path.exists('/sys/kernel/security/lsm'):
|
if os.path.exists('/sys/kernel/security/lsm'):
|
||||||
lsm = read_file(['/sys/kernel/security/lsm']).strip()
|
lsm = read_file(['/sys/kernel/security/lsm']).strip()
|
||||||
if 'selinux' in lsm:
|
if 'selinux' in lsm:
|
||||||
@ -6211,7 +6215,7 @@ class HostFacts():
|
|||||||
"description": "Linux Security Module framework is active, but is not using SELinux or AppArmor"
|
"description": "Linux Security Module framework is active, but is not using SELinux or AppArmor"
|
||||||
}
|
}
|
||||||
|
|
||||||
if ret is not None:
|
if ret:
|
||||||
return ret
|
return ret
|
||||||
|
|
||||||
return {
|
return {
|
||||||
@ -6219,6 +6223,11 @@ class HostFacts():
|
|||||||
"description": "Linux Security Module framework is not available"
|
"description": "Linux Security Module framework is not available"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@property
|
||||||
|
def selinux_enabled(self):
|
||||||
|
return (self.kernel_security["type"] == "SELinux") and \
|
||||||
|
(self.kernel_security["description"] != "SELinux: Disabled")
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def kernel_parameters(self):
|
def kernel_parameters(self):
|
||||||
# type: () -> Dict[str, str]
|
# type: () -> Dict[str, str]
|
||||||
@ -7684,4 +7693,3 @@ def main():
|
|||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
main()
|
main()
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user