Skip to content

Commit ea6c8cb

Browse files
committed
kola: Update SELinux file context
vasd policy was removed from SELinux policy [1][2], so we update our test against another component, preferably a more stable one. I think "pam_shield" is a good candidate. Closes coreos/rhel-coreos-config#92 [1] fedora-selinux/selinux-policy#2923 [2] https://issues.redhat.com/browse/RHEL-116512
1 parent 82410e1 commit ea6c8cb

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

mantle/kola/tests/misc/selinux.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -180,15 +180,15 @@ func SelinuxBooleanPersist(c cluster.TestCluster) {
180180
// have it persist across reboots
181181
func SelinuxManage(c cluster.TestCluster) {
182182
cmdList := []cmdCheckOutput{
183-
{"sudo semanage fcontext -l | grep vasd", true, ".*system_u:object_r:var_auth_t:s0"},
184-
{"sudo semanage fcontext -m -t httpd_log_t \"/var/opt/quest/vas/vasd(/.*)?\"", false, ""},
185-
{"sudo semanage fcontext -l | grep vasd", true, ".*system_u:object_r:httpd_log_t:s0"},
183+
{"sudo semanage fcontext -l | grep pam_shield", true, ".*system_u:object_r:var_auth_t:s0"},
184+
{"sudo semanage fcontext -m -t httpd_log_t \"/var/lib/pam_shield(/.*)?\"", false, ""},
185+
{"sudo semanage fcontext -l | grep pam_shield", true, ".*system_u:object_r:httpd_log_t:s0"},
186186
}
187187

188188
m := c.Machines()[0]
189189

190190
testSelinuxCmds(c, m, cmdList)
191191

192192
// the change should be persisted after a reboot
193-
c.AssertCmdOutputMatches(m, "sudo semanage fcontext -l | grep vasd", regexp.MustCompile(".*system_u:object_r:httpd_log_t:s0"))
193+
c.AssertCmdOutputMatches(m, "sudo semanage fcontext -l | grep pam_shield", regexp.MustCompile(".*system_u:object_r:httpd_log_t:s0"))
194194
}

0 commit comments

Comments
 (0)