summaryrefslogtreecommitdiffstats
path: root/src/providers/ipa/ipa_selinux.c
diff options
context:
space:
mode:
authorSimo Sorce <simo@redhat.com>2013-01-08 00:48:12 -0500
committerJakub Hrozek <jhrozek@redhat.com>2013-01-15 10:53:02 +0100
commit740870643f337ce70d85f25f9ed057cd1f91028c (patch)
tree319f52b3a9e13a7c14492808a789778f1ee37613 /src/providers/ipa/ipa_selinux.c
parent2913240aee51ce81195148a4d814e967f66839c4 (diff)
downloadsssd-740870643f337ce70d85f25f9ed057cd1f91028c.tar.gz
sssd-740870643f337ce70d85f25f9ed057cd1f91028c.tar.xz
sssd-740870643f337ce70d85f25f9ed057cd1f91028c.zip
Add domain argument to sysdb selinux functions
Diffstat (limited to 'src/providers/ipa/ipa_selinux.c')
-rw-r--r--src/providers/ipa/ipa_selinux.c9
1 files changed, 6 insertions, 3 deletions
diff --git a/src/providers/ipa/ipa_selinux.c b/src/providers/ipa/ipa_selinux.c
index c8093bad4..09dc075fe 100644
--- a/src/providers/ipa/ipa_selinux.c
+++ b/src/providers/ipa/ipa_selinux.c
@@ -215,20 +215,21 @@ static void ipa_selinux_handler_done(struct tevent_req *req)
}
in_transaction = true;
- ret = sysdb_delete_usermaps(breq->sysdb);
+ ret = sysdb_delete_usermaps(breq->sysdb, breq->domain);
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE,
("Cannot delete existing maps from sysdb\n"));
goto fail;
}
- ret = sysdb_store_selinux_config(sysdb, default_user, map_order);
+ ret = sysdb_store_selinux_config(sysdb, breq->be_ctx->domain,
+ default_user, map_order);
if (ret != EOK) {
goto fail;
}
if (map_count > 0 && maps != NULL) {
- ret = ipa_save_user_maps(sysdb, map_count, maps);
+ ret = ipa_save_user_maps(sysdb, breq->be_ctx->domain, map_count, maps);
if (ret != EOK) {
goto fail;
}
@@ -595,6 +596,7 @@ ipa_get_selinux_maps_offline(struct tevent_req *req)
/* read the config entry */
ret = sysdb_search_selinux_config(state, state->be_req->be_ctx->sysdb,
+ state->be_req->be_ctx->domain,
NULL, &defaults);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE, ("sysdb_search_selinux_config failed [%d]: %s\n",
@@ -628,6 +630,7 @@ ipa_get_selinux_maps_offline(struct tevent_req *req)
/* read all the SELinux rules */
ret = sysdb_get_selinux_usermaps(state, state->be_req->be_ctx->sysdb,
+ state->be_req->be_ctx->domain,
attrs, &nmaps, &maps);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE, ("sysdb_get_selinux_usermaps failed [%d]: %s\n",