Sealert - command /usr/bin/sealert -l "*"

class insights.parsers.sealert.Sealert(context)[source]

Bases: CommandParser

Reads the output of /usr/bin/sealert -l "*".

Sample output:

SELinux is preventing sh from entrypoint access on the file /usr/bin/podman.

*****  Plugin catchall (100. confidence) suggests **************************

If you believe that sh should be allowed entrypoint access on the podman file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'sh' --raw | audit2allow -M my-sh
# semodule -X 300 -i my-sh.pp

Additional Information:
Source Context unconfined_u:system_r:rpm_script_t:s0-s0:c0.c1023
Target Context system_u:object_r:container_runtime_exec_t:s0
Target Objects                /usr/bin/podman [ file ]
Source                        sh
Source Path                   sh
Port                          <Unknown>
Host                          localhost.localdomain
Source RPM Packages
Target RPM Packages           podman-1.1.2-1.git0ad9b6b.fc28.x86_64
Policy RPM                    selinux-policy-3.14.1-54.fc28.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     localhost.localdomain
Platform                      Linux localhost.localdomain 4.20.7-100.fc28.x86_64
                              #1 SMP Wed Feb 6 19:17:09 UTC 2019 x86_64 x86_64
Alert Count                   1
First Seen                    2019-07-30 11:15:04 CEST
Last Seen                     2019-07-30 11:15:04 CEST
Local ID                      39a7094b-e402-4d87-9af9-e97eda41219a

Raw Audit Messages
type=AVC msg=audit(1564478104.911:4631): avc:  denied  { entrypoint } for  pid=29402 comm="sh" path="/usr/bin/podman" dev="dm-1" ino=955465 scontext=unconfined_u:system_r:rpm_script_t:s0-s0:c0.c1023 tcontext=system_u:object_r:container_runtime_exec_t:s0 tclass=file permissive=0

Hash: sh,rpm_script_t,container_runtime_exec_t,file,entrypoint

Examples

>>> type(sealert)
<class 'insights.parsers.sealert.Sealert'>
>>> sealert.raw_lines[0]
'SELinux is preventing rngd from using the dac_override capability.'
>>> sealert.reports[1].lines_stripped()[0]
'SELinux is preventing sh from entrypoint access on the file /usr/bin/podman.'
>>> str(sealert.reports[1]).split('\n')[0]
'SELinux is preventing sh from entrypoint access on the file /usr/bin/podman.'
raw_lines

Unparsed output as list of lines

Type:

list[str]

reports

Sealert reports

Type:

list[Report]

Raises:

SkipComponent -- When output is empty

parse_content(content)[source]

This method must be implemented by classes based on this class.