Adoptable Cookbooks List

Looking for a cookbook to adopt? You can now see a list of cookbooks available for adoption!
List of Adoptable Cookbooks

Supermarket Belongs to the Community

Supermarket belongs to the community. While Chef has the responsibility to keep it running and be stewards of its functionality, what it does and how it works is driven by the community. The chef/supermarket repository will continue to be where development of the Supermarket application takes place. Come be part of shaping the direction of Supermarket by opening issues and pull requests or by joining us on the Chef Mailing List.

Select Badges

Select Supported Platforms

Select Status


selinux_policy (42) Versions 0.8.1

Manages SELinux policy components

cookbook 'selinux_policy', '= 0.8.1', :supermarket
cookbook 'selinux_policy', '= 0.8.1'
knife supermarket install selinux_policy
knife supermarket download selinux_policy
Quality 100%

SELinux Policy Cookbook

This cookbbok can be used to manage SELinux policies and components (rather than just enable / disable enforcing).

I made it because I needed some SELinux settings done, and the executes started to look annoying.


Needs an SELinux policy active (so its values can be managed). Can work with a disabled SELinux system (see attribute allow_disabled), which will generate warnings and do nothing (but won't break the run).

Also requires SELinux's management tools, namely semanage, setsebool and getsebool.
Tools are installed by the selinux_policy::install recipe (for RHEL/Debian and the like).


These attributes affect the way all of the LWRPs are behaving.

  • node['selinux_policy']['allow_disabled'] - Whether to allow runs when SELinux is disabled. Will generate warnings, but the run won't fail.
    Defaults to true, set to false if you don't have any machines with disabled SELinux.


This cookbook's functionality is exposed via resources, so it should be called from a wrapper cookbook.
Remember to add depends 'selinux_policy' to your metadata.rb.


Represents an SELinux boolean.
You can either set it, meaning it will be changed without persistence (it will revert to default in the next reboot), or setpersist it (default action), so it'll keep it value after rebooting.

Using setpersist requires an active policy (so that the new value can be saved somewhere).


  • name: boolean's name. Defaults to resource name.
  • value: Its new value (true/false).
  • force: Use setsebool even if the current value agrees with the requested one.

Example usage:

selinux_policy_boolean 'httpd_can_network_connect' do
    value true
    # Make sure nginx is started if this value was modified
    notifies :start,'service[nginx]', :immediate

Note: Due to ruby interperting 0 as true, using value 0 is unwise.


Allows assigning a network port to a certain SELinux context.

As explained here, it can be useful for running Apache on a non-standard port.


  • addormodify (default): Assigns the port to the right context, whether it's already listed another context or not at all.
  • add: Assigns the port to the right context it's if not listed (only uses -a).
  • modify: Changes the port's context if it's already listed (only uses -m).
  • delete: Removes the port's context if it's listed (uses -d).


  • port: The port in question, defaults to resource name.
  • protocol: tcp/udp.
  • secontext: The SELinux context to assign the port to. Uneeded when using delete.

Example usage:

# Allow nginx to bind to port 5678, by giving it the http_port_t context
selinux_policy_port '5678' do
    protocol 'tcp'
    secontext 'http_port_t'


Manages SEModules


  • deploy (default): Compiles a module from it's te file and deploys it. Deploys only when one of the following is true:
    • The module isn't currently present
    • force is enabled
    • The policy file has changed
  • remove: Removes a module


  • name: The module name. Defaults to resource name.
  • content: The module content, can be extracted from audit2allow -m NAME
  • force: Whether to install the module even if it seems unnecessary. Defaults to false, can help when the module was modified "under the nose" of Chef (since we don't actually download the curernt module and decompile when comparing).

Example usage:

# Allow openvpn to write/delete in '/etc/openvpn'
selinux_policy_module 'openvpn-googleauthenticator' do
  content '
module dy-openvpn-googleauthenticator 1.0;

require {
    type openvpn_t;
    type openvpn_etc_t;
    class file { write unlink };

#============= openvpn_t ==============
allow openvpn_t openvpn_etc_t:file { write unlink };
  action :deploy


Allows managing the SELinux context of files.
This can be used to grant SELinux-protected daemons access to additional / moved files.


  • addormodify (default): Assigns the file regexp to the right context, whether it's already listed another context or not at all.
  • add: Assigns the file regexp to the right context it's if not listed (only uses -a).
  • modify: Changes the file regexp context if it's already listed (only uses -m).
  • delete: Removes the file regexp context if it's listed (uses -d).


  • file_spec: This is the file regexp in question, defaults to resource name.
  • secontext: The SELinux context to assign the file regexp to. Not needed when using delete.

Example usage (see mysql cookbook for example daemons ):

# Allow http servers (nginx/apache) to modify moodle files
selinux_policy_fcontext '/var/www/moodle(/.*)?' do
  secontext 'httpd_sys_rw_content_t'

# Allow a custom mysql daemon to access its files.
{'mysqld_etc_t' => "/etc/mysql-#{service_name}(/.*)?",
'mysqld_etc_t' => "/etc/mysql-#{service_name}/my\.cnf",
'mysqld_log_t' => "/var/log/mysql-#{service_name}(/.*)?",
'mysqld_db_t' => "/opt/mysql_data_#{service_name}(/.*)?",
'mysqld_var_run_t' => "/var/run/mysql-#{service_name}(/.*)?",
'mysqld_initrc_exec_t' => "/etc/rc\.d/init\.d/mysql-#{service_name}"}.each do |sc, f|
  selinux_policy_fcontext f do
    secontext sc


Allows some types to misbehave without stopping them.

Not as good as specific policies, but better than disabling SELinux entirely.


  • add: Adds a permissive, unless it's already added
  • delete: Deletes a permissive if it's listed

Example usage:

# Disable enforcement on Nginx
# As described on

selinux_policy_permissive 'nginx' do
  notifies :restart, 'service[nginx]'


We have a test kitchen that has some tests (at the time of writing this: Basic port ops)

We also have a ChefSpec suite for some things (again, currently only basic ports). To use it, run something like chef exec rspec.

We also only test against CentOS (because Ubuntu comes with SELinux disabled and restarting mid-test is hard).

Chef 11 Support

I don't use Chef 11, but stuff seems to work OK to other people.


Pretty standard.

If fixing a bug, please add regession tests to the RSpec (if applicable) and the kitchen.

If adding a feature, please create basic tests for it, both RSpec and kitchen.

  1. Fork the repository on Github
  2. Create a named feature branch (like add_component_x)
  3. Write your change
  4. Write tests for your change (if applicable)
  5. Run the tests, ensuring they all pass
  6. Submit a Pull Request using Github

License and Authors

Licensed GPL v2

Author: Nitzan Raz (backslasher)

* Joerg Herzinger (
* Wade Peacock (
* Kieren Evans (
* Antek Baranski
* James Le Cuirot

I'll be happy to accept contributions or to hear from you!

Dependent cookbooks

This cookbook has no specified dependencies.

Contingent cookbooks

al_agents Applicable Versions
alfresco-db Applicable Versions
cockpit Applicable Versions
cookbook-openshift3 Applicable Versions
cookbook-openshift3 0.0.1
cookbook-openshift3 0.0.2
cookbook-openshift3 1.0.2
cookbook-openshift3 1.0.3
cookbook-openshift3 1.0.4
cookbook-openshift3 1.0.5
cookbook-openshift3 1.0.6
cookbook-openshift3 1.0.7
cookbook-openshift3 1.0.8
cookbook-openshift3 1.0.9
cookbook-openshift3 1.10.0
cookbook-openshift3 1.10.1
cookbook-openshift3 1.10.2
cookbook-openshift3 1.10.3
cookbook-openshift3 1.10.4
cookbook-openshift3 1.10.5
cookbook-openshift3 1.10.6
cookbook-openshift3 1.10.7
cookbook-openshift3 1.10.8
cookbook-openshift3 1.10.9
cookbook-openshift3 1.10.10
cookbook-openshift3 1.10.11
cookbook-openshift3 1.10.12
cookbook-openshift3 1.10.13
cookbook-openshift3 1.10.14
cookbook-openshift3 1.10.15
cookbook-openshift3 1.10.16
cookbook-openshift3 1.10.17
cookbook-openshift3 1.10.18
cookbook-openshift3 1.10.19
cookbook-openshift3 1.10.20
cookbook-openshift3 1.10.21
cookbook-openshift3 1.10.22
cookbook-openshift3 1.10.23
cookbook-openshift3 1.10.24
cookbook-openshift3 1.10.25
cookbook-openshift3 1.10.26
cookbook-openshift3 1.10.27
cookbook-openshift3 1.10.28
cookbook-openshift3 1.10.29
cookbook-openshift3 1.10.30
cookbook-openshift3 1.10.31
cookbook-openshift3 1.10.32
cookbook-openshift3 1.10.33
cookbook-openshift3 1.10.34
cookbook-openshift3 1.10.35
cookbook-openshift3 1.10.36
cookbook-openshift3 1.10.37
cookbook-openshift3 1.10.38
cookbook-openshift3 1.10.39
cookbook-openshift3 1.10.40
cookbook-openshift3 1.10.41
cookbook-openshift3 1.10.42
cookbook-openshift3 1.10.43
cookbook-openshift3 1.10.44
cookbook-openshift3 1.10.45
cookbook-openshift3 1.10.46
cookbook-openshift3 1.10.47
cookbook-openshift3 1.10.48
cookbook-openshift3 1.10.49
cookbook-openshift3 1.10.50
cookbook-openshift3 1.10.51
cookbook-openshift3 1.10.52
cookbook-openshift3 1.10.53
cookbook-openshift3 1.10.54
cookbook-openshift3 1.10.55
cookbook-openshift3 1.10.56
cookbook-openshift3 1.10.57
cookbook-openshift3 1.10.58
cookbook-openshift3 1.10.59
cookbook-openshift3 1.10.60
cookbook-openshift3 1.10.61
cookbook-openshift3 1.10.62
cookbook-openshift3 1.10.63
cookbook-openshift3 1.10.64
cookbook-openshift3 1.10.66
cookbook-openshift3 1.10.67
cookbook-openshift3 2.0.5
cookbook-openshift3 2.0.6
cookbook-openshift3 2.0.7
cookbook-openshift3 2.0.9
cookbook-openshift3 2.0.10
cookbook-openshift3 2.0.12
cookbook-openshift3 2.0.13
cookbook-openshift3 2.0.14
cookbook-openshift3 2.0.15
cookbook-openshift3 2.0.18
cookbook-openshift3 2.0.19
cookbook-openshift3 2.0.20
cookbook-openshift3 2.0.21
cookbook-openshift3 2.0.22
cookbook-openshift3 2.0.23
cookbook-openshift3 2.0.24
cookbook-openshift3 2.0.26
cookbook-openshift3 2.0.27
cookbook-openshift3 2.0.28
cookbook-openshift3 2.0.29
cookbook-openshift3 2.0.32
cookbook-openshift3 2.0.33
cookbook-openshift3 2.0.41
cookbook-openshift3 2.0.42
cookbook-openshift3 2.0.43
cookbook-openshift3 2.0.44
cookbook-openshift3 2.0.45
cookbook-openshift3 2.0.46
cookbook-openshift3 2.0.47
cookbook-openshift3 2.0.48
cookbook-openshift3 2.0.49
cookbook-openshift3 2.0.50
cookbook-openshift3 2.0.51
cookbook-openshift3 2.0.52
cookbook-openshift3 2.0.53
cookbook-openshift3 2.0.54
cookbook-openshift3 2.0.55
cookbook-openshift3 2.0.57
cookbook-openshift3 2.0.58
cookbook-openshift3 2.0.60
cookbook-openshift3 2.0.62
cookbook-openshift3 2.0.63
cookbook-openshift3 2.0.64
cookbook-openshift3 2.0.65
cookbook-openshift3 2.0.66
cookbook-openshift3 2.0.68
cookbook-openshift3 2.0.69
cookbook-openshift3 2.0.71
cookbook-openshift3 2.0.72
cookbook-openshift3 2.0.74
cookbook-openshift3 2.0.75
cookbook-openshift3 2.0.76
cookbook-openshift3 2.0.77
cookbook-openshift3 2.0.82
cookbook-openshift3 2.0.83
cookbook-openshift3 2.0.85
cookbook-openshift3 2.0.86
cookbook-openshift3 2.0.88
cookbook-openshift3 2.0.90
cookbook-openshift3 2.1.0
cookbook-openshift3 2.1.1
cookbook-openshift3 2.1.2
cookbook-openshift3 2.1.3
cookbook-openshift3 2.1.4
cookbook-openshift3 2.1.5
cookbook-openshift3 2.1.6
cookbook-openshift3 2.1.7
cookbook-openshift3 2.1.8
cookbook-openshift3 2.1.9
cookbook-openshift3 2.1.11
cookbook-openshift3 2.1.13
cookbook-openshift3 2.1.14
cookbook-openshift3 2.1.17
cookbook-openshift3 2.1.18
cookbook-openshift3 2.1.19
cookbook-openshift3 2.1.21
cookbook-openshift3 2.1.23
cookbook-openshift3 2.1.24
cookbook-openshift3 2.1.25
cookbook-openshift3 2.1.26
kloudspeaker Applicable Versions
mariadb Applicable Versions
msodbcsql Applicable Versions
qas Applicable Versions
realmd-sssd Applicable Versions
redisio Applicable Versions
squid Applicable Versions

selinuxpolicy CHANGELOG

This file is used to list changes made in each version of the selinuxpolicy cookbook.


  • [backslasher] - Added Travis CI harness
  • [backslasher] - Fixed typo in README


  • [backslasher] - Test overhaul. Now testing is somewhat reliable when using ports
  • [backslasher] - Port search is a function
  • [backslasher] - Port detection now supports ranges. No possibility to add ranges (yet)


  • [shortdudey123] - ChefSpec matchers, helps testing


  • [backslasher] - Forgot contributor


  • [chewi] - Fixed prereq packages
  • [backslasher] - Modified misleading comment
  • [chewi] - Move helpers into a cookbook-specific module
  • [chewi] - Prevent use_selinux from blowing up on systems without getenforce


  • [backslasher] - Ubuntu installation warning


  • [sauraus] - CentOS 7 support
  • [sauraus] - Typos


  • [backslasher] - Readme updates
  • [kevans] - Added kitchen testing


  • [kevans] - Support Chef 11.8.0 running shellout!()
  • [backslasher] - Simplified support info
  • [backslasher] - ASCIIed files


  • [backslasher] - Migrated to only_if instead of if
  • [backslasher] - README typos


  • [joerg] - Added fcontext resource for managing file contexts under SELinux


  • [backslasher] - Added RHEL5/derivatives support. Thanks to @knightorc. Cookbook will break on RHEL7. If anyone expiriences this, please check required packages and create an issue/PR
  • [backslasher] - Machines without SELinux are (opionally) supported. Thanks to @knightroc.


  • [backlasher] - Fixed foodcritic errors


  • [backlasher] - Fixed install.rb syntax. Now it actually works


  • [backlasher] - Added module resource. Currently supports deployment and removal (because that's what I need)
  • [backlasher] - Added permissive resource


  • [backlasher] - Initial release of selinuxpolicy

Foodcritic Metric

0.8.1 passed this metric