SELinux fix
- Label all fifo_file as fapolicyd_var_run_t in /var/run. - Allow fapolicyd_t domain to create fifo files labeled as fapolicyd_var_run_t
This commit is contained in:
parent
193b9f0cdf
commit
6e714e474b
@ -5,7 +5,7 @@
|
|||||||
Summary: Application Whitelisting Daemon
|
Summary: Application Whitelisting Daemon
|
||||||
Name: fapolicyd
|
Name: fapolicyd
|
||||||
Version: 0.9.2
|
Version: 0.9.2
|
||||||
Release: 1%{?dist}
|
Release: 2%{?dist}
|
||||||
License: GPLv3+
|
License: GPLv3+
|
||||||
URL: http://people.redhat.com/sgrubb/fapolicyd
|
URL: http://people.redhat.com/sgrubb/fapolicyd
|
||||||
Source0: https://people.redhat.com/sgrubb/fapolicyd/%{name}-%{version}.tar.gz
|
Source0: https://people.redhat.com/sgrubb/fapolicyd/%{name}-%{version}.tar.gz
|
||||||
@ -22,6 +22,7 @@ Requires(preun): systemd-units
|
|||||||
Requires(postun): systemd-units
|
Requires(postun): systemd-units
|
||||||
|
|
||||||
Patch1: fapolicyd-conf.patch
|
Patch1: fapolicyd-conf.patch
|
||||||
|
Patch2: selinux.patch
|
||||||
|
|
||||||
%description
|
%description
|
||||||
Fapolicyd (File Access Policy Daemon) implements application whitelisting
|
Fapolicyd (File Access Policy Daemon) implements application whitelisting
|
||||||
@ -53,6 +54,7 @@ sed -i "s/%python3_path%/`readlink -f %{__python3} | sed 's/\//\\\\\//g'`/g" ini
|
|||||||
sed -i "s/%ld_so_path%/`find /usr/lib64/ -type f -name 'ld-2\.*.so' | sed 's/\//\\\\\//g'`/g" init/%{name}.rules
|
sed -i "s/%ld_so_path%/`find /usr/lib64/ -type f -name 'ld-2\.*.so' | sed 's/\//\\\\\//g'`/g" init/%{name}.rules
|
||||||
|
|
||||||
%patch1 -p1 -b .default-conf
|
%patch1 -p1 -b .default-conf
|
||||||
|
%patch2 -p1 -b .selinux
|
||||||
|
|
||||||
%build
|
%build
|
||||||
|
|
||||||
@ -147,6 +149,11 @@ fi
|
|||||||
|
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Feb 04 2020 Radovan Sroka <rsroka@redhat.com> - 0.9.2-2
|
||||||
|
- Label all fifo_file as fapolicyd_var_run_t in /var/run.
|
||||||
|
- Allow fapolicyd_t domain to create fifo files labeled as
|
||||||
|
fapolicyd_var_run_t
|
||||||
|
|
||||||
* Fri Jan 31 2020 Radovan Sroka <rsroka@redhat.com> - 0.9.2-1
|
* Fri Jan 31 2020 Radovan Sroka <rsroka@redhat.com> - 0.9.2-1
|
||||||
- rebase fapolicyd to 0.9.2
|
- rebase fapolicyd to 0.9.2
|
||||||
- allows watched mount points to be specified by file system types
|
- allows watched mount points to be specified by file system types
|
||||||
|
25
selinux.patch
Normal file
25
selinux.patch
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
From 93d7fc7decfdca3a0622ecc5e0ae3fe5880a836a Mon Sep 17 00:00:00 2001
|
||||||
|
From: Lukas Vrabec <lvrabec@redhat.com>
|
||||||
|
Date: Tue, 4 Feb 2020 09:33:01 +0100
|
||||||
|
Subject: [PATCH] Allow fapolicyd create fifo files with own label
|
||||||
|
|
||||||
|
- Label all fifo_file as fapolicyd_var_run_t in /var/run.
|
||||||
|
- Allow fapolicyd_t domain to create fifo files labeled as
|
||||||
|
fapolicyd_var_run_t
|
||||||
|
---
|
||||||
|
fapolicyd.te | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/fapolicyd.te b/fapolicyd.te
|
||||||
|
index 39f09f5..71eb6c0 100644
|
||||||
|
--- a/fapolicyd-selinux-0.2/fapolicyd.te
|
||||||
|
+++ b/fapolicyd-selinux-0.2/fapolicyd.te
|
||||||
|
@@ -48,7 +48,7 @@ manage_dirs_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
|
||||||
|
manage_files_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
|
||||||
|
manage_fifo_files_pattern(fapolicyd_t, fapolicyd_var_run_t,fapolicyd_var_run_t)
|
||||||
|
manage_lnk_files_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
|
||||||
|
-files_pid_filetrans(fapolicyd_t, fapolicyd_var_run_t, { dir file lnk_file })
|
||||||
|
+files_pid_filetrans(fapolicyd_t, fapolicyd_var_run_t, { dir file fifo_file lnk_file })
|
||||||
|
|
||||||
|
kernel_dgram_send(fapolicyd_t)
|
||||||
|
|
Loading…
Reference in New Issue
Block a user