SELinux fix
- Label all fifo_file as fapolicyd_var_run_t in /var/run. - Allow fapolicyd_t domain to create fifo files labeled as fapolicyd_var_run_t
This commit is contained in:
parent
193b9f0cdf
commit
6e714e474b
@ -5,7 +5,7 @@
|
||||
Summary: Application Whitelisting Daemon
|
||||
Name: fapolicyd
|
||||
Version: 0.9.2
|
||||
Release: 1%{?dist}
|
||||
Release: 2%{?dist}
|
||||
License: GPLv3+
|
||||
URL: http://people.redhat.com/sgrubb/fapolicyd
|
||||
Source0: https://people.redhat.com/sgrubb/fapolicyd/%{name}-%{version}.tar.gz
|
||||
@ -22,6 +22,7 @@ Requires(preun): systemd-units
|
||||
Requires(postun): systemd-units
|
||||
|
||||
Patch1: fapolicyd-conf.patch
|
||||
Patch2: selinux.patch
|
||||
|
||||
%description
|
||||
Fapolicyd (File Access Policy Daemon) implements application whitelisting
|
||||
@ -53,6 +54,7 @@ sed -i "s/%python3_path%/`readlink -f %{__python3} | sed 's/\//\\\\\//g'`/g" ini
|
||||
sed -i "s/%ld_so_path%/`find /usr/lib64/ -type f -name 'ld-2\.*.so' | sed 's/\//\\\\\//g'`/g" init/%{name}.rules
|
||||
|
||||
%patch1 -p1 -b .default-conf
|
||||
%patch2 -p1 -b .selinux
|
||||
|
||||
%build
|
||||
|
||||
@ -147,6 +149,11 @@ fi
|
||||
|
||||
|
||||
%changelog
|
||||
* Tue Feb 04 2020 Radovan Sroka <rsroka@redhat.com> - 0.9.2-2
|
||||
- Label all fifo_file as fapolicyd_var_run_t in /var/run.
|
||||
- Allow fapolicyd_t domain to create fifo files labeled as
|
||||
fapolicyd_var_run_t
|
||||
|
||||
* Fri Jan 31 2020 Radovan Sroka <rsroka@redhat.com> - 0.9.2-1
|
||||
- rebase fapolicyd to 0.9.2
|
||||
- allows watched mount points to be specified by file system types
|
||||
|
25
selinux.patch
Normal file
25
selinux.patch
Normal file
@ -0,0 +1,25 @@
|
||||
From 93d7fc7decfdca3a0622ecc5e0ae3fe5880a836a Mon Sep 17 00:00:00 2001
|
||||
From: Lukas Vrabec <lvrabec@redhat.com>
|
||||
Date: Tue, 4 Feb 2020 09:33:01 +0100
|
||||
Subject: [PATCH] Allow fapolicyd create fifo files with own label
|
||||
|
||||
- Label all fifo_file as fapolicyd_var_run_t in /var/run.
|
||||
- Allow fapolicyd_t domain to create fifo files labeled as
|
||||
fapolicyd_var_run_t
|
||||
---
|
||||
fapolicyd.te | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/fapolicyd.te b/fapolicyd.te
|
||||
index 39f09f5..71eb6c0 100644
|
||||
--- a/fapolicyd-selinux-0.2/fapolicyd.te
|
||||
+++ b/fapolicyd-selinux-0.2/fapolicyd.te
|
||||
@@ -48,7 +48,7 @@ manage_dirs_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
|
||||
manage_files_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
|
||||
manage_fifo_files_pattern(fapolicyd_t, fapolicyd_var_run_t,fapolicyd_var_run_t)
|
||||
manage_lnk_files_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
|
||||
-files_pid_filetrans(fapolicyd_t, fapolicyd_var_run_t, { dir file lnk_file })
|
||||
+files_pid_filetrans(fapolicyd_t, fapolicyd_var_run_t, { dir file fifo_file lnk_file })
|
||||
|
||||
kernel_dgram_send(fapolicyd_t)
|
||||
|
Loading…
Reference in New Issue
Block a user