6e714e474b
- Label all fifo_file as fapolicyd_var_run_t in /var/run. - Allow fapolicyd_t domain to create fifo files labeled as fapolicyd_var_run_t
230 lines
7.8 KiB
RPMSpec
230 lines
7.8 KiB
RPMSpec
%global selinuxtype targeted
|
|
%global moduletype contrib
|
|
%define semodule_version 0.2
|
|
|
|
Summary: Application Whitelisting Daemon
|
|
Name: fapolicyd
|
|
Version: 0.9.2
|
|
Release: 2%{?dist}
|
|
License: GPLv3+
|
|
URL: http://people.redhat.com/sgrubb/fapolicyd
|
|
Source0: https://people.redhat.com/sgrubb/fapolicyd/%{name}-%{version}.tar.gz
|
|
Source1: https://github.com/linux-application-whitelisting/%{name}-selinux/releases/download/v%{semodule_version}/%{name}-selinux-%{semodule_version}.tar.gz
|
|
BuildRequires: kernel-headers
|
|
BuildRequires: autoconf automake make gcc libtool
|
|
BuildRequires: systemd-devel libgcrypt-devel rpm-devel file-devel
|
|
BuildRequires: libcap-ng-devel libseccomp-devel lmdb-devel
|
|
BuildRequires: python3-devel
|
|
Recommends: %{name}-selinux
|
|
Requires(pre): shadow-utils
|
|
Requires(post): systemd-units
|
|
Requires(preun): systemd-units
|
|
Requires(postun): systemd-units
|
|
|
|
Patch1: fapolicyd-conf.patch
|
|
Patch2: selinux.patch
|
|
|
|
%description
|
|
Fapolicyd (File Access Policy Daemon) implements application whitelisting
|
|
to decide file access rights. Applications that are known via a reputation
|
|
source are allowed access while unknown applications are not. The daemon
|
|
makes use of the kernel's fanotify interface to determine file access rights.
|
|
|
|
%package selinux
|
|
Summary: Fapolicyd selinux
|
|
Group: Applications/System
|
|
Requires: %{name} = %{version}-%{release}
|
|
BuildRequires: selinux-policy
|
|
BuildRequires: selinux-policy-devel
|
|
BuildArch: noarch
|
|
%{?selinux_requires}
|
|
|
|
%description selinux
|
|
The %{name}-selinux package contains selinux policy for the %{name} daemon.
|
|
|
|
%prep
|
|
|
|
%setup -q
|
|
|
|
# selinux
|
|
%setup -q -D -T -a 1
|
|
|
|
sed -i "s/%python2_path%/`readlink -f %{__python2} | sed 's/\//\\\\\//g'`/g" init/%{name}.rules
|
|
sed -i "s/%python3_path%/`readlink -f %{__python3} | sed 's/\//\\\\\//g'`/g" init/%{name}.rules
|
|
sed -i "s/%ld_so_path%/`find /usr/lib64/ -type f -name 'ld-2\.*.so' | sed 's/\//\\\\\//g'`/g" init/%{name}.rules
|
|
|
|
%patch1 -p1 -b .default-conf
|
|
%patch2 -p1 -b .selinux
|
|
|
|
%build
|
|
|
|
./autogen.sh
|
|
|
|
%configure \
|
|
--with-audit \
|
|
--with-rpm \
|
|
--disable-shared
|
|
|
|
|
|
make CFLAGS="%{optflags}" %{?_smp_mflags}
|
|
|
|
# selinux
|
|
pushd %{name}-selinux-%{semodule_version}
|
|
make
|
|
popd
|
|
|
|
# selinux
|
|
%pre selinux
|
|
%selinux_relabel_pre -s %{selinuxtype}
|
|
|
|
%install
|
|
make DESTDIR="%{buildroot}" INSTALL='install -p' install
|
|
mkdir -p %{buildroot}/%{python3_sitelib}/dnf-plugins/
|
|
install -p -m 644 dnf/%{name}-dnf-plugin.py %{buildroot}/%{python3_sitelib}/dnf-plugins/
|
|
install -p -m 644 -D init/%{name}-tmpfiles.conf %{buildroot}/%{_tmpfilesdir}/%{name}.conf
|
|
mkdir -p %{buildroot}/%{_localstatedir}/lib/%{name}
|
|
mkdir -p %{buildroot}/run/%{name}
|
|
|
|
# selinux
|
|
install -d %{buildroot}%{_datadir}/selinux/packages/%{selinuxtype}
|
|
install -m 0644 %{name}-selinux-%{semodule_version}/%{name}.pp.bz2 %{buildroot}%{_datadir}/selinux/packages/%{selinuxtype}
|
|
install -d -p %{buildroot}%{_datadir}/selinux/devel/include/%{moduletype}
|
|
install -p -m 644 %{name}-selinux-%{semodule_version}/%{name}.if %{buildroot}%{_datadir}/selinux/devel/include/%{moduletype}/ipp-%{name}.if
|
|
|
|
#cleanup
|
|
find %{buildroot} \( -name '*.la' -o -name '*.a' \) -exec rm -f {} ';'
|
|
|
|
%pre
|
|
getent passwd %{name} >/dev/null || useradd -r -M -d %{_localstatedir}/lib/%{name} -s /sbin/nologin -c "Application Whitelisting Daemon" %{name}
|
|
|
|
%post
|
|
%systemd_post %{name}.service
|
|
|
|
%preun
|
|
%systemd_preun %{name}.service
|
|
|
|
%postun
|
|
%systemd_postun_with_restart %{name}.service
|
|
|
|
%files
|
|
%doc README.md
|
|
%{!?_licensedir:%global license %%doc}
|
|
%license COPYING
|
|
%attr(750,root,%{name}) %dir %{_sysconfdir}/%{name}
|
|
%config(noreplace) %attr(644,root,%{name}) %{_sysconfdir}/%{name}/%{name}.rules
|
|
%config(noreplace) %attr(644,root,%{name}) %{_sysconfdir}/%{name}/%{name}.conf
|
|
%config(noreplace) %attr(644,root,%{name}) %{_sysconfdir}/%{name}/%{name}.trust
|
|
%attr(644,root,root) %{_unitdir}/%{name}.service
|
|
%attr(644,root,root) %{_tmpfilesdir}/%{name}.conf
|
|
%attr(755,root,root) %{_sbindir}/%{name}
|
|
%attr(755,root,root) %{_sbindir}/%{name}-cli
|
|
%attr(644,root,root) %{_mandir}/man8/*
|
|
%attr(644,root,root) %{_mandir}/man5/*
|
|
%attr(644,root,root) %{_mandir}/man1/*
|
|
%ghost %{_localstatedir}/log/%{name}-access.log
|
|
%attr(770,root,%{name}) %dir %{_localstatedir}/lib/%{name}
|
|
%attr(770,root,%{name}) %dir /run/%{name}
|
|
%ghost %{_localstatedir}/run/%{name}/%{name}.fifo
|
|
%ghost %{_localstatedir}/lib/%{name}/data.mdb
|
|
%ghost %{_localstatedir}/lib/%{name}/lock.mdb
|
|
%{python3_sitelib}/dnf-plugins/%{name}-dnf-plugin.py
|
|
%{python3_sitelib}/dnf-plugins/__pycache__/%{name}-dnf-plugin.*.pyc
|
|
|
|
|
|
%files selinux
|
|
%{_datadir}/selinux/packages/%{selinuxtype}/%{name}.pp.bz2
|
|
%ghost %{_sharedstatedir}/selinux/%{selinuxtype}/active/modules/200/%{name}
|
|
%{_datadir}/selinux/devel/include/%{moduletype}/ipp-%{name}.if
|
|
|
|
%post selinux
|
|
%selinux_modules_install -s %{selinuxtype} %{_datadir}/selinux/packages/%{selinuxtype}/%{name}.pp.bz2
|
|
|
|
%postun selinux
|
|
if [ $1 -eq 0 ]; then
|
|
%selinux_modules_uninstall -s %{selinuxtype} %{name}
|
|
fi
|
|
|
|
%posttrans selinux
|
|
%selinux_relabel_post -s %{selinuxtype}
|
|
|
|
|
|
%changelog
|
|
* Tue Feb 04 2020 Radovan Sroka <rsroka@redhat.com> - 0.9.2-2
|
|
- Label all fifo_file as fapolicyd_var_run_t in /var/run.
|
|
- Allow fapolicyd_t domain to create fifo files labeled as
|
|
fapolicyd_var_run_t
|
|
|
|
* Fri Jan 31 2020 Radovan Sroka <rsroka@redhat.com> - 0.9.2-1
|
|
- rebase fapolicyd to 0.9.2
|
|
- allows watched mount points to be specified by file system types
|
|
- ELF file detection was improved
|
|
- the rules have been rewritten to express the policy based on subject
|
|
object trust for better performance and reliability
|
|
- exceptions for dracut and ansible were added to the rules to avoid problems
|
|
under normal system use
|
|
- adds an admin defined trust database (fapolicyd.trust)
|
|
- setting boost, queue, user, and group on the daemon
|
|
command line are deprecated
|
|
|
|
* Tue Jan 28 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.9-4
|
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
|
|
|
|
* Tue Nov 05 2019 Marek Tamaskovic <mtamasko@redhat.com> - 0.9-3
|
|
- Updated fapolicyd-selinux subpackage to v0.2
|
|
Selinux subpackage is recommended for fapolicyd.
|
|
|
|
* Mon Oct 07 2019 Radovan Sroka <rsroka@redhat.com> - 0.9-2
|
|
- Added fapolicyd-selinux subpackage
|
|
|
|
* Mon Oct 07 2019 Radovan Sroka <rsroka@redhat.com> - 0.9-1
|
|
- rebase to v0.9
|
|
|
|
* Thu Oct 03 2019 Miro Hrončok <mhroncok@redhat.com> - 0.8.10-2
|
|
- Rebuilt for Python 3.8.0rc1 (#1748018)
|
|
|
|
* Wed Aug 28 2019 Radovan Sroka <rsroka@redhat.com> - 0.8.10-1
|
|
- rebase to 0.8.10
|
|
- generate python paths dynamically
|
|
|
|
* Mon Aug 19 2019 Miro Hrončok <mhroncok@redhat.com> - 0.8.9-5
|
|
- Rebuilt for Python 3.8
|
|
|
|
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 0.8.9-4
|
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
|
|
|
|
* Mon Jun 10 22:13:18 CET 2019 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.8.9-3
|
|
- Rebuild for RPM 4.15
|
|
|
|
* Mon Jun 10 15:42:01 CET 2019 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.8.9-2
|
|
- Rebuild for RPM 4.15
|
|
|
|
* Mon May 06 2019 Radovan Sroka <rsroka@redhat.com> - 0.8.9-1
|
|
- New upstream release
|
|
|
|
* Wed Mar 13 2019 Radovan Sroka <rsroka@redhat.com> - 0.8.8-2
|
|
- backport some patches to resolve dac_override for fapolicyd
|
|
|
|
* Mon Mar 11 2019 Radovan Sroka <rsroka@redhat.com> - 0.8.8-1
|
|
- New upstream release
|
|
- Added new DNF plugin that can update the trust database when rpms are installed
|
|
- Added support for FAN_OPEN_EXEC_PERM
|
|
|
|
* Thu Jan 31 2019 Fedora Release Engineering <releng@fedoraproject.org> - 0.8.7-3
|
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
|
|
|
|
|
|
* Wed Oct 03 2018 Steve Grubb <sgrubb@redhat.com> 0.8.7-1
|
|
- New upstream bugfix release
|
|
|
|
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.8.6-2
|
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
|
|
|
|
* Thu Jun 07 2018 Steve Grubb <sgrubb@redhat.com> 0.8.6-1
|
|
- New upstream feature release
|
|
|
|
* Fri May 18 2018 Steve Grubb <sgrubb@redhat.com> 0.8.5-2
|
|
- Add dist tag (#1579362)
|
|
|
|
* Fri Feb 16 2018 Steve Grubb <sgrubb@redhat.com> 0.8.5-1
|
|
- New release
|