Commit Graph

1297 Commits

Author SHA1 Message Date
Petr Lautrbach
ef4795f423 Configure autorelabel service to output to journal and to console if set
The selinux-autorelabel.service is configured with "StandardInput=tty", even though
the script doing the relabeling is not interactive (only "fixfiles relabel" is
interactive but it is not used in this service).

This property should be removed and replaced by
"StandardOutput=journal+console".

See:
- https://bugzilla.redhat.com/show_bug.cgi?id=1634661
- https://github.com/fedora-sysv/initscripts/pull/262
2019-11-14 10:01:54 +01:00
Petr Lautrbach
da2585a281 SELinux userspace 3.0-rc1 release candidate 2019-11-11 11:45:22 +01:00
Petr Lautrbach
d4e16d7c7d policycoreutils-2.9-7.fc32
- semanage: Do not use default s0 range in "semanage login -a" (#1312283)
2019-09-04 07:48:15 +02:00
Petr Lautrbach
bfe01763d9 semanage: Do not use default s0 range in "semanage login -a"
Using the "s0" default means that new login mappings are always added with "s0"
range instead of the range of SELinux user.

Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1312283
2019-09-04 07:48:15 +02:00
Petr Lautrbach
757b820a2b policycoreutils-2.9-6.fc32
- gui: Fix remove module in system-config-selinux (#1740936)
2019-08-29 10:09:52 +02:00
Petr Lautrbach
d6f96f416d gui: Fix remove module in system-config-selinux
When a user tried to remove a policy module with priority other than 400 via
GUI, it failed with a message:

libsemanage.semanage_direct_remove_key: Unable to remove module somemodule at priority 400. (No such file or directory).

This is fixed by calling "semodule -x PRIORITY -r NAME" instead of
"semodule -r NAME".

Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1740936
2019-08-29 10:08:55 +02:00
Petr Lautrbach
a2e668e9c9 policycoreutils-2.9-5.fc32 2019-08-23 13:42:11 +02:00
Petr Lautrbach
5ea7b37cde policycoreutils-2.9-5.fc32
- fixfiles: Fix unbound variable problem
2019-08-23 13:29:36 +02:00
Miro Hrončok
78ffe5c66e Rebuilt for Python 3.8 2019-08-16 04:45:37 +02:00
Petr Lautrbach
2dc66df8a9 policycoreutils-2.9-3.fc31
- Drop python2-policycoreutils
- Update ru man page translations
2019-08-05 19:25:53 +02:00
Petr Lautrbach
21fff37ccc fixfiles: Fix [-B] [-F] onboot and force full relabel when SELinux is disabled 2019-08-05 19:25:53 +02:00
Petr Lautrbach
61d9b74e3d Update ru man page translations
https://github.com/SELinuxProject/selinux/pull/145
2019-08-05 19:25:53 +02:00
Petr Lautrbach
d01ff1b97d Raise requires libaudit version to 3.0 at least 2019-08-05 19:25:53 +02:00
Petr Lautrbach
88ef143cf4 Drop python2-policycoreutils
It requires python2-setools which is not available anymore, see
https://bugzilla.redhat.com/show_bug.cgi?id=1734789
2019-08-05 19:25:53 +02:00
Petr Lautrbach
18e735df1b Use separate patches instead of *-fedora.patch'es
Using patches from git makes it clean which changes are included in Fedora

New workflow:

1. clone https://github.com/fedora-selinux/selinux
2. create patchset
    $ git format-patch 20190315 -- policycoreutils python gui sandbox dbus semodule-utils restorecond
3. update spec file
    $ for j in [0-9]*.patch; do printf "Patch%s: %s\n" ${j/-*/} $j; done

	#	deleted:    restorecond-fedora.patch
2019-08-05 19:25:53 +02:00
Petr Lautrbach
d98f342921 Fix perms on newrole so that objcopy can process it
Fixes:
 	File usr/bin/newrole is not stripped on all architectures (have [.gnu_debugdata])
2019-08-05 08:30:04 +02:00
Fedora Release Engineering
d378c732b0 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2019-07-26 11:05:20 +00:00
Petr Lautrbach
f62c86f32c SELinux userspace 2.9 release 2019-03-18 17:55:40 +01:00
Petr Lautrbach
8008fc1f39 tests: Filter using new "generic" and "fedora" tags
See 028e473158

commit 028e4731581214841455233a656912241a5a8b69 (HEAD -> master, origin/master)
Author: Petr Lautrbach <plautrba@redhat.com>
Date:   Wed Mar 13 11:23:00 2019 +0100

    Apply "generic" and "fedora" tags

    Tests tagged as "generic" is supposed to be used on a generic system like Fedora
    or Red Hat Enterprise Linux, while tests with "fedora" tag is for Fedora only.

    Usage:
    List only "generic" tests:
         $ fmf show --filter "tier: 1 | component: policycoreutils & tags: generic"

    List all "generic" and "fedora" tests:
         $ fmf show --filter "tier: 1 | component: policycoreutils & tags: generic, fedora"
2019-03-13 11:31:11 +01:00
Petr Lautrbach
8478235a3c SELinux userspace 2.9-rc2 release 2019-03-11 17:03:46 +01:00
Fedora Release Engineering
67598f5a41 - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2019-02-02 04:35:56 +00:00
Petr Lautrbach
a21e2f9484 SELinux userspace 2.9-rc1 release candidate 2019-01-30 10:09:38 +01:00
Petr Lautrbach
3a6c8251f5 policycoreutils-2.8-17
- python2-policycoreutils requires python2-ipaddress (#1669230)
2019-01-25 08:52:32 +01:00
Petr Lautrbach
ea40a6c901 policycoreutils-2.8-16
- restorecond: Install DBUS service file with 644 permissions
2019-01-22 14:22:37 +01:00
Petr Lautrbach
e3a75fa174 policycoreutils-2.8-15
- setsebool: support use of -P on SELinux-disabled hosts
- sepolicy: initialize mislabeled_files in __init__()
- audit2allow: use local sepolgen-ifgen-attr-helper for tests
- audit2allow: allow using audit2why as non-root user
- audit2allow/sepolgen-ifgen: show errors on stderr
- audit2allow/sepolgen-ifgen: add missing \n to error message
- sepolgen: close /etc/selinux/sepolgen.conf after parsing it
- sepolicy: Make policy files sorting more robust
- semanage: Load a store policy and set the store SELinux policy root
2019-01-21 17:56:37 +01:00
Petr Lautrbach
9c1b897074 policycoreutils-2.8-14
- chcat: fix removing categories on users with Fedora default setup
- semanage: Include MCS/MLS range when exporting local customizations
- semanage: Start exporting "ibendport" and "ibpkey" entries
- semanage: do not show "None" levels when using a non-MLS policy
- sepolicy: Add sepolicy.load_store_policy(store)
- semanage: import sepolicy only when it's needed
- semanage: move valid_types initialisations to class constructors
2018-12-20 10:30:25 +01:00
Petr Lautrbach
a56e58893b policycoreutils-2.8-13
- chcat: use check_call instead of getstatusoutput
- Use matchbox-window-manager instead of openbox
- Use ipaddress python module instead of IPy
- semanage: Fix handling of -a/-e/-d/-r options
- semanage: Use standard argparse.error() method
2018-12-10 18:00:15 +01:00
Petr Lautrbach
3183fc4035 policycoreutils-2.8-12
- sepolicy,semanage: replace aliases with corresponding type names
- sepolicy-generate: Handle more reserved port types
2018-11-13 13:42:49 +01:00
Petr Lautrbach
d0a54fbf96 policycoreutils-2.8-11
- sepolicy: Fix get_real_type_name to handle query failure properly
- sepolicy: search() for dontaudit rules as well
2018-10-16 12:11:18 +02:00
Petr Šplíchal
10ed19a560 Remove explicit requires from tests.yml
Requires are now handled by Standard Test Roles based on the
individual test metadata so there is no need to list them here.
2018-10-08 13:03:14 +02:00
Petr Šplíchal
3d37582bc2 Use FMF filter instead of listing tests manually
There is a new feature in the Standard Test Roles which allows to
use an FMF filter instead of listing all tests manually. All tier
one selinux tests are selected as well, thus extending requires.
2018-10-02 13:48:10 +02:00
Petr Lautrbach
06ebc75d30 policycoreutils-2.8-10
- semanage: "semanage user" does not use -s, fix documentation
- semanage: add a missing space in ibendport help
- sepolicy: Update to work with setools-4.2.0
2018-10-02 09:39:49 +02:00
Petr Lautrbach
6456a752da policycoreutils-2.8-9
- semanage: Stop rejecting aliases in semanage commands
- sepolicy: Stop rejecting aliases in sepolicy commands
- sepolicy: Fix "info" to search aliases as well
- setfiles: Improve description of -d switch
2018-09-14 21:54:29 +02:00
Petr Lautrbach
9d43d20386 policycoreutils-2.8-8
- Update translations
2018-09-13 12:49:48 +02:00
Petr Lautrbach
dbb0324fb0 Move setsebool bash-completion to policycoreutils (#1598499) 2018-09-10 22:39:25 +02:00
Petr Lautrbach
2001cdc01d libselinux-2.8-4
- Fix typo in newrole.1 manpage
- sepolgen: print all AV rules correctly
- sepolgen: fix access vector initialization
- Add xperms support to audit2allow
- semanage: Stop logging loginRecords changes
- semanage: Fix logger class definition
- semanage: Replace bare except with specific one
- semanage: fix Python syntax of catching several exceptions
- sepolgen: return NotImplemented instead of raising it
- sepolgen: fix refpolicy parsing of "permissive"
2018-09-04 09:32:10 +02:00
Petr Lautrbach
1cf65c551e Update README.translations to reflect recent changes and add default zanata.xml 2018-08-07 18:01:26 +02:00
Petr Lautrbach
ad810ff414 Use patch'es without translations since they are in separete tarballs 2018-08-07 18:01:26 +02:00
Petr Lautrbach
03a027dfaa Split translations into sub-tarballs
https://github.com/fedora-selinux/selinux/issues/43
2018-08-07 17:33:39 +02:00
Petr Lautrbach
0da684cc41 policycoreutils-2.8-6.fc29
- Use split translation files
  https://github.com/fedora-selinux/selinux/issues/43
2018-08-06 14:47:07 +02:00
Petr Lautrbach
1a9e2c70e4 Use new translation files structure
https://github.com/fedora-selinux/selinux/issues/43
2018-08-06 14:38:57 +02:00
Petr Lautrbach
e8cd8997c5 tests: Add selinux-info, booleans and modules tests 2018-08-03 14:11:50 +02:00
Petr Lautrbach
2e1ddce936 Build with python3 by default
Since this [1] change, there's no /usr/bin/python anymore

[1] https://fedoraproject.org/wiki/Changes/Move_usr_bin_python_into_separate_package
2018-07-18 22:39:08 +02:00
Petr Lautrbach
2f16dd5c7d cgroup support was removed from sandbox in 2.4 release long time ago 2018-07-18 13:04:23 +02:00
Petr Lautrbach
748028495e Disable automatic compilation of Python files in extra directories
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/IDDR65FMKZYZYLL6DGFEKFACC55PELW3/
https://fedoraproject.org/wiki/Packaging:Python_Appendix#Manual_byte_compilation
2018-07-16 14:47:02 +02:00
Petr Lautrbach
7505971712 Do not use symlinks to enable selinux-autorelabel-mark.service
The service should be enabled using `systemd preset`
https://bugzilla.redhat.com/show_bug.cgi?id=1589720
2018-07-16 13:35:12 +02:00
Fedora Release Engineering
3a5478fbe1 - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2018-07-13 22:42:19 +00:00
Miro Hrončok
ed5913bed9 Rebuilt for Python 3.7 2018-07-02 18:24:39 +02:00
Petr Lautrbach
c1291665a7 policycoreutils-2.8-3.fc29
- selinux-autorelabel: Use plymouth --quit rather then --hide-splash (#1592221)
- selinux-autorelabel: Increment boot_indeterminate grub environment variable (#1592221)
2018-06-18 11:23:27 +02:00
Hans de Goede
3bbe617cee selinux-autorelabel: Increment boot_indeterminate grub environment variable
For the new grub auto-hide feature:
https://fedoraproject.org/wiki/Changes/HiddenGrubMenu

Grub needs to know if the previous boot succeeded. This is tracked
through flags in the grub environment.

A selinux autorelabel is special, because it reboots the machine without
completing the boot in the normal manner.

grub checks the (new) boot_indeterminate grub environment variable to deal
with this. This is a variable containing a count of special boots since
the last successful normal boot. If this variable is 1 then it also treats
the previous boot as successful. The idea is that an autorelabel (or
offline updates) increments boot_indeterminate, so normally after a reboot
it will be 1 and the grub menu stays hidden. But if we end up in a selinux
autorelabel loop for some reason, then it will be bigger then 1 (*) and
the grub menu will be shown allowing the user to try and fix things.

*) grub itself will also increment it if it is 1 so that even if it gets
incremented only once, that still only makes 1 boot count as successful.

This commit makes the selinux-autorelabel script call:
grub2-editenv - incr boot_indeterminate
for proper integration with this new grub feature.

Signed-off-by: Hans de Goede <hdegoede@redhat.com>
2018-06-18 11:03:49 +02:00