diff --git a/.cvsignore b/.cvsignore index e69de29b..b44f5448 100644 --- a/.cvsignore +++ b/.cvsignore @@ -0,0 +1 @@ +serefpolicy-2.0.0.tgz diff --git a/selinux-policy.spec b/selinux-policy.spec new file mode 100644 index 00000000..2621be4d --- /dev/null +++ b/selinux-policy.spec @@ -0,0 +1,196 @@ +%define distro redhat +%define direct_initrc y +%define monolithic n +%define polname1 targeted +%define type1 targeted-mcs +%define polname2 strict +%define type2 strict-mcs +%define POLICYVER 20 +%define POLICYCOREUTILSVER 1.27.26-1 +%define CHECKPOLICYVER 1.27.17-5 +Summary: SELinux policy configuration +Name: selinux-policy +Version: 2.0.0 +Release: 0.6 +License: GPL +Group: System Environment/Base +Source: serefpolicy-%{version}.tgz +Source1: seusers +Source2: setrans.conf +patch: policy-20051114.patch +Url: http://serefpolicy.sourceforge.net +BuildRoot: %{_tmppath}/serefpolicy-buildroot +BuildArch: noarch +BuildRequires: checkpolicy >= %{CHECKPOLICYVER} m4 policycoreutils >= %{POLICYCOREUTILSVER} +Requires: policycoreutils >= %{POLICYCOREUTILSVER} +Obsoletes: policy + +%define installCmds() \ +make NAME=%1 TYPE=%2 DISTRO=%{distro} DIRECT_INITRC=%{direct_initrc} MONOLITHIC=%{monolithic} base.pp \ +make NAME=%1 TYPE=%2 DISTRO=%{distro} DIRECT_INITRC=%{direct_initrc} MONOLITHIC=%{monolithic} modules \ +%{__mkdir} -p $RPM_BUILD_ROOT/%{_usr}/share/selinux/%1/ \ +%{__cp} *.pp $RPM_BUILD_ROOT/%{_usr}/share/selinux/%1/ \ +%{__mkdir} -p $RPM_BUILD_ROOT/%{_sysconfdir}/selinux/%1/policy \ +%{__mkdir} -p $RPM_BUILD_ROOT/%{_sysconfdir}/selinux/%1/modules/active \ +%{__mkdir} -p $RPM_BUILD_ROOT/%{_sysconfdir}/selinux/%1/contexts/files \ +make NAME=%1 TYPE=%{type1} DISTRO=%{distro} DIRECT_INITRC=%{direct_initrc} MONOLITHIC=y DESTDIR=$RPM_BUILD_ROOT install-appconfig \ +install -m0644 %{SOURCE1} ${RPM_BUILD_ROOT}%{_sysconfdir}/selinux/%1/modules/active/seusers \ +install -m0644 %{SOURCE2} ${RPM_BUILD_ROOT}%{_sysconfdir}/selinux/%1/setrans.conf \ +rm -rf $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/booleans \ +touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/config \ +touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/seusers \ +touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/policy/policy.%{POLICYVER} \ +touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/contexts/files/file_contexts \ +touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/contexts/files/homedir_template \ +touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/contexts/files/file_contexts.homedirs + +%define fileList() \ +%defattr(-,root,root) \ +%dir %{_usr}/share/selinux \ +%dir %{_usr}/share/selinux/%1 \ +%config %{_usr}/share/selinux/%1/base.pp \ +%dir %{_sysconfdir}/selinux \ +%ghost %config(noreplace) %{_sysconfdir}/selinux/config \ +%dir %{_sysconfdir}/selinux/%1 \ +%config(noreplace) %{_sysconfdir}/selinux/%1/setrans.conf \ +%ghost %{_sysconfdir}/selinux/%1/seusers \ +%dir %{_sysconfdir}/selinux/%1/modules \ +%dir %{_sysconfdir}/selinux/%1/modules/active \ +%config(noreplace) %{_sysconfdir}/selinux/%1/modules/active/seusers \ +%dir %{_sysconfdir}/selinux/%1/policy/ \ +%ghost %{_sysconfdir}/selinux/%1/policy/policy.%{POLICYVER} \ +%dir %{_sysconfdir}/selinux/%1/contexts \ +%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/customizable_types \ +%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/dbus_contexts \ +%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/default_contexts \ +%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/default_type \ +%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/failsafe_context \ +%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/initrc_context \ +%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/removable_context \ +%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/userhelper_context \ +%dir %{_sysconfdir}/selinux/%1/contexts/files \ +%ghost %config %{_sysconfdir}/selinux/%1/contexts/files/file_contexts \ +%ghost %config %{_sysconfdir}/selinux/%1/contexts/files/homedir_template \ +%ghost %config %{_sysconfdir}/selinux/%1/contexts/files/file_contexts.homedirs \ +%config %{_sysconfdir}/selinux/%1/contexts/files/media + +%define saveFileContext() \ +. %{_sysconfdir}/selinux/config; \ +FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \ +if [ "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT} ]; then \ + cp -f ${FILE_CONTEXT} ${FILE_CONTEXT}.pre; \ +fi + +%define rebuildpolicy() \ +semodule -b /usr/share/selinux/%1/base.pp -s %1 \ +for file in $(ls /usr/share/selinux/%1 | grep -v base.pp) \ +do \ + semodule -i /usr/share/selinux/%1/$file -s %1;\ +done; + +%define relabel() \ +. %{_sysconfdir}/selinux/config; \ +FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \ +if [ "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT}.pre ]; then \ + fixfiles -C ${FILE_CONTEXT}.pre restore; \ + rm -f ${FILE_CONTEXT}.pre; \ +fi; + +%description +SELinux Reference Policy - modular. + +%prep +%setup -q -n serefpolicy-%{version} +%patch -p1 + +%build +make conf + +%install +%{__rm} -fR $RPM_BUILD_ROOT +%installCmds %{polname1} %{type1} + +# Commented out because only targeted ref policy currently builds +%installCmds %{polname2} %{type2} + +%clean +%{__rm} -fR $RPM_BUILD_ROOT + +%package %{polname1} +Summary: SELinux %{polname1} base policy +Group: System Environment/Base +Provides: selinux-policy-base +Obsoletes: selinux-policy-%{polname1}-sources + +%description %{polname1} +SELinux Reference policy targeted base module. + +%files %{polname1} +%fileList %{polname1} + +%pre %{polname1} +%saveFileContext %{polname1} + +%post %{polname1} +if [ ! -s /etc/selinux/config ]; then + # + # New install so we will default to targeted policy + # + echo " +# This file controls the state of SELinux on the system. +# SELINUX= can take one of these three values: +# enforcing - SELinux security policy is enforced. +# permissive - SELinux prints warnings instead of enforcing. +# disabled - No SELinux policy is loaded. +SELINUX=enforcing +# SELINUXTYPE= can take one of these two values: +# targeted - Only targeted network daemons are protected. +# strict - Full SELinux protection. +SELINUXTYPE=targeted +# SETLOCALDEFS= Check local definition changes +SETLOCALDEFS=0 + +" > /etc/selinux/config + + ln -sf /etc/selinux/config /etc/sysconfig/selinux + restorecon /etc/selinux/config 2> /dev/null +else + # if first time update booleans.local needs to be copied to sandbox + [ -f /etc/selinux/%{polname1}/booleans.local ] && mv /etc/selinux/%{polname1}/booleans.local /etc/selinux/%{polname1}/modules/active/ + [ -f /etc/selinux/%{polname1}/seusers ] && cp -f /etc/selinux/%{polname1}/seusers /etc/selinux/%{polname1}/modules/active/seusers + grep -q "^SETLOCALDEFS" /etc/selinux/config || echo -n " +# SETLOCALDEFS= Check local definition changes +SETLOCALDEFS=0 +">> /etc/selinux/config +fi +%rebuildpolicy %{polname1} +%relabel %{polname1} + +%triggerpostun %{polname1} -- selinux-policy-%{polname1} <= 2.0.0 +%rebuildpolicy %{polname1} + +%package %{polname2} +Summary: SELinux %{polname2} base policy +Group: System Environment/Base +Provides: selinux-policy-base +Obsoletes: selinux-policy-%{polname1}-sources + +%description %{polname2} +SELinux Reference policy %{polname2} base module. + +%pre %{polname2} +%saveFileContext %{polname2} + +%post %{polname2} +%rebuildpolicy %{polname2} +%relabel %{polname1} + +%triggerpostun %{polname2} -- %{polname2} <= 2.0.0 +%{rebuildpolicy} %{polname2} + +%files %{polname2} +#%#fileList %{polname2} + +%changelog +* Wed Nov 9 2003 Dan Walsh 2.0.0-5 +- Initial version diff --git a/setrans.conf b/setrans.conf new file mode 100644 index 00000000..0d8aaebe --- /dev/null +++ b/setrans.conf @@ -0,0 +1,19 @@ +# +# Multi-Category Security translation table for SELinux +# +# Uncomment the following to disable translation libary +# disable=1 +# +# Objects can be categorized with 0-256 categories defined by the admin. +# Objects can be in more than one category at a time. +# Categories are stored in the system as c0-c255. Users can use this +# table to translate the categories into a more meaningful output. +# Examples: +# s0:c0=CompanyConfidential +# s0:c1=PatientRecord +# s0:c2=Unclassified +# s0:c3=TopSecret +# s0:c1,c3=CompanyConfidentialRedHat +s0= +s0-s0:c0.c255=SystemLow-SystemHigh +s0:c0.c255=SystemHigh diff --git a/seusers b/seusers new file mode 100644 index 00000000..c400c79d --- /dev/null +++ b/seusers @@ -0,0 +1,2 @@ +root:root:s0-s0:c0.c255 +__default__:user_u:s0 diff --git a/sources b/sources index e69de29b..0a6f68b3 100644 --- a/sources +++ b/sources @@ -0,0 +1 @@ +8fcf0948d5caf52cbd6c70b404388b38 serefpolicy-2.0.0.tgz