auto-import selinux-policy-2.0.0-0.6 on branch devel from
selinux-policy-2.0.0-0.6.src.rpm
This commit is contained in:
parent
ecb5ec4af1
commit
1580c873c7
@ -0,0 +1 @@
|
|||||||
|
serefpolicy-2.0.0.tgz
|
196
selinux-policy.spec
Normal file
196
selinux-policy.spec
Normal file
@ -0,0 +1,196 @@
|
|||||||
|
%define distro redhat
|
||||||
|
%define direct_initrc y
|
||||||
|
%define monolithic n
|
||||||
|
%define polname1 targeted
|
||||||
|
%define type1 targeted-mcs
|
||||||
|
%define polname2 strict
|
||||||
|
%define type2 strict-mcs
|
||||||
|
%define POLICYVER 20
|
||||||
|
%define POLICYCOREUTILSVER 1.27.26-1
|
||||||
|
%define CHECKPOLICYVER 1.27.17-5
|
||||||
|
Summary: SELinux policy configuration
|
||||||
|
Name: selinux-policy
|
||||||
|
Version: 2.0.0
|
||||||
|
Release: 0.6
|
||||||
|
License: GPL
|
||||||
|
Group: System Environment/Base
|
||||||
|
Source: serefpolicy-%{version}.tgz
|
||||||
|
Source1: seusers
|
||||||
|
Source2: setrans.conf
|
||||||
|
patch: policy-20051114.patch
|
||||||
|
Url: http://serefpolicy.sourceforge.net
|
||||||
|
BuildRoot: %{_tmppath}/serefpolicy-buildroot
|
||||||
|
BuildArch: noarch
|
||||||
|
BuildRequires: checkpolicy >= %{CHECKPOLICYVER} m4 policycoreutils >= %{POLICYCOREUTILSVER}
|
||||||
|
Requires: policycoreutils >= %{POLICYCOREUTILSVER}
|
||||||
|
Obsoletes: policy
|
||||||
|
|
||||||
|
%define installCmds() \
|
||||||
|
make NAME=%1 TYPE=%2 DISTRO=%{distro} DIRECT_INITRC=%{direct_initrc} MONOLITHIC=%{monolithic} base.pp \
|
||||||
|
make NAME=%1 TYPE=%2 DISTRO=%{distro} DIRECT_INITRC=%{direct_initrc} MONOLITHIC=%{monolithic} modules \
|
||||||
|
%{__mkdir} -p $RPM_BUILD_ROOT/%{_usr}/share/selinux/%1/ \
|
||||||
|
%{__cp} *.pp $RPM_BUILD_ROOT/%{_usr}/share/selinux/%1/ \
|
||||||
|
%{__mkdir} -p $RPM_BUILD_ROOT/%{_sysconfdir}/selinux/%1/policy \
|
||||||
|
%{__mkdir} -p $RPM_BUILD_ROOT/%{_sysconfdir}/selinux/%1/modules/active \
|
||||||
|
%{__mkdir} -p $RPM_BUILD_ROOT/%{_sysconfdir}/selinux/%1/contexts/files \
|
||||||
|
make NAME=%1 TYPE=%{type1} DISTRO=%{distro} DIRECT_INITRC=%{direct_initrc} MONOLITHIC=y DESTDIR=$RPM_BUILD_ROOT install-appconfig \
|
||||||
|
install -m0644 %{SOURCE1} ${RPM_BUILD_ROOT}%{_sysconfdir}/selinux/%1/modules/active/seusers \
|
||||||
|
install -m0644 %{SOURCE2} ${RPM_BUILD_ROOT}%{_sysconfdir}/selinux/%1/setrans.conf \
|
||||||
|
rm -rf $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/booleans \
|
||||||
|
touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/config \
|
||||||
|
touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/seusers \
|
||||||
|
touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/policy/policy.%{POLICYVER} \
|
||||||
|
touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/contexts/files/file_contexts \
|
||||||
|
touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/contexts/files/homedir_template \
|
||||||
|
touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/contexts/files/file_contexts.homedirs
|
||||||
|
|
||||||
|
%define fileList() \
|
||||||
|
%defattr(-,root,root) \
|
||||||
|
%dir %{_usr}/share/selinux \
|
||||||
|
%dir %{_usr}/share/selinux/%1 \
|
||||||
|
%config %{_usr}/share/selinux/%1/base.pp \
|
||||||
|
%dir %{_sysconfdir}/selinux \
|
||||||
|
%ghost %config(noreplace) %{_sysconfdir}/selinux/config \
|
||||||
|
%dir %{_sysconfdir}/selinux/%1 \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/setrans.conf \
|
||||||
|
%ghost %{_sysconfdir}/selinux/%1/seusers \
|
||||||
|
%dir %{_sysconfdir}/selinux/%1/modules \
|
||||||
|
%dir %{_sysconfdir}/selinux/%1/modules/active \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/modules/active/seusers \
|
||||||
|
%dir %{_sysconfdir}/selinux/%1/policy/ \
|
||||||
|
%ghost %{_sysconfdir}/selinux/%1/policy/policy.%{POLICYVER} \
|
||||||
|
%dir %{_sysconfdir}/selinux/%1/contexts \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/customizable_types \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/dbus_contexts \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/default_contexts \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/default_type \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/failsafe_context \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/initrc_context \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/removable_context \
|
||||||
|
%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/userhelper_context \
|
||||||
|
%dir %{_sysconfdir}/selinux/%1/contexts/files \
|
||||||
|
%ghost %config %{_sysconfdir}/selinux/%1/contexts/files/file_contexts \
|
||||||
|
%ghost %config %{_sysconfdir}/selinux/%1/contexts/files/homedir_template \
|
||||||
|
%ghost %config %{_sysconfdir}/selinux/%1/contexts/files/file_contexts.homedirs \
|
||||||
|
%config %{_sysconfdir}/selinux/%1/contexts/files/media
|
||||||
|
|
||||||
|
%define saveFileContext() \
|
||||||
|
. %{_sysconfdir}/selinux/config; \
|
||||||
|
FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \
|
||||||
|
if [ "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT} ]; then \
|
||||||
|
cp -f ${FILE_CONTEXT} ${FILE_CONTEXT}.pre; \
|
||||||
|
fi
|
||||||
|
|
||||||
|
%define rebuildpolicy() \
|
||||||
|
semodule -b /usr/share/selinux/%1/base.pp -s %1 \
|
||||||
|
for file in $(ls /usr/share/selinux/%1 | grep -v base.pp) \
|
||||||
|
do \
|
||||||
|
semodule -i /usr/share/selinux/%1/$file -s %1;\
|
||||||
|
done;
|
||||||
|
|
||||||
|
%define relabel() \
|
||||||
|
. %{_sysconfdir}/selinux/config; \
|
||||||
|
FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \
|
||||||
|
if [ "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT}.pre ]; then \
|
||||||
|
fixfiles -C ${FILE_CONTEXT}.pre restore; \
|
||||||
|
rm -f ${FILE_CONTEXT}.pre; \
|
||||||
|
fi;
|
||||||
|
|
||||||
|
%description
|
||||||
|
SELinux Reference Policy - modular.
|
||||||
|
|
||||||
|
%prep
|
||||||
|
%setup -q -n serefpolicy-%{version}
|
||||||
|
%patch -p1
|
||||||
|
|
||||||
|
%build
|
||||||
|
make conf
|
||||||
|
|
||||||
|
%install
|
||||||
|
%{__rm} -fR $RPM_BUILD_ROOT
|
||||||
|
%installCmds %{polname1} %{type1}
|
||||||
|
|
||||||
|
# Commented out because only targeted ref policy currently builds
|
||||||
|
%installCmds %{polname2} %{type2}
|
||||||
|
|
||||||
|
%clean
|
||||||
|
%{__rm} -fR $RPM_BUILD_ROOT
|
||||||
|
|
||||||
|
%package %{polname1}
|
||||||
|
Summary: SELinux %{polname1} base policy
|
||||||
|
Group: System Environment/Base
|
||||||
|
Provides: selinux-policy-base
|
||||||
|
Obsoletes: selinux-policy-%{polname1}-sources
|
||||||
|
|
||||||
|
%description %{polname1}
|
||||||
|
SELinux Reference policy targeted base module.
|
||||||
|
|
||||||
|
%files %{polname1}
|
||||||
|
%fileList %{polname1}
|
||||||
|
|
||||||
|
%pre %{polname1}
|
||||||
|
%saveFileContext %{polname1}
|
||||||
|
|
||||||
|
%post %{polname1}
|
||||||
|
if [ ! -s /etc/selinux/config ]; then
|
||||||
|
#
|
||||||
|
# New install so we will default to targeted policy
|
||||||
|
#
|
||||||
|
echo "
|
||||||
|
# This file controls the state of SELinux on the system.
|
||||||
|
# SELINUX= can take one of these three values:
|
||||||
|
# enforcing - SELinux security policy is enforced.
|
||||||
|
# permissive - SELinux prints warnings instead of enforcing.
|
||||||
|
# disabled - No SELinux policy is loaded.
|
||||||
|
SELINUX=enforcing
|
||||||
|
# SELINUXTYPE= can take one of these two values:
|
||||||
|
# targeted - Only targeted network daemons are protected.
|
||||||
|
# strict - Full SELinux protection.
|
||||||
|
SELINUXTYPE=targeted
|
||||||
|
# SETLOCALDEFS= Check local definition changes
|
||||||
|
SETLOCALDEFS=0
|
||||||
|
|
||||||
|
" > /etc/selinux/config
|
||||||
|
|
||||||
|
ln -sf /etc/selinux/config /etc/sysconfig/selinux
|
||||||
|
restorecon /etc/selinux/config 2> /dev/null
|
||||||
|
else
|
||||||
|
# if first time update booleans.local needs to be copied to sandbox
|
||||||
|
[ -f /etc/selinux/%{polname1}/booleans.local ] && mv /etc/selinux/%{polname1}/booleans.local /etc/selinux/%{polname1}/modules/active/
|
||||||
|
[ -f /etc/selinux/%{polname1}/seusers ] && cp -f /etc/selinux/%{polname1}/seusers /etc/selinux/%{polname1}/modules/active/seusers
|
||||||
|
grep -q "^SETLOCALDEFS" /etc/selinux/config || echo -n "
|
||||||
|
# SETLOCALDEFS= Check local definition changes
|
||||||
|
SETLOCALDEFS=0
|
||||||
|
">> /etc/selinux/config
|
||||||
|
fi
|
||||||
|
%rebuildpolicy %{polname1}
|
||||||
|
%relabel %{polname1}
|
||||||
|
|
||||||
|
%triggerpostun %{polname1} -- selinux-policy-%{polname1} <= 2.0.0
|
||||||
|
%rebuildpolicy %{polname1}
|
||||||
|
|
||||||
|
%package %{polname2}
|
||||||
|
Summary: SELinux %{polname2} base policy
|
||||||
|
Group: System Environment/Base
|
||||||
|
Provides: selinux-policy-base
|
||||||
|
Obsoletes: selinux-policy-%{polname1}-sources
|
||||||
|
|
||||||
|
%description %{polname2}
|
||||||
|
SELinux Reference policy %{polname2} base module.
|
||||||
|
|
||||||
|
%pre %{polname2}
|
||||||
|
%saveFileContext %{polname2}
|
||||||
|
|
||||||
|
%post %{polname2}
|
||||||
|
%rebuildpolicy %{polname2}
|
||||||
|
%relabel %{polname1}
|
||||||
|
|
||||||
|
%triggerpostun %{polname2} -- %{polname2} <= 2.0.0
|
||||||
|
%{rebuildpolicy} %{polname2}
|
||||||
|
|
||||||
|
%files %{polname2}
|
||||||
|
#%#fileList %{polname2}
|
||||||
|
|
||||||
|
%changelog
|
||||||
|
* Wed Nov 9 2003 Dan Walsh <dwalsh@redhat.com> 2.0.0-5
|
||||||
|
- Initial version
|
19
setrans.conf
Normal file
19
setrans.conf
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
#
|
||||||
|
# Multi-Category Security translation table for SELinux
|
||||||
|
#
|
||||||
|
# Uncomment the following to disable translation libary
|
||||||
|
# disable=1
|
||||||
|
#
|
||||||
|
# Objects can be categorized with 0-256 categories defined by the admin.
|
||||||
|
# Objects can be in more than one category at a time.
|
||||||
|
# Categories are stored in the system as c0-c255. Users can use this
|
||||||
|
# table to translate the categories into a more meaningful output.
|
||||||
|
# Examples:
|
||||||
|
# s0:c0=CompanyConfidential
|
||||||
|
# s0:c1=PatientRecord
|
||||||
|
# s0:c2=Unclassified
|
||||||
|
# s0:c3=TopSecret
|
||||||
|
# s0:c1,c3=CompanyConfidentialRedHat
|
||||||
|
s0=
|
||||||
|
s0-s0:c0.c255=SystemLow-SystemHigh
|
||||||
|
s0:c0.c255=SystemHigh
|
Loading…
Reference in New Issue
Block a user