Merge branch 'master' of ssh://pkgs.fedoraproject.org/selinux-policy
This commit is contained in:
commit
3397003331
@ -2457,3 +2457,17 @@ ipa = module
|
|||||||
# mirrormanager policy
|
# mirrormanager policy
|
||||||
#
|
#
|
||||||
mirrormanager = module
|
mirrormanager = module
|
||||||
|
|
||||||
|
# Layer: contrib
|
||||||
|
# Module: snapper
|
||||||
|
#
|
||||||
|
# snapper policy
|
||||||
|
#
|
||||||
|
snapper = module
|
||||||
|
|
||||||
|
# Layer: contrib
|
||||||
|
# Module: pcp
|
||||||
|
#
|
||||||
|
# pcp policy
|
||||||
|
#
|
||||||
|
pcp = module
|
||||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.13.1
|
Version: 3.13.1
|
||||||
Release: 13%{?dist}
|
Release: 15%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -117,6 +117,7 @@ SELinux policy development and man page package
|
|||||||
%{_usr}/share/selinux/devel/include/*
|
%{_usr}/share/selinux/devel/include/*
|
||||||
%dir %{_usr}/share/selinux/devel/html
|
%dir %{_usr}/share/selinux/devel/html
|
||||||
%{_usr}/share/selinux/devel/html/*html
|
%{_usr}/share/selinux/devel/html/*html
|
||||||
|
%{_usr}/share/selinux/devel/html/*css
|
||||||
%{_usr}/share/selinux/devel/Makefile
|
%{_usr}/share/selinux/devel/Makefile
|
||||||
%{_usr}/share/selinux/devel/example.*
|
%{_usr}/share/selinux/devel/example.*
|
||||||
%{_usr}/share/selinux/devel/policy.*
|
%{_usr}/share/selinux/devel/policy.*
|
||||||
@ -388,6 +389,8 @@ chmod +x %{buildroot}%{_usr}/share/selinux/devel/policyhelp
|
|||||||
mkdir %{buildroot}%{_usr}/share/selinux/devel/html
|
mkdir %{buildroot}%{_usr}/share/selinux/devel/html
|
||||||
htmldir=`compgen -d %{buildroot}%{_usr}/share/man/man8/`
|
htmldir=`compgen -d %{buildroot}%{_usr}/share/man/man8/`
|
||||||
mv ${htmldir}/* %{buildroot}%{_usr}/share/selinux/devel/html
|
mv ${htmldir}/* %{buildroot}%{_usr}/share/selinux/devel/html
|
||||||
|
mv %{buildroot}%{_usr}/share/man/man8/index.html %{buildroot}%{_usr}/share/selinux/devel/html
|
||||||
|
mv %{buildroot}%{_usr}/share/man/man8/style.css %{buildroot}%{_usr}/share/selinux/devel/html
|
||||||
rm -rf ${htmldir}
|
rm -rf ${htmldir}
|
||||||
|
|
||||||
mkdir -p %{buildroot}%{_rpmconfigdir}/macros.d
|
mkdir -p %{buildroot}%{_rpmconfigdir}/macros.d
|
||||||
@ -576,6 +579,86 @@ SELinux Reference policy mls base module.
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jan 20 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-15
|
||||||
|
- Add cron unconfined role support for uncofined SELinux user
|
||||||
|
- Call kernel_rw_usermodehelper_state() in init.te
|
||||||
|
- Call corenet_udp_bind_all_ports() in milter.te
|
||||||
|
- Allow fence_virtd to connect to zented port
|
||||||
|
- Fix header for mirrormanager_admin()
|
||||||
|
- Allow dkim-milter to bind udp ports
|
||||||
|
- Allow milter domains to send signull itself
|
||||||
|
- Allow block_suspend for yum running as mock_t
|
||||||
|
- Allow beam.smp to manage couchdb files
|
||||||
|
- Add couchdb_manage_files()
|
||||||
|
- Add labeling for /var/log/php_errors.log
|
||||||
|
- Allow bumblebee to stream connect to xserver
|
||||||
|
- Allow bumblebee to send a signal to xserver
|
||||||
|
- gnome-thumbnail to stream connect to bumblebee
|
||||||
|
- Fix calling usermodehelper to use _state in interface name
|
||||||
|
- Allow xkbcomp running as bumblebee_t to execute bin_t
|
||||||
|
- Allow logrotate to read squid.conf
|
||||||
|
- Additional rules to get docker and lxc to play well with SELinux
|
||||||
|
- Call kernel_read_usermodhelper/kernel_rw_usermodhelper
|
||||||
|
- Make rpm_transition_script accept a role
|
||||||
|
- Added new policy for pcp
|
||||||
|
- Allow bumbleed to connect to xserver port
|
||||||
|
- Allow pegasus_openlmi_storage_t to read hwdata
|
||||||
|
|
||||||
|
* Fri Jan 17 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-14
|
||||||
|
- Make rpm_transition_script accept a role
|
||||||
|
- Clean up pcp.te
|
||||||
|
- Added new policy for pcp
|
||||||
|
- Allow bumbleed to connect to xserver port
|
||||||
|
- Added support for named-sdb in bind policy
|
||||||
|
- Allow NetworkManager to signal and sigkill init scripts
|
||||||
|
- Allow pegasus_openlmi_storage_t to read hwdata
|
||||||
|
- Fix rhcs_rw_cluster_tmpfs()
|
||||||
|
- Allow fenced_t to bind on zented udp port
|
||||||
|
- Fix mirrormanager_read_lib_files()
|
||||||
|
- Allow mirromanager scripts running as httpd_t to manage mirrormanager pid files
|
||||||
|
- Dontaudit read/write to init stream socket for lsmd_plugin_t
|
||||||
|
- Allow automount to read nfs link files
|
||||||
|
- Allow lsm plugins to read/write lsmd stream socket
|
||||||
|
- Allow svirt_lxc domains to umount dockersocket filesytem
|
||||||
|
- Allow gnome keyring domains to create gnome config dirs
|
||||||
|
- Allow rpm scritplets to create /run/gather with correct labeling
|
||||||
|
- Add sblim_filetrans_named_content() interface
|
||||||
|
- Allow ctdb to create sock files in /var/run/ctdb
|
||||||
|
- Add also labeling for /var/run/ctdb
|
||||||
|
- Add missing labeling for /var/lib/ctdb
|
||||||
|
- ALlow tuned to manage syslog.conf. Should be fixed in tuned. #1030446
|
||||||
|
- Dontaudit hypervkvp to search homedirs
|
||||||
|
- Dontaudit hypervkvp to search admin homedirs
|
||||||
|
- Allow hypervkvp to execute bin_t and ifconfig in the caller domain
|
||||||
|
- Dontaudit xguest_t to read ABRT conf files
|
||||||
|
- Add abrt_dontaudit_read_config()
|
||||||
|
- Allow namespace-init to getattr on fs
|
||||||
|
- Add thumb_role() also for xguest
|
||||||
|
- Add filename transitions to create .spamassassin with correct labeling
|
||||||
|
- Allow apache domain to read mirrormanager pid files
|
||||||
|
- Allow domains to read/write shm and sem owned by mozilla_plugin_t
|
||||||
|
- Allow alsactl to send a generic signal to kernel_t
|
||||||
|
- Allow plymouthd to read run/udev/queue.bin
|
||||||
|
- Allow sys_chroot for NM required by iodine service
|
||||||
|
- Change glusterd to allow mounton all non security
|
||||||
|
- Labeled ~/.nv/GLCache as being gstreamer output
|
||||||
|
- Restrict the ability to set usermodehelpers and proc security settings.
|
||||||
|
- Limit the ability to write to the files that configure kernel i
|
||||||
|
- usermodehelpers and security-sensitive proc settings to the init domain. i
|
||||||
|
- Permissive domains can also continue to set these values.
|
||||||
|
- The current list is not exhaustive, just an initial set.
|
||||||
|
- Not all of these files will exist on all kernels/devices.
|
||||||
|
- Controlling access to certain kernel usermodehelpers, e.g. cgroup
|
||||||
|
- release_agent, will require kernel changes to support and cannot be
|
||||||
|
- addressed here.
|
||||||
|
- Ideas come from Stephen Smalley and seandroid
|
||||||
|
- Make rpm_transition_script accept a role
|
||||||
|
- Make rpm_transition_script accept a role
|
||||||
|
- Allow NetworkManager to signal and sigkill init scripts
|
||||||
|
- Allow init_t to work on transitient and snapshot unit files
|
||||||
|
- Add logging_manage_syslog_config()
|
||||||
|
- Update sysnet_dns_name_resolve() to allow connect to dnssec port
|
||||||
|
|
||||||
* Mon Jan 13 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-13
|
* Mon Jan 13 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-13
|
||||||
- Remove file_t from the system and realias it with unlabeled_t
|
- Remove file_t from the system and realias it with unlabeled_t
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user