+- Use fs_use_xattr for squashf
+- Fix procs_type interface +- Dovecot has a new fifo_file /var/run/dovecot/stats-mail +- Dovecot has a new fifo_file /var/run/stats-mail +- Colord does not need to connect to network +- Allow system_cronjob to dbus chat with NetworkManager +- Puppet manages content, want to make sure it labels everything correctly
This commit is contained in:
parent
e5768e0fb6
commit
4fe804b367
268
policy-F16.patch
268
policy-F16.patch
@ -18475,7 +18475,7 @@ index ff006ea..b682bcf 100644
|
|||||||
+ dontaudit $1 file_type:dir_file_class_set write;
|
+ dontaudit $1 file_type:dir_file_class_set write;
|
||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/kernel/files.te b/policy/modules/kernel/files.te
|
diff --git a/policy/modules/kernel/files.te b/policy/modules/kernel/files.te
|
||||||
index 22821ff..4e8d594 100644
|
index 22821ff..4486d80 100644
|
||||||
--- a/policy/modules/kernel/files.te
|
--- a/policy/modules/kernel/files.te
|
||||||
+++ b/policy/modules/kernel/files.te
|
+++ b/policy/modules/kernel/files.te
|
||||||
@@ -10,7 +10,9 @@ attribute files_unconfined_type;
|
@@ -10,7 +10,9 @@ attribute files_unconfined_type;
|
||||||
@ -18515,7 +18515,7 @@ index 22821ff..4e8d594 100644
|
|||||||
#
|
#
|
||||||
type system_map_t;
|
type system_map_t;
|
||||||
files_type(system_map_t)
|
files_type(system_map_t)
|
||||||
+procs_type(system_map_t)
|
+kernel_proc_type(system_map_t)
|
||||||
genfscon proc /kallsyms gen_context(system_u:object_r:system_map_t,s0)
|
genfscon proc /kallsyms gen_context(system_u:object_r:system_map_t,s0)
|
||||||
|
|
||||||
#
|
#
|
||||||
@ -19114,10 +19114,18 @@ index 97fcdac..6342520 100644
|
|||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
diff --git a/policy/modules/kernel/filesystem.te b/policy/modules/kernel/filesystem.te
|
diff --git a/policy/modules/kernel/filesystem.te b/policy/modules/kernel/filesystem.te
|
||||||
index f125dc2..3c6e827 100644
|
index f125dc2..f5e522e 100644
|
||||||
--- a/policy/modules/kernel/filesystem.te
|
--- a/policy/modules/kernel/filesystem.te
|
||||||
+++ b/policy/modules/kernel/filesystem.te
|
+++ b/policy/modules/kernel/filesystem.te
|
||||||
@@ -52,6 +52,7 @@ type anon_inodefs_t;
|
@@ -33,6 +33,7 @@ fs_use_xattr jffs2 gen_context(system_u:object_r:fs_t,s0);
|
||||||
|
fs_use_xattr jfs gen_context(system_u:object_r:fs_t,s0);
|
||||||
|
fs_use_xattr lustre gen_context(system_u:object_r:fs_t,s0);
|
||||||
|
fs_use_xattr xfs gen_context(system_u:object_r:fs_t,s0);
|
||||||
|
+fs_use_xattr squashfs gen_context(system_u:object_r:fs_t,s0);
|
||||||
|
|
||||||
|
# Use the allocating task SID to label inodes in the following filesystem
|
||||||
|
# types, and label the filesystem itself with the specified context.
|
||||||
|
@@ -52,6 +53,7 @@ type anon_inodefs_t;
|
||||||
fs_type(anon_inodefs_t)
|
fs_type(anon_inodefs_t)
|
||||||
files_mountpoint(anon_inodefs_t)
|
files_mountpoint(anon_inodefs_t)
|
||||||
genfscon anon_inodefs / gen_context(system_u:object_r:anon_inodefs_t,s0)
|
genfscon anon_inodefs / gen_context(system_u:object_r:anon_inodefs_t,s0)
|
||||||
@ -19125,7 +19133,7 @@ index f125dc2..3c6e827 100644
|
|||||||
|
|
||||||
type bdev_t;
|
type bdev_t;
|
||||||
fs_type(bdev_t)
|
fs_type(bdev_t)
|
||||||
@@ -67,7 +68,7 @@ fs_type(capifs_t)
|
@@ -67,7 +69,7 @@ fs_type(capifs_t)
|
||||||
files_mountpoint(capifs_t)
|
files_mountpoint(capifs_t)
|
||||||
genfscon capifs / gen_context(system_u:object_r:capifs_t,s0)
|
genfscon capifs / gen_context(system_u:object_r:capifs_t,s0)
|
||||||
|
|
||||||
@ -19134,7 +19142,7 @@ index f125dc2..3c6e827 100644
|
|||||||
fs_type(cgroup_t)
|
fs_type(cgroup_t)
|
||||||
files_type(cgroup_t)
|
files_type(cgroup_t)
|
||||||
files_mountpoint(cgroup_t)
|
files_mountpoint(cgroup_t)
|
||||||
@@ -96,6 +97,7 @@ type hugetlbfs_t;
|
@@ -96,6 +98,7 @@ type hugetlbfs_t;
|
||||||
fs_type(hugetlbfs_t)
|
fs_type(hugetlbfs_t)
|
||||||
files_mountpoint(hugetlbfs_t)
|
files_mountpoint(hugetlbfs_t)
|
||||||
fs_use_trans hugetlbfs gen_context(system_u:object_r:hugetlbfs_t,s0);
|
fs_use_trans hugetlbfs gen_context(system_u:object_r:hugetlbfs_t,s0);
|
||||||
@ -19142,7 +19150,19 @@ index f125dc2..3c6e827 100644
|
|||||||
|
|
||||||
type ibmasmfs_t;
|
type ibmasmfs_t;
|
||||||
fs_type(ibmasmfs_t)
|
fs_type(ibmasmfs_t)
|
||||||
@@ -175,6 +177,7 @@ fs_type(tmpfs_t)
|
@@ -144,11 +147,6 @@ fs_type(spufs_t)
|
||||||
|
genfscon spufs / gen_context(system_u:object_r:spufs_t,s0)
|
||||||
|
files_mountpoint(spufs_t)
|
||||||
|
|
||||||
|
-type squash_t;
|
||||||
|
-fs_type(squash_t)
|
||||||
|
-genfscon squash / gen_context(system_u:object_r:squash_t,s0)
|
||||||
|
-files_mountpoint(squash_t)
|
||||||
|
-
|
||||||
|
type sysv_t;
|
||||||
|
fs_noxattr_type(sysv_t)
|
||||||
|
files_mountpoint(sysv_t)
|
||||||
|
@@ -175,6 +173,7 @@ fs_type(tmpfs_t)
|
||||||
files_type(tmpfs_t)
|
files_type(tmpfs_t)
|
||||||
files_mountpoint(tmpfs_t)
|
files_mountpoint(tmpfs_t)
|
||||||
files_poly_parent(tmpfs_t)
|
files_poly_parent(tmpfs_t)
|
||||||
@ -19150,7 +19170,7 @@ index f125dc2..3c6e827 100644
|
|||||||
|
|
||||||
# Use a transition SID based on the allocating task SID and the
|
# Use a transition SID based on the allocating task SID and the
|
||||||
# filesystem SID to label inodes in the following filesystem types,
|
# filesystem SID to label inodes in the following filesystem types,
|
||||||
@@ -254,6 +257,8 @@ genfscon udf / gen_context(system_u:object_r:iso9660_t,s0)
|
@@ -254,6 +253,8 @@ genfscon udf / gen_context(system_u:object_r:iso9660_t,s0)
|
||||||
type removable_t;
|
type removable_t;
|
||||||
allow removable_t noxattrfs:filesystem associate;
|
allow removable_t noxattrfs:filesystem associate;
|
||||||
fs_noxattr_type(removable_t)
|
fs_noxattr_type(removable_t)
|
||||||
@ -19159,7 +19179,7 @@ index f125dc2..3c6e827 100644
|
|||||||
files_mountpoint(removable_t)
|
files_mountpoint(removable_t)
|
||||||
|
|
||||||
#
|
#
|
||||||
@@ -273,6 +278,7 @@ genfscon ncpfs / gen_context(system_u:object_r:nfs_t,s0)
|
@@ -273,6 +274,7 @@ genfscon ncpfs / gen_context(system_u:object_r:nfs_t,s0)
|
||||||
genfscon reiserfs / gen_context(system_u:object_r:nfs_t,s0)
|
genfscon reiserfs / gen_context(system_u:object_r:nfs_t,s0)
|
||||||
genfscon panfs / gen_context(system_u:object_r:nfs_t,s0)
|
genfscon panfs / gen_context(system_u:object_r:nfs_t,s0)
|
||||||
genfscon gadgetfs / gen_context(system_u:object_r:nfs_t,s0)
|
genfscon gadgetfs / gen_context(system_u:object_r:nfs_t,s0)
|
||||||
@ -19168,7 +19188,7 @@ index f125dc2..3c6e827 100644
|
|||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
|
diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
|
||||||
index 6346378..4845190 100644
|
index 6346378..34c6897 100644
|
||||||
--- a/policy/modules/kernel/kernel.if
|
--- a/policy/modules/kernel/kernel.if
|
||||||
+++ b/policy/modules/kernel/kernel.if
|
+++ b/policy/modules/kernel/kernel.if
|
||||||
@@ -345,13 +345,8 @@ interface(`kernel_load_module',`
|
@@ -345,13 +345,8 @@ interface(`kernel_load_module',`
|
||||||
@ -19383,9 +19403,9 @@ index 6346378..4845190 100644
|
|||||||
+## </summary>
|
+## </summary>
|
||||||
+## </param>
|
+## </param>
|
||||||
+#
|
+#
|
||||||
+interface(`procs_type',`
|
+interface(`kernel_proc_type',`
|
||||||
+ gen_require(`
|
+ gen_require(`
|
||||||
+ attribute proc_type
|
+ attribute proc_type;
|
||||||
+ ')
|
+ ')
|
||||||
+
|
+
|
||||||
+ typeattribute $1 proc_type;
|
+ typeattribute $1 proc_type;
|
||||||
@ -31285,24 +31305,10 @@ index 0000000..ca71d08
|
|||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
diff --git a/policy/modules/services/colord.te b/policy/modules/services/colord.te
|
diff --git a/policy/modules/services/colord.te b/policy/modules/services/colord.te
|
||||||
index 74505cc..2f9b1bc 100644
|
index 74505cc..be3683b 100644
|
||||||
--- a/policy/modules/services/colord.te
|
--- a/policy/modules/services/colord.te
|
||||||
+++ b/policy/modules/services/colord.te
|
+++ b/policy/modules/services/colord.te
|
||||||
@@ -5,6 +5,13 @@ policy_module(colord, 1.0.0)
|
@@ -23,9 +23,11 @@ files_type(colord_var_lib_t)
|
||||||
# Declarations
|
|
||||||
#
|
|
||||||
|
|
||||||
+## <desc>
|
|
||||||
+## <p>
|
|
||||||
+## Allow colord domain to connect to the network using TCP.
|
|
||||||
+## </p>
|
|
||||||
+## </desc>
|
|
||||||
+gen_tunable(colord_can_network_connect, false)
|
|
||||||
+
|
|
||||||
type colord_t;
|
|
||||||
type colord_exec_t;
|
|
||||||
dbus_system_domain(colord_t, colord_exec_t)
|
|
||||||
@@ -23,9 +30,11 @@ files_type(colord_var_lib_t)
|
|
||||||
# colord local policy
|
# colord local policy
|
||||||
#
|
#
|
||||||
allow colord_t self:capability { dac_read_search dac_override };
|
allow colord_t self:capability { dac_read_search dac_override };
|
||||||
@ -31314,7 +31320,7 @@ index 74505cc..2f9b1bc 100644
|
|||||||
allow colord_t self:udp_socket create_socket_perms;
|
allow colord_t self:udp_socket create_socket_perms;
|
||||||
allow colord_t self:unix_dgram_socket create_socket_perms;
|
allow colord_t self:unix_dgram_socket create_socket_perms;
|
||||||
|
|
||||||
@@ -41,8 +50,14 @@ manage_dirs_pattern(colord_t, colord_var_lib_t, colord_var_lib_t)
|
@@ -41,8 +43,14 @@ manage_dirs_pattern(colord_t, colord_var_lib_t, colord_var_lib_t)
|
||||||
manage_files_pattern(colord_t, colord_var_lib_t, colord_var_lib_t)
|
manage_files_pattern(colord_t, colord_var_lib_t, colord_var_lib_t)
|
||||||
files_var_lib_filetrans(colord_t, colord_var_lib_t, { file dir })
|
files_var_lib_filetrans(colord_t, colord_var_lib_t, { file dir })
|
||||||
|
|
||||||
@ -31330,7 +31336,7 @@ index 74505cc..2f9b1bc 100644
|
|||||||
|
|
||||||
corenet_all_recvfrom_unlabeled(colord_t)
|
corenet_all_recvfrom_unlabeled(colord_t)
|
||||||
corenet_all_recvfrom_netlabel(colord_t)
|
corenet_all_recvfrom_netlabel(colord_t)
|
||||||
@@ -50,6 +65,8 @@ corenet_udp_bind_generic_node(colord_t)
|
@@ -50,6 +58,8 @@ corenet_udp_bind_generic_node(colord_t)
|
||||||
corenet_udp_bind_ipp_port(colord_t)
|
corenet_udp_bind_ipp_port(colord_t)
|
||||||
corenet_tcp_connect_ipp_port(colord_t)
|
corenet_tcp_connect_ipp_port(colord_t)
|
||||||
|
|
||||||
@ -31339,7 +31345,7 @@ index 74505cc..2f9b1bc 100644
|
|||||||
dev_read_video_dev(colord_t)
|
dev_read_video_dev(colord_t)
|
||||||
dev_write_video_dev(colord_t)
|
dev_write_video_dev(colord_t)
|
||||||
dev_rw_printer(colord_t)
|
dev_rw_printer(colord_t)
|
||||||
@@ -65,19 +82,37 @@ files_list_mnt(colord_t)
|
@@ -65,19 +75,33 @@ files_list_mnt(colord_t)
|
||||||
files_read_etc_files(colord_t)
|
files_read_etc_files(colord_t)
|
||||||
files_read_usr_files(colord_t)
|
files_read_usr_files(colord_t)
|
||||||
|
|
||||||
@ -31363,10 +31369,6 @@ index 74505cc..2f9b1bc 100644
|
|||||||
+userdom_rw_user_tmpfs_files(colord_t)
|
+userdom_rw_user_tmpfs_files(colord_t)
|
||||||
+
|
+
|
||||||
+userdom_home_reader(colord_t)
|
+userdom_home_reader(colord_t)
|
||||||
+
|
|
||||||
+tunable_policy(`colord_can_network_connect',`
|
|
||||||
+ corenet_tcp_connect_all_ports(colord_t)
|
|
||||||
+')
|
|
||||||
|
|
||||||
tunable_policy(`use_nfs_home_dirs',`
|
tunable_policy(`use_nfs_home_dirs',`
|
||||||
+ fs_getattr_nfs(colord_t)
|
+ fs_getattr_nfs(colord_t)
|
||||||
@ -31378,7 +31380,7 @@ index 74505cc..2f9b1bc 100644
|
|||||||
fs_read_cifs_files(colord_t)
|
fs_read_cifs_files(colord_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -89,6 +124,12 @@ optional_policy(`
|
@@ -89,6 +113,12 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -31391,7 +31393,7 @@ index 74505cc..2f9b1bc 100644
|
|||||||
policykit_dbus_chat(colord_t)
|
policykit_dbus_chat(colord_t)
|
||||||
policykit_domtrans_auth(colord_t)
|
policykit_domtrans_auth(colord_t)
|
||||||
policykit_read_lib(colord_t)
|
policykit_read_lib(colord_t)
|
||||||
@@ -96,5 +137,16 @@ optional_policy(`
|
@@ -96,5 +126,16 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -32485,7 +32487,7 @@ index 35241ed..7a0913c 100644
|
|||||||
+ manage_files_pattern($1, system_cronjob_var_lib_t, system_cronjob_var_lib_t)
|
+ manage_files_pattern($1, system_cronjob_var_lib_t, system_cronjob_var_lib_t)
|
||||||
')
|
')
|
||||||
diff --git a/policy/modules/services/cron.te b/policy/modules/services/cron.te
|
diff --git a/policy/modules/services/cron.te b/policy/modules/services/cron.te
|
||||||
index f7583ab..230cbb2 100644
|
index f7583ab..a4d25d9 100644
|
||||||
--- a/policy/modules/services/cron.te
|
--- a/policy/modules/services/cron.te
|
||||||
+++ b/policy/modules/services/cron.te
|
+++ b/policy/modules/services/cron.te
|
||||||
@@ -10,18 +10,18 @@ gen_require(`
|
@@ -10,18 +10,18 @@ gen_require(`
|
||||||
@ -32878,7 +32880,18 @@ index f7583ab..230cbb2 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -480,7 +582,7 @@ optional_policy(`
|
@@ -472,6 +574,10 @@ optional_policy(`
|
||||||
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
+ networkmanager_dbus_chat(system_cronjob_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
postfix_read_config(system_cronjob_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
@@ -480,7 +586,7 @@ optional_policy(`
|
||||||
prelink_manage_lib(system_cronjob_t)
|
prelink_manage_lib(system_cronjob_t)
|
||||||
prelink_manage_log(system_cronjob_t)
|
prelink_manage_log(system_cronjob_t)
|
||||||
prelink_read_cache(system_cronjob_t)
|
prelink_read_cache(system_cronjob_t)
|
||||||
@ -32887,7 +32900,7 @@ index f7583ab..230cbb2 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -495,6 +597,7 @@ optional_policy(`
|
@@ -495,6 +601,7 @@ optional_policy(`
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
spamassassin_manage_lib_files(system_cronjob_t)
|
spamassassin_manage_lib_files(system_cronjob_t)
|
||||||
@ -32895,7 +32908,7 @@ index f7583ab..230cbb2 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -502,7 +605,13 @@ optional_policy(`
|
@@ -502,7 +609,13 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -32909,7 +32922,7 @@ index f7583ab..230cbb2 100644
|
|||||||
userdom_user_home_dir_filetrans_user_home_content(system_cronjob_t, { dir file lnk_file fifo_file sock_file })
|
userdom_user_home_dir_filetrans_user_home_content(system_cronjob_t, { dir file lnk_file fifo_file sock_file })
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -595,9 +704,12 @@ userdom_manage_user_home_content_sockets(cronjob_t)
|
@@ -595,9 +708,12 @@ userdom_manage_user_home_content_sockets(cronjob_t)
|
||||||
#userdom_user_home_dir_filetrans_user_home_content(cronjob_t, notdevfile_class_set)
|
#userdom_user_home_dir_filetrans_user_home_content(cronjob_t, notdevfile_class_set)
|
||||||
|
|
||||||
list_dirs_pattern(crond_t, user_cron_spool_t, user_cron_spool_t)
|
list_dirs_pattern(crond_t, user_cron_spool_t, user_cron_spool_t)
|
||||||
@ -36655,7 +36668,7 @@ index e1d7dc5..0557be0 100644
|
|||||||
admin_pattern($1, dovecot_var_run_t)
|
admin_pattern($1, dovecot_var_run_t)
|
||||||
|
|
||||||
diff --git a/policy/modules/services/dovecot.te b/policy/modules/services/dovecot.te
|
diff --git a/policy/modules/services/dovecot.te b/policy/modules/services/dovecot.te
|
||||||
index acf6d4f..194f170 100644
|
index acf6d4f..47969fe 100644
|
||||||
--- a/policy/modules/services/dovecot.te
|
--- a/policy/modules/services/dovecot.te
|
||||||
+++ b/policy/modules/services/dovecot.te
|
+++ b/policy/modules/services/dovecot.te
|
||||||
@@ -18,7 +18,7 @@ type dovecot_auth_tmp_t;
|
@@ -18,7 +18,7 @@ type dovecot_auth_tmp_t;
|
||||||
@ -36709,7 +36722,7 @@ index acf6d4f..194f170 100644
|
|||||||
files_search_etc(dovecot_t)
|
files_search_etc(dovecot_t)
|
||||||
|
|
||||||
can_exec(dovecot_t, dovecot_exec_t)
|
can_exec(dovecot_t, dovecot_exec_t)
|
||||||
@@ -94,10 +99,11 @@ manage_dirs_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
@@ -94,10 +99,12 @@ manage_dirs_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
||||||
manage_files_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
manage_files_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
||||||
manage_lnk_files_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
manage_lnk_files_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
||||||
|
|
||||||
@ -36718,11 +36731,12 @@ index acf6d4f..194f170 100644
|
|||||||
manage_lnk_files_pattern(dovecot_t, dovecot_var_run_t, dovecot_var_run_t)
|
manage_lnk_files_pattern(dovecot_t, dovecot_var_run_t, dovecot_var_run_t)
|
||||||
manage_sock_files_pattern(dovecot_t, dovecot_var_run_t, dovecot_var_run_t)
|
manage_sock_files_pattern(dovecot_t, dovecot_var_run_t, dovecot_var_run_t)
|
||||||
-files_pid_filetrans(dovecot_t, dovecot_var_run_t, file)
|
-files_pid_filetrans(dovecot_t, dovecot_var_run_t, file)
|
||||||
+files_pid_filetrans(dovecot_t, dovecot_var_run_t, { dir file })
|
+manage_fifo_files_pattern(dovecot_t, dovecot_var_run_t, dovecot_var_run_t)
|
||||||
|
+files_pid_filetrans(dovecot_t, dovecot_var_run_t, { dir file fifo_file })
|
||||||
|
|
||||||
kernel_read_kernel_sysctls(dovecot_t)
|
kernel_read_kernel_sysctls(dovecot_t)
|
||||||
kernel_read_system_state(dovecot_t)
|
kernel_read_system_state(dovecot_t)
|
||||||
@@ -110,6 +116,7 @@ corenet_tcp_sendrecv_all_ports(dovecot_t)
|
@@ -110,6 +117,7 @@ corenet_tcp_sendrecv_all_ports(dovecot_t)
|
||||||
corenet_tcp_bind_generic_node(dovecot_t)
|
corenet_tcp_bind_generic_node(dovecot_t)
|
||||||
corenet_tcp_bind_mail_port(dovecot_t)
|
corenet_tcp_bind_mail_port(dovecot_t)
|
||||||
corenet_tcp_bind_pop_port(dovecot_t)
|
corenet_tcp_bind_pop_port(dovecot_t)
|
||||||
@ -36730,7 +36744,7 @@ index acf6d4f..194f170 100644
|
|||||||
corenet_tcp_bind_sieve_port(dovecot_t)
|
corenet_tcp_bind_sieve_port(dovecot_t)
|
||||||
corenet_tcp_connect_all_ports(dovecot_t)
|
corenet_tcp_connect_all_ports(dovecot_t)
|
||||||
corenet_tcp_connect_postgresql_port(dovecot_t)
|
corenet_tcp_connect_postgresql_port(dovecot_t)
|
||||||
@@ -135,6 +142,7 @@ files_dontaudit_list_default(dovecot_t)
|
@@ -135,6 +143,7 @@ files_dontaudit_list_default(dovecot_t)
|
||||||
# Dovecot now has quota support and it uses getmntent() to find the mountpoints.
|
# Dovecot now has quota support and it uses getmntent() to find the mountpoints.
|
||||||
files_read_etc_runtime_files(dovecot_t)
|
files_read_etc_runtime_files(dovecot_t)
|
||||||
files_search_all_mountpoints(dovecot_t)
|
files_search_all_mountpoints(dovecot_t)
|
||||||
@ -36738,7 +36752,7 @@ index acf6d4f..194f170 100644
|
|||||||
|
|
||||||
init_getattr_utmp(dovecot_t)
|
init_getattr_utmp(dovecot_t)
|
||||||
|
|
||||||
@@ -145,6 +153,7 @@ logging_send_syslog_msg(dovecot_t)
|
@@ -145,6 +154,7 @@ logging_send_syslog_msg(dovecot_t)
|
||||||
miscfiles_read_generic_certs(dovecot_t)
|
miscfiles_read_generic_certs(dovecot_t)
|
||||||
miscfiles_read_localization(dovecot_t)
|
miscfiles_read_localization(dovecot_t)
|
||||||
|
|
||||||
@ -36746,7 +36760,7 @@ index acf6d4f..194f170 100644
|
|||||||
userdom_dontaudit_use_unpriv_user_fds(dovecot_t)
|
userdom_dontaudit_use_unpriv_user_fds(dovecot_t)
|
||||||
userdom_manage_user_home_content_dirs(dovecot_t)
|
userdom_manage_user_home_content_dirs(dovecot_t)
|
||||||
userdom_manage_user_home_content_files(dovecot_t)
|
userdom_manage_user_home_content_files(dovecot_t)
|
||||||
@@ -160,6 +169,15 @@ optional_policy(`
|
@@ -160,6 +170,15 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -36762,7 +36776,7 @@ index acf6d4f..194f170 100644
|
|||||||
postgresql_stream_connect(dovecot_t)
|
postgresql_stream_connect(dovecot_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -180,8 +198,8 @@ optional_policy(`
|
@@ -180,8 +199,8 @@ optional_policy(`
|
||||||
# dovecot auth local policy
|
# dovecot auth local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
@ -36773,7 +36787,7 @@ index acf6d4f..194f170 100644
|
|||||||
allow dovecot_auth_t self:fifo_file rw_fifo_file_perms;
|
allow dovecot_auth_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow dovecot_auth_t self:unix_dgram_socket create_socket_perms;
|
allow dovecot_auth_t self:unix_dgram_socket create_socket_perms;
|
||||||
allow dovecot_auth_t self:unix_stream_socket create_stream_socket_perms;
|
allow dovecot_auth_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
@@ -190,6 +208,9 @@ allow dovecot_auth_t dovecot_t:unix_stream_socket { connectto rw_stream_socket_p
|
@@ -190,6 +209,9 @@ allow dovecot_auth_t dovecot_t:unix_stream_socket { connectto rw_stream_socket_p
|
||||||
|
|
||||||
read_files_pattern(dovecot_auth_t, dovecot_passwd_t, dovecot_passwd_t)
|
read_files_pattern(dovecot_auth_t, dovecot_passwd_t, dovecot_passwd_t)
|
||||||
|
|
||||||
@ -36783,7 +36797,7 @@ index acf6d4f..194f170 100644
|
|||||||
manage_dirs_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
|
manage_dirs_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
|
||||||
manage_files_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
|
manage_files_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
|
||||||
files_tmp_filetrans(dovecot_auth_t, dovecot_auth_tmp_t, { file dir })
|
files_tmp_filetrans(dovecot_auth_t, dovecot_auth_tmp_t, { file dir })
|
||||||
@@ -201,9 +222,12 @@ dovecot_stream_connect_auth(dovecot_auth_t)
|
@@ -201,9 +223,12 @@ dovecot_stream_connect_auth(dovecot_auth_t)
|
||||||
kernel_read_all_sysctls(dovecot_auth_t)
|
kernel_read_all_sysctls(dovecot_auth_t)
|
||||||
kernel_read_system_state(dovecot_auth_t)
|
kernel_read_system_state(dovecot_auth_t)
|
||||||
|
|
||||||
@ -36796,7 +36810,7 @@ index acf6d4f..194f170 100644
|
|||||||
dev_read_urand(dovecot_auth_t)
|
dev_read_urand(dovecot_auth_t)
|
||||||
|
|
||||||
auth_domtrans_chk_passwd(dovecot_auth_t)
|
auth_domtrans_chk_passwd(dovecot_auth_t)
|
||||||
@@ -216,7 +240,8 @@ files_read_usr_files(dovecot_auth_t)
|
@@ -216,7 +241,8 @@ files_read_usr_files(dovecot_auth_t)
|
||||||
files_read_usr_symlinks(dovecot_auth_t)
|
files_read_usr_symlinks(dovecot_auth_t)
|
||||||
files_read_var_lib_files(dovecot_auth_t)
|
files_read_var_lib_files(dovecot_auth_t)
|
||||||
files_search_tmp(dovecot_auth_t)
|
files_search_tmp(dovecot_auth_t)
|
||||||
@ -36806,7 +36820,7 @@ index acf6d4f..194f170 100644
|
|||||||
|
|
||||||
init_rw_utmp(dovecot_auth_t)
|
init_rw_utmp(dovecot_auth_t)
|
||||||
|
|
||||||
@@ -236,6 +261,8 @@ optional_policy(`
|
@@ -236,6 +262,8 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
mysql_search_db(dovecot_auth_t)
|
mysql_search_db(dovecot_auth_t)
|
||||||
mysql_stream_connect(dovecot_auth_t)
|
mysql_stream_connect(dovecot_auth_t)
|
||||||
@ -36815,7 +36829,7 @@ index acf6d4f..194f170 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -243,6 +270,8 @@ optional_policy(`
|
@@ -243,6 +271,8 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -36824,7 +36838,7 @@ index acf6d4f..194f170 100644
|
|||||||
postfix_search_spool(dovecot_auth_t)
|
postfix_search_spool(dovecot_auth_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -250,23 +279,42 @@ optional_policy(`
|
@@ -250,23 +280,42 @@ optional_policy(`
|
||||||
#
|
#
|
||||||
# dovecot deliver local policy
|
# dovecot deliver local policy
|
||||||
#
|
#
|
||||||
@ -36869,7 +36883,7 @@ index acf6d4f..194f170 100644
|
|||||||
|
|
||||||
miscfiles_read_localization(dovecot_deliver_t)
|
miscfiles_read_localization(dovecot_deliver_t)
|
||||||
|
|
||||||
@@ -283,24 +331,22 @@ userdom_manage_user_home_content_pipes(dovecot_deliver_t)
|
@@ -283,24 +332,22 @@ userdom_manage_user_home_content_pipes(dovecot_deliver_t)
|
||||||
userdom_manage_user_home_content_sockets(dovecot_deliver_t)
|
userdom_manage_user_home_content_sockets(dovecot_deliver_t)
|
||||||
userdom_user_home_dir_filetrans_user_home_content(dovecot_deliver_t, { dir file lnk_file fifo_file sock_file })
|
userdom_user_home_dir_filetrans_user_home_content(dovecot_deliver_t, { dir file lnk_file fifo_file sock_file })
|
||||||
|
|
||||||
@ -53252,7 +53266,7 @@ index 2855a44..58bb459 100644
|
|||||||
+ allow $1 puppet_var_run_t:dir search_dir_perms;
|
+ allow $1 puppet_var_run_t:dir search_dir_perms;
|
||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/services/puppet.te b/policy/modules/services/puppet.te
|
diff --git a/policy/modules/services/puppet.te b/policy/modules/services/puppet.te
|
||||||
index 64c5f95..fa3c113 100644
|
index 64c5f95..39d23dc 100644
|
||||||
--- a/policy/modules/services/puppet.te
|
--- a/policy/modules/services/puppet.te
|
||||||
+++ b/policy/modules/services/puppet.te
|
+++ b/policy/modules/services/puppet.te
|
||||||
@@ -6,12 +6,19 @@ policy_module(puppet, 1.0.0)
|
@@ -6,12 +6,19 @@ policy_module(puppet, 1.0.0)
|
||||||
@ -53376,7 +53390,7 @@ index 64c5f95..fa3c113 100644
|
|||||||
files_rw_var_files(puppet_t)
|
files_rw_var_files(puppet_t)
|
||||||
|
|
||||||
rpm_domtrans(puppet_t)
|
rpm_domtrans(puppet_t)
|
||||||
@@ -156,13 +188,68 @@ optional_policy(`
|
@@ -156,13 +188,136 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -53387,8 +53401,77 @@ index 64c5f95..fa3c113 100644
|
|||||||
+ usermanage_access_check_useradd(puppet_t)
|
+ usermanage_access_check_useradd(puppet_t)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+########################################
|
+optional_policy(`
|
||||||
+#
|
+ auth_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ alsa_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ bootloader_filetrans_config(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ devicekit_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ dnsmasq_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ kerberos_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ libs_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ miscfiles_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ mta_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ modules_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ networkmanager_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ nx_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ postfix_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ quota_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ sysnet_filetrans_named_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ virt_filetrans_home_content(puppet_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ ssh_filetrans_admin_home_content(puppet_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
#
|
||||||
|
-# Pupper master personal policy
|
||||||
+# PuppetCA personal policy
|
+# PuppetCA personal policy
|
||||||
+#
|
+#
|
||||||
+
|
+
|
||||||
@ -53439,16 +53522,15 @@ index 64c5f95..fa3c113 100644
|
|||||||
+ usermanage_access_check_groupadd(puppet_t)
|
+ usermanage_access_check_groupadd(puppet_t)
|
||||||
+ usermanage_access_check_passwd(puppet_t)
|
+ usermanage_access_check_passwd(puppet_t)
|
||||||
+ usermanage_access_check_useradd(puppet_t)
|
+ usermanage_access_check_useradd(puppet_t)
|
||||||
')
|
+')
|
||||||
|
+
|
||||||
########################################
|
+########################################
|
||||||
#
|
+#
|
||||||
-# Pupper master personal policy
|
|
||||||
+# Puppet master personal policy
|
+# Puppet master personal policy
|
||||||
#
|
#
|
||||||
|
|
||||||
allow puppetmaster_t self:capability { dac_read_search dac_override setuid setgid fowner chown fsetid sys_tty_config };
|
allow puppetmaster_t self:capability { dac_read_search dac_override setuid setgid fowner chown fsetid sys_tty_config };
|
||||||
@@ -171,29 +258,36 @@ allow puppetmaster_t self:fifo_file rw_fifo_file_perms;
|
@@ -171,29 +326,36 @@ allow puppetmaster_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow puppetmaster_t self:netlink_route_socket create_netlink_socket_perms;
|
allow puppetmaster_t self:netlink_route_socket create_netlink_socket_perms;
|
||||||
allow puppetmaster_t self:socket create;
|
allow puppetmaster_t self:socket create;
|
||||||
allow puppetmaster_t self:tcp_socket create_stream_socket_perms;
|
allow puppetmaster_t self:tcp_socket create_stream_socket_perms;
|
||||||
@ -53488,7 +53570,7 @@ index 64c5f95..fa3c113 100644
|
|||||||
|
|
||||||
corecmd_exec_bin(puppetmaster_t)
|
corecmd_exec_bin(puppetmaster_t)
|
||||||
corecmd_exec_shell(puppetmaster_t)
|
corecmd_exec_shell(puppetmaster_t)
|
||||||
@@ -206,21 +300,46 @@ corenet_tcp_bind_generic_node(puppetmaster_t)
|
@@ -206,21 +368,46 @@ corenet_tcp_bind_generic_node(puppetmaster_t)
|
||||||
corenet_tcp_bind_puppet_port(puppetmaster_t)
|
corenet_tcp_bind_puppet_port(puppetmaster_t)
|
||||||
corenet_sendrecv_puppet_server_packets(puppetmaster_t)
|
corenet_sendrecv_puppet_server_packets(puppetmaster_t)
|
||||||
|
|
||||||
@ -53502,11 +53584,11 @@ index 64c5f95..fa3c113 100644
|
|||||||
|
|
||||||
domain_read_all_domains_state(puppetmaster_t)
|
domain_read_all_domains_state(puppetmaster_t)
|
||||||
+domain_obj_id_change_exemption(puppetmaster_t)
|
+domain_obj_id_change_exemption(puppetmaster_t)
|
||||||
+
|
|
||||||
+files_read_usr_files(puppetmaster_t)
|
|
||||||
|
|
||||||
-files_read_etc_files(puppetmaster_t)
|
-files_read_etc_files(puppetmaster_t)
|
||||||
-files_search_var_lib(puppetmaster_t)
|
-files_search_var_lib(puppetmaster_t)
|
||||||
|
+files_read_usr_files(puppetmaster_t)
|
||||||
|
+
|
||||||
+selinux_validate_context(puppetmaster_t)
|
+selinux_validate_context(puppetmaster_t)
|
||||||
+
|
+
|
||||||
+auth_use_nsswitch(puppetmaster_t)
|
+auth_use_nsswitch(puppetmaster_t)
|
||||||
@ -53538,7 +53620,7 @@ index 64c5f95..fa3c113 100644
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
hostname_exec(puppetmaster_t)
|
hostname_exec(puppetmaster_t)
|
||||||
')
|
')
|
||||||
@@ -231,3 +350,9 @@ optional_policy(`
|
@@ -231,3 +418,9 @@ optional_policy(`
|
||||||
rpm_exec(puppetmaster_t)
|
rpm_exec(puppetmaster_t)
|
||||||
rpm_read_db(puppetmaster_t)
|
rpm_read_db(puppetmaster_t)
|
||||||
')
|
')
|
||||||
@ -59443,7 +59525,7 @@ index 623c8fa..0a802f7 100644
|
|||||||
/var/run/snmpd(/.*)? gen_context(system_u:object_r:snmpd_var_run_t,s0)
|
/var/run/snmpd(/.*)? gen_context(system_u:object_r:snmpd_var_run_t,s0)
|
||||||
/var/run/snmpd\.pid -- gen_context(system_u:object_r:snmpd_var_run_t,s0)
|
/var/run/snmpd\.pid -- gen_context(system_u:object_r:snmpd_var_run_t,s0)
|
||||||
diff --git a/policy/modules/services/snmp.if b/policy/modules/services/snmp.if
|
diff --git a/policy/modules/services/snmp.if b/policy/modules/services/snmp.if
|
||||||
index 275f9fb..ad10bef 100644
|
index 275f9fb..f1343b7 100644
|
||||||
--- a/policy/modules/services/snmp.if
|
--- a/policy/modules/services/snmp.if
|
||||||
+++ b/policy/modules/services/snmp.if
|
+++ b/policy/modules/services/snmp.if
|
||||||
@@ -11,12 +11,12 @@
|
@@ -11,12 +11,12 @@
|
||||||
@ -59463,7 +59545,7 @@ index 275f9fb..ad10bef 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -62,6 +62,7 @@ interface(`snmp_read_snmp_var_lib_files',`
|
@@ -62,11 +62,70 @@ interface(`snmp_read_snmp_var_lib_files',`
|
||||||
type snmpd_var_lib_t;
|
type snmpd_var_lib_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -59471,10 +59553,29 @@ index 275f9fb..ad10bef 100644
|
|||||||
allow $1 snmpd_var_lib_t:dir list_dir_perms;
|
allow $1 snmpd_var_lib_t:dir list_dir_perms;
|
||||||
read_files_pattern($1, snmpd_var_lib_t, snmpd_var_lib_t)
|
read_files_pattern($1, snmpd_var_lib_t, snmpd_var_lib_t)
|
||||||
read_lnk_files_pattern($1, snmpd_var_lib_t, snmpd_var_lib_t)
|
read_lnk_files_pattern($1, snmpd_var_lib_t, snmpd_var_lib_t)
|
||||||
@@ -69,6 +70,45 @@ interface(`snmp_read_snmp_var_lib_files',`
|
')
|
||||||
|
|
||||||
########################################
|
+#######################################
|
||||||
## <summary>
|
+## <summary>
|
||||||
|
+## Read snmpd libraries directories
|
||||||
|
+## </summary>
|
||||||
|
+## <param name="domain">
|
||||||
|
+## <summary>
|
||||||
|
+## Domain allowed access.
|
||||||
|
+## </summary>
|
||||||
|
+## </param>
|
||||||
|
+#
|
||||||
|
+interface(`snmp_read_snmp_var_lib_dirs',`
|
||||||
|
+ gen_require(`
|
||||||
|
+ type snmpd_var_lib_t;
|
||||||
|
+ ')
|
||||||
|
+
|
||||||
|
+ files_search_var_lib($1)
|
||||||
|
+ allow $1 snmpd_var_lib_t:dir list_dir_perms;
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+########################################
|
||||||
|
+## <summary>
|
||||||
+## Manage snmpd libraries directories
|
+## Manage snmpd libraries directories
|
||||||
+## </summary>
|
+## </summary>
|
||||||
+## <param name="domain">
|
+## <param name="domain">
|
||||||
@ -59512,12 +59613,10 @@ index 275f9fb..ad10bef 100644
|
|||||||
+ manage_files_pattern($1, snmpd_var_lib_t, snmpd_var_lib_t)
|
+ manage_files_pattern($1, snmpd_var_lib_t, snmpd_var_lib_t)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+########################################
|
########################################
|
||||||
+## <summary>
|
## <summary>
|
||||||
## dontaudit Read snmpd libraries.
|
## dontaudit Read snmpd libraries.
|
||||||
## </summary>
|
@@ -81,9 +140,10 @@ interface(`snmp_dontaudit_read_snmp_var_lib_files',`
|
||||||
## <param name="domain">
|
|
||||||
@@ -81,9 +121,10 @@ interface(`snmp_dontaudit_read_snmp_var_lib_files',`
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type snmpd_var_lib_t;
|
type snmpd_var_lib_t;
|
||||||
')
|
')
|
||||||
@ -59529,7 +59628,7 @@ index 275f9fb..ad10bef 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -123,13 +164,15 @@ interface(`snmp_dontaudit_write_snmp_var_lib_files',`
|
@@ -123,13 +183,15 @@ interface(`snmp_dontaudit_write_snmp_var_lib_files',`
|
||||||
#
|
#
|
||||||
interface(`snmp_admin',`
|
interface(`snmp_admin',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
@ -63903,7 +64002,7 @@ index 7c5d8d8..3fd8f12 100644
|
|||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
diff --git a/policy/modules/services/virt.te b/policy/modules/services/virt.te
|
diff --git a/policy/modules/services/virt.te b/policy/modules/services/virt.te
|
||||||
index 3eca020..30c47b0 100644
|
index 3eca020..59444ba 100644
|
||||||
--- a/policy/modules/services/virt.te
|
--- a/policy/modules/services/virt.te
|
||||||
+++ b/policy/modules/services/virt.te
|
+++ b/policy/modules/services/virt.te
|
||||||
@@ -5,56 +5,84 @@ policy_module(virt, 1.4.0)
|
@@ -5,56 +5,84 @@ policy_module(virt, 1.4.0)
|
||||||
@ -64460,7 +64559,7 @@ index 3eca020..30c47b0 100644
|
|||||||
files_read_usr_files(virt_domain)
|
files_read_usr_files(virt_domain)
|
||||||
files_read_var_files(virt_domain)
|
files_read_var_files(virt_domain)
|
||||||
files_search_all(virt_domain)
|
files_search_all(virt_domain)
|
||||||
@@ -440,25 +626,358 @@ files_search_all(virt_domain)
|
@@ -440,25 +626,359 @@ files_search_all(virt_domain)
|
||||||
fs_getattr_tmpfs(virt_domain)
|
fs_getattr_tmpfs(virt_domain)
|
||||||
fs_rw_anon_inodefs_files(virt_domain)
|
fs_rw_anon_inodefs_files(virt_domain)
|
||||||
fs_rw_tmpfs_files(virt_domain)
|
fs_rw_tmpfs_files(virt_domain)
|
||||||
@ -64796,6 +64895,7 @@ index 3eca020..30c47b0 100644
|
|||||||
+
|
+
|
||||||
+domain_entry_file(svirt_lxc_net_t, svirt_lxc_file_t)
|
+domain_entry_file(svirt_lxc_net_t, svirt_lxc_file_t)
|
||||||
+domtrans_pattern(virtd_lxc_t, svirt_lxc_file_t, svirt_lxc_net_t)
|
+domtrans_pattern(virtd_lxc_t, svirt_lxc_file_t, svirt_lxc_net_t)
|
||||||
|
+corecmd_shell_domtrans(virtd_lxc_t, svirt_lxc_net_t)
|
||||||
+fs_noxattr_type(svirt_lxc_file_t)
|
+fs_noxattr_type(svirt_lxc_file_t)
|
||||||
+term_pty(svirt_lxc_file_t)
|
+term_pty(svirt_lxc_file_t)
|
||||||
+
|
+
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.10.0
|
Version: 3.10.0
|
||||||
Release: 63%{?dist}
|
Release: 64%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -470,6 +470,15 @@ SELinux Reference policy mls base module.
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Dec 1 2011 Miroslav Grepl <mgrepl@redhat.com> 3.10.0-64
|
||||||
|
- Use fs_use_xattr for squashf
|
||||||
|
- Fix procs_type interface
|
||||||
|
- Dovecot has a new fifo_file /var/run/dovecot/stats-mail
|
||||||
|
- Dovecot has a new fifo_file /var/run/stats-mail
|
||||||
|
- Colord does not need to connect to network
|
||||||
|
- Allow system_cronjob to dbus chat with NetworkManager
|
||||||
|
- Puppet manages content, want to make sure it labels everything correctly
|
||||||
|
|
||||||
* Tue Nov 29 2011 Miroslav Grepl <mgrepl@redhat.com> 3.10.0-63
|
* Tue Nov 29 2011 Miroslav Grepl <mgrepl@redhat.com> 3.10.0-63
|
||||||
- Change port 9050 to tor_socks_port_t and then allow openvpn to connect to it
|
- Change port 9050 to tor_socks_port_t and then allow openvpn to connect to it
|
||||||
- Allow all postfix domains to use the fifo_file
|
- Allow all postfix domains to use the fifo_file
|
||||||
|
Loading…
Reference in New Issue
Block a user