RHEL 9.0.0 Alpha bootstrap
The content of this branch was automatically imported from Fedora ELN with the following as its source: https://src.fedoraproject.org/rpms/selinux-policy#fe20768333d6dfa8183364a04e3c4327c8185427
This commit is contained in:
parent
cc2b4860c9
commit
7975d49f67
492
.gitignore
vendored
492
.gitignore
vendored
@ -0,0 +1,492 @@
|
|||||||
|
serefpolicy-2.0.0.tgz
|
||||||
|
serefpolicy-2.0.1.tgz
|
||||||
|
serefpolicy-2.0.2.tgz
|
||||||
|
serefpolicy-2.0.3.tgz
|
||||||
|
serefpolicy-2.0.4.tgz
|
||||||
|
serefpolicy-2.0.5.tgz
|
||||||
|
serefpolicy-2.0.6.tgz
|
||||||
|
serefpolicy-2.0.7.tgz
|
||||||
|
serefpolicy-2.0.8.tgz
|
||||||
|
serefpolicy-2.0.9.tgz
|
||||||
|
serefpolicy-2.0.10.tgz
|
||||||
|
serefpolicy-2.0.11.tgz
|
||||||
|
exclude
|
||||||
|
noarch
|
||||||
|
nsadiff
|
||||||
|
nsaserefpolicy
|
||||||
|
serefpolicy-2.1.0.tgz
|
||||||
|
serefpolicy-2.1.1.tgz
|
||||||
|
serefpolicy-2.1.2.tgz
|
||||||
|
serefpolicy-2.1.4.tgz
|
||||||
|
serefpolicy-2.1.5.tgz
|
||||||
|
serefpolicy-2.1.6.tgz
|
||||||
|
serefpolicy-2.1.7.tgz
|
||||||
|
serefpolicy-2.1.8.tgz
|
||||||
|
serefpolicy-2.1.9.tgz
|
||||||
|
serefpolicy-2.1.10.tgz
|
||||||
|
serefpolicy-2.1.11.tgz
|
||||||
|
serefpolicy-2.1.12.tgz
|
||||||
|
serefpolicy-2.1.13.tgz
|
||||||
|
serefpolicy-2.2.2.tgz
|
||||||
|
serefpolicy-2.2.4.tgz
|
||||||
|
serefpolicy-2.2.5.tgz
|
||||||
|
serefpolicy-2.2.6.tgz
|
||||||
|
serefpolicy-2.2.7.tgz
|
||||||
|
serefpolicy-2.2.8.tgz
|
||||||
|
serefpolicy-2.2.9.tgz
|
||||||
|
serefpolicy-2.2.10.tgz
|
||||||
|
serefpolicy-2.2.11.tgz
|
||||||
|
serefpolicy-2.2.12.tgz
|
||||||
|
serefpolicy-2.2.13.tgz
|
||||||
|
serefpolicy-2.2.14.tgz
|
||||||
|
serefpolicy-2.2.15.tgz
|
||||||
|
serefpolicy-2.2.16.tgz
|
||||||
|
serefpolicy-2.2.17.tgz
|
||||||
|
serefpolicy-2.2.18.tgz
|
||||||
|
serefpolicy-2.2.19.tgz
|
||||||
|
serefpolicy-2.2.20.tgz
|
||||||
|
serefpolicy-2.2.21.tgz
|
||||||
|
serefpolicy-2.2.22.tgz
|
||||||
|
serefpolicy-2.2.23.tgz
|
||||||
|
serefpolicy-2.2.24.tgz
|
||||||
|
serefpolicy-2.2.25.tgz
|
||||||
|
serefpolicy-2.2.26.tgz
|
||||||
|
serefpolicy-2.2.27.tgz
|
||||||
|
serefpolicy-2.2.28.tgz
|
||||||
|
serefpolicy-2.2.29.tgz
|
||||||
|
serefpolicy-2.2.30.tgz
|
||||||
|
serefpolicy-2.2.31.tgz
|
||||||
|
serefpolicy-2.2.32.tgz
|
||||||
|
serefpolicy-2.2.33.tgz
|
||||||
|
serefpolicy-2.2.34.tgz
|
||||||
|
selinux-policy-2.2.35-1.src.rpm
|
||||||
|
serefpolicy-2.2.35.tgz
|
||||||
|
serefpolicy-2.2.36.tgz
|
||||||
|
serefpolicy-2.2.37.tgz
|
||||||
|
serefpolicy-2.2.38.tgz
|
||||||
|
serefpolicy-2.2.39.tgz
|
||||||
|
serefpolicy-2.2.40.tgz
|
||||||
|
serefpolicy-2.2.41.tgz
|
||||||
|
serefpolicy-2.2.42.tgz
|
||||||
|
serefpolicy-2.2.43.tgz
|
||||||
|
serefpolicy-2.2.45.tgz
|
||||||
|
serefpolicy-2.2.46.tgz
|
||||||
|
serefpolicy-2.2.47.tgz
|
||||||
|
serefpolicy-2.2.48.tgz
|
||||||
|
serefpolicy-2.2.49.tgz
|
||||||
|
serefpolicy-2.3.1.tgz
|
||||||
|
serefpolicy-2.3.2.tgz
|
||||||
|
serefpolicy-2.3.3.tgz
|
||||||
|
serefpolicy-2.3.4.tgz
|
||||||
|
serefpolicy-2.3.5.tgz
|
||||||
|
serefpolicy-2.3.6.tgz
|
||||||
|
serefpolicy-2.3.7.tgz
|
||||||
|
serefpolicy-2.3.8.tgz
|
||||||
|
serefpolicy-2.3.9.tgz
|
||||||
|
serefpolicy-2.3.10.tgz
|
||||||
|
clog
|
||||||
|
serefpolicy-2.3.11.tgz
|
||||||
|
serefpolicy-2.3.12.tgz
|
||||||
|
serefpolicy-2.3.13.tgz
|
||||||
|
serefpolicy-2.3.14.tgz
|
||||||
|
serefpolicy-2.3.15.tgz
|
||||||
|
serefpolicy-2.3.16.tgz
|
||||||
|
serefpolicy-2.3.17.tgz
|
||||||
|
serefpolicy-2.3.18.tgz
|
||||||
|
serefpolicy-2.3.19.tgz
|
||||||
|
serefpolicy-2.4.tgz
|
||||||
|
serefpolicy-2.4.1.tgz
|
||||||
|
serefpolicy-2.4.2.tgz
|
||||||
|
serefpolicy-2.4.3.tgz
|
||||||
|
serefpolicy-2.4.4.tgz
|
||||||
|
serefpolicy-2.4.5.tgz
|
||||||
|
serefpolicy-2.4.6.tgz
|
||||||
|
serefpolicy-2.5.1.tgz
|
||||||
|
serefpolicy-2.5.2.tgz
|
||||||
|
serefpolicy-2.5.3.tgz
|
||||||
|
serefpolicy-2.5.4.tgz
|
||||||
|
serefpolicy-2.5.5.tgz
|
||||||
|
serefpolicy-2.5.6.tgz
|
||||||
|
serefpolicy-2.5.7.tgz
|
||||||
|
serefpolicy-2.5.8.tgz
|
||||||
|
serefpolicy-2.5.9.tgz
|
||||||
|
serefpolicy-2.5.10.tgz
|
||||||
|
serefpolicy-2.5.11.tgz
|
||||||
|
serefpolicy-2.5.12.tgz
|
||||||
|
serefpolicy-2.6.1.tgz
|
||||||
|
serefpolicy-2.6.2.tgz
|
||||||
|
serefpolicy-2.6.3.tgz
|
||||||
|
serefpolicy-2.6.4.tgz
|
||||||
|
serefpolicy-2.6.5.tgz
|
||||||
|
serefpolicy-3.0.1.tgz
|
||||||
|
serefpolicy-3.0.2.tgz
|
||||||
|
serefpolicy-3.0.3.tgz
|
||||||
|
serefpolicy-3.0.4.tgz
|
||||||
|
serefpolicy-3.0.5.tgz
|
||||||
|
serefpolicy-3.0.6.tgz
|
||||||
|
serefpolicy-3.0.7.tgz
|
||||||
|
serefpolicy-3.0.8.tgz
|
||||||
|
serefpolicy-3.1.0.tgz
|
||||||
|
serefpolicy-3.1.1.tgz
|
||||||
|
serefpolicy-3.1.2.tgz
|
||||||
|
serefpolicy-3.2.1.tgz
|
||||||
|
serefpolicy-3.2.2.tgz
|
||||||
|
serefpolicy-3.2.3.tgz
|
||||||
|
serefpolicy-3.2.4.tgz
|
||||||
|
serefpolicy-3.2.5.tgz
|
||||||
|
serefpolicy-3.2.6.tgz
|
||||||
|
serefpolicy-3.2.7.tgz
|
||||||
|
serefpolicy-3.2.8.tgz
|
||||||
|
serefpolicy-3.2.9.tgz
|
||||||
|
serefpolicy-3.3.0.tgz
|
||||||
|
serefpolicy-3.3.1.tgz
|
||||||
|
serefpolicy-3.4.1.tgz
|
||||||
|
serefpolicy-3.4.2.tgz
|
||||||
|
serefpolicy-3.5.1.tgz
|
||||||
|
serefpolicy-3.5.2.tgz
|
||||||
|
serefpolicy-3.5.3.tgz
|
||||||
|
serefpolicy-3.5.4.tgz
|
||||||
|
serefpolicy-3.5.5.tgz
|
||||||
|
serefpolicy-3.5.6.tgz
|
||||||
|
serefpolicy-3.5.7.tgz
|
||||||
|
serefpolicy-3.5.8.tgz
|
||||||
|
serefpolicy-3.5.9.tgz
|
||||||
|
serefpolicy-3.5.10.tgz
|
||||||
|
serefpolicy-3.5.11.tgz
|
||||||
|
serefpolicy-3.5.12.tgz
|
||||||
|
serefpolicy-3.5.13.tgz
|
||||||
|
serefpolicy-3.6.1.tgz
|
||||||
|
serefpolicy-3.6.2.tgz
|
||||||
|
serefpolicy-3.6.3.tgz
|
||||||
|
serefpolicy-3.6.4.tgz
|
||||||
|
serefpolicy-3.6.5.tgz
|
||||||
|
serefpolicy-3.6.6.tgz
|
||||||
|
serefpolicy-3.6.7.tgz
|
||||||
|
serefpolicy-3.6.8.tgz
|
||||||
|
serefpolicy-3.6.9.tgz
|
||||||
|
serefpolicy-3.6.10.tgz
|
||||||
|
serefpolicy-3.6.11.tgz
|
||||||
|
serefpolicy-3.6.12.tgz
|
||||||
|
serefpolicy-3.6.13.tgz
|
||||||
|
serefpolicy-3.6.14.tgz
|
||||||
|
serefpolicy-3.6.15.tgz
|
||||||
|
serefpolicy-3.6.16.tgz
|
||||||
|
serefpolicy-3.6.17.tgz
|
||||||
|
serefpolicy-3.6.18.tgz
|
||||||
|
serefpolicy-3.6.19.tgz
|
||||||
|
serefpolicy-3.6.20.tgz
|
||||||
|
serefpolicy-3.6.21.tgz
|
||||||
|
setroubleshoot-2.2.11.tar.gz
|
||||||
|
serefpolicy-3.6.22.tgz
|
||||||
|
serefpolicy-3.6.23.tgz
|
||||||
|
serefpolicy-3.6.24.tgz
|
||||||
|
serefpolicy-3.6.25.tgz
|
||||||
|
serefpolicy-3.6.26.tgz
|
||||||
|
serefpolicy-3.6.27.tgz
|
||||||
|
serefpolicy-3.6.28.tgz
|
||||||
|
setroubleshoot-2.2.21.tar.gz
|
||||||
|
serefpolicy-3.6.29.tgz
|
||||||
|
serefpolicy-3.6.30.tgz
|
||||||
|
serefpolicy-3.6.31.tgz
|
||||||
|
serefpolicy-3.6.32.tgz
|
||||||
|
serefpolicy-3.6.33.tgz
|
||||||
|
serefpolicy-3.7.1.tgz
|
||||||
|
serefpolicy-3.7.2.tgz
|
||||||
|
serefpolicy-3.7.3.tgz
|
||||||
|
serefpolicy-3.7.4.tgz
|
||||||
|
serefpolicy-3.7.5.tgz
|
||||||
|
serefpolicy-3.7.6.tgz
|
||||||
|
serefpolicy-3.7.7.tgz
|
||||||
|
serefpolicy-3.7.8.tgz
|
||||||
|
setroubleshoot-2.2.58.tar.gz
|
||||||
|
serefpolicy-3.7.9.tgz
|
||||||
|
serefpolicy-3.7.11.tgz
|
||||||
|
serefpolicy-3.7.12.tgz
|
||||||
|
serefpolicy-3.7.13.tgz
|
||||||
|
serefpolicy-3.7.14.tgz
|
||||||
|
serefpolicy-3.7.15.tgz
|
||||||
|
serefpolicy-3.7.16.tgz
|
||||||
|
serefpolicy-3.7.17.tgz
|
||||||
|
serefpolicy-3.7.18.tgz
|
||||||
|
serefpolicy-3.7.19.tgz
|
||||||
|
serefpolicy-3.8.1.tgz
|
||||||
|
serefpolicy-3.8.2.tgz
|
||||||
|
serefpolicy-3.8.3.tgz
|
||||||
|
serefpolicy-3.8.4.tgz
|
||||||
|
serefpolicy-3.8.5.tgz
|
||||||
|
serefpolicy-3.8.6.tgz
|
||||||
|
serefpolicy-3.8.7.tgz
|
||||||
|
serefpolicy-3.8.8.tgz
|
||||||
|
*.rpm
|
||||||
|
serefpolicy*
|
||||||
|
/serefpolicy-3.9.0.tgz
|
||||||
|
/serefpolicy-3.9.1.tgz
|
||||||
|
/serefpolicy-3.9.2.tgz
|
||||||
|
/serefpolicy-3.9.3.tgz
|
||||||
|
/serefpolicy-3.9.4.tgz
|
||||||
|
/serefpolicy-3.9.5.tgz
|
||||||
|
/serefpolicy-3.9.6.tgz
|
||||||
|
/serefpolicy-3.9.8.tgz
|
||||||
|
/serefpolicy-3.9.9.tgz
|
||||||
|
/serefpolicy-3.9.10.tgz
|
||||||
|
/serefpolicy-3.9.11.tgz
|
||||||
|
/serefpolicy-3.9.12.tgz
|
||||||
|
/serefpolicy-3.9.13.tgz
|
||||||
|
/selinux-policy-9ae373e.tar.gz
|
||||||
|
/selinux-policy-contrib-e269450.tar.gz
|
||||||
|
/container-selinux.tgz
|
||||||
|
/selinux-policy-contrib-a749579.tar.gz
|
||||||
|
/selinux-policy-f6aa4d6.tar.gz
|
||||||
|
/selinux-policy-cc4a892.tar.gz
|
||||||
|
/selinux-policy-contrib-68a780b.tar.gz
|
||||||
|
/selinux-policy-0087f3e.tar.gz
|
||||||
|
/selinux-policy-contrib-93c9a53.tar.gz
|
||||||
|
/selinux-policy-747f4e6.tar.gz
|
||||||
|
/selinux-policy-contrib-4fe9943.tar.gz
|
||||||
|
/selinux-policy-contrib-a1cd00e.tar.gz
|
||||||
|
/selinux-policy-642cc91.tar.gz
|
||||||
|
/selinux-policy-contrib-b657ba0.tar.gz
|
||||||
|
/selinux-policy-contrib-0311bf8.tar.gz
|
||||||
|
/selinux-policy-ef9ecd7.tar.gz
|
||||||
|
/selinux-policy-8a10ba8.tar.gz
|
||||||
|
/selinux-policy-contrib-6777a17.tar.gz
|
||||||
|
/selinux-policy-contrib-27f5e51.tar.gz
|
||||||
|
/selinux-policy-2c13be1.tar.gz
|
||||||
|
/selinux-policy-e16d205.tar.gz
|
||||||
|
/selinux-policy-contrib-9facb1c.tar.gz
|
||||||
|
/selinux-policy-contrib-f564072.tar.gz
|
||||||
|
/selinux-policy-bd7ad92.tar.gz
|
||||||
|
/selinux-policy-9bd65d3.tar.gz
|
||||||
|
/selinux-policy-contrib-fbc0290.tar.gz
|
||||||
|
/selinux-policy-contrib-ce817e6.tar.gz
|
||||||
|
/selinux-policy-370bcfb.tar.gz
|
||||||
|
/selinux-policy-4b1f9bd.tar.gz
|
||||||
|
/selinux-policy-contrib-d2dd0ad.tar.gz
|
||||||
|
/selinux-policy-contrib-7ecfe28.tar.gz
|
||||||
|
/selinux-policy-116b85e.tar.gz
|
||||||
|
/selinux-policy-154a8cf.tar.gz
|
||||||
|
/selinux-policy-contrib-504d76b.tar.gz
|
||||||
|
/selinux-policy-01924d8.tar.gz
|
||||||
|
/selinux-policy-contrib-1255203.tar.gz
|
||||||
|
/selinux-policy-contrib-10b75cc.tar.gz
|
||||||
|
/selinux-policy-bb22502.tar.gz
|
||||||
|
/selinux-policy-b8ddd7e.tar.gz
|
||||||
|
/selinux-policy-contrib-4b13776.tar.gz
|
||||||
|
/selinux-policy-fee4738.tar.gz
|
||||||
|
/selinux-policy-contrib-6c883f6.tar.gz
|
||||||
|
/selinux-policy-301aa80.tar.gz
|
||||||
|
/selinux-policy-contrib-01b5dd1.tar.gz
|
||||||
|
/selinux-policy-17160ee.tar.gz
|
||||||
|
/selinux-policy-contrib-4f6a859.tar.gz
|
||||||
|
/selinux-policy-718d75d.tar.gz
|
||||||
|
/selinux-policy-cab8dc9.tar.gz
|
||||||
|
/selinux-policy-contrib-19624b4.tar.gz
|
||||||
|
/selinux-policy-contrib-5ae0301.tar.gz
|
||||||
|
/selinux-policy-ba72e52.tar.gz
|
||||||
|
/selinux-policy-877fde5.tar.gz
|
||||||
|
/selinux-policy-contrib-12d91da.tar.gz
|
||||||
|
/selinux-policy-contrib-6cf567f.tar.gz
|
||||||
|
/selinux-policy-a1ec13e.tar.gz
|
||||||
|
/selinux-policy-contrib-93edf9a.tar.gz
|
||||||
|
/selinux-policy-d06c960.tar.gz
|
||||||
|
/selinux-policy-contrib-f1b2ca4.tar.gz
|
||||||
|
/selinux-policy-ae55b01.tar.gz
|
||||||
|
/selinux-policy-contrib-d23eef1.tar.gz
|
||||||
|
/selinux-policy-003cd80.tar.gz
|
||||||
|
/selinux-policy-contrib-494e26e.tar.gz
|
||||||
|
/selinux-policy-2248854.tar.gz
|
||||||
|
/selinux-policy-contrib-23a0603.tar.gz
|
||||||
|
/selinux-policy-d616286.tar.gz
|
||||||
|
/selinux-policy-contrib-bfc11d6.tar.gz
|
||||||
|
/selinux-policy-cc3def4.tar.gz
|
||||||
|
/selinux-policy-contrib-f0ca657.tar.gz
|
||||||
|
/selinux-policy-contrib-6bfaa82.tar.gz
|
||||||
|
/selinux-policy-e08b2da.tar.gz
|
||||||
|
/selinux-policy-8555de5.tar.gz
|
||||||
|
/selinux-policy-contrib-ab97c9d.tar.gz
|
||||||
|
/selinux-policy-c8dfe84.tar.gz
|
||||||
|
/selinux-policy-contrib-a342008.tar.gz
|
||||||
|
/selinux-policy-contrib-5ed2192.tar.gz
|
||||||
|
/selinux-policy-38c6414.tar.gz
|
||||||
|
/selinux-policy-contrib-dab4b50.tar.gz
|
||||||
|
/selinux-policy-446ee2a.tar.gz
|
||||||
|
/selinux-policy-0813126.tar.gz
|
||||||
|
/selinux-policy-contrib-ff6d7f4.tar.gz
|
||||||
|
/selinux-policy-contrib-fdc0a2e.tar.gz
|
||||||
|
/selinux-policy-493101e.tar.gz
|
||||||
|
/selinux-policy-contrib-765b73a.tar.gz
|
||||||
|
/selinux-policy-8bcb254.tar.gz
|
||||||
|
/selinux-policy-contrib-5252fe6.tar.gz
|
||||||
|
/selinux-policy-2d39d24.tar.gz
|
||||||
|
/selinux-policy-contrib-a69f9e6.tar.gz
|
||||||
|
/selinux-policy-contrib-6c30b43.tar.gz
|
||||||
|
/selinux-policy-a46eac2.tar.gz
|
||||||
|
/selinux-policy-contrib-5a2a313.tar.gz
|
||||||
|
/selinux-policy-62d90da.tar.gz
|
||||||
|
/selinux-policy-contrib-a01743f.tar.gz
|
||||||
|
/selinux-policy-4cbc1ae.tar.gz
|
||||||
|
/selinux-policy-contrib-a0e3869.tar.gz
|
||||||
|
/selinux-policy-509e071.tar.gz
|
||||||
|
/selinux-policy-contrib-a265988.tar.gz
|
||||||
|
/selinux-policy-d0c5c81.tar.gz
|
||||||
|
/selinux-policy-0379b0e.tar.gz
|
||||||
|
/selinux-policy-contrib-2664b0a.tar.gz
|
||||||
|
/selinux-policy-35f00c1.tar.gz
|
||||||
|
/selinux-policy-5181cbd.tar.gz
|
||||||
|
/selinux-policy-contrib-992defd.tar.gz
|
||||||
|
/selinux-policy-contrib-b4944ea.tar.gz
|
||||||
|
/selinux-policy-07bdaa4.tar.gz
|
||||||
|
/selinux-policy-contrib-8b8ce9b.tar.gz
|
||||||
|
/selinux-policy-8258bc1.tar.gz
|
||||||
|
/selinux-policy-contrib-01421de.tar.gz
|
||||||
|
/selinux-policy-18ccb6c.tar.gz
|
||||||
|
/selinux-policy-contrib-7e2f178.tar.gz
|
||||||
|
/selinux-policy-contrib-af9fa4f.tar.gz
|
||||||
|
/selinux-policy-108b4cd.tar.gz
|
||||||
|
/selinux-policy-contrib-925fb5e.tar.gz
|
||||||
|
/selinux-policy-aa6253c.tar.gz
|
||||||
|
/selinux-policy-contrib-c199027.tar.gz
|
||||||
|
/selinux-policy-4c00590.tar.gz
|
||||||
|
/selinux-policy-b28842e.tar.gz
|
||||||
|
/selinux-policy-contrib-dc92f2d.tar.gz
|
||||||
|
/selinux-policy-b78306b.tar.gz
|
||||||
|
/selinux-policy-contrib-ef0c1e0.tar.gz
|
||||||
|
/macro-expander
|
||||||
|
/selinux-policy-549ed43.tar.gz
|
||||||
|
/selinux-policy-contrib-e753aa8.tar.gz
|
||||||
|
/selinux-policy-contrib-7010ac2.tar.gz
|
||||||
|
/selinux-policy-50cc590.tar.gz
|
||||||
|
/selinux-policy-f1590bb.tar.gz
|
||||||
|
/selinux-policy-contrib-8659df1.tar.gz
|
||||||
|
/selinux-policy-f8a2347.tar.gz
|
||||||
|
/selinux-policy-379f4fb.tar.gz
|
||||||
|
/selinux-policy-2163c68.tar.gz
|
||||||
|
/selinux-policy-contrib-b78d1b1.tar.gz
|
||||||
|
/selinux-policy-contrib-d00ed3c.tar.gz
|
||||||
|
/selinux-policy-6ed8a72.tar.gz
|
||||||
|
/selinux-policy-contrib-5a0561d.tar.gz
|
||||||
|
/selinux-policy-54c05f2.tar.gz
|
||||||
|
/selinux-policy-088381c.tar.gz
|
||||||
|
/selinux-policy-contrib-e33aa41.tar.gz
|
||||||
|
/selinux-policy-c5e58b6.tar.gz
|
||||||
|
/selinux-policy-contrib-721b2bf.tar.gz
|
||||||
|
/selinux-policy-8eaf5bc.tar.gz
|
||||||
|
/selinux-policy-contrib-38d51f0.tar.gz
|
||||||
|
/selinux-policy-62e78cf.tar.gz
|
||||||
|
/selinux-policy-contrib-ebaeade.tar.gz
|
||||||
|
/selinux-policy-78cbf0a.tar.gz
|
||||||
|
/selinux-policy-contrib-efd9524.tar.gz
|
||||||
|
/selinux-policy-50e97b7.tar.gz
|
||||||
|
/selinux-policy-contrib-7dabd9f.tar.gz
|
||||||
|
/selinux-policy-26ad838.tar.gz
|
||||||
|
/selinux-policy-contrib-2f9692d.tar.gz
|
||||||
|
/selinux-policy-5b2d489.tar.gz
|
||||||
|
/selinux-policy-contrib-7d3bcf4.tar.gz
|
||||||
|
/selinux-policy-905153e.tar.gz
|
||||||
|
/selinux-policy-contrib-9e9bb01.tar.gz
|
||||||
|
/selinux-policy-f1ee18a.tar.gz
|
||||||
|
/selinux-policy-contrib-2e0b14e.tar.gz
|
||||||
|
/selinux-policy-8935967.tar.gz
|
||||||
|
/selinux-policy-contrib-da6544c.tar.gz
|
||||||
|
/selinux-policy-2f909f9.tar.gz
|
||||||
|
/selinux-policy-contrib-2b47485.tar.gz
|
||||||
|
/selinux-policy-da92bd2.tar.gz
|
||||||
|
/selinux-policy-contrib-b7144a2.tar.gz
|
||||||
|
/selinux-policy-cd63aff.tar.gz
|
||||||
|
/selinux-policy-contrib-e563a8d.tar.gz
|
||||||
|
/selinux-policy-contrib-4396848.tar.gz
|
||||||
|
/selinux-policy-b313a79.tar.gz
|
||||||
|
/selinux-policy-contrib-c55a896.tar.gz
|
||||||
|
/selinux-policy-6a0cb45.tar.gz
|
||||||
|
/selinux-policy-contrib-8ce79b2.tar.gz
|
||||||
|
/selinux-policy-contrib-c5a8fd2.tar.gz
|
||||||
|
/selinux-policy-3e6f5ff.tar.gz
|
||||||
|
/selinux-policy-37ef196.tar.gz
|
||||||
|
/selinux-policy-contrib-b43d580.tar.gz
|
||||||
|
/selinux-policy-31db3dc.tar.gz
|
||||||
|
/selinux-policy-contrib-c3a90b3.tar.gz
|
||||||
|
/selinux-policy-contrib-bfb130f.tar.gz
|
||||||
|
/selinux-policy-contrib-2c0ecb3.tar.gz
|
||||||
|
/selinux-policy-d63d681.tar.gz
|
||||||
|
/selinux-policy-aa4c070.tar.gz
|
||||||
|
/selinux-policy-contrib-84cf0f5.tar.gz
|
||||||
|
/selinux-policy-contrib-7c1c105.tar.gz
|
||||||
|
/selinux-policy-contrib-070f96c.tar.gz
|
||||||
|
/selinux-policy-contrib-7adf788.tar.gz
|
||||||
|
/selinux-policy-c95997f.tar.gz
|
||||||
|
/selinux-policy-contrib-6b3a800.tar.gz
|
||||||
|
/selinux-policy-7b7648b.tar.gz
|
||||||
|
/selinux-policy-contrib-dee19b8.tar.gz
|
||||||
|
/selinux-policy-40f6bcc.tar.gz
|
||||||
|
/selinux-policy-contrib-6c531fb.tar.gz
|
||||||
|
/selinux-policy-4253587.tar.gz
|
||||||
|
/selinux-policy-contrib-5041702.tar.gz
|
||||||
|
/selinux-policy-a9839a5.tar.gz
|
||||||
|
/selinux-policy-contrib-35568c7.tar.gz
|
||||||
|
/selinux-policy-90b3284.tar.gz
|
||||||
|
/selinux-policy-contrib-46d44de.tar.gz
|
||||||
|
/selinux-policy-ae2c4ae.tar.gz
|
||||||
|
/selinux-policy-4881d15.tar.gz
|
||||||
|
/selinux-policy-contrib-43e2de6.tar.gz
|
||||||
|
/selinux-policy-789c659.tar.gz
|
||||||
|
/selinux-policy-b169ed6.tar.gz
|
||||||
|
/selinux-policy-contrib-cabad1f.tar.gz
|
||||||
|
/selinux-policy-533b7be.tar.gz
|
||||||
|
/selinux-policy-contrib-be783bd.tar.gz
|
||||||
|
/selinux-policy-9e0b4dd.tar.gz
|
||||||
|
/selinux-policy-contrib-f23171a.tar.gz
|
||||||
|
/selinux-policy-contrib-7f1b345.tar.gz
|
||||||
|
/selinux-policy-9d5b9be.tar.gz
|
||||||
|
/selinux-policy-4be621b.tar.gz
|
||||||
|
/selinux-policy-contrib-6178b11.tar.gz
|
||||||
|
/selinux-policy-a303d1d.tar.gz
|
||||||
|
/selinux-policy-contrib-f2a3549.tar.gz
|
||||||
|
/selinux-policy-d5268be.tar.gz
|
||||||
|
/selinux-policy-bde5c9e.tar.gz
|
||||||
|
/selinux-policy-contrib-f7a21a9.tar.gz
|
||||||
|
/selinux-policy-contrib-08def7c.tar.gz
|
||||||
|
/selinux-policy-deadfd1.tar.gz
|
||||||
|
/selinux-policy-ff8908f.tar.gz
|
||||||
|
/selinux-policy-contrib-5406e9a.tar.gz
|
||||||
|
/selinux-policy-contrib-d504071.tar.gz
|
||||||
|
/selinux-policy-649b10d.tar.gz
|
||||||
|
/selinux-policy-contrib-ab515a1.tar.gz
|
||||||
|
/selinux-policy-0072731.tar.gz
|
||||||
|
/selinux-policy-a9a124e.tar.gz
|
||||||
|
/selinux-policy-contrib-2c38d35.tar.gz
|
||||||
|
/selinux-policy-contrib-d5da042.tar.gz
|
||||||
|
/selinux-policy-50a6afe.tar.gz
|
||||||
|
/selinux-policy-ad1d355.tar.gz
|
||||||
|
/selinux-policy-contrib-6db7310.tar.gz
|
||||||
|
/selinux-policy-b583642.tar.gz
|
||||||
|
/selinux-policy-contrib-80860a3.tar.gz
|
||||||
|
/selinux-policy-contrib-cafd506.tar.gz
|
||||||
|
/selinux-policy-6d96694.tar.gz
|
||||||
|
/selinux-policy-contrib-22a7272.tar.gz
|
||||||
|
/selinux-policy-7dd92fd.tar.gz
|
||||||
|
/selinux-policy-contrib-2a1096a.tar.gz
|
||||||
|
/selinux-policy-427796e.tar.gz
|
||||||
|
/selinux-policy-contrib-f55cbfd.tar.gz
|
||||||
|
/selinux-policy-f0e4878.tar.gz
|
||||||
|
/selinux-policy-contrib-27225b9.tar.gz
|
||||||
|
/selinux-policy-d5c0a2d.tar.gz
|
||||||
|
/selinux-policy-9c84d68.tar.gz
|
||||||
|
/selinux-policy-af31e95.tar.gz
|
||||||
|
/selinux-policy-contrib-3e36d23.tar.gz
|
||||||
|
/selinux-policy-contrib-72b3524.tar.gz
|
||||||
|
/selinux-policy-3952201.tar.gz
|
||||||
|
/selinux-policy-217d493.tar.gz
|
||||||
|
/selinux-policy-contrib-9b7cf70.tar.gz
|
||||||
|
/selinux-policy-6fe2056.tar.gz
|
||||||
|
/selinux-policy-contrib-7c37fde.tar.gz
|
||||||
|
/selinux-policy-5e99183.tar.gz
|
||||||
|
/selinux-policy-099ea7b.tar.gz
|
||||||
|
/selinux-policy-contrib-d78dc0e.tar.gz
|
||||||
|
/selinux-policy-4585c55.tar.gz
|
||||||
|
/selinux-policy-contrib-a79abda.tar.gz
|
||||||
|
/selinux-policy-16e3987.tar.gz
|
||||||
|
/selinux-policy-496bf1e.tar.gz
|
||||||
|
/selinux-policy-contrib-b1dcbc5.tar.gz
|
||||||
|
/selinux-policy-8ae4dfa.tar.gz
|
||||||
|
/selinux-policy-contrib-ed1077e.tar.gz
|
||||||
|
/selinux-policy-9bb39f6.tar.gz
|
340
COPYING
Normal file
340
COPYING
Normal file
@ -0,0 +1,340 @@
|
|||||||
|
GNU GENERAL PUBLIC LICENSE
|
||||||
|
Version 2, June 1991
|
||||||
|
|
||||||
|
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
|
||||||
|
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||||
|
Everyone is permitted to copy and distribute verbatim copies
|
||||||
|
of this license document, but changing it is not allowed.
|
||||||
|
|
||||||
|
Preamble
|
||||||
|
|
||||||
|
The licenses for most software are designed to take away your
|
||||||
|
freedom to share and change it. By contrast, the GNU General Public
|
||||||
|
License is intended to guarantee your freedom to share and change free
|
||||||
|
software--to make sure the software is free for all its users. This
|
||||||
|
General Public License applies to most of the Free Software
|
||||||
|
Foundation's software and to any other program whose authors commit to
|
||||||
|
using it. (Some other Free Software Foundation software is covered by
|
||||||
|
the GNU Library General Public License instead.) You can apply it to
|
||||||
|
your programs, too.
|
||||||
|
|
||||||
|
When we speak of free software, we are referring to freedom, not
|
||||||
|
price. Our General Public Licenses are designed to make sure that you
|
||||||
|
have the freedom to distribute copies of free software (and charge for
|
||||||
|
this service if you wish), that you receive source code or can get it
|
||||||
|
if you want it, that you can change the software or use pieces of it
|
||||||
|
in new free programs; and that you know you can do these things.
|
||||||
|
|
||||||
|
To protect your rights, we need to make restrictions that forbid
|
||||||
|
anyone to deny you these rights or to ask you to surrender the rights.
|
||||||
|
These restrictions translate to certain responsibilities for you if you
|
||||||
|
distribute copies of the software, or if you modify it.
|
||||||
|
|
||||||
|
For example, if you distribute copies of such a program, whether
|
||||||
|
gratis or for a fee, you must give the recipients all the rights that
|
||||||
|
you have. You must make sure that they, too, receive or can get the
|
||||||
|
source code. And you must show them these terms so they know their
|
||||||
|
rights.
|
||||||
|
|
||||||
|
We protect your rights with two steps: (1) copyright the software, and
|
||||||
|
(2) offer you this license which gives you legal permission to copy,
|
||||||
|
distribute and/or modify the software.
|
||||||
|
|
||||||
|
Also, for each author's protection and ours, we want to make certain
|
||||||
|
that everyone understands that there is no warranty for this free
|
||||||
|
software. If the software is modified by someone else and passed on, we
|
||||||
|
want its recipients to know that what they have is not the original, so
|
||||||
|
that any problems introduced by others will not reflect on the original
|
||||||
|
authors' reputations.
|
||||||
|
|
||||||
|
Finally, any free program is threatened constantly by software
|
||||||
|
patents. We wish to avoid the danger that redistributors of a free
|
||||||
|
program will individually obtain patent licenses, in effect making the
|
||||||
|
program proprietary. To prevent this, we have made it clear that any
|
||||||
|
patent must be licensed for everyone's free use or not licensed at all.
|
||||||
|
|
||||||
|
The precise terms and conditions for copying, distribution and
|
||||||
|
modification follow.
|
||||||
|
|
||||||
|
GNU GENERAL PUBLIC LICENSE
|
||||||
|
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||||||
|
|
||||||
|
0. This License applies to any program or other work which contains
|
||||||
|
a notice placed by the copyright holder saying it may be distributed
|
||||||
|
under the terms of this General Public License. The "Program", below,
|
||||||
|
refers to any such program or work, and a "work based on the Program"
|
||||||
|
means either the Program or any derivative work under copyright law:
|
||||||
|
that is to say, a work containing the Program or a portion of it,
|
||||||
|
either verbatim or with modifications and/or translated into another
|
||||||
|
language. (Hereinafter, translation is included without limitation in
|
||||||
|
the term "modification".) Each licensee is addressed as "you".
|
||||||
|
|
||||||
|
Activities other than copying, distribution and modification are not
|
||||||
|
covered by this License; they are outside its scope. The act of
|
||||||
|
running the Program is not restricted, and the output from the Program
|
||||||
|
is covered only if its contents constitute a work based on the
|
||||||
|
Program (independent of having been made by running the Program).
|
||||||
|
Whether that is true depends on what the Program does.
|
||||||
|
|
||||||
|
1. You may copy and distribute verbatim copies of the Program's
|
||||||
|
source code as you receive it, in any medium, provided that you
|
||||||
|
conspicuously and appropriately publish on each copy an appropriate
|
||||||
|
copyright notice and disclaimer of warranty; keep intact all the
|
||||||
|
notices that refer to this License and to the absence of any warranty;
|
||||||
|
and give any other recipients of the Program a copy of this License
|
||||||
|
along with the Program.
|
||||||
|
|
||||||
|
You may charge a fee for the physical act of transferring a copy, and
|
||||||
|
you may at your option offer warranty protection in exchange for a fee.
|
||||||
|
|
||||||
|
2. You may modify your copy or copies of the Program or any portion
|
||||||
|
of it, thus forming a work based on the Program, and copy and
|
||||||
|
distribute such modifications or work under the terms of Section 1
|
||||||
|
above, provided that you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) You must cause the modified files to carry prominent notices
|
||||||
|
stating that you changed the files and the date of any change.
|
||||||
|
|
||||||
|
b) You must cause any work that you distribute or publish, that in
|
||||||
|
whole or in part contains or is derived from the Program or any
|
||||||
|
part thereof, to be licensed as a whole at no charge to all third
|
||||||
|
parties under the terms of this License.
|
||||||
|
|
||||||
|
c) If the modified program normally reads commands interactively
|
||||||
|
when run, you must cause it, when started running for such
|
||||||
|
interactive use in the most ordinary way, to print or display an
|
||||||
|
announcement including an appropriate copyright notice and a
|
||||||
|
notice that there is no warranty (or else, saying that you provide
|
||||||
|
a warranty) and that users may redistribute the program under
|
||||||
|
these conditions, and telling the user how to view a copy of this
|
||||||
|
License. (Exception: if the Program itself is interactive but
|
||||||
|
does not normally print such an announcement, your work based on
|
||||||
|
the Program is not required to print an announcement.)
|
||||||
|
|
||||||
|
These requirements apply to the modified work as a whole. If
|
||||||
|
identifiable sections of that work are not derived from the Program,
|
||||||
|
and can be reasonably considered independent and separate works in
|
||||||
|
themselves, then this License, and its terms, do not apply to those
|
||||||
|
sections when you distribute them as separate works. But when you
|
||||||
|
distribute the same sections as part of a whole which is a work based
|
||||||
|
on the Program, the distribution of the whole must be on the terms of
|
||||||
|
this License, whose permissions for other licensees extend to the
|
||||||
|
entire whole, and thus to each and every part regardless of who wrote it.
|
||||||
|
|
||||||
|
Thus, it is not the intent of this section to claim rights or contest
|
||||||
|
your rights to work written entirely by you; rather, the intent is to
|
||||||
|
exercise the right to control the distribution of derivative or
|
||||||
|
collective works based on the Program.
|
||||||
|
|
||||||
|
In addition, mere aggregation of another work not based on the Program
|
||||||
|
with the Program (or with a work based on the Program) on a volume of
|
||||||
|
a storage or distribution medium does not bring the other work under
|
||||||
|
the scope of this License.
|
||||||
|
|
||||||
|
3. You may copy and distribute the Program (or a work based on it,
|
||||||
|
under Section 2) in object code or executable form under the terms of
|
||||||
|
Sections 1 and 2 above provided that you also do one of the following:
|
||||||
|
|
||||||
|
a) Accompany it with the complete corresponding machine-readable
|
||||||
|
source code, which must be distributed under the terms of Sections
|
||||||
|
1 and 2 above on a medium customarily used for software interchange; or,
|
||||||
|
|
||||||
|
b) Accompany it with a written offer, valid for at least three
|
||||||
|
years, to give any third party, for a charge no more than your
|
||||||
|
cost of physically performing source distribution, a complete
|
||||||
|
machine-readable copy of the corresponding source code, to be
|
||||||
|
distributed under the terms of Sections 1 and 2 above on a medium
|
||||||
|
customarily used for software interchange; or,
|
||||||
|
|
||||||
|
c) Accompany it with the information you received as to the offer
|
||||||
|
to distribute corresponding source code. (This alternative is
|
||||||
|
allowed only for noncommercial distribution and only if you
|
||||||
|
received the program in object code or executable form with such
|
||||||
|
an offer, in accord with Subsection b above.)
|
||||||
|
|
||||||
|
The source code for a work means the preferred form of the work for
|
||||||
|
making modifications to it. For an executable work, complete source
|
||||||
|
code means all the source code for all modules it contains, plus any
|
||||||
|
associated interface definition files, plus the scripts used to
|
||||||
|
control compilation and installation of the executable. However, as a
|
||||||
|
special exception, the source code distributed need not include
|
||||||
|
anything that is normally distributed (in either source or binary
|
||||||
|
form) with the major components (compiler, kernel, and so on) of the
|
||||||
|
operating system on which the executable runs, unless that component
|
||||||
|
itself accompanies the executable.
|
||||||
|
|
||||||
|
If distribution of executable or object code is made by offering
|
||||||
|
access to copy from a designated place, then offering equivalent
|
||||||
|
access to copy the source code from the same place counts as
|
||||||
|
distribution of the source code, even though third parties are not
|
||||||
|
compelled to copy the source along with the object code.
|
||||||
|
|
||||||
|
4. You may not copy, modify, sublicense, or distribute the Program
|
||||||
|
except as expressly provided under this License. Any attempt
|
||||||
|
otherwise to copy, modify, sublicense or distribute the Program is
|
||||||
|
void, and will automatically terminate your rights under this License.
|
||||||
|
However, parties who have received copies, or rights, from you under
|
||||||
|
this License will not have their licenses terminated so long as such
|
||||||
|
parties remain in full compliance.
|
||||||
|
|
||||||
|
5. You are not required to accept this License, since you have not
|
||||||
|
signed it. However, nothing else grants you permission to modify or
|
||||||
|
distribute the Program or its derivative works. These actions are
|
||||||
|
prohibited by law if you do not accept this License. Therefore, by
|
||||||
|
modifying or distributing the Program (or any work based on the
|
||||||
|
Program), you indicate your acceptance of this License to do so, and
|
||||||
|
all its terms and conditions for copying, distributing or modifying
|
||||||
|
the Program or works based on it.
|
||||||
|
|
||||||
|
6. Each time you redistribute the Program (or any work based on the
|
||||||
|
Program), the recipient automatically receives a license from the
|
||||||
|
original licensor to copy, distribute or modify the Program subject to
|
||||||
|
these terms and conditions. You may not impose any further
|
||||||
|
restrictions on the recipients' exercise of the rights granted herein.
|
||||||
|
You are not responsible for enforcing compliance by third parties to
|
||||||
|
this License.
|
||||||
|
|
||||||
|
7. If, as a consequence of a court judgment or allegation of patent
|
||||||
|
infringement or for any other reason (not limited to patent issues),
|
||||||
|
conditions are imposed on you (whether by court order, agreement or
|
||||||
|
otherwise) that contradict the conditions of this License, they do not
|
||||||
|
excuse you from the conditions of this License. If you cannot
|
||||||
|
distribute so as to satisfy simultaneously your obligations under this
|
||||||
|
License and any other pertinent obligations, then as a consequence you
|
||||||
|
may not distribute the Program at all. For example, if a patent
|
||||||
|
license would not permit royalty-free redistribution of the Program by
|
||||||
|
all those who receive copies directly or indirectly through you, then
|
||||||
|
the only way you could satisfy both it and this License would be to
|
||||||
|
refrain entirely from distribution of the Program.
|
||||||
|
|
||||||
|
If any portion of this section is held invalid or unenforceable under
|
||||||
|
any particular circumstance, the balance of the section is intended to
|
||||||
|
apply and the section as a whole is intended to apply in other
|
||||||
|
circumstances.
|
||||||
|
|
||||||
|
It is not the purpose of this section to induce you to infringe any
|
||||||
|
patents or other property right claims or to contest validity of any
|
||||||
|
such claims; this section has the sole purpose of protecting the
|
||||||
|
integrity of the free software distribution system, which is
|
||||||
|
implemented by public license practices. Many people have made
|
||||||
|
generous contributions to the wide range of software distributed
|
||||||
|
through that system in reliance on consistent application of that
|
||||||
|
system; it is up to the author/donor to decide if he or she is willing
|
||||||
|
to distribute software through any other system and a licensee cannot
|
||||||
|
impose that choice.
|
||||||
|
|
||||||
|
This section is intended to make thoroughly clear what is believed to
|
||||||
|
be a consequence of the rest of this License.
|
||||||
|
|
||||||
|
8. If the distribution and/or use of the Program is restricted in
|
||||||
|
certain countries either by patents or by copyrighted interfaces, the
|
||||||
|
original copyright holder who places the Program under this License
|
||||||
|
may add an explicit geographical distribution limitation excluding
|
||||||
|
those countries, so that distribution is permitted only in or among
|
||||||
|
countries not thus excluded. In such case, this License incorporates
|
||||||
|
the limitation as if written in the body of this License.
|
||||||
|
|
||||||
|
9. The Free Software Foundation may publish revised and/or new versions
|
||||||
|
of the General Public License from time to time. Such new versions will
|
||||||
|
be similar in spirit to the present version, but may differ in detail to
|
||||||
|
address new problems or concerns.
|
||||||
|
|
||||||
|
Each version is given a distinguishing version number. If the Program
|
||||||
|
specifies a version number of this License which applies to it and "any
|
||||||
|
later version", you have the option of following the terms and conditions
|
||||||
|
either of that version or of any later version published by the Free
|
||||||
|
Software Foundation. If the Program does not specify a version number of
|
||||||
|
this License, you may choose any version ever published by the Free Software
|
||||||
|
Foundation.
|
||||||
|
|
||||||
|
10. If you wish to incorporate parts of the Program into other free
|
||||||
|
programs whose distribution conditions are different, write to the author
|
||||||
|
to ask for permission. For software which is copyrighted by the Free
|
||||||
|
Software Foundation, write to the Free Software Foundation; we sometimes
|
||||||
|
make exceptions for this. Our decision will be guided by the two goals
|
||||||
|
of preserving the free status of all derivatives of our free software and
|
||||||
|
of promoting the sharing and reuse of software generally.
|
||||||
|
|
||||||
|
NO WARRANTY
|
||||||
|
|
||||||
|
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
||||||
|
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
||||||
|
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
||||||
|
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
||||||
|
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||||
|
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
||||||
|
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
||||||
|
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
||||||
|
REPAIR OR CORRECTION.
|
||||||
|
|
||||||
|
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||||
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
||||||
|
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
||||||
|
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
||||||
|
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
||||||
|
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
||||||
|
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
||||||
|
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
||||||
|
POSSIBILITY OF SUCH DAMAGES.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
How to Apply These Terms to Your New Programs
|
||||||
|
|
||||||
|
If you develop a new program, and you want it to be of the greatest
|
||||||
|
possible use to the public, the best way to achieve this is to make it
|
||||||
|
free software which everyone can redistribute and change under these terms.
|
||||||
|
|
||||||
|
To do so, attach the following notices to the program. It is safest
|
||||||
|
to attach them to the start of each source file to most effectively
|
||||||
|
convey the exclusion of warranty; and each file should have at least
|
||||||
|
the "copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
|
<one line to give the program's name and a brief idea of what it does.>
|
||||||
|
Copyright (C) <year> <name of author>
|
||||||
|
|
||||||
|
This program is free software; you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation; either version 2 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program; if not, write to the Free Software
|
||||||
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||||
|
|
||||||
|
|
||||||
|
Also add information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
|
If the program is interactive, make it output a short notice like this
|
||||||
|
when it starts in an interactive mode:
|
||||||
|
|
||||||
|
Gnomovision version 69, Copyright (C) year name of author
|
||||||
|
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||||
|
This is free software, and you are welcome to redistribute it
|
||||||
|
under certain conditions; type `show c' for details.
|
||||||
|
|
||||||
|
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||||
|
parts of the General Public License. Of course, the commands you use may
|
||||||
|
be called something other than `show w' and `show c'; they could even be
|
||||||
|
mouse-clicks or menu items--whatever suits your program.
|
||||||
|
|
||||||
|
You should also get your employer (if you work as a programmer) or your
|
||||||
|
school, if any, to sign a "copyright disclaimer" for the program, if
|
||||||
|
necessary. Here is a sample; alter the names:
|
||||||
|
|
||||||
|
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
||||||
|
`Gnomovision' (which makes passes at compilers) written by James Hacker.
|
||||||
|
|
||||||
|
<signature of Ty Coon>, 1 April 1989
|
||||||
|
Ty Coon, President of Vice
|
||||||
|
|
||||||
|
This General Public License does not permit incorporating your program into
|
||||||
|
proprietary programs. If your program is a subroutine library, you may
|
||||||
|
consider it more useful to permit linking proprietary applications with the
|
||||||
|
library. If this is what you want to do, use the GNU Library General
|
||||||
|
Public License instead of this License.
|
22
Makefile.devel
Normal file
22
Makefile.devel
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
# installation paths
|
||||||
|
SHAREDIR := /usr/share/selinux
|
||||||
|
|
||||||
|
AWK ?= gawk
|
||||||
|
NAME ?= $(strip $(shell $(AWK) -F= '/^SELINUXTYPE/{ print $$2 }' /etc/selinux/config))
|
||||||
|
|
||||||
|
ifeq ($(MLSENABLED),)
|
||||||
|
MLSENABLED := 1
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifeq ($(MLSENABLED),1)
|
||||||
|
NTYPE = mcs
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifeq ($(NAME),mls)
|
||||||
|
NTYPE = mls
|
||||||
|
endif
|
||||||
|
|
||||||
|
TYPE ?= $(NTYPE)
|
||||||
|
|
||||||
|
HEADERDIR := $(SHAREDIR)/devel/include
|
||||||
|
include $(HEADERDIR)/Makefile
|
67
README.md
Normal file
67
README.md
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
## Purpose
|
||||||
|
|
||||||
|
SELinux Fedora Policy is a large patch off the mainline. The [fedora-selinux/selinux-policy](https://github.com/selinux-policy/selinux-policy.git) makes Fedora Policy packaging more simple and transparent for developers, upstream developers and users. It is used for applying downstream Fedora fixes, for communication about proposed/committed changes, for communication with upstream and the community. It reflects upstream repository structure to make submitting patches to upstream easy.
|
||||||
|
|
||||||
|
## Structure
|
||||||
|
|
||||||
|
### github
|
||||||
|
On GitHub, we have two repositories (selinux-policy and selinux-policy-contrib ) for dist-git repository.
|
||||||
|
|
||||||
|
$ cd selinux-policy
|
||||||
|
$ git remote -v
|
||||||
|
origin git@github.com:fedora-selinux/selinux-policy.git (fetch)
|
||||||
|
|
||||||
|
|
||||||
|
$ git branch -r
|
||||||
|
origin/HEAD -> origin/master
|
||||||
|
origin/f27
|
||||||
|
origin/f28
|
||||||
|
origin/master
|
||||||
|
origin/rawhide
|
||||||
|
|
||||||
|
$ cd selinux-policy-contrib
|
||||||
|
$ git remote -v
|
||||||
|
origin git@github.com:fedora-selinux/selinux-policy-contrib.git (fetch)
|
||||||
|
|
||||||
|
$ git branch -r
|
||||||
|
origin/HEAD -> origin/master
|
||||||
|
origin/f27
|
||||||
|
origin/f28
|
||||||
|
origin/master
|
||||||
|
origin/rawhide
|
||||||
|
|
||||||
|
Note: _master_ branch on GitHub does not reflect master branch in dist-git. For this purpose, we created the _rawhide github branches in both selinux-policy and selinux-policy-contrib repositories.
|
||||||
|
|
||||||
|
### dist-git
|
||||||
|
Package sources in dist-git are generally composed from a _selinux-policy and _selinux-policy-contrib repository snapshots tarballs and from other config files.
|
||||||
|
|
||||||
|
## Build process
|
||||||
|
|
||||||
|
1. clone [fedora-selinux/selinux-policy](https://github.com/fedora-selinux/selinux-policy) repository
|
||||||
|
|
||||||
|
$ cd ~/devel/github
|
||||||
|
$ git clone git@github.com:fedora-selinux/selinux-policy.git
|
||||||
|
$ cd selinux-policy
|
||||||
|
|
||||||
|
2. clone [fedora-selinux/selinux-policy-contrib](https://github.com/fedora-selinux/selinux-policy-contrib) repository
|
||||||
|
|
||||||
|
$ cd ~/devel/github
|
||||||
|
$ git clone git@github.com:fedora-selinux/selinux-policy-contrib.git
|
||||||
|
$ cd selinux-policy-contrib
|
||||||
|
|
||||||
|
3. create, backport, cherry-pick needed changes to a particular branch and push them
|
||||||
|
|
||||||
|
4. clone **selinux-policy** dist-git repository
|
||||||
|
|
||||||
|
$ cd ~/devel/dist-git
|
||||||
|
$ fedpkg clone selinux-policy
|
||||||
|
$ cd selinux-policy
|
||||||
|
|
||||||
|
4. Download the latest snaphots from selinux-policy and selinux-policy-contrib github repositories
|
||||||
|
|
||||||
|
$ ./make-rhat-patches.sh
|
||||||
|
|
||||||
|
5. add changes to the dist-git repository, bump release, create a changelog entry, commit and push
|
||||||
|
6. build the package
|
||||||
|
|
||||||
|
$ fedpkg build
|
248
booleans-minimum.conf
Normal file
248
booleans-minimum.conf
Normal file
@ -0,0 +1,248 @@
|
|||||||
|
# Allow making anonymous memory executable, e.g.for runtime-code generation or executable stack.
|
||||||
|
#
|
||||||
|
allow_execmem = false
|
||||||
|
|
||||||
|
# Allow making a modified private filemapping executable (text relocation).
|
||||||
|
#
|
||||||
|
allow_execmod = false
|
||||||
|
|
||||||
|
# Allow making the stack executable via mprotect.Also requires allow_execmem.
|
||||||
|
#
|
||||||
|
allow_execstack = true
|
||||||
|
|
||||||
|
# Allow ftpd to read cifs directories.
|
||||||
|
#
|
||||||
|
allow_ftpd_use_cifs = false
|
||||||
|
|
||||||
|
# Allow ftpd to read nfs directories.
|
||||||
|
#
|
||||||
|
allow_ftpd_use_nfs = false
|
||||||
|
|
||||||
|
# Allow ftp servers to modify public filesused for public file transfer services.
|
||||||
|
#
|
||||||
|
allow_ftpd_anon_write = false
|
||||||
|
|
||||||
|
# Allow gssd to read temp directory.
|
||||||
|
#
|
||||||
|
allow_gssd_read_tmp = true
|
||||||
|
|
||||||
|
# Allow Apache to modify public filesused for public file transfer services.
|
||||||
|
#
|
||||||
|
allow_httpd_anon_write = false
|
||||||
|
|
||||||
|
# Allow Apache to use mod_auth_pam module
|
||||||
|
#
|
||||||
|
allow_httpd_mod_auth_pam = false
|
||||||
|
|
||||||
|
# Allow system to run with kerberos
|
||||||
|
#
|
||||||
|
allow_kerberos = true
|
||||||
|
|
||||||
|
# Allow rsync to modify public filesused for public file transfer services.
|
||||||
|
#
|
||||||
|
allow_rsync_anon_write = false
|
||||||
|
|
||||||
|
# Allow sasl to read shadow
|
||||||
|
#
|
||||||
|
allow_saslauthd_read_shadow = false
|
||||||
|
|
||||||
|
# Allow samba to modify public filesused for public file transfer services.
|
||||||
|
#
|
||||||
|
allow_smbd_anon_write = false
|
||||||
|
|
||||||
|
# Allow system to run with NIS
|
||||||
|
#
|
||||||
|
allow_ypbind = false
|
||||||
|
|
||||||
|
# Allow zebra to write it own configuration files
|
||||||
|
#
|
||||||
|
allow_zebra_write_config = false
|
||||||
|
|
||||||
|
# Enable extra rules in the cron domainto support fcron.
|
||||||
|
#
|
||||||
|
fcron_crond = false
|
||||||
|
|
||||||
|
#
|
||||||
|
# allow httpd to connect to mysql/posgresql
|
||||||
|
httpd_can_network_connect_db = false
|
||||||
|
|
||||||
|
#
|
||||||
|
# allow httpd to send dbus messages to avahi
|
||||||
|
httpd_dbus_avahi = true
|
||||||
|
|
||||||
|
#
|
||||||
|
# allow httpd to network relay
|
||||||
|
httpd_can_network_relay = false
|
||||||
|
|
||||||
|
# Allow httpd to use built in scripting (usually php)
|
||||||
|
#
|
||||||
|
httpd_builtin_scripting = true
|
||||||
|
|
||||||
|
# Allow http daemon to tcp connect
|
||||||
|
#
|
||||||
|
httpd_can_network_connect = false
|
||||||
|
|
||||||
|
# Allow httpd cgi support
|
||||||
|
#
|
||||||
|
httpd_enable_cgi = true
|
||||||
|
|
||||||
|
# Allow httpd to act as a FTP server bylistening on the ftp port.
|
||||||
|
#
|
||||||
|
httpd_enable_ftp_server = false
|
||||||
|
|
||||||
|
# Allow httpd to read home directories
|
||||||
|
#
|
||||||
|
httpd_enable_homedirs = false
|
||||||
|
|
||||||
|
# Run SSI execs in system CGI script domain.
|
||||||
|
#
|
||||||
|
httpd_ssi_exec = false
|
||||||
|
|
||||||
|
# Allow http daemon to communicate with the TTY
|
||||||
|
#
|
||||||
|
httpd_tty_comm = false
|
||||||
|
|
||||||
|
# Run CGI in the main httpd domain
|
||||||
|
#
|
||||||
|
httpd_unified = false
|
||||||
|
|
||||||
|
# Allow BIND to write the master zone files.Generally this is used for dynamic DNS.
|
||||||
|
#
|
||||||
|
named_write_master_zones = false
|
||||||
|
|
||||||
|
# Allow nfs to be exported read/write.
|
||||||
|
#
|
||||||
|
nfs_export_all_rw = true
|
||||||
|
|
||||||
|
# Allow nfs to be exported read only
|
||||||
|
#
|
||||||
|
nfs_export_all_ro = true
|
||||||
|
|
||||||
|
# Allow pppd to load kernel modules for certain modems
|
||||||
|
#
|
||||||
|
pppd_can_insmod = false
|
||||||
|
|
||||||
|
# Allow reading of default_t files.
|
||||||
|
#
|
||||||
|
read_default_t = false
|
||||||
|
|
||||||
|
# Allow samba to export user home directories.
|
||||||
|
#
|
||||||
|
samba_enable_home_dirs = false
|
||||||
|
|
||||||
|
# Allow squid to connect to all ports, not justHTTP, FTP, and Gopher ports.
|
||||||
|
#
|
||||||
|
squid_connect_any = false
|
||||||
|
|
||||||
|
# Support NFS home directories
|
||||||
|
#
|
||||||
|
use_nfs_home_dirs = true
|
||||||
|
|
||||||
|
# Support SAMBA home directories
|
||||||
|
#
|
||||||
|
use_samba_home_dirs = false
|
||||||
|
|
||||||
|
# Control users use of ping and traceroute
|
||||||
|
#
|
||||||
|
user_ping = false
|
||||||
|
|
||||||
|
# allow host key based authentication
|
||||||
|
#
|
||||||
|
allow_ssh_keysign = false
|
||||||
|
|
||||||
|
# Allow pppd to be run for a regular user
|
||||||
|
#
|
||||||
|
pppd_for_user = false
|
||||||
|
|
||||||
|
# Allow applications to read untrusted contentIf this is disallowed, Internet content hasto be manually relabeled for read access to be granted
|
||||||
|
#
|
||||||
|
read_untrusted_content = false
|
||||||
|
|
||||||
|
# Allow spamd to write to users homedirs
|
||||||
|
#
|
||||||
|
spamd_enable_home_dirs = false
|
||||||
|
|
||||||
|
# Allow regular users direct mouse access
|
||||||
|
#
|
||||||
|
user_direct_mouse = false
|
||||||
|
|
||||||
|
# Allow users to read system messages.
|
||||||
|
#
|
||||||
|
user_dmesg = false
|
||||||
|
|
||||||
|
# Allow user to r/w files on filesystemsthat do not have extended attributes (FAT, CDROM, FLOPPY)
|
||||||
|
#
|
||||||
|
user_rw_noexattrfile = false
|
||||||
|
|
||||||
|
# Allow users to run TCP servers (bind to ports and accept connection fromthe same domain and outside users) disabling this forces FTP passive modeand may change other protocols.
|
||||||
|
#
|
||||||
|
user_tcp_server = false
|
||||||
|
|
||||||
|
# Allow w to display everyone
|
||||||
|
#
|
||||||
|
user_ttyfile_stat = false
|
||||||
|
|
||||||
|
# Allow applications to write untrusted contentIf this is disallowed, no Internet contentwill be stored.
|
||||||
|
#
|
||||||
|
write_untrusted_content = false
|
||||||
|
|
||||||
|
# Allow all domains to talk to ttys
|
||||||
|
#
|
||||||
|
allow_daemons_use_tty = false
|
||||||
|
|
||||||
|
# Allow login domains to polyinstatiate directories
|
||||||
|
#
|
||||||
|
allow_polyinstantiation = false
|
||||||
|
|
||||||
|
# Allow all domains to dump core
|
||||||
|
#
|
||||||
|
allow_daemons_dump_core = true
|
||||||
|
|
||||||
|
# Allow samba to act as the domain controller
|
||||||
|
#
|
||||||
|
samba_domain_controller = false
|
||||||
|
|
||||||
|
# Allow samba to export user home directories.
|
||||||
|
#
|
||||||
|
samba_run_unconfined = false
|
||||||
|
|
||||||
|
# Allows XServer to execute writable memory
|
||||||
|
#
|
||||||
|
allow_xserver_execmem = false
|
||||||
|
|
||||||
|
# disallow guest accounts to execute files that they can create
|
||||||
|
#
|
||||||
|
allow_guest_exec_content = false
|
||||||
|
allow_xguest_exec_content = false
|
||||||
|
|
||||||
|
# Only allow browser to use the web
|
||||||
|
#
|
||||||
|
browser_confine_xguest=false
|
||||||
|
|
||||||
|
# Allow postfix locat to write to mail spool
|
||||||
|
#
|
||||||
|
allow_postfix_local_write_mail_spool=false
|
||||||
|
|
||||||
|
# Allow common users to read/write noexattrfile systems
|
||||||
|
#
|
||||||
|
user_rw_noexattrfile=true
|
||||||
|
|
||||||
|
# Allow qemu to connect fully to the network
|
||||||
|
#
|
||||||
|
qemu_full_network=true
|
||||||
|
|
||||||
|
# Allow nsplugin execmem/execstack for bad plugins
|
||||||
|
#
|
||||||
|
allow_nsplugin_execmem=true
|
||||||
|
|
||||||
|
# Allow unconfined domain to transition to confined domain
|
||||||
|
#
|
||||||
|
allow_unconfined_nsplugin_transition=true
|
||||||
|
|
||||||
|
# System uses init upstart program
|
||||||
|
#
|
||||||
|
init_upstart = true
|
||||||
|
|
||||||
|
# Allow mount to mount any file/dir
|
||||||
|
#
|
||||||
|
allow_mount_anyfile = true
|
6
booleans-mls.conf
Normal file
6
booleans-mls.conf
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
kerberos_enabled = true
|
||||||
|
mount_anyfile = true
|
||||||
|
polyinstantiation_enabled = true
|
||||||
|
ftpd_is_daemon = true
|
||||||
|
selinuxuser_ping = true
|
||||||
|
xserver_object_manager = true
|
25
booleans-targeted.conf
Normal file
25
booleans-targeted.conf
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
gssd_read_tmp = true
|
||||||
|
httpd_builtin_scripting = true
|
||||||
|
httpd_enable_cgi = true
|
||||||
|
kerberos_enabled = true
|
||||||
|
mount_anyfile = true
|
||||||
|
nfs_export_all_ro = true
|
||||||
|
nfs_export_all_rw = true
|
||||||
|
nscd_use_shm = true
|
||||||
|
openvpn_enable_homedirs = true
|
||||||
|
postfix_local_write_mail_spool=true
|
||||||
|
pppd_can_insmod = false
|
||||||
|
privoxy_connect_any = true
|
||||||
|
selinuxuser_direct_dri_enabled = true
|
||||||
|
selinuxuser_execmem = true
|
||||||
|
selinuxuser_execmod = true
|
||||||
|
selinuxuser_execstack = true
|
||||||
|
selinuxuser_rw_noexattrfile=true
|
||||||
|
selinuxuser_ping = true
|
||||||
|
squid_connect_any = true
|
||||||
|
telepathy_tcp_connect_generic_network_ports=true
|
||||||
|
unconfined_chrome_sandbox_transition=true
|
||||||
|
unconfined_mozilla_plugin_transition=true
|
||||||
|
xguest_exec_content = true
|
||||||
|
mozilla_plugin_can_network_connect = true
|
||||||
|
use_virtualbox = true
|
54
booleans.subs_dist
Normal file
54
booleans.subs_dist
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
allow_auditadm_exec_content auditadm_exec_content
|
||||||
|
allow_console_login login_console_enabled
|
||||||
|
allow_cvs_read_shadow cvs_read_shadow
|
||||||
|
allow_daemons_dump_core daemons_dump_core
|
||||||
|
allow_daemons_use_tcp_wrapper daemons_use_tcp_wrapper
|
||||||
|
allow_daemons_use_tty daemons_use_tty
|
||||||
|
allow_domain_fd_use domain_fd_use
|
||||||
|
allow_execheap selinuxuser_execheap
|
||||||
|
allow_execmod selinuxuser_execmod
|
||||||
|
allow_execstack selinuxuser_execstack
|
||||||
|
allow_ftpd_anon_write ftpd_anon_write
|
||||||
|
allow_ftpd_full_access ftpd_full_access
|
||||||
|
allow_ftpd_use_cifs ftpd_use_cifs
|
||||||
|
allow_ftpd_use_nfs ftpd_use_nfs
|
||||||
|
allow_gssd_read_tmp gssd_read_tmp
|
||||||
|
allow_guest_exec_content guest_exec_content
|
||||||
|
allow_httpd_anon_write httpd_anon_write
|
||||||
|
allow_httpd_mod_auth_ntlm_winbind httpd_mod_auth_ntlm_winbind
|
||||||
|
allow_httpd_mod_auth_pam httpd_mod_auth_pam
|
||||||
|
allow_httpd_sys_script_anon_write httpd_sys_script_anon_write
|
||||||
|
allow_kerberos kerberos_enabled
|
||||||
|
allow_mplayer_execstack mplayer_execstack
|
||||||
|
allow_mount_anyfile mount_anyfile
|
||||||
|
allow_nfsd_anon_write nfsd_anon_write
|
||||||
|
allow_polyinstantiation polyinstantiation_enabled
|
||||||
|
allow_postfix_local_write_mail_spool postfix_local_write_mail_spool
|
||||||
|
allow_rsync_anon_write rsync_anon_write
|
||||||
|
allow_saslauthd_read_shadow saslauthd_read_shadow
|
||||||
|
allow_secadm_exec_content secadm_exec_content
|
||||||
|
allow_smbd_anon_write smbd_anon_write
|
||||||
|
allow_ssh_keysign ssh_keysign
|
||||||
|
allow_staff_exec_content staff_exec_content
|
||||||
|
allow_sysadm_exec_content sysadm_exec_content
|
||||||
|
allow_user_exec_content user_exec_content
|
||||||
|
allow_user_mysql_connect selinuxuser_mysql_connect_enabled
|
||||||
|
allow_user_postgresql_connect selinuxuser_postgresql_connect_enabled
|
||||||
|
allow_write_xshm xserver_clients_write_xshm
|
||||||
|
allow_xguest_exec_content xguest_exec_content
|
||||||
|
allow_xserver_execmem xserver_execmem
|
||||||
|
allow_ypbind nis_enabled
|
||||||
|
allow_zebra_write_config zebra_write_config
|
||||||
|
user_direct_dri selinuxuser_direct_dri_enabled
|
||||||
|
user_ping selinuxuser_ping
|
||||||
|
user_share_music selinuxuser_share_music
|
||||||
|
user_tcp_server selinuxuser_tcp_server
|
||||||
|
sepgsql_enable_pitr_implementation postgresql_can_rsync
|
||||||
|
sepgsql_enable_users_ddl postgresql_selinux_users_ddl
|
||||||
|
sepgsql_transmit_client_label postgresql_selinux_transmit_client_label
|
||||||
|
sepgsql_unconfined_dbadm postgresql_selinux_unconfined_dbadm
|
||||||
|
clamd_use_jit antivirus_use_jit
|
||||||
|
amavis_use_jit antivirus_use_jit
|
||||||
|
logwatch_can_sendmail logwatch_can_network_connect_mail
|
||||||
|
puppet_manage_all_files puppetagent_manage_all_files
|
||||||
|
virt_sandbox_use_nfs virt_use_nfs
|
14
customizable_types
Normal file
14
customizable_types
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
container_file_t
|
||||||
|
sandbox_file_t
|
||||||
|
svirt_image_t
|
||||||
|
svirt_home_t
|
||||||
|
svirt_sandbox_file_t
|
||||||
|
virt_content_t
|
||||||
|
httpd_user_htaccess_t
|
||||||
|
httpd_user_script_exec_t
|
||||||
|
httpd_user_rw_content_t
|
||||||
|
httpd_user_ra_content_t
|
||||||
|
httpd_user_content_t
|
||||||
|
git_session_content_t
|
||||||
|
home_bin_t
|
||||||
|
user_tty_device_t
|
21
file_contexts.subs_dist
Normal file
21
file_contexts.subs_dist
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
/run /var/run
|
||||||
|
/run/lock /var/lock
|
||||||
|
/run/systemd/system /usr/lib/systemd/system
|
||||||
|
/run/systemd/generator /usr/lib/systemd/system
|
||||||
|
/run/systemd/generator.late /usr/lib/systemd/system
|
||||||
|
/lib /usr/lib
|
||||||
|
/lib64 /usr/lib
|
||||||
|
/usr/lib64 /usr/lib
|
||||||
|
/usr/local/lib64 /usr/lib
|
||||||
|
/usr/local/lib32 /usr/lib
|
||||||
|
/etc/systemd/system /usr/lib/systemd/system
|
||||||
|
/var/lib/xguest/home /home
|
||||||
|
/var/named/chroot/usr/lib64 /usr/lib
|
||||||
|
/var/named/chroot/lib64 /usr/lib
|
||||||
|
/var/named/chroot/var /var
|
||||||
|
/home-inst /home
|
||||||
|
/home/home-inst /home
|
||||||
|
/var/roothome /root
|
||||||
|
/sbin /usr/sbin
|
||||||
|
/sysroot/tmp /tmp
|
||||||
|
/var/usrlocal /usr/local
|
76
make-rhat-patches.sh
Executable file
76
make-rhat-patches.sh
Executable file
@ -0,0 +1,76 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
DISTGIT_PATH=$(pwd)
|
||||||
|
|
||||||
|
FEDORA_VERSION=rawhide
|
||||||
|
DOCKER_FEDORA_VERSION=master
|
||||||
|
DISTGIT_BRANCH=master
|
||||||
|
REPO_SELINUX_POLICY=${REPO_SELINUX_POLICY:-https://github.com/fedora-selinux/selinux-policy}
|
||||||
|
REPO_SELINUX_POLICY_BRANCH=${REPO_SELINUX_POLICY_BRANCH:-$FEDORA_VERSION}
|
||||||
|
REPO_SELINUX_POLICY_CONTRIB=${REPO_SELINUX_POLICY_CONTRIB:-https://github.com/fedora-selinux/selinux-policy-contrib}
|
||||||
|
REPO_SELINUX_POLICY_CONTRIB_BRANCH=${REPO_SELINUX_POLICY_CONTRIB_BRANCH:-$FEDORA_VERSION}
|
||||||
|
REPO_CONTAINER_SELINUX=${REPO_CONTAINER_SELINUX:-https://github.com/containers/container-selinux}
|
||||||
|
REPO_MACRO_EXPANDER=${REPO_MACRO_EXPANDER:-https://github.com/fedora-selinux/macro-expander.git}
|
||||||
|
|
||||||
|
# When -l is specified, we use locally created tarballs and don't download them from github
|
||||||
|
DOWNLOAD_DEFAULT_GITHUB_TARBALLS=1
|
||||||
|
if [ "$1" == "-l" ]; then
|
||||||
|
DOWNLOAD_DEFAULT_GITHUB_TARBALLS=0
|
||||||
|
fi
|
||||||
|
|
||||||
|
git checkout $DISTGIT_BRANCH -q
|
||||||
|
|
||||||
|
POLICYSOURCES=`mktemp -d --tmpdir policysources.XXXXXX`
|
||||||
|
pushd $POLICYSOURCES > /dev/null
|
||||||
|
|
||||||
|
git clone --depth=1 -q $REPO_SELINUX_POLICY selinux-policy \
|
||||||
|
-b $REPO_SELINUX_POLICY_BRANCH
|
||||||
|
git clone --depth=1 -q $REPO_SELINUX_POLICY_CONTRIB selinux-policy-contrib \
|
||||||
|
-b $REPO_SELINUX_POLICY_CONTRIB_BRANCH
|
||||||
|
git clone --depth=1 -q $REPO_CONTAINER_SELINUX container-selinux
|
||||||
|
git clone --depth=1 -q $REPO_MACRO_EXPANDER macro-expander
|
||||||
|
|
||||||
|
pushd selinux-policy > /dev/null
|
||||||
|
# prepare policy patches against upstream commits matching the last upstream merge
|
||||||
|
BASE_HEAD_ID=$(git rev-parse HEAD)
|
||||||
|
BASE_SHORT_HEAD_ID=$(c=${BASE_HEAD_ID}; echo ${c:0:7})
|
||||||
|
git archive --prefix=selinux-policy-$BASE_HEAD_ID/ --format tgz HEAD > $DISTGIT_PATH/selinux-policy-$BASE_SHORT_HEAD_ID.tar.gz
|
||||||
|
popd > /dev/null
|
||||||
|
|
||||||
|
pushd selinux-policy-contrib > /dev/null
|
||||||
|
# prepare policy patches against upstream commits matching the last upstream merge
|
||||||
|
CONTRIB_HEAD_ID=$(git rev-parse HEAD)
|
||||||
|
CONTRIB_SHORT_HEAD_ID=$(c=${CONTRIB_HEAD_ID}; echo ${c:0:7})
|
||||||
|
git archive --prefix=selinux-policy-contrib-$CONTRIB_HEAD_ID/ --format tgz HEAD > $DISTGIT_PATH/selinux-policy-contrib-$CONTRIB_SHORT_HEAD_ID.tar.gz
|
||||||
|
popd > /dev/null
|
||||||
|
|
||||||
|
pushd container-selinux > /dev/null
|
||||||
|
# Actual container-selinux files are in master branch
|
||||||
|
#git checkout -b ${DOCKER_FEDORA_VERSION} -t origin/${DOCKER_FEDORA_VERSION} -q
|
||||||
|
tar -czf container-selinux.tgz container.if container.te container.fc
|
||||||
|
popd > /dev/null
|
||||||
|
|
||||||
|
pushd $DISTGIT_PATH > /dev/null
|
||||||
|
if [ $DOWNLOAD_DEFAULT_GITHUB_TARBALLS == 1 ]; then
|
||||||
|
wget -O selinux-policy-${BASE_SHORT_HEAD_ID}.tar.gz https://github.com/fedora-selinux/selinux-policy/archive/${BASE_HEAD_ID}.tar.gz &> /dev/null
|
||||||
|
wget -O selinux-policy-contrib-${CONTRIB_SHORT_HEAD_ID}.tar.gz https://github.com/fedora-selinux/selinux-policy-contrib/archive/${CONTRIB_HEAD_ID}.tar.gz &> /dev/null
|
||||||
|
fi
|
||||||
|
cp $POLICYSOURCES/container-selinux/container-selinux.tgz .
|
||||||
|
cp $POLICYSOURCES/macro-expander/macro-expander.sh ./macro-expander
|
||||||
|
chmod +x ./macro-expander
|
||||||
|
popd > /dev/null
|
||||||
|
|
||||||
|
popd > /dev/null
|
||||||
|
rm -rf $POLICYSOURCES
|
||||||
|
|
||||||
|
# Update commit ids in selinux-policy.spec file
|
||||||
|
sed -i "s/%global commit0 [^ ]*$/%global commit0 $BASE_HEAD_ID/" selinux-policy.spec
|
||||||
|
sed -i "s/%global commit1 [^ ]*$/%global commit1 $CONTRIB_HEAD_ID/" selinux-policy.spec
|
||||||
|
|
||||||
|
# Update sources
|
||||||
|
sha512sum --tag selinux-policy-${BASE_SHORT_HEAD_ID}.tar.gz selinux-policy-contrib-${CONTRIB_SHORT_HEAD_ID}.tar.gz container-selinux.tgz macro-expander > sources
|
||||||
|
|
||||||
|
echo -e "\nSELinux policy tarballs and container.tgz with container policy files have been created."
|
||||||
|
echo "Commit ids of selinux-policy and selinux-policy-contrib in spec file were changed to:"
|
||||||
|
echo "commit0 " ${BASE_HEAD_ID}
|
||||||
|
echo "commit1 " ${CONTRIB_HEAD_ID}
|
1
modules-minimum.conf
Symbolic link
1
modules-minimum.conf
Symbolic link
@ -0,0 +1 @@
|
|||||||
|
modules-targeted.conf
|
380
modules-mls-base.conf
Normal file
380
modules-mls-base.conf
Normal file
@ -0,0 +1,380 @@
|
|||||||
|
# Layer: kernel
|
||||||
|
# Module: bootloader
|
||||||
|
#
|
||||||
|
# Policy for the kernel modules, kernel image, and bootloader.
|
||||||
|
#
|
||||||
|
bootloader = module
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: corenetwork
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy controlling access to network objects
|
||||||
|
#
|
||||||
|
corenetwork = base
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: dmesg
|
||||||
|
#
|
||||||
|
# Policy for dmesg.
|
||||||
|
#
|
||||||
|
dmesg = module
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: netutils
|
||||||
|
#
|
||||||
|
# Network analysis utilities
|
||||||
|
#
|
||||||
|
netutils = module
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: sudo
|
||||||
|
#
|
||||||
|
# Execute a command with a substitute user
|
||||||
|
#
|
||||||
|
sudo = module
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: su
|
||||||
|
#
|
||||||
|
# Run shells with substitute user and group
|
||||||
|
#
|
||||||
|
su = module
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: usermanage
|
||||||
|
#
|
||||||
|
# Policy for managing user accounts.
|
||||||
|
#
|
||||||
|
usermanage = module
|
||||||
|
|
||||||
|
# Layer: apps
|
||||||
|
# Module: seunshare
|
||||||
|
#
|
||||||
|
# seunshare executable
|
||||||
|
#
|
||||||
|
seunshare = module
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: corecommands
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Core policy for shells, and generic programs
|
||||||
|
# in /bin, /sbin, /usr/bin, and /usr/sbin.
|
||||||
|
#
|
||||||
|
corecommands = base
|
||||||
|
|
||||||
|
# Module: devices
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Device nodes and interfaces for many basic system devices.
|
||||||
|
#
|
||||||
|
devices = base
|
||||||
|
|
||||||
|
# Module: domain
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Core policy for domains.
|
||||||
|
#
|
||||||
|
domain = base
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: userdomain
|
||||||
|
#
|
||||||
|
# Policy for user domains
|
||||||
|
#
|
||||||
|
userdomain = module
|
||||||
|
|
||||||
|
# Module: files
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Basic filesystem types and interfaces.
|
||||||
|
#
|
||||||
|
files = base
|
||||||
|
|
||||||
|
# Module: filesystem
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for filesystems.
|
||||||
|
#
|
||||||
|
filesystem = base
|
||||||
|
|
||||||
|
# Module: kernel
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for kernel threads, proc filesystem,and unlabeled processes and objects.
|
||||||
|
#
|
||||||
|
kernel = base
|
||||||
|
|
||||||
|
# Module: mcs
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# MultiCategory security policy
|
||||||
|
#
|
||||||
|
mcs = base
|
||||||
|
|
||||||
|
# Module: mls
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Multilevel security policy
|
||||||
|
#
|
||||||
|
mls = base
|
||||||
|
|
||||||
|
# Module: selinux
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for kernel security interface, in particular, selinuxfs.
|
||||||
|
#
|
||||||
|
selinux = base
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: storage
|
||||||
|
#
|
||||||
|
# Policy controlling access to storage devices
|
||||||
|
#
|
||||||
|
storage = base
|
||||||
|
|
||||||
|
# Module: terminal
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for terminals.
|
||||||
|
#
|
||||||
|
terminal = base
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: ubac
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#
|
||||||
|
ubac = base
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: unlabelednet
|
||||||
|
#
|
||||||
|
# The unlabelednet module.
|
||||||
|
#
|
||||||
|
unlabelednet = module
|
||||||
|
|
||||||
|
# Layer: role
|
||||||
|
# Module: auditadm
|
||||||
|
#
|
||||||
|
# auditadm account on tty logins
|
||||||
|
#
|
||||||
|
auditadm = module
|
||||||
|
|
||||||
|
# Layer: role
|
||||||
|
# Module: logadm
|
||||||
|
#
|
||||||
|
# Minimally prived root role for managing logging system
|
||||||
|
#
|
||||||
|
logadm = module
|
||||||
|
|
||||||
|
# Layer: role
|
||||||
|
# Module: secadm
|
||||||
|
#
|
||||||
|
# secadm account on tty logins
|
||||||
|
#
|
||||||
|
secadm = module
|
||||||
|
|
||||||
|
# Layer:role
|
||||||
|
# Module: staff
|
||||||
|
#
|
||||||
|
# admin account
|
||||||
|
#
|
||||||
|
staff = module
|
||||||
|
|
||||||
|
# Layer:role
|
||||||
|
# Module: sysadm_secadm
|
||||||
|
#
|
||||||
|
# System Administrator with Security Admin rules
|
||||||
|
#
|
||||||
|
sysadm_secadm = module
|
||||||
|
|
||||||
|
# Layer:role
|
||||||
|
# Module: sysadm
|
||||||
|
#
|
||||||
|
# System Administrator
|
||||||
|
#
|
||||||
|
sysadm = module
|
||||||
|
|
||||||
|
# Layer: role
|
||||||
|
# Module: unprivuser
|
||||||
|
#
|
||||||
|
# Minimally privs guest account on tty logins
|
||||||
|
#
|
||||||
|
unprivuser = module
|
||||||
|
|
||||||
|
# Layer: services
|
||||||
|
# Module: postgresql
|
||||||
|
#
|
||||||
|
# PostgreSQL relational database
|
||||||
|
#
|
||||||
|
postgresql = module
|
||||||
|
|
||||||
|
# Layer: services
|
||||||
|
# Module: ssh
|
||||||
|
#
|
||||||
|
# Secure shell client and server policy.
|
||||||
|
#
|
||||||
|
ssh = module
|
||||||
|
|
||||||
|
# Layer: services
|
||||||
|
# Module: xserver
|
||||||
|
#
|
||||||
|
# X windows login display manager
|
||||||
|
#
|
||||||
|
xserver = module
|
||||||
|
|
||||||
|
# Module: application
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Defines attributs and interfaces for all user applications
|
||||||
|
#
|
||||||
|
application = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: authlogin
|
||||||
|
#
|
||||||
|
# Common policy for authentication and user login.
|
||||||
|
#
|
||||||
|
authlogin = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: clock
|
||||||
|
#
|
||||||
|
# Policy for reading and setting the hardware clock.
|
||||||
|
#
|
||||||
|
clock = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: fstools
|
||||||
|
#
|
||||||
|
# Tools for filesystem management, such as mkfs and fsck.
|
||||||
|
#
|
||||||
|
fstools = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: getty
|
||||||
|
#
|
||||||
|
# Policy for getty.
|
||||||
|
#
|
||||||
|
getty = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: hostname
|
||||||
|
#
|
||||||
|
# Policy for changing the system host name.
|
||||||
|
#
|
||||||
|
hostname = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: init
|
||||||
|
#
|
||||||
|
# System initialization programs (init and init scripts).
|
||||||
|
#
|
||||||
|
init = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: ipsec
|
||||||
|
#
|
||||||
|
# TCP/IP encryption
|
||||||
|
#
|
||||||
|
ipsec = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: iptables
|
||||||
|
#
|
||||||
|
# Policy for iptables.
|
||||||
|
#
|
||||||
|
iptables = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: libraries
|
||||||
|
#
|
||||||
|
# Policy for system libraries.
|
||||||
|
#
|
||||||
|
libraries = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: locallogin
|
||||||
|
#
|
||||||
|
# Policy for local logins.
|
||||||
|
#
|
||||||
|
locallogin = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: logging
|
||||||
|
#
|
||||||
|
# Policy for the kernel message logger and system logging daemon.
|
||||||
|
#
|
||||||
|
logging = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: lvm
|
||||||
|
#
|
||||||
|
# Policy for logical volume management programs.
|
||||||
|
#
|
||||||
|
lvm = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: miscfiles
|
||||||
|
#
|
||||||
|
# Miscelaneous files.
|
||||||
|
#
|
||||||
|
miscfiles = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: modutils
|
||||||
|
#
|
||||||
|
# Policy for kernel module utilities
|
||||||
|
#
|
||||||
|
modutils = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: mount
|
||||||
|
#
|
||||||
|
# Policy for mount.
|
||||||
|
#
|
||||||
|
mount = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: netlabel
|
||||||
|
#
|
||||||
|
# Basic netlabel types and interfaces.
|
||||||
|
#
|
||||||
|
netlabel = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: selinuxutil
|
||||||
|
#
|
||||||
|
# Policy for SELinux policy and userland applications.
|
||||||
|
#
|
||||||
|
selinuxutil = module
|
||||||
|
|
||||||
|
# Module: setrans
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for setrans
|
||||||
|
#
|
||||||
|
setrans = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: sysnetwork
|
||||||
|
#
|
||||||
|
# Policy for network configuration: ifconfig and dhcp client.
|
||||||
|
#
|
||||||
|
sysnetwork = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: systemd
|
||||||
|
#
|
||||||
|
# Policy for systemd components
|
||||||
|
#
|
||||||
|
systemd = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: udev
|
||||||
|
#
|
||||||
|
# Policy for udev.
|
||||||
|
#
|
||||||
|
udev = module
|
1581
modules-mls-contrib.conf
Normal file
1581
modules-mls-contrib.conf
Normal file
File diff suppressed because it is too large
Load Diff
393
modules-targeted-base.conf
Normal file
393
modules-targeted-base.conf
Normal file
@ -0,0 +1,393 @@
|
|||||||
|
# Layer: kernel
|
||||||
|
# Module: bootloader
|
||||||
|
#
|
||||||
|
# Policy for the kernel modules, kernel image, and bootloader.
|
||||||
|
#
|
||||||
|
bootloader = module
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: corecommands
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Core policy for shells, and generic programs
|
||||||
|
# in /bin, /sbin, /usr/bin, and /usr/sbin.
|
||||||
|
#
|
||||||
|
corecommands = base
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: corenetwork
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy controlling access to network objects
|
||||||
|
#
|
||||||
|
corenetwork = base
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: dmesg
|
||||||
|
#
|
||||||
|
# Policy for dmesg.
|
||||||
|
#
|
||||||
|
dmesg = module
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: netutils
|
||||||
|
#
|
||||||
|
# Network analysis utilities
|
||||||
|
#
|
||||||
|
netutils = module
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: sudo
|
||||||
|
#
|
||||||
|
# Execute a command with a substitute user
|
||||||
|
#
|
||||||
|
sudo = module
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: su
|
||||||
|
#
|
||||||
|
# Run shells with substitute user and group
|
||||||
|
#
|
||||||
|
su = module
|
||||||
|
|
||||||
|
# Layer: admin
|
||||||
|
# Module: usermanage
|
||||||
|
#
|
||||||
|
# Policy for managing user accounts.
|
||||||
|
#
|
||||||
|
usermanage = module
|
||||||
|
|
||||||
|
# Layer: apps
|
||||||
|
# Module: seunshare
|
||||||
|
#
|
||||||
|
# seunshare executable
|
||||||
|
#
|
||||||
|
seunshare = module
|
||||||
|
|
||||||
|
# Module: devices
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Device nodes and interfaces for many basic system devices.
|
||||||
|
#
|
||||||
|
devices = base
|
||||||
|
|
||||||
|
# Module: domain
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Core policy for domains.
|
||||||
|
#
|
||||||
|
domain = base
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: userdomain
|
||||||
|
#
|
||||||
|
# Policy for user domains
|
||||||
|
#
|
||||||
|
userdomain = module
|
||||||
|
|
||||||
|
# Module: files
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Basic filesystem types and interfaces.
|
||||||
|
#
|
||||||
|
files = base
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: miscfiles
|
||||||
|
#
|
||||||
|
# Miscelaneous files.
|
||||||
|
#
|
||||||
|
miscfiles = module
|
||||||
|
|
||||||
|
# Module: filesystem
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for filesystems.
|
||||||
|
#
|
||||||
|
filesystem = base
|
||||||
|
|
||||||
|
# Module: kernel
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for kernel threads, proc filesystem,and unlabeled processes and objects.
|
||||||
|
#
|
||||||
|
kernel = base
|
||||||
|
|
||||||
|
# Module: mcs
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# MultiCategory security policy
|
||||||
|
#
|
||||||
|
mcs = base
|
||||||
|
|
||||||
|
# Module: mls
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Multilevel security policy
|
||||||
|
#
|
||||||
|
mls = base
|
||||||
|
|
||||||
|
# Module: selinux
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for kernel security interface, in particular, selinuxfs.
|
||||||
|
#
|
||||||
|
selinux = base
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: storage
|
||||||
|
#
|
||||||
|
# Policy controlling access to storage devices
|
||||||
|
#
|
||||||
|
storage = base
|
||||||
|
|
||||||
|
# Module: terminal
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for terminals.
|
||||||
|
#
|
||||||
|
terminal = base
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: ubac
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#
|
||||||
|
ubac = base
|
||||||
|
|
||||||
|
# Layer: kernel
|
||||||
|
# Module: unconfined
|
||||||
|
#
|
||||||
|
# The unlabelednet module.
|
||||||
|
#
|
||||||
|
unlabelednet = module
|
||||||
|
|
||||||
|
# Layer: role
|
||||||
|
# Module: auditadm
|
||||||
|
#
|
||||||
|
# auditadm account on tty logins
|
||||||
|
#
|
||||||
|
auditadm = module
|
||||||
|
|
||||||
|
# Layer: role
|
||||||
|
# Module: logadm
|
||||||
|
#
|
||||||
|
# Minimally prived root role for managing logging system
|
||||||
|
#
|
||||||
|
logadm = module
|
||||||
|
|
||||||
|
# Layer: role
|
||||||
|
# Module: secadm
|
||||||
|
#
|
||||||
|
# secadm account on tty logins
|
||||||
|
#
|
||||||
|
secadm = module
|
||||||
|
|
||||||
|
# Layer:role
|
||||||
|
# Module: sysadm_secadm
|
||||||
|
#
|
||||||
|
# System Administrator with Security Admin rules
|
||||||
|
#
|
||||||
|
sysadm_secadm = module
|
||||||
|
|
||||||
|
# Module: staff
|
||||||
|
#
|
||||||
|
# admin account
|
||||||
|
#
|
||||||
|
staff = module
|
||||||
|
|
||||||
|
# Layer:role
|
||||||
|
# Module: sysadm
|
||||||
|
#
|
||||||
|
# System Administrator
|
||||||
|
#
|
||||||
|
sysadm = module
|
||||||
|
|
||||||
|
# Layer: role
|
||||||
|
# Module: unconfineduser
|
||||||
|
#
|
||||||
|
# The unconfined user domain.
|
||||||
|
#
|
||||||
|
unconfineduser = module
|
||||||
|
|
||||||
|
# Layer: role
|
||||||
|
# Module: unprivuser
|
||||||
|
#
|
||||||
|
# Minimally privs guest account on tty logins
|
||||||
|
#
|
||||||
|
unprivuser = module
|
||||||
|
|
||||||
|
# Layer: services
|
||||||
|
# Module: postgresql
|
||||||
|
#
|
||||||
|
# PostgreSQL relational database
|
||||||
|
#
|
||||||
|
postgresql = module
|
||||||
|
|
||||||
|
# Layer: services
|
||||||
|
# Module: ssh
|
||||||
|
#
|
||||||
|
# Secure shell client and server policy.
|
||||||
|
#
|
||||||
|
ssh = module
|
||||||
|
|
||||||
|
# Layer: services
|
||||||
|
# Module: xserver
|
||||||
|
#
|
||||||
|
# X windows login display manager
|
||||||
|
#
|
||||||
|
xserver = module
|
||||||
|
|
||||||
|
# Module: application
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Defines attributs and interfaces for all user applications
|
||||||
|
#
|
||||||
|
application = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: authlogin
|
||||||
|
#
|
||||||
|
# Common policy for authentication and user login.
|
||||||
|
#
|
||||||
|
authlogin = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: clock
|
||||||
|
#
|
||||||
|
# Policy for reading and setting the hardware clock.
|
||||||
|
#
|
||||||
|
clock = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: fstools
|
||||||
|
#
|
||||||
|
# Tools for filesystem management, such as mkfs and fsck.
|
||||||
|
#
|
||||||
|
fstools = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: getty
|
||||||
|
#
|
||||||
|
# Policy for getty.
|
||||||
|
#
|
||||||
|
getty = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: hostname
|
||||||
|
#
|
||||||
|
# Policy for changing the system host name.
|
||||||
|
#
|
||||||
|
hostname = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: init
|
||||||
|
#
|
||||||
|
# System initialization programs (init and init scripts).
|
||||||
|
#
|
||||||
|
init = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: ipsec
|
||||||
|
#
|
||||||
|
# TCP/IP encryption
|
||||||
|
#
|
||||||
|
ipsec = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: iptables
|
||||||
|
#
|
||||||
|
# Policy for iptables.
|
||||||
|
#
|
||||||
|
iptables = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: libraries
|
||||||
|
#
|
||||||
|
# Policy for system libraries.
|
||||||
|
#
|
||||||
|
libraries = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: locallogin
|
||||||
|
#
|
||||||
|
# Policy for local logins.
|
||||||
|
#
|
||||||
|
locallogin = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: logging
|
||||||
|
#
|
||||||
|
# Policy for the kernel message logger and system logging daemon.
|
||||||
|
#
|
||||||
|
logging = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: lvm
|
||||||
|
#
|
||||||
|
# Policy for logical volume management programs.
|
||||||
|
#
|
||||||
|
lvm = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: modutils
|
||||||
|
#
|
||||||
|
# Policy for kernel module utilities
|
||||||
|
#
|
||||||
|
modutils = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: mount
|
||||||
|
#
|
||||||
|
# Policy for mount.
|
||||||
|
#
|
||||||
|
mount = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: netlabel
|
||||||
|
#
|
||||||
|
# Basic netlabel types and interfaces.
|
||||||
|
#
|
||||||
|
netlabel = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: selinuxutil
|
||||||
|
#
|
||||||
|
# Policy for SELinux policy and userland applications.
|
||||||
|
#
|
||||||
|
selinuxutil = module
|
||||||
|
|
||||||
|
# Module: setrans
|
||||||
|
# Required in base
|
||||||
|
#
|
||||||
|
# Policy for setrans
|
||||||
|
#
|
||||||
|
setrans = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: sysnetwork
|
||||||
|
#
|
||||||
|
# Policy for network configuration: ifconfig and dhcp client.
|
||||||
|
#
|
||||||
|
sysnetwork = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: systemd
|
||||||
|
#
|
||||||
|
# Policy for systemd components
|
||||||
|
#
|
||||||
|
systemd = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: udev
|
||||||
|
#
|
||||||
|
# Policy for udev.
|
||||||
|
#
|
||||||
|
udev = module
|
||||||
|
|
||||||
|
# Layer: system
|
||||||
|
# Module: unconfined
|
||||||
|
#
|
||||||
|
# The unconfined domain.
|
||||||
|
#
|
||||||
|
unconfined = module
|
2665
modules-targeted-contrib.conf
Normal file
2665
modules-targeted-contrib.conf
Normal file
File diff suppressed because it is too large
Load Diff
2565
modules-targeted.conf
Normal file
2565
modules-targeted.conf
Normal file
File diff suppressed because it is too large
Load Diff
2
permissivedomains.cil
Normal file
2
permissivedomains.cil
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
(roleattributeset cil_gen_require system_r)
|
||||||
|
|
182
rpm.macros
Normal file
182
rpm.macros
Normal file
@ -0,0 +1,182 @@
|
|||||||
|
# Copyright (C) 2017 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# Author: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
# Author: Lukáš Vrabec <lvrabec@redhat.com>
|
||||||
|
#
|
||||||
|
# This program is free software; you can redistribute it and/or
|
||||||
|
# modify it under the terms of the GNU General Public License
|
||||||
|
# as published by the Free Software Foundation; either version 2
|
||||||
|
# of the License, or (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
# RPM macros for packages installing SELinux modules
|
||||||
|
|
||||||
|
%_selinux_policy_version SELINUXPOLICYVERSION
|
||||||
|
|
||||||
|
%_selinux_store_path SELINUXSTOREPATH
|
||||||
|
%_selinux_store_policy_path %{_selinux_store_path}/${_policytype}
|
||||||
|
|
||||||
|
%_file_context_file %{_sysconfdir}/selinux/${SELINUXTYPE}/contexts/files/file_contexts
|
||||||
|
%_file_context_file_pre %{_localstatedir}/lib/rpm-state/file_contexts.pre
|
||||||
|
|
||||||
|
%_file_custom_defined_booleans %{_selinux_store_policy_path}/rpmbooleans.custom
|
||||||
|
%_file_custom_defined_booleans_tmp %{_selinux_store_policy_path}/rpmbooleans.custom.tmp
|
||||||
|
|
||||||
|
# %selinux_requires
|
||||||
|
%selinux_requires \
|
||||||
|
Requires: selinux-policy >= %{_selinux_policy_version} \
|
||||||
|
BuildRequires: pkgconfig(systemd) \
|
||||||
|
BuildRequires: selinux-policy \
|
||||||
|
BuildRequires: selinux-policy-devel \
|
||||||
|
Requires(post): selinux-policy-base >= %{_selinux_policy_version} \
|
||||||
|
Requires(post): libselinux-utils \
|
||||||
|
Requires(post): policycoreutils \
|
||||||
|
%if 0%{?fedora} || 0%{?rhel} > 7\
|
||||||
|
Requires(post): policycoreutils-python-utils \
|
||||||
|
%else \
|
||||||
|
Requires(post): policycoreutils-python \
|
||||||
|
%endif \
|
||||||
|
%{nil}
|
||||||
|
|
||||||
|
# %selinux_modules_install [-s <policytype>] [-p <modulepriority>] module [module]...
|
||||||
|
%selinux_modules_install("s:p:") \
|
||||||
|
if [ -e /etc/selinux/config ]; then \
|
||||||
|
. /etc/selinux/config \
|
||||||
|
fi \
|
||||||
|
_policytype=%{-s*} \
|
||||||
|
if [ -z "${_policytype}" ]; then \
|
||||||
|
_policytype="targeted" \
|
||||||
|
fi \
|
||||||
|
if [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
||||||
|
%{_sbindir}/semodule -n -s ${_policytype} -X %{!-p:200}%{-p*} -i %* || : \
|
||||||
|
%{_sbindir}/selinuxenabled && %{_sbindir}/load_policy || : \
|
||||||
|
fi \
|
||||||
|
%{nil}
|
||||||
|
|
||||||
|
# %selinux_modules_uninstall [-s <policytype>] [-p <modulepriority>] module [module]...
|
||||||
|
%selinux_modules_uninstall("s:p:") \
|
||||||
|
if [ -e /etc/selinux/config ]; then \
|
||||||
|
. /etc/selinux/config \
|
||||||
|
fi \
|
||||||
|
_policytype=%{-s*} \
|
||||||
|
if [ -z "${_policytype}" ]; then \
|
||||||
|
_policytype="targeted" \
|
||||||
|
fi \
|
||||||
|
if [ $1 -eq 0 ]; then \
|
||||||
|
if [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
||||||
|
%{_sbindir}/semodule -n -X %{!-p:200}%{-p*} -s ${_policytype} -r %* &> /dev/null || : \
|
||||||
|
%{_sbindir}/selinuxenabled && %{_sbindir}/load_policy || : \
|
||||||
|
fi \
|
||||||
|
fi \
|
||||||
|
%{nil}
|
||||||
|
|
||||||
|
# %selinux_relabel_pre [-s <policytype>]
|
||||||
|
%selinux_relabel_pre("s:") \
|
||||||
|
if %{_sbindir}/selinuxenabled; then \
|
||||||
|
if [ -e /etc/selinux/config ]; then \
|
||||||
|
. /etc/selinux/config \
|
||||||
|
fi \
|
||||||
|
_policytype=%{-s*} \
|
||||||
|
if [ -z "${_policytype}" ]; then \
|
||||||
|
_policytype="targeted" \
|
||||||
|
fi \
|
||||||
|
if [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
||||||
|
[ -f %{_file_context_file_pre} ] || cp -f %{_file_context_file} %{_file_context_file_pre} \
|
||||||
|
fi \
|
||||||
|
fi \
|
||||||
|
%{nil}
|
||||||
|
|
||||||
|
|
||||||
|
# %selinux_relabel_post [-s <policytype>]
|
||||||
|
%selinux_relabel_post("s:") \
|
||||||
|
if [ -e /etc/selinux/config ]; then \
|
||||||
|
. /etc/selinux/config \
|
||||||
|
fi \
|
||||||
|
_policytype=%{-s*} \
|
||||||
|
if [ -z "${_policytype}" ]; then \
|
||||||
|
_policytype="targeted" \
|
||||||
|
fi \
|
||||||
|
if %{_sbindir}/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
||||||
|
if [ -f %{_file_context_file_pre} ]; then \
|
||||||
|
%{_sbindir}/fixfiles -C %{_file_context_file_pre} restore &> /dev/null \
|
||||||
|
rm -f %{_file_context_file_pre} \
|
||||||
|
fi \
|
||||||
|
fi \
|
||||||
|
%{nil}
|
||||||
|
|
||||||
|
# %selinux_set_booleans [-s <policytype>] boolean [boolean]...
|
||||||
|
%selinux_set_booleans("s:") \
|
||||||
|
if [ -e /etc/selinux/config ]; then \
|
||||||
|
. /etc/selinux/config \
|
||||||
|
fi \
|
||||||
|
_policytype=%{-s*} \
|
||||||
|
if [ -z "${_policytype}" ]; then \
|
||||||
|
_policytype="targeted" \
|
||||||
|
fi \
|
||||||
|
if [ -d "%{_selinux_store_policy_path}" ]; then \
|
||||||
|
LOCAL_MODIFICATIONS=$(%{_sbindir}/semanage boolean -E) \
|
||||||
|
if [ ! -f %_file_custom_defined_booleans ]; then \
|
||||||
|
/bin/echo "# This file is managed by macros.selinux-policy. Do not edit it manually" > %_file_custom_defined_booleans \
|
||||||
|
fi \
|
||||||
|
semanage_import='' \
|
||||||
|
for boolean in %*; do \
|
||||||
|
boolean_name=${boolean%=*} \
|
||||||
|
boolean_value=${boolean#*=} \
|
||||||
|
boolean_local_string=$(grep "$boolean_name\$" <<<$LOCAL_MODIFICATIONS) \
|
||||||
|
if [ -n "$boolean_local_string" ]; then \
|
||||||
|
semanage_import="${semanage_import}\\nboolean -m -$boolean_value $boolean_name" \
|
||||||
|
boolean_customized_string=$(grep "$boolean_name\$" %_file_custom_defined_booleans | tail -n 1) \
|
||||||
|
if [ -n "$boolean_customized_string" ]; then \
|
||||||
|
/bin/echo $boolean_customized_string >> %_file_custom_defined_booleans \
|
||||||
|
else \
|
||||||
|
/bin/echo $boolean_local_string >> %_file_custom_defined_booleans \
|
||||||
|
fi \
|
||||||
|
else \
|
||||||
|
semanage_import="${semanage_import}\\nboolean -m -$boolean_value $boolean_name" \
|
||||||
|
boolean_default_value=$(LC_ALL=C %{_sbindir}/semanage boolean -l | grep "^$boolean_name " | sed 's/[^(]*([^,]*, *\\(on\\|off\\).*/\\1/') \
|
||||||
|
/bin/echo "boolean -m --$boolean_default_value $boolean_name" >> %_file_custom_defined_booleans \
|
||||||
|
fi \
|
||||||
|
done; \
|
||||||
|
if %{_sbindir}/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
||||||
|
/bin/echo -e "$semanage_import" | %{_sbindir}/semanage import -S "${_policytype}" \
|
||||||
|
elif test -d /usr/share/selinux/"${_policytype}"/base.lst; then \
|
||||||
|
/bin/echo -e "$semanage_import" | %{_sbindir}/semanage import -S "${_policytype}" -N \
|
||||||
|
fi \
|
||||||
|
fi \
|
||||||
|
%{nil}
|
||||||
|
|
||||||
|
# %selinux_unset_booleans [-s <policytype>] boolean [boolean]...
|
||||||
|
%selinux_unset_booleans("s:") \
|
||||||
|
if [ -e /etc/selinux/config ]; then \
|
||||||
|
. /etc/selinux/config \
|
||||||
|
fi \
|
||||||
|
_policytype=%{-s*} \
|
||||||
|
if [ -z "${_policytype}" ]; then \
|
||||||
|
_policytype="targeted" \
|
||||||
|
fi \
|
||||||
|
if [ -d "%{_selinux_store_policy_path}" ]; then \
|
||||||
|
semanage_import='' \
|
||||||
|
for boolean in %*; do \
|
||||||
|
boolean_name=${boolean%=*} \
|
||||||
|
boolean_customized_string=$(grep "$boolean_name\$" %_file_custom_defined_booleans | tail -n 1) \
|
||||||
|
if [ -n "$boolean_customized_string" ]; then \
|
||||||
|
awk "/$boolean_customized_string/ && !f{f=1; next} 1" %_file_custom_defined_booleans > %_file_custom_defined_booleans_tmp && mv %_file_custom_defined_booleans_tmp %_file_custom_defined_booleans \
|
||||||
|
if ! grep -q "$boolean_name\$" %_file_custom_defined_booleans; then \
|
||||||
|
semanage_import="${semanage_import}\\n${boolean_customized_string}" \
|
||||||
|
fi \
|
||||||
|
fi \
|
||||||
|
done; \
|
||||||
|
if %{_sbindir}/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
||||||
|
/bin/echo -e "$semanage_import" | %{_sbindir}/semanage import -S "${_policytype}" \
|
||||||
|
elif test -d /usr/share/selinux/"${_policytype}"/base.lst; then \
|
||||||
|
/bin/echo -e "$semanage_import" | %{_sbindir}/semanage import -S "${_policytype}" -N \
|
||||||
|
fi \
|
||||||
|
fi \
|
||||||
|
%{nil}
|
4
securetty_types-minimum
Normal file
4
securetty_types-minimum
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
console_device_t
|
||||||
|
sysadm_tty_device_t
|
||||||
|
user_tty_device_t
|
||||||
|
staff_tty_device_t
|
6
securetty_types-mls
Normal file
6
securetty_types-mls
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
console_device_t
|
||||||
|
sysadm_tty_device_t
|
||||||
|
user_tty_device_t
|
||||||
|
staff_tty_device_t
|
||||||
|
auditadm_tty_device_t
|
||||||
|
secureadm_tty_device_t
|
4
securetty_types-targeted
Normal file
4
securetty_types-targeted
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
console_device_t
|
||||||
|
sysadm_tty_device_t
|
||||||
|
user_tty_device_t
|
||||||
|
staff_tty_device_t
|
4
selinux-policy.conf
Normal file
4
selinux-policy.conf
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
z /sys/devices/system/cpu/online - - -
|
||||||
|
Z /sys/class/net - - -
|
||||||
|
z /sys/kernel/uevent_helper - - -
|
||||||
|
w /sys/fs/selinux/checkreqprot - - - - 0
|
15047
selinux-policy.spec
Normal file
15047
selinux-policy.spec
Normal file
File diff suppressed because it is too large
Load Diff
19
setrans-minimum.conf
Normal file
19
setrans-minimum.conf
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
#
|
||||||
|
# Multi-Category Security translation table for SELinux
|
||||||
|
#
|
||||||
|
# Uncomment the following to disable translation libary
|
||||||
|
# disable=1
|
||||||
|
#
|
||||||
|
# Objects can be categorized with 0-1023 categories defined by the admin.
|
||||||
|
# Objects can be in more than one category at a time.
|
||||||
|
# Categories are stored in the system as c0-c1023. Users can use this
|
||||||
|
# table to translate the categories into a more meaningful output.
|
||||||
|
# Examples:
|
||||||
|
# s0:c0=CompanyConfidential
|
||||||
|
# s0:c1=PatientRecord
|
||||||
|
# s0:c2=Unclassified
|
||||||
|
# s0:c3=TopSecret
|
||||||
|
# s0:c1,c3=CompanyConfidentialRedHat
|
||||||
|
s0=SystemLow
|
||||||
|
s0-s0:c0.c1023=SystemLow-SystemHigh
|
||||||
|
s0:c0.c1023=SystemHigh
|
52
setrans-mls.conf
Normal file
52
setrans-mls.conf
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
#
|
||||||
|
# Multi-Level Security translation table for SELinux
|
||||||
|
#
|
||||||
|
# Uncomment the following to disable translation libary
|
||||||
|
# disable=1
|
||||||
|
#
|
||||||
|
# Objects can be labeled with one of 16 levels and be categorized with 0-1023
|
||||||
|
# categories defined by the admin.
|
||||||
|
# Objects can be in more than one category at a time.
|
||||||
|
# Users can modify this table to translate the MLS labels for different purpose.
|
||||||
|
#
|
||||||
|
# Assumptions: using below MLS labels.
|
||||||
|
# SystemLow
|
||||||
|
# SystemHigh
|
||||||
|
# Unclassified
|
||||||
|
# Secret with compartments A and B.
|
||||||
|
#
|
||||||
|
# SystemLow and SystemHigh
|
||||||
|
s0=SystemLow
|
||||||
|
s15:c0.c1023=SystemHigh
|
||||||
|
s0-s15:c0.c1023=SystemLow-SystemHigh
|
||||||
|
|
||||||
|
# Unclassified level
|
||||||
|
s1=Unclassified
|
||||||
|
|
||||||
|
# Secret level with compartments
|
||||||
|
s2=Secret
|
||||||
|
s2:c0=A
|
||||||
|
s2:c1=B
|
||||||
|
|
||||||
|
# ranges for Unclassified
|
||||||
|
s0-s1=SystemLow-Unclassified
|
||||||
|
s1-s2=Unclassified-Secret
|
||||||
|
s1-s15:c0.c1023=Unclassified-SystemHigh
|
||||||
|
|
||||||
|
# ranges for Secret with compartments
|
||||||
|
s0-s2=SystemLow-Secret
|
||||||
|
s0-s2:c0=SystemLow-Secret:A
|
||||||
|
s0-s2:c1=SystemLow-Secret:B
|
||||||
|
s0-s2:c0,c1=SystemLow-Secret:AB
|
||||||
|
s1-s2:c0=Unclassified-Secret:A
|
||||||
|
s1-s2:c1=Unclassified-Secret:B
|
||||||
|
s1-s2:c0,c1=Unclassified-Secret:AB
|
||||||
|
s2-s2:c0=Secret-Secret:A
|
||||||
|
s2-s2:c1=Secret-Secret:B
|
||||||
|
s2-s2:c0,c1=Secret-Secret:AB
|
||||||
|
s2-s15:c0.c1023=Secret-SystemHigh
|
||||||
|
s2:c0-s2:c0,c1=Secret:A-Secret:AB
|
||||||
|
s2:c0-s15:c0.c1023=Secret:A-SystemHigh
|
||||||
|
s2:c1-s2:c0,c1=Secret:B-Secret:AB
|
||||||
|
s2:c1-s15:c0.c1023=Secret:B-SystemHigh
|
||||||
|
s2:c0,c1-s15:c0.c1023=Secret:AB-SystemHigh
|
19
setrans-targeted.conf
Normal file
19
setrans-targeted.conf
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
#
|
||||||
|
# Multi-Category Security translation table for SELinux
|
||||||
|
#
|
||||||
|
# Uncomment the following to disable translation libary
|
||||||
|
# disable=1
|
||||||
|
#
|
||||||
|
# Objects can be categorized with 0-1023 categories defined by the admin.
|
||||||
|
# Objects can be in more than one category at a time.
|
||||||
|
# Categories are stored in the system as c0-c1023. Users can use this
|
||||||
|
# table to translate the categories into a more meaningful output.
|
||||||
|
# Examples:
|
||||||
|
# s0:c0=CompanyConfidential
|
||||||
|
# s0:c1=PatientRecord
|
||||||
|
# s0:c2=Unclassified
|
||||||
|
# s0:c3=TopSecret
|
||||||
|
# s0:c1,c3=CompanyConfidentialRedHat
|
||||||
|
s0=SystemLow
|
||||||
|
s0-s0:c0.c1023=SystemLow-SystemHigh
|
||||||
|
s0:c0.c1023=SystemHigh
|
4
sources
Normal file
4
sources
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
SHA512 (selinux-policy-contrib-ed1077e.tar.gz) = 0fa391b7cf03e2be1b04bb7ab35b11c26a26694d30a51d672e587d49e4903df9e8525914b6ea039daf187c1fe494c4a598f8dae16ee32d95d3235eaee9dee603
|
||||||
|
SHA512 (selinux-policy-9bb39f6.tar.gz) = 4bf8ca57a4cef58d82b049be5d9607d85886f3baa9708d99ed67f9e6823447b319a715b381e87a4d4179ddbf4a9376a4d9c196bd5c89fee8b37e7a83782ee0d2
|
||||||
|
SHA512 (container-selinux.tgz) = 12db1e9eccc963e364707c52ec2a944de9223c628ba898fc4609a9f8f9451a09c52a36e594884f29c5430e0ff702aa044f19466b81968a676ec8bbc703abf702
|
||||||
|
SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4
|
50
tests/tests-reboot.yml
Normal file
50
tests/tests-reboot.yml
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
---
|
||||||
|
- hosts: localhost
|
||||||
|
vars:
|
||||||
|
- artifacts: "{{ lookup('env', 'TEST_ARTIFACTS')|default('./artifacts', true) }}"
|
||||||
|
tags:
|
||||||
|
- classic
|
||||||
|
tasks:
|
||||||
|
# switch SELinux to permissive mode
|
||||||
|
- name: Get default kernel
|
||||||
|
command: "grubby --default-kernel"
|
||||||
|
register: default_kernel
|
||||||
|
- debug: msg="{{ default_kernel.stdout }}"
|
||||||
|
- name: Set permissive mode
|
||||||
|
command: "grubby --args=enforcing=0 --update-kernel {{ default_kernel.stdout }}"
|
||||||
|
|
||||||
|
- name: reboot
|
||||||
|
block:
|
||||||
|
- name: restart host
|
||||||
|
shell: sleep 2 && shutdown -r now "Ansible updates triggered"
|
||||||
|
async: 1
|
||||||
|
poll: 0
|
||||||
|
ignore_errors: true
|
||||||
|
|
||||||
|
- name: wait for host to come back
|
||||||
|
wait_for_connection:
|
||||||
|
delay: 10
|
||||||
|
timeout: 300
|
||||||
|
|
||||||
|
- name: Re-create /tmp/artifacts
|
||||||
|
command: mkdir /tmp/artifacts
|
||||||
|
|
||||||
|
- name: Gather SELinux denials since boot
|
||||||
|
shell: |
|
||||||
|
result=pass
|
||||||
|
dmesg | grep -i -e type=1300 -e type=1400 > /tmp/avc.log && result=fail
|
||||||
|
ausearch -m avc -m selinux_err -m user_avc -ts boot &>> /tmp/avc.log
|
||||||
|
grep -q '<no matches>' /tmp/avc.log || result=fail
|
||||||
|
echo -e "\nresults:\n- test: reboot and collect AVC\n result: $result\n logs:\n - avc.log\n\n" > /tmp/results.yml
|
||||||
|
( [ $result = "pass" ] && echo PASS test-reboot || echo FAIL test-reboot ) > /tmp/test.log
|
||||||
|
|
||||||
|
always:
|
||||||
|
- name: Pull out the artifacts
|
||||||
|
fetch:
|
||||||
|
dest: "{{ artifacts }}/"
|
||||||
|
src: "{{ item }}"
|
||||||
|
flat: yes
|
||||||
|
with_items:
|
||||||
|
- /tmp/test.log
|
||||||
|
- /tmp/avc.log
|
||||||
|
- /tmp/results.yml
|
10
tests/tests.yml
Normal file
10
tests/tests.yml
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
---
|
||||||
|
- hosts: localhost
|
||||||
|
roles:
|
||||||
|
- role: standard-test-beakerlib
|
||||||
|
tags:
|
||||||
|
- classic
|
||||||
|
repositories:
|
||||||
|
- repo: "https://src.fedoraproject.org/tests/selinux.git"
|
||||||
|
dest: "selinux"
|
||||||
|
fmf_filter: "tier:1 | component:selinux-policy"
|
38
users-minimum
Normal file
38
users-minimum
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
##################################
|
||||||
|
#
|
||||||
|
# Core User configuration.
|
||||||
|
#
|
||||||
|
|
||||||
|
#
|
||||||
|
# gen_user(username, prefix, role_set, mls_defaultlevel, mls_range, [mcs_catetories])
|
||||||
|
#
|
||||||
|
# Note: Identities without a prefix wil not be listed
|
||||||
|
# in the users_extra file used by genhomedircon.
|
||||||
|
|
||||||
|
#
|
||||||
|
# system_u is the user identity for system processes and objects.
|
||||||
|
# There should be no corresponding Unix user identity for system,
|
||||||
|
# and a user process should never be assigned the system user
|
||||||
|
# identity.
|
||||||
|
#
|
||||||
|
gen_user(system_u,, system_r unconfined_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
|
||||||
|
#
|
||||||
|
# user_u is a generic user identity for Linux users who have no
|
||||||
|
# SELinux user identity defined. The modified daemons will use
|
||||||
|
# this user identity in the security context if there is no matching
|
||||||
|
# SELinux user identity for a Linux user. If you do not want to
|
||||||
|
# permit any access to such users, then remove this entry.
|
||||||
|
#
|
||||||
|
gen_user(user_u, user, user_r, s0, s0)
|
||||||
|
gen_user(staff_u, user, staff_r system_r sysadm_r unconfined_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
gen_user(sysadm_u, user, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
|
||||||
|
#
|
||||||
|
# The following users correspond to Unix identities.
|
||||||
|
# These identities are typically assigned as the user attribute
|
||||||
|
# when login starts the user shell. Users with access to the sysadm_r
|
||||||
|
# role should use the staff_r role instead of the user_r role when
|
||||||
|
# not in the sysadm_r.
|
||||||
|
#
|
||||||
|
gen_user(root, user, unconfined_r sysadm_r staff_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
38
users-mls
Normal file
38
users-mls
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
##################################
|
||||||
|
#
|
||||||
|
# Core User configuration.
|
||||||
|
#
|
||||||
|
|
||||||
|
#
|
||||||
|
# gen_user(username, prefix, role_set, mls_defaultlevel, mls_range, [mcs_catetories])
|
||||||
|
#
|
||||||
|
# Note: Identities without a prefix wil not be listed
|
||||||
|
# in the users_extra file used by genhomedircon.
|
||||||
|
|
||||||
|
#
|
||||||
|
# system_u is the user identity for system processes and objects.
|
||||||
|
# There should be no corresponding Unix user identity for system,
|
||||||
|
# and a user process should never be assigned the system user
|
||||||
|
# identity.
|
||||||
|
#
|
||||||
|
gen_user(system_u,, system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
|
||||||
|
#
|
||||||
|
# user_u is a generic user identity for Linux users who have no
|
||||||
|
# SELinux user identity defined. The modified daemons will use
|
||||||
|
# this user identity in the security context if there is no matching
|
||||||
|
# SELinux user identity for a Linux user. If you do not want to
|
||||||
|
# permit any access to such users, then remove this entry.
|
||||||
|
#
|
||||||
|
gen_user(user_u, user, user_r, s0, s0)
|
||||||
|
gen_user(staff_u, user, staff_r system_r sysadm_r secadm_r auditadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
gen_user(sysadm_u, user, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
|
||||||
|
#
|
||||||
|
# The following users correspond to Unix identities.
|
||||||
|
# These identities are typically assigned as the user attribute
|
||||||
|
# when login starts the user shell. Users with access to the sysadm_r
|
||||||
|
# role should use the staff_r role instead of the user_r role when
|
||||||
|
# not in the sysadm_r.
|
||||||
|
#
|
||||||
|
gen_user(root, user, sysadm_r staff_r secadm_r auditadm_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
38
users-targeted
Normal file
38
users-targeted
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
##################################
|
||||||
|
#
|
||||||
|
# Core User configuration.
|
||||||
|
#
|
||||||
|
|
||||||
|
#
|
||||||
|
# gen_user(username, prefix, role_set, mls_defaultlevel, mls_range, [mcs_catetories])
|
||||||
|
#
|
||||||
|
# Note: Identities without a prefix wil not be listed
|
||||||
|
# in the users_extra file used by genhomedircon.
|
||||||
|
|
||||||
|
#
|
||||||
|
# system_u is the user identity for system processes and objects.
|
||||||
|
# There should be no corresponding Unix user identity for system,
|
||||||
|
# and a user process should never be assigned the system user
|
||||||
|
# identity.
|
||||||
|
#
|
||||||
|
gen_user(system_u,, system_r unconfined_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
|
||||||
|
#
|
||||||
|
# user_u is a generic user identity for Linux users who have no
|
||||||
|
# SELinux user identity defined. The modified daemons will use
|
||||||
|
# this user identity in the security context if there is no matching
|
||||||
|
# SELinux user identity for a Linux user. If you do not want to
|
||||||
|
# permit any access to such users, then remove this entry.
|
||||||
|
#
|
||||||
|
gen_user(user_u, user, user_r, s0, s0)
|
||||||
|
gen_user(staff_u, user, staff_r system_r sysadm_r unconfined_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
gen_user(sysadm_u, user, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
|
||||||
|
#
|
||||||
|
# The following users correspond to Unix identities.
|
||||||
|
# These identities are typically assigned as the user attribute
|
||||||
|
# when login starts the user shell. Users with access to the sysadm_r
|
||||||
|
# role should use the staff_r role instead of the user_r role when
|
||||||
|
# not in the sysadm_r.
|
||||||
|
#
|
||||||
|
gen_user(root, user, unconfined_r sysadm_r staff_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
Loading…
Reference in New Issue
Block a user