Dan Walsh
63265668f0
- Update policy for mozilla_plugin_t
2010-08-23 18:01:46 -04:00
Dan Walsh
66ec626d23
- Allow clamscan to read proc_t
...
- Allow mount_t to write to debufs_t dir
- Dontaudit mount_t trying to write to security_t dir
2010-08-23 17:33:55 -04:00
Dan Walsh
eee39f9d8e
- Allow clamscan to read proc_t
...
- Allow mount_t to write to debufs_t dir
- Dontaudit mount_t trying to write to security_t dir
2010-08-23 17:29:52 -04:00
Dan Walsh
19988ca76d
- Allow clamscan_t execmem if clamd_use_jit set
...
- Add policy for firefox plugin-container
2010-08-20 09:36:56 -04:00
Chris PeBenito
c62f1bef77
Dbadm updates from KaiGai Kohei.
2010-08-19 08:41:39 -04:00
Dan Walsh
34e74a1baa
- label dead.letter as mail_home_t
2010-08-17 10:05:08 -04:00
Dan Walsh
3798ee962a
- label dead.letter as mail_home_t
2010-08-17 07:22:11 -04:00
Chris PeBenito
ab8f919e6f
Part of gnome patch from Dan Walsh.
2010-08-12 09:21:36 -04:00
Dan Walsh
b12ede2ac0
* Tue Aug 10 2010 Dan Walsh <dwalsh@redhat.com> 3.8.8-12
...
- Fix devicekit_power bug
- Allow policykit_auth_t more access.
2010-08-11 08:58:16 -04:00
Dan Walsh
922cd61e83
* Tue Aug 10 2010 Dan Walsh <dwalsh@redhat.com> 3.8.8-12
...
- Fix devicekit_power bug
- Allow policykit_auth_t more access.
2010-08-11 07:55:04 -04:00
Chris PeBenito
a9539a063b
Additional kdumpgui cleanup.
2010-08-10 09:21:01 -04:00
Jeremy Solt
46fc0d39e3
Policy for system-config-kdump gui from Dan Walsh
...
Edits:
- removed gnome_dontaudit_search_config
- removed userdom_dontaudit_search_admin_dir
- whitespace and style fixes
2010-08-10 09:05:43 -04:00
Chris PeBenito
5d6bf457b9
Changelog entry for sambagui.
2010-08-09 09:51:35 -04:00
Jeremy Solt
68e615ec5a
system-config-samba dbus service policy from Dan Walsh
2010-08-09 09:37:29 -04:00
Jeremy Solt
c87e150280
roles patch from Dan Walsh to move unwanted interface calls into a ifndef
2010-08-09 09:20:31 -04:00
Chris PeBenito
00ca404a20
Remove unnecessary require on cgroup_admin().
2010-08-09 09:10:24 -04:00
Chris PeBenito
d687db9b42
Whitespace fixes on cgroup.
2010-08-09 08:52:39 -04:00
Dominick Grift
61d7ee58a4
Confine /sbin/cgclear.
...
Libcgroup moved cgclear to /sbin.
Confine it so that initrc_t can domain transition to the cgclear_t domain. That way we do not have to extend the initrc_t domains policy.
We might want to add cgroup_run_cgclear to sysadm module.
Signed-off-by: Dominick Grift <domg472@gmail.com>
2010-08-09 08:47:15 -04:00
Dominick Grift
a0546c9d1c
System layer xml fixes.
...
Signed-off-by: Dominick Grift <domg472@gmail.com>
2010-08-05 09:25:55 -04:00
Dominick Grift
288845a638
Services layer xml files.
...
Signed-off-by: Dominick Grift <domg472@gmail.com>
2010-08-05 09:25:29 -04:00
Chris PeBenito
97b990f86e
Fix corecmd_dontaudit_exec_all_executables doc.
2010-08-05 09:24:41 -04:00
Dominick Grift
705f70f098
Kernel layer xml fixes.
...
Signed-off-by: Dominick Grift <domg472@gmail.com>
2010-08-05 09:08:07 -04:00
Chris PeBenito
19ff03977d
Fix usermanage_kill_passwd() parameter doc.
2010-08-05 08:56:31 -04:00
Dominick Grift
77e4b55f70
Admin layer xml fixes.
...
Signed-off-by: Dominick Grift <domg472@gmail.com>
2010-08-05 08:46:44 -04:00
Dominick Grift
03b86663f0
apps: domain { allowed to transition, allowed access, to not audit }.
...
Signed-off-by: Dominick Grift <domg472@gmail.com>
2010-08-05 08:20:59 -04:00
Chris PeBenito
12ab39533b
Changelog entry for accountsd.
2010-08-03 09:51:01 -04:00
Chris PeBenito
8da88970be
Accountsd cleanup.
2010-08-03 09:50:40 -04:00
Chris PeBenito
d0eebed0b7
Move accountsd to services.
2010-08-03 09:31:53 -04:00
Jeremy Solt
c4834a02d2
accountsd policy from Dan Walsh
...
Edits:
- Removed accountsd_manage_var_lib
- Removed optional block for xserver - these interfaces didn't exist
- It looks like sys_ptrace is needed because it reads /proc/pid/loginuid
- Whitespace and style fixes
2010-08-03 09:27:24 -04:00
Chris PeBenito
a7ee7f819a
Docs standardizing on the role portion of run interfaces. Additional docs cleanup.
2010-08-03 09:20:22 -04:00
Chris PeBenito
9d4395a736
MojoMojo from Lain Arnell.
2010-08-02 09:28:06 -04:00
Chris PeBenito
a72e42f485
Interface documentation standardization patch from Dan Walsh.
2010-08-02 09:22:09 -04:00
Chris PeBenito
27eeb649cc
Virtio disk file context update from Mika Pfluger.
2010-08-02 08:33:41 -04:00
Mika Pflüger
b3f7203d6a
Take virtio disks into account.
...
Signed-off-by: Mika Pflüger <debian@mikapflueger.de>
Signed-off-by: Chris PeBenito <cpebenito@tresys.com>
2010-08-02 08:25:14 -04:00
Fedora Release Engineering
003a26404b
dist-git conversion
2010-07-29 12:29:24 +00:00
Daniel J Walsh
d4bb132c2e
- Merge in fixes from dgrift repository
2010-07-27 20:34:21 +00:00
Daniel J Walsh
2b65defede
- Update boinc policy
...
- Fix sysstat policy to allow sys_admin
- Change failsafe_context to unconfined_r:unconfined_t:s0
2010-07-27 20:30:56 +00:00
Daniel J Walsh
7f5d8f30d0
- Update boinc policy
...
- Fix sysstat policy to allow sys_admin
- Change failsafe_context to unconfined_r:unconfined_t:s0
2010-07-27 17:28:04 +00:00
Daniel J Walsh
a1ef703492
- New paths for upstart
2010-07-26 21:46:12 +00:00
Daniel J Walsh
8d55a410dc
- New permissions for syslog
...
- New labels for /lib/upstart
2010-07-26 20:32:18 +00:00
Daniel J Walsh
f3fc10528f
- Allow systemd to setsockcon on sockets to immitate other services
2010-07-22 16:58:58 +00:00
Chris PeBenito
64ef2df368
Module version bump for 5563d4c
.
2010-07-22 09:13:11 -04:00
Jeremy Solt
5563d4c4d8
Removing seutil_domtrans_setsebool from anaconda patch - it doesn't exist
2010-07-22 08:49:32 -04:00
Jeremy Solt
b0a6f1b7c2
anaconda patch from Dan Walsh
...
- Did not include the change to unconfined_domain_noaudit
2010-07-22 08:49:32 -04:00
Daniel J Walsh
9f811efbbb
- Remove debugfs label
2010-07-21 14:57:11 +00:00
Daniel J Walsh
d66bec6356
- Update to latest policy
2010-07-20 17:48:36 +00:00
Daniel J Walsh
1df2fc2bba
- Fix eclipse labeling from IBMSupportAssasstant packageing
2010-07-19 21:16:41 +00:00
Chris PeBenito
21fdee9dd5
Increase bindreservport range to 512-1024 in corenetwork, from Dan Walsh.
...
We went back and reread the bindreservport code in glibc.
Turns out the range or ports that this will reserve are 512-1024 rather
then 600-1024.
The code actually first tries to reserve a port from 600-1024 and if
they are ALL reserved will try 512-599.
So we need to change corenetwork to reflect this.
2010-07-19 14:22:44 -04:00
Daniel J Walsh
3f1005a67d
- Make boot with systemd in enforcing mode
2010-07-15 20:04:35 +00:00
Daniel J Walsh
0f2ae00c61
- Update to upstream
2010-07-15 13:11:25 +00:00