SELinux policy configuration
Go to file
Zdenek Pytela 64a29f1839 * Fri Jun 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.35-1
-Add the corecmd_watch_bin_dirs() interface
Resolves: rhbz#1965013
- Update rhcd policy
Resolves: rhbz#1965013
- Allow rhcd search insights configuration directories
Resolves: rhbz#1965013
- Add the kernel_read_proc_files() interface
Resolves: rhbz#1965013
- Update insights_client_filetrans_named_content()
Resolves: rhbz#2081425
- Allow transition to insights_client named content
Resolves: rhbz#2081425
- Add the insights_client_filetrans_named_content() interface
Resolves: rhbz#2081425
- Update policy for insights-client to run additional commands 3
Resolves: rhbz#2081425
- Allow insights-client execute its private memfd: objects
Resolves: rhbz#2081425
- Update policy for insights-client to run additional commands 2
Resolves: rhbz#2081425
- Use insights_client_tmp_t instead of insights_client_var_tmp_t
Resolves: rhbz#2081425
- Change space indentation to tab in insights-client
Resolves: rhbz#2081425
- Use socket permissions sets in insights-client
Resolves: rhbz#2081425
- Update policy for insights-client to run additional commands
Resolves: rhbz#2081425
- Allow init_t to rw insights_client unnamed pipe
Resolves: rhbz#2081425
- Fix insights client
Resolves: rhbz#2081425
- Update kernel_read_unix_sysctls() for sysctl_net_unix_t handling
Resolves: rhbz#2081425
- Do not let system_cronjob_t create redhat-access-insights.log with var_log_t
Resolves: rhbz#2081425
- Allow stalld get scheduling policy of kernel threads
Resolves: rhbz#2096776
- Update samba-dcerpcd policy for kerberos usage
Resolves: rhbz#2096521
- Allow winbind_rpcd_t connect to self over a unix_stream_socket
Resolves: rhbz#2096255
- Allow dlm_controld send a null signal to a cluster daemon
Resolves: rhbz#2095884
- Allow dhclient manage pid files used by chronyd
The chronyd_manage_pid_files() interface was added.
- Resolves: rhbz#2094155
Allow install_t nnp_domtrans to setfiles_mac_t
- Resolves: rhbz#2073010
- Allow rabbitmq to use systemd notify
Resolves: rhbz#2056565
- Allow ksmctl create hardware state information files
Resolves: rhbz#2021131
- Label /var/target with targetd_var_t
Resolves: rhbz#2020169
- Allow targetclid read generic SSL certificates
Resolves: rhbz#2020169
2022-06-24 23:45:04 +02:00
tests RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
.gitignore Merged update from upstream sources 2020-11-06 00:43:32 +00:00
booleans-minimum.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
booleans-mls.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
booleans-targeted.conf Change the selinuxuser_execstack boolean value to true 2022-04-07 12:24:08 +02:00
booleans.subs_dist RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
COPYING RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
customizable_types RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
file_contexts.subs_dist Merged update from upstream sources 2021-01-22 10:21:40 +00:00
gating.yaml gating.yaml: add missing '}' 2021-07-07 10:46:03 +02:00
make-rhat-patches.sh * Tue Apr 19 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.30-2 2022-04-19 18:47:26 +02:00
Makefile.devel RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-minimum.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-mls-base.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-mls-contrib.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-targeted-base.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-targeted-contrib.conf Add wireguard module to modules-targeted-contrib.conf 2022-06-09 16:01:15 +02:00
modules-targeted.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
permissivedomains.cil RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
README.md Merged update from upstream sources 2020-12-17 03:03:39 +00:00
rpm.macros RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
securetty_types-minimum RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
securetty_types-mls RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
securetty_types-targeted RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
selinux-policy.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
selinux-policy.spec * Fri Jun 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.35-1 2022-06-24 23:45:04 +02:00
setrans-minimum.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
setrans-mls.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
setrans-targeted.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
sources * Fri Jun 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.35-1 2022-06-24 23:45:04 +02:00
users-minimum Users have to be generated is policy/users to make 3.4 userspace happy 2022-05-11 20:41:36 +02:00
users-mls Users have to be generated is policy/users to make 3.4 userspace happy 2022-05-11 20:41:36 +02:00
users-targeted Users have to be generated is policy/users to make 3.4 userspace happy 2022-05-11 20:41:36 +02:00

Purpose

SELinux Fedora Policy is a fork of the SELinux reference policy. The fedora-selinux/selinux-policy repo makes Fedora packaging simpler and more transparent for packagers, upstream developers, and users. It is used for applying downstream Fedora fixes, for communication about proposed/committed changes, and for communication with upstream and the community. It reflects the upstream repository structure to make submitting patches to upstream easy.

Structure

GitHub

On GitHub, we have one repository containing the policy sources.

$ cd selinux-policy
$ git remote -v
origin	git@github.com:fedora-selinux/selinux-policy.git (fetch)

$ git branch -r
origin/HEAD -> origin/master
origin/f27
origin/f28
origin/master
origin/rawhide

Note: As opposed to dist-git, the Rawhide content resides in the rawhide branch rather than master.

dist-git

Package sources in dist-git are composed from the selinux-policy repository snapshot tarball, container-selinux policy files snapshot, the macro-expander script snapshot, and from other config files.

Build process

  1. Clone the fedora-selinux/selinux-policy repository.

     $ cd ~/devel/github
     $ git clone git@github.com:fedora-selinux/selinux-policy.git
     $ cd selinux-policy
    
  2. Create, backport, or cherry-pick needed changes to a particular branch and push them.

  3. Clone the selinux-policy dist-git repository.

     $ cd ~/devel/dist-git
     $ fedpkg clone selinux-policy
     $ cd selinux-policy
    
  4. Download the latest snapshot from the selinux-policy GitHub repository.

     $ ./make-rhat-patches.sh
    
  5. Add changes to the dist-git repository, bump release, create a changelog entry, commit, and push.

  6. Build the package.

     $ fedpkg build