SELinux policy configuration
Go to file
Zdenek Pytela a922a23d90 * Wed Jul 31 2024 Zdenek Pytela <zpytela@redhat.com> - 38.1.43-1
- Allow rhsmcertd read/write access to /dev/papr-sysparm
Resolves: RHEL-49599
- Label /dev/papr-sysparm and /dev/papr-vpd
Resolves: RHEL-49599
- Allow rhsmcertd read, write, and map ica tmpfs files
Resolves: RHEL-50926
- Update afterburn file transition policy
Resolves: RHEL-49735
- Label /run/metadata with afterburn_runtime_t
Resolves: RHEL-49735
- Allow afterburn list ssh home directory
Resolves: RHEL-49735
- Support SGX devices
Resolves: RHEL-50922
- Allow systemd-pstore send a message to syslogd over a unix domain
Resolves: RHEL-45528
- Allow postfix_domain map postfix_etc_t files
Resolves: RHEL-46332
- Allow microcode create /sys/devices/system/cpu/microcode/reload
Resolves: RHEL-26821
- Allow svirt_tcg_t map svirt_image_t files
Resolves: RHEL-27141
- Allow systemd-hostnamed shut down nscd
Resolves: RHEL-45033
- Allow postfix_domain connect to postgresql over a unix socket
Resolves: RHEL-6776
2024-07-31 18:07:13 +02:00
.fmf run relevant Tier1 tests via TMT 2023-11-02 14:05:24 +01:00
plans fix the sequence of script commands 2023-11-09 08:08:39 +01:00
tests run relevant Tier1 tests via TMT 2023-11-02 14:05:24 +01:00
.gitignore Merged update from upstream sources 2020-11-06 00:43:32 +00:00
booleans-minimum.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
booleans-mls.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
booleans-targeted.conf Change the selinuxuser_execstack boolean value to true 2022-04-07 12:24:08 +02:00
booleans.subs_dist RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
COPYING RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
customizable_types RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
file_contexts.subs_dist Add /bin = /usr/bin file context equivalency 2023-12-14 14:00:17 +01:00
gating.yaml gating.yaml: add missing '}' 2021-07-07 10:46:03 +02:00
ifndefy.py Add a script for enclosing interfaces in ifndef statements 2022-11-21 15:55:02 +01:00
make-rhat-patches.sh Update repository link and branches names for c9s 2024-04-15 15:00:51 +02:00
Makefile.devel RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-minimum.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-mls-base.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-mls-contrib.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-targeted-base.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
modules-targeted-contrib.conf * Tue May 07 2024 Zdenek Pytela <zpytela@redhat.com> - 38.1.37-1 2024-05-07 22:35:20 +02:00
modules-targeted.conf Remove glusterd from modules-targeted-*.conf 2023-11-14 20:51:42 +01:00
permissivedomains.cil RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
README.md Merged update from upstream sources 2020-12-17 03:03:39 +00:00
rpm.macros RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
securetty_types-minimum RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
securetty_types-mls RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
securetty_types-targeted RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
selinux-check-proper-disable.service Add a systemd service to check that SELinux is disabled properly 2022-11-21 15:54:31 +01:00
selinux-policy.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
selinux-policy.spec * Wed Jul 31 2024 Zdenek Pytela <zpytela@redhat.com> - 38.1.43-1 2024-07-31 18:07:13 +02:00
setrans-minimum.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
setrans-mls.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
setrans-targeted.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 09:28:03 -07:00
sources * Wed Jul 31 2024 Zdenek Pytela <zpytela@redhat.com> - 38.1.43-1 2024-07-31 18:07:13 +02:00
users-minimum Users have to be generated is policy/users to make 3.4 userspace happy 2022-05-11 20:41:36 +02:00
users-mls Users have to be generated is policy/users to make 3.4 userspace happy 2022-05-11 20:41:36 +02:00
users-targeted Users have to be generated is policy/users to make 3.4 userspace happy 2022-05-11 20:41:36 +02:00

Purpose

SELinux Fedora Policy is a fork of the SELinux reference policy. The fedora-selinux/selinux-policy repo makes Fedora packaging simpler and more transparent for packagers, upstream developers, and users. It is used for applying downstream Fedora fixes, for communication about proposed/committed changes, and for communication with upstream and the community. It reflects the upstream repository structure to make submitting patches to upstream easy.

Structure

GitHub

On GitHub, we have one repository containing the policy sources.

$ cd selinux-policy
$ git remote -v
origin	git@github.com:fedora-selinux/selinux-policy.git (fetch)

$ git branch -r
origin/HEAD -> origin/master
origin/f27
origin/f28
origin/master
origin/rawhide

Note: As opposed to dist-git, the Rawhide content resides in the rawhide branch rather than master.

dist-git

Package sources in dist-git are composed from the selinux-policy repository snapshot tarball, container-selinux policy files snapshot, the macro-expander script snapshot, and from other config files.

Build process

  1. Clone the fedora-selinux/selinux-policy repository.

     $ cd ~/devel/github
     $ git clone git@github.com:fedora-selinux/selinux-policy.git
     $ cd selinux-policy
    
  2. Create, backport, or cherry-pick needed changes to a particular branch and push them.

  3. Clone the selinux-policy dist-git repository.

     $ cd ~/devel/dist-git
     $ fedpkg clone selinux-policy
     $ cd selinux-policy
    
  4. Download the latest snapshot from the selinux-policy GitHub repository.

     $ ./make-rhat-patches.sh
    
  5. Add changes to the dist-git repository, bump release, create a changelog entry, commit, and push.

  6. Build the package.

     $ fedpkg build