Go to file
Hu 043e5338e1 Accepting request 1121138 from home:cahu:branches:security:SELinux
- Update to version 20231030: Big policy sync with upstream policy
  * Allow system_mail_t manage exim spool files and dirs
  * Dontaudit keepalived setattr on keepalived_unconfined_script_exec_t
  * Label /run/pcsd.socket with cluster_var_run_t
  * ci: Run cockpit tests in PRs
  * Add map_read map_write to kernel_prog_run_bpf
  * Allow systemd-fstab-generator read all symlinks
  * Allow systemd-fstab-generator the dac_override capability
  * Allow rpcbind read network sysctls
  * Support using systemd containers
  * Allow sysadm_t to connect to iscsid using a unix domain stream socket
  * Add policy for coreos installer
  * Add policy for nvme-stas
  * Confine systemd fstab,sysv,rc-local
  * Label /etc/aliases.lmdb with etc_aliases_t
  * Create policy for afterburn
  * Make new virt drivers permissive
  * Split virt policy, introduce virt_supplementary module
  * Allow apcupsd cgi scripts read /sys
  * Allow kernel_t to manage and relabel all files
  * Add missing optional_policy() to files_relabel_all_files()
  * Allow named and ndc use the io_uring api
  * Deprecate common_anon_inode_perms usage
  * Improve default file context(None) of /var/lib/authselect/backups
  * Allow udev_t to search all directories with a filesystem type
  * Implement proper anon_inode support
  * Allow targetd write to the syslog pid sock_file
  * Add ipa_pki_retrieve_key_exec() interface
  * Allow kdumpctl_t to list all directories with a filesystem type
  * Allow udev additional permissions
  * Allow udev load kernel module
  * Allow sysadm_t to mmap modules_object_t files
  * Add the unconfined_read_files() and unconfined_list_dirs() interfaces
  * Set default file context of HOME_DIR/tmp/.* to <<none>>
  * Allow kernel_generic_helper_t to execute mount(1)
  * Allow sssd send SIGKILL to passkey_child running in ipa_otpd_t
  * Allow systemd-localed create Xserver config dirs
  * Allow sssd read symlinks in /etc/sssd
  * Label /dev/gnss[0-9] with gnss_device_t
  * Allow systemd-sleep read/write efivarfs variables
  * ci: Fix version number of packit generated srpms
  * Dontaudit rhsmcertd write memory device
  * Allow ssh_agent_type create a sockfile in /run/user/USERID
  * Set default file context of /var/lib/authselect/backups to <<none>>
  * Allow prosody read network sysctls
  * Allow cupsd_t to use bpf capability
  * Allow sssd domain transition on passkey_child execution conditionally
  * Allow login_userdomain watch lnk_files in /usr
  * Allow login_userdomain watch video4linux devices
  * Change systemd-network-generator transition to include class file
  * Revert "Change file transition for systemd-network-generator"
  * Allow nm-dispatcher winbind plugin read/write samba var files
  * Allow systemd-networkd write to cgroup files
  * Allow kdump create and use its memfd: objects
  * Allow fedora-third-party get generic filesystem attributes
  * Allow sssd use usb devices conditionally
  * Update policy for qatlib
  * Allow ssh_agent_type manage generic cache home files
  * Change file transition for systemd-network-generator
  * Additional support for gnome-initial-setup
  * Update gnome-initial-setup policy for geoclue
  * Allow openconnect vpn open vhost net device
  * Allow cifs.upcall to connect to SSSD also through the /var/run socket
  * Grant cifs.upcall more required capabilities
  * Allow xenstored map xenfs files
  * Update policy for fdo
  * Allow keepalived watch var_run dirs
  * Allow svirt to rw /dev/udmabuf
  * Allow qatlib  to modify hardware state information.
  * Allow key.dns_resolve connect to avahi over a unix stream socket
  * Allow key.dns_resolve create and use unix datagram socket
  * Use quay.io as the container image source for CI
  * ci: Move srpm/rpm build to packit
  * .copr: Avoid subshell and changing directory
  * Allow gpsd, oddjob and oddjob_mkhomedir_t write user_tty_device_t chr_file
  * Label /usr/libexec/openssh/ssh-pkcs11-helper with ssh_agent_exec_t
  * Make insights_client_t an unconfined domain
  * Allow insights-client manage user temporary files
  * Allow insights-client create all rpm logs with a correct label
  * Allow insights-client manage generic logs
  * Allow cloud_init create dhclient var files and init_t manage net_conf_t
  * Allow insights-client read and write cluster tmpfs files
  * Allow ipsec read nsfs files
  * Make tuned work with mls policy
  * Remove nsplugin_role from mozilla.if
  * allow mon_procd_t self:cap_userns sys_ptrace
  * Allow pdns name_bind and name_connect all ports
  * Set the MLS range of fsdaemon_t to s0 - mls_systemhigh
  * ci: Move to actions/checkout@v3 version
  * .copr: Replace chown call with standard workflow safe.directory setting
  * .copr: Enable `set -u` for robustness
  * .copr: Simplify root directory variable
  * Allow rhsmcertd dbus chat with policykit
  * Allow polkitd execute pkla-check-authorization with nnp transition
  * Allow user_u and staff_u get attributes of non-security dirs
  * Allow unconfined user filetrans chrome_sandbox_home_t
  * Allow svnserve execute postdrop with a transition
  * Do not make postfix_postdrop_t type an MTA executable file
  * Allow samba-dcerpc service manage samba tmp files
  * Add use_nfs_home_dirs boolean for mozilla_plugin
  * Fix labeling for no-stub-resolv.conf
  * Revert "Allow winbind-rpcd use its private tmp files"
  * Allow upsmon execute upsmon via a helper script
  * Allow openconnect vpn read/write inherited vhost net device
  * Allow winbind-rpcd use its private tmp files
  * Update samba-dcerpc policy for printing
  * Allow gpsd,oddjob,oddjob_mkhomedir rw user domain pty
  * Allow nscd watch system db dirs
  * Allow qatlib to read sssd public files
  * Allow fedora-third-party read /sys and proc
  * Allow systemd-gpt-generator mount a tmpfs filesystem
  * Allow journald write to cgroup files
  * Allow rpc.mountd read network sysctls
  * Allow blueman read the contents of the sysfs filesystem
  * Allow logrotate_t to map generic files in /etc
  * Boolean: Allow virt_qemu_ga create ssh directory
  * Allow systemd-network-generator send system log messages
  * Dontaudit the execute permission on sock_file globally
  * Allow fsadm_t the file mounton permission
  * Allow named and ndc the io_uring sqpoll permission
  * Allow sssd io_uring sqpoll permission
  * Fix location for /run/nsd
  * Allow qemu-ga get fixed disk devices attributes
  * Update bitlbee policy
  * Label /usr/sbin/sos with sosreport_exec_t
  * Update policy for the sblim-sfcb service
  * Add the files_getattr_non_auth_dirs() interface
  * Fix the CI to work with DNF5
  * Make systemd_tmpfiles_t MLS trusted for lowering the level of files
  * Revert "Allow insights client map cache_home_t"
  * Allow nfsidmapd connect to systemd-machined over a unix socket
  * Allow snapperd connect to kernel over a unix domain stream socket
  * Allow virt_qemu_ga_t create .ssh dir with correct label
  * Allow targetd read network sysctls
  * Set the abrt_handle_event boolean to on
  * Permit kernel_t to change the user identity in object contexts
  * Allow insights client map cache_home_t
  * Label /usr/sbin/mariadbd with mysqld_exec_t
  * Allow httpd tcp connect to redis port conditionally
  * Label only /usr/sbin/ripd and ripngd with zebra_exec_t
  * Dontaudit aide the execmem permission
  * Remove permissive from fdo
  * Allow sa-update manage spamc home files
  * Allow sa-update connect to systemlog services
  * Label /usr/lib/systemd/system/mimedefang.service with antivirus_unit_file_t
  * Allow nsd_crond_t write nsd_var_run_t & connectto nsd_t
  * Allow bootupd search EFI directory
  * Change init_audit_control default value to true
  * Allow nfsidmapd connect to systemd-userdbd with a unix socket
  * Add the qatlib  module
  * Add the fdo module
  * Add the bootupd module
  * Set default ports for keylime policy
  * Create policy for qatlib
  * Add policy for FIDO Device Onboard
  * Add policy for bootupd
  * Add support for kafs-dns requested by keyutils
  * Allow insights-client execmem
  * Add support for chronyd-restricted
  * Add init_explicit_domain() interface
  * Allow fsadm_t to get attributes of cgroup filesystems
  * Add list_dir_perms to kerberos_read_keytab
  * Label /var/run/tmpfiles.d/static-nodes.conf with kmod_var_run_t
  * Allow sendmail manage its runtime files

OBS-URL: https://build.opensuse.org/request/show/1121138
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=196
2023-10-30 11:05:50 +00:00
_service Accepting request 1072556 from home:jsegitz:branches:security:SELinux_final 2023-03-17 10:46:53 +00:00
_servicedata Accepting request 1121138 from home:cahu:branches:security:SELinux 2023-10-30 11:05:50 +00:00
.gitattributes initial import 2008-07-22 09:56:50 +00:00
.gitignore initial import 2008-07-22 09:56:50 +00:00
booleans-minimum.conf Accepting request 833509 from home:jsegitz:branches:security:SELinux 2020-09-10 15:07:50 +00:00
booleans-mls.conf Accepting request 833509 from home:jsegitz:branches:security:SELinux 2020-09-10 15:07:50 +00:00
booleans-targeted.conf Accepting request 833509 from home:jsegitz:branches:security:SELinux 2020-09-10 15:07:50 +00:00
booleans.subs_dist Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
container.fc Accepting request 1094792 from home:jsegitz:branches:security:SELinux 2023-06-23 08:08:16 +00:00
container.if Accepting request 1094792 from home:jsegitz:branches:security:SELinux 2023-06-23 08:08:16 +00:00
container.te Accepting request 1094792 from home:jsegitz:branches:security:SELinux 2023-06-23 08:08:16 +00:00
customizable_types OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
debug-build.sh Accepting request 1075010 from home:cahu:branches:security:SELinux 2023-03-28 12:44:26 +00:00
file_contexts.subs_dist OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=96 2021-03-12 07:59:19 +00:00
macros.selinux-policy Accepting request 1115645 from home:jsegitz:branches:security:SELinux_3 2023-10-04 15:03:23 +00:00
Makefile.devel OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
modules-minimum-base.conf Accepting request 914043 from home:akedroutek:branches:security:SELinux 2021-08-24 14:50:15 +00:00
modules-minimum-contrib.conf Accepting request 1035580 from home:jsegitz:branches:security:SELinux 2022-11-14 08:27:42 +00:00
modules-minimum-disable.lst Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
modules-mls-base.conf Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
modules-mls-contrib.conf Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
modules-targeted-base.conf Accepting request 914043 from home:akedroutek:branches:security:SELinux 2021-08-24 14:50:15 +00:00
modules-targeted-contrib.conf Accepting request 1035580 from home:jsegitz:branches:security:SELinux 2022-11-14 08:27:42 +00:00
README.Update process easier in general. Updated README.Update 2023-03-17 11:19:42 +00:00
securetty_types-minimum OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
securetty_types-mls OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
securetty_types-targeted OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
selinux-policy-20231030.tar.xz Accepting request 1121138 from home:cahu:branches:security:SELinux 2023-10-30 11:05:50 +00:00
selinux-policy-rpmlintrc Accepting request 781805 from home:jsegitz:branches:security:SELinux 2020-03-05 10:13:59 +00:00
selinux-policy.changes Accepting request 1121138 from home:cahu:branches:security:SELinux 2023-10-30 11:05:50 +00:00
selinux-policy.conf Accepting request 824841 from home:kukuk:selinux 2020-08-10 12:35:50 +00:00
selinux-policy.spec Accepting request 1121138 from home:cahu:branches:security:SELinux 2023-10-30 11:05:50 +00:00
setrans-minimum.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
setrans-mls.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
setrans-targeted.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
update.sh Accepting request 1112155 from home:jsegitz:branches:security:SELinux_2 2023-09-20 14:15:21 +00:00
users-minimum Accepting request 978296 from home:jsegitz:branches:security:SELinux 2022-05-20 14:53:12 +00:00
users-mls Accepting request 978296 from home:jsegitz:branches:security:SELinux 2022-05-20 14:53:12 +00:00
users-targeted Accepting request 978296 from home:jsegitz:branches:security:SELinux 2022-05-20 14:53:12 +00:00

# How to update this project

This project is updated using obs services.
The obs services pull from git repositories, which are specified in the `_service` file.
Please contribute all changes to the upstream git repositories listed there.

To update this project to the upstream versions, please make sure you installed these obs services locally:
```
sudo zypper in obs-service-tar_scm obs-service-recompress obs-service-set_version obs-service-download_files
```

Then, generate new tarballs, changelog and version number for this repository by running this command:
```
sh update.sh
```

Afterwards, please check your local project state and remove old tarballs if necessary.
Then proceed as usual with check-in and build.