Go to file
Johannes Segitz 2eaa3b6b79 Accepting request 1166915 from home:cahu:security:SELinux:policytest
- Update to version 20240411:
  * Remove duplicate in sysnetwork.fc
  * Rename /var/run/wicked* to /run/wicked*
  * Remove /var/run/rsyslog/additional-log-sockets.conf from logging.fc
  * policy: support pidfs
  * Confine selinux-autorelabel-generator.sh
  * Allow logwatch_mail_t read/write to init over a unix stream socket
  * Allow logwatch read logind sessions files
  * files_dontaudit_getattr_tmpfs_files allowed the access and didn't dontaudit it
  * files_dontaudit_mounton_modules_object allowed the access and didn't dontaudit it
  * Allow NetworkManager the sys_ptrace capability in user namespace
  * dontaudit execmem for modemmanager
  * Allow dhcpcd use unix_stream_socket
  * Allow dhcpc read /run/netns files
  * Update mmap_rw_file_perms to include the lock permission
  * Allow plymouthd log during shutdown
  * Add logging_watch_all_log_dirs() and logging_watch_all_log_files()
  * Allow journalctl_t read filesystem sysctls
  * Allow cgred_t to get attributes of cgroup filesystems
  * Allow wdmd read hardware state information
  * Allow wdmd list the contents of the sysfs directories
  * Allow linuxptp configure phc2sys and chronyd over a unix domain socket
  * Allow sulogin relabel tty1
  * Dontaudit sulogin the checkpoint_restore capability
  * Modify sudo_role_template() to allow getpgid
  * Allow userdomain get attributes of files on an nsfs filesystem
  * Allow opafm create NFS files and directories
  * Allow virtqemud create and unlink files in /etc/libvirt/
  * Allow virtqemud domain transition on swtpm execution
  * Add the swtpm.if interface file for interactions with other domains
  * Allow samba to have dac_override capability
  * systemd: allow sys_admin capability for systemd_notify_t
  * systemd: allow systemd_notify_t to send data to kernel_t datagram sockets
  * Allow thumb_t to watch and watch_reads mount_var_run_t
  * Allow krb5kdc_t map krb5kdc_principal_t files
  * Allow unprivileged confined user dbus chat with setroubleshoot
  * Allow login_userdomain map files in /var
  * Allow wireguard work with firewall-cmd
  * Differentiate between staff and sysadm when executing crontab with sudo
  * Add crontab_admin_domtrans interface
  * Allow abrt_t nnp domain transition to abrt_handle_event_t
  * Allow xdm_t to watch and watch_reads mount_var_run_t
  * Dontaudit subscription manager setfscreate and read file contexts
  * Don't audit crontab_domain write attempts to user home
  * Transition from sudodomains to crontab_t when executing crontab_exec_t
  * Add crontab_domtrans interface
  * Fix label of pseudoterminals created from sudodomain
  * Allow utempter_t use ptmx
  * Dontaudit rpmdb attempts to connect to sssd over a unix stream socket
  * Allow admin user read/write on fixed_disk_device_t
  * Only allow confined user domains to login locally without unconfined_login
  * Add userdom_spec_domtrans_confined_admin_users interface
  * Only allow admindomain to execute shell via ssh with ssh_sysadm_login
  * Add userdom_spec_domtrans_admin_users interface
  * Move ssh dyntrans to unconfined inside unconfined_login tunable policy
  * Update ssh_role_template() for user ssh-agent type
  * Allow init to inherit system DBus file descriptors
  * Allow init to inherit fds from syslogd
  * Allow any domain to inherit fds from rpm-ostree
  * Update afterburn policy
  * Allow init_t nnp domain transition to abrtd_t
  * Rename all /var/lock file context entries to /run/lock
  * Rename all /var/run file context entries to /run
- Add script varrun-convert.sh for locally existing modules
  to be able to cope with the /var/run -> /run change
- Update embedded container-selinux to commit
  a8e389dbcd3f9b6ed0a7e495c6f559c0383dc49e

OBS-URL: https://build.opensuse.org/request/show/1166915
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=217
2024-04-12 07:02:14 +00:00
_service Accepting request 1072556 from home:jsegitz:branches:security:SELinux_final 2023-03-17 10:46:53 +00:00
_servicedata Accepting request 1166915 from home:cahu:security:SELinux:policytest 2024-04-12 07:02:14 +00:00
.gitattributes initial import 2008-07-22 09:56:50 +00:00
.gitignore initial import 2008-07-22 09:56:50 +00:00
booleans-minimum.conf Accepting request 833509 from home:jsegitz:branches:security:SELinux 2020-09-10 15:07:50 +00:00
booleans-mls.conf Accepting request 833509 from home:jsegitz:branches:security:SELinux 2020-09-10 15:07:50 +00:00
booleans-targeted.conf Accepting request 833509 from home:jsegitz:branches:security:SELinux 2020-09-10 15:07:50 +00:00
booleans.subs_dist Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
container.fc Accepting request 1166915 from home:cahu:security:SELinux:policytest 2024-04-12 07:02:14 +00:00
container.if Accepting request 1166915 from home:cahu:security:SELinux:policytest 2024-04-12 07:02:14 +00:00
container.te Accepting request 1166915 from home:cahu:security:SELinux:policytest 2024-04-12 07:02:14 +00:00
customizable_types OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
debug-build.sh Accepting request 1075010 from home:cahu:branches:security:SELinux 2023-03-28 12:44:26 +00:00
file_contexts.subs_dist Accepting request 1166915 from home:cahu:security:SELinux:policytest 2024-04-12 07:02:14 +00:00
macros.selinux-policy Accepting request 1115645 from home:jsegitz:branches:security:SELinux_3 2023-10-04 15:03:23 +00:00
Makefile.devel OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
modules-minimum-base.conf Accepting request 914043 from home:akedroutek:branches:security:SELinux 2021-08-24 14:50:15 +00:00
modules-minimum-contrib.conf Accepting request 1035580 from home:jsegitz:branches:security:SELinux 2022-11-14 08:27:42 +00:00
modules-minimum-disable.lst Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
modules-mls-base.conf Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
modules-mls-contrib.conf Accepting request 1128519 from home:cahu:branches:security:SELinux 2023-11-24 09:58:31 +00:00
modules-targeted-base.conf Accepting request 914043 from home:akedroutek:branches:security:SELinux 2021-08-24 14:50:15 +00:00
modules-targeted-contrib.conf Accepting request 1160076 from home:jsegitz:branches:security:SELinux_4 2024-03-21 11:06:40 +00:00
README.Update process easier in general. Updated README.Update 2023-03-17 11:19:42 +00:00
securetty_types-minimum OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
securetty_types-mls OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
securetty_types-targeted OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
selinux-policy-20240411.tar.xz Accepting request 1166915 from home:cahu:security:SELinux:policytest 2024-04-12 07:02:14 +00:00
selinux-policy-rpmlintrc Accepting request 781805 from home:jsegitz:branches:security:SELinux 2020-03-05 10:13:59 +00:00
selinux-policy.changes Accepting request 1166915 from home:cahu:security:SELinux:policytest 2024-04-12 07:02:14 +00:00
selinux-policy.conf Accepting request 824841 from home:kukuk:selinux 2020-08-10 12:35:50 +00:00
selinux-policy.spec Accepting request 1166915 from home:cahu:security:SELinux:policytest 2024-04-12 07:02:14 +00:00
setrans-minimum.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
setrans-mls.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
setrans-targeted.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
update.sh Accepting request 1112155 from home:jsegitz:branches:security:SELinux_2 2023-09-20 14:15:21 +00:00
users-minimum Accepting request 978296 from home:jsegitz:branches:security:SELinux 2022-05-20 14:53:12 +00:00
users-mls Accepting request 978296 from home:jsegitz:branches:security:SELinux 2022-05-20 14:53:12 +00:00
users-targeted Accepting request 978296 from home:jsegitz:branches:security:SELinux 2022-05-20 14:53:12 +00:00
varrun-convert.sh Accepting request 1166915 from home:cahu:security:SELinux:policytest 2024-04-12 07:02:14 +00:00

# How to update this project

This project is updated using obs services.
The obs services pull from git repositories, which are specified in the `_service` file.
Please contribute all changes to the upstream git repositories listed there.

To update this project to the upstream versions, please make sure you installed these obs services locally:
```
sudo zypper in obs-service-tar_scm obs-service-recompress obs-service-set_version obs-service-download_files
```

Then, generate new tarballs, changelog and version number for this repository by running this command:
```
sh update.sh
```

Afterwards, please check your local project state and remove old tarballs if necessary.
Then proceed as usual with check-in and build.