Go to file
Hu 4b3ec21f85 Accepting request 1144343 from home:cahu:branches:security:SELinux
- Update to version 20240205:
  * Allow gpg manage rpm cache
  * Allow login_userdomain name_bind to howl and xmsg udp ports
  * Allow rules for confined users logged in plasma
  * Label /dev/iommu with iommu_device_t
  * Remove duplicate file context entries in /run
  * Dontaudit getty and plymouth the checkpoint_restore capability
  * Allow su domains write login records
  * Revert "Allow su domains write login records"
  * Allow login_userdomain delete session dbusd tmp socket files
  * Allow unix dgram sendto between exim processes
  * Allow su domains write login records
  * Allow smbd_t to watch user_home_dir_t if samba_enable_home_dirs is on
  * Allow chronyd-restricted read chronyd key files
  * Allow conntrackd_t to use bpf capability2
  * Allow systemd-networkd manage its runtime socket files
  * Allow init_t nnp domain transition to colord_t
  * Allow polkit status systemd services
  * nova: Fix duplicate declarations
  * Allow httpd work with PrivateTmp
  * Add interfaces for watching and reading ifconfig_var_run_t
  * Allow collectd read raw fixed disk device
  * Allow collectd read udev pid files
  * Set correct label on /etc/pki/pki-tomcat/kra
  * Allow systemd domains watch system dbus pid socket files
  * Allow certmonger read network sysctls
  * Allow mdadm list stratisd data directories
  * Allow syslog to run unconfined scripts conditionally
  * Allow syslogd_t nnp_transition to syslogd_unconfined_script_t
  * Allow qatlib set attributes of vfio device files
  * Allow systemd-sleep set attributes of efivarfs files
  * Allow samba-dcerpcd read public files
  * Allow spamd_update_t the sys_ptrace capability in user namespace
  * Allow bluetooth devices work with alsa
  * Allow alsa get attributes filesystems with extended attributes
  * Allow hypervkvp_t write access to NetworkManager_etc_rw_t
  * Add interface for write-only access to NetworkManager rw conf
  * Allow systemd-sleep send a message to syslog over a unix dgram socket
  * Allow init create and use netlink netfilter socket
  * Allow qatlib load kernel modules
  * Allow qatlib run lspci
  * Allow qatlib manage its private runtime socket files
  * Allow qatlib read/write vfio devices
  * Label /etc/redis.conf with redis_conf_t
  * Remove the lockdown-class rules from the policy
  * Allow init read all non-security socket files
  * Replace redundant dnsmasq pattern macros
  * Remove unneeded symlink perms in dnsmasq.if
  * Add additions to dnsmasq interface
  * Allow nvme_stas_t create and use netlink kobject uevent socket
  * Allow collectd connect to statsd port
  * Allow keepalived_t to use sys_ptrace of cap_userns
  * Allow dovecot_auth_t connect to postgresql using UNIX socket
  * Make named_zone_t and named_var_run_t a part of the mountpoint attribute
  * Allow sysadm execute traceroute in sysadm_t domain using sudo
  * Allow sysadm execute tcpdump in sysadm_t domain using sudo
  * Allow opafm search nfs directories
  * Add support for syslogd unconfined scripts
  * Allow gpsd use /dev/gnss devices
  * Allow gpg read rpm cache
  * Allow virtqemud additional permissions
  * Allow virtqemud manage its private lock files
  * Allow virtqemud use the io_uring api
  * Allow ddclient send e-mail notifications
  * Allow postfix_master_t map postfix data files
  * Allow init create and use vsock sockets
  * Allow thumb_t append to init unix domain stream sockets
  * Label /dev/vas with vas_device_t
  * Create interface selinux_watch_config and add it to SELinux users
  * Update cifs interfaces to include fs_search_auto_mountpoints()
  * Allow sudodomain read var auth files
  * Allow spamd_update_t read hardware state information
  * Allow virtnetworkd domain transition on tc command execution
  * Allow sendmail MTA connect to sendmail LDA
  * Allow auditd read all domains process state
  * Allow rsync read network sysctls
  * Add dhcpcd bpf capability to run bpf programs
  * Dontaudit systemd-hwdb dac_override capability
  * Allow systemd-sleep create efivarfs files
  * Allow map xserver_tmpfs_t files when xserver_clients_write_xshm is on
  * Allow graphical applications work in Wayland
  * Allow kdump work with PrivateTmp
  * Allow dovecot-auth work with PrivateTmp
  * Allow nfsd get attributes of all filesystems
  * Allow unconfined_domain_type use io_uring cmd on domain
  * ci: Only run Rawhide revdeps tests on the rawhide branch
  * Label /var/run/auditd.state as auditd_var_run_t
  * Allow fido-device-onboard (FDO) read the crack database
  * Allow ip an explicit domain transition to other domains
  * Label /usr/libexec/selinux/selinux-autorelabel with semanage_exec_t
  * Allow  winbind_rpcd_t processes access when samba_export_all_* is on
  * Enable NetworkManager and dhclient to use initramfs-configured DHCP connection
  * Allow ntp to bind and connect to ntske port.

OBS-URL: https://build.opensuse.org/request/show/1144343
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=208
2024-02-06 08:12:43 +00:00
_service Accepting request 1072556 from home:jsegitz:branches:security:SELinux_final 2023-03-17 10:46:53 +00:00
_servicedata Accepting request 1144343 from home:cahu:branches:security:SELinux 2024-02-06 08:12:43 +00:00
.gitattributes initial import 2008-07-22 09:56:50 +00:00
.gitignore initial import 2008-07-22 09:56:50 +00:00
booleans-minimum.conf Accepting request 833509 from home:jsegitz:branches:security:SELinux 2020-09-10 15:07:50 +00:00
booleans-mls.conf Accepting request 833509 from home:jsegitz:branches:security:SELinux 2020-09-10 15:07:50 +00:00
booleans-targeted.conf Accepting request 833509 from home:jsegitz:branches:security:SELinux 2020-09-10 15:07:50 +00:00
booleans.subs_dist Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
container.fc Accepting request 1094792 from home:jsegitz:branches:security:SELinux 2023-06-23 08:08:16 +00:00
container.if Accepting request 1094792 from home:jsegitz:branches:security:SELinux 2023-06-23 08:08:16 +00:00
container.te Accepting request 1094792 from home:jsegitz:branches:security:SELinux 2023-06-23 08:08:16 +00:00
customizable_types OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
debug-build.sh Accepting request 1075010 from home:cahu:branches:security:SELinux 2023-03-28 12:44:26 +00:00
file_contexts.subs_dist OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=96 2021-03-12 07:59:19 +00:00
macros.selinux-policy Accepting request 1115645 from home:jsegitz:branches:security:SELinux_3 2023-10-04 15:03:23 +00:00
Makefile.devel OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
modules-minimum-base.conf Accepting request 914043 from home:akedroutek:branches:security:SELinux 2021-08-24 14:50:15 +00:00
modules-minimum-contrib.conf Accepting request 1035580 from home:jsegitz:branches:security:SELinux 2022-11-14 08:27:42 +00:00
modules-minimum-disable.lst Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
modules-mls-base.conf Accepting request 734854 from home:jsegitz:branches:security:SELinux 2019-10-04 02:15:03 +00:00
modules-mls-contrib.conf Accepting request 1128519 from home:cahu:branches:security:SELinux 2023-11-24 09:58:31 +00:00
modules-targeted-base.conf Accepting request 914043 from home:akedroutek:branches:security:SELinux 2021-08-24 14:50:15 +00:00
modules-targeted-contrib.conf Accepting request 1128143 from home:cahu:branches:security:SELinux 2023-11-22 13:59:55 +00:00
README.Update process easier in general. Updated README.Update 2023-03-17 11:19:42 +00:00
securetty_types-minimum OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
securetty_types-mls OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
securetty_types-targeted OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
selinux-policy-20240205.tar.xz Accepting request 1144343 from home:cahu:branches:security:SELinux 2024-02-06 08:12:43 +00:00
selinux-policy-rpmlintrc Accepting request 781805 from home:jsegitz:branches:security:SELinux 2020-03-05 10:13:59 +00:00
selinux-policy.changes Accepting request 1144343 from home:cahu:branches:security:SELinux 2024-02-06 08:12:43 +00:00
selinux-policy.conf Accepting request 824841 from home:kukuk:selinux 2020-08-10 12:35:50 +00:00
selinux-policy.spec Accepting request 1144343 from home:cahu:branches:security:SELinux 2024-02-06 08:12:43 +00:00
setrans-minimum.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
setrans-mls.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
setrans-targeted.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=68 2018-11-27 09:16:35 +00:00
update.sh Accepting request 1112155 from home:jsegitz:branches:security:SELinux_2 2023-09-20 14:15:21 +00:00
users-minimum Accepting request 978296 from home:jsegitz:branches:security:SELinux 2022-05-20 14:53:12 +00:00
users-mls Accepting request 978296 from home:jsegitz:branches:security:SELinux 2022-05-20 14:53:12 +00:00
users-targeted Accepting request 978296 from home:jsegitz:branches:security:SELinux 2022-05-20 14:53:12 +00:00

# How to update this project

This project is updated using obs services.
The obs services pull from git repositories, which are specified in the `_service` file.
Please contribute all changes to the upstream git repositories listed there.

To update this project to the upstream versions, please make sure you installed these obs services locally:
```
sudo zypper in obs-service-tar_scm obs-service-recompress obs-service-set_version obs-service-download_files
```

Then, generate new tarballs, changelog and version number for this repository by running this command:
```
sh update.sh
```

Afterwards, please check your local project state and remove old tarballs if necessary.
Then proceed as usual with check-in and build.