forked from pool/selinux-policy
Compare commits
16 Commits
Author | SHA256 | Date | |
---|---|---|---|
|
eef1aee96a | ||
03f97d0b62 | |||
|
9ea1b50e02 | ||
3c53700573 | |||
|
e65ffcabd8 | ||
1ed8974058 | |||
96c5622eed | |||
|
6afcac9730 | ||
0a02f57980 | |||
|
accf007cd1 | ||
3d7db12b13 | |||
55f3e0d374 | |||
|
26b7385b38 | ||
0c3d4440ae | |||
f6d9c79526 | |||
ee9959537f |
@ -1,7 +1,7 @@
|
||||
<servicedata>
|
||||
<service name="tar_scm">
|
||||
<param name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param>
|
||||
<param name="changesrevision">f8d70ad2b8a5d2628cd1ee881ccedbcebf189d3d</param></service><service name="tar_scm">
|
||||
<param name="changesrevision">6e8cf2b0a771eddc3ae1bee3be0042bd3d9d8ba1</param></service><service name="tar_scm">
|
||||
<param name="url">https://github.com/containers/container-selinux.git</param>
|
||||
<param name="changesrevision">07b3034f6d9625ab84508a2f46515d8ff79b4204</param></service><service name="tar_scm">
|
||||
<param name="url">https://gitlab.suse.de/jsegitz/selinux-policy.git</param>
|
||||
|
@ -117,7 +117,7 @@ if [ -z "${_policytype}" ]; then \
|
||||
_policytype="targeted" \
|
||||
fi \
|
||||
if %{_sbindir}/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
||||
if [ -f %{_file_context_file_pre} ]; then \
|
||||
if [ -f %{_file_context_file_pre} ] && [ -z "${TRANSACTIONAL_UPDATE}" ]; then \
|
||||
%{_sbindir}/fixfiles -C %{_file_context_file_pre} restore &> /dev/null \
|
||||
rm -f %{_file_context_file_pre} \
|
||||
fi \
|
||||
|
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:2e46dccf26669df2e4cb81b47ade54d28892113ad73308f60bb4300f216cb39c
|
||||
size 774376
|
3
selinux-policy-20241105.tar.xz
Normal file
3
selinux-policy-20241105.tar.xz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:e5ea1d19388cfee6c2d8b7c95a17bf541872cec56ca3d761f501ef1487ecc5b9
|
||||
size 775060
|
@ -1,3 +1,69 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Nov 05 16:21:44 UTC 2024 - cathy.hu@suse.com
|
||||
|
||||
- Update to version 20241105:
|
||||
* Allow virt_dbus_t to connect to virtd_t over unix_stream_socket (bsc#1232655)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Oct 31 07:35:49 UTC 2024 - cathy.hu@suse.com
|
||||
|
||||
- Update to version 20241031:
|
||||
* Label /var/livepatches as lib_t for ULP on micro (bsc#1228879)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Oct 21 07:23:25 UTC 2024 - cathy.hu@suse.com
|
||||
|
||||
- Update to version 20241021:
|
||||
* rsync: add rsync_exec_commands boolean and enable it by default (bsc#1231494)
|
||||
* Allow snapperd to execute systemctl (bsc#1231489)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Oct 18 12:34:06 UTC 2024 - cathy.hu@suse.com
|
||||
|
||||
- Update to version 20241018:
|
||||
* Allow slpd to create TCPDIAG netlink socket (bsc#1231491)
|
||||
* Allow slpd to use sys_chroot (bsc#1231491)
|
||||
* Allow openvswitch-ipsec use strongswan (bsc#1231493)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 30 07:15:18 UTC 2024 - cathy.hu@suse.com
|
||||
|
||||
- Update to version 20240930:
|
||||
* Label yast binaries correctly
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Sep 25 08:23:22 UTC 2024 - cathy.hu@suse.com
|
||||
|
||||
- Update to version 20240925:
|
||||
* Allow snapperd to manage unlabeled_t files (bsc#1230966)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 24 09:37:13 UTC 2024 - cathy.hu@suse.com
|
||||
|
||||
- Update to version 20240924:
|
||||
* Revert "Allow virtstoraged to manage images (bsc#1228742)"
|
||||
* Label /etc/mdevctl.d with mdevctl_conf_t
|
||||
* Sync users with Fedora targeted users
|
||||
* Update policy for rpc-virtstorage
|
||||
* Allow virtstoraged get attributes of configfs dirs
|
||||
* Fix SELinux policy for sandbox X server to fix 'sandbox -X' command
|
||||
* Update bootupd policy when ESP is not mounted
|
||||
* Allow thumb_t map dri devices
|
||||
* Allow samba use the io_uring API
|
||||
* Allow the sysadm user use the secretmem API
|
||||
* Allow nut-upsmon read systemd-logind session files
|
||||
* Allow sysadm_t to create PF_KEY sockets
|
||||
* Update bootupd policy for the removing-state-file test
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 24 08:50:16 UTC 2024 - Cathy Hu <cathy.hu@suse.com>
|
||||
|
||||
- Fix macros.selinux-policy (bsc#1230897)
|
||||
- %selinux_relabel_post should not relabel files in
|
||||
transactional systems in %post as the policy is not loaded
|
||||
into the kernel directly after install, instead the relabelling
|
||||
will happen on the next boot
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Sep 12 07:34:20 UTC 2024 - cathy.hu@suse.com
|
||||
|
||||
|
@ -36,7 +36,7 @@ Summary: SELinux policy configuration
|
||||
License: GPL-2.0-or-later
|
||||
Group: System/Management
|
||||
Name: selinux-policy
|
||||
Version: 20240912
|
||||
Version: 20241105
|
||||
Release: 0
|
||||
Source0: %{name}-%{version}.tar.xz
|
||||
Source1: container.fc
|
||||
|
Loading…
Reference in New Issue
Block a user