forked from pool/selinux-policy
6fa6803f18
- Update to version 20200910. Refreshed * fix_authlogin.patch * fix_nagios.patch * fix_systemd.patch * fix_usermanage.patch - Delete suse_specific.patch, moved content into fix_selinuxutil.patch - Cleanup of booleans-* presets * Enabled user_rw_noexattrfile unconfined_chrome_sandbox_transition unconfined_mozilla_plugin_transition for the minimal policy * Disabled xserver_object_manager for the MLS policy * Disabled openvpn_enable_homedirs privoxy_connect_any selinuxuser_direct_dri_enabled selinuxuser_ping (aka user_ping) squid_connect_any telepathy_tcp_connect_generic_network_ports for the targeted policy Change your local config if you need them - Build HTML version of manpages for the -devel package OBS-URL: https://build.opensuse.org/request/show/833509 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=83
25 lines
1.3 KiB
Diff
25 lines
1.3 KiB
Diff
Index: fedora-policy/policy/modules/contrib/nagios.fc
|
|
===================================================================
|
|
--- fedora-policy.orig/policy/modules/contrib/nagios.fc
|
|
+++ fedora-policy/policy/modules/contrib/nagios.fc
|
|
@@ -24,6 +24,7 @@
|
|
/var/log/pnp4nagios(/.*)? gen_context(system_u:object_r:nagios_log_t,s0)
|
|
|
|
/var/lib/pnp4nagios(/.*)? gen_context(system_u:object_r:nagios_var_lib_t,s0)
|
|
+/var/lib/nagios(/.*)? gen_context(system_u:object_r:nagios_var_lib_t,s0)
|
|
|
|
/var/run/nagios.* gen_context(system_u:object_r:nagios_var_run_t,s0)
|
|
|
|
Index: fedora-policy/policy/modules/contrib/nagios.te
|
|
===================================================================
|
|
--- fedora-policy.orig/policy/modules/contrib/nagios.te
|
|
+++ fedora-policy/policy/modules/contrib/nagios.te
|
|
@@ -161,6 +161,7 @@ allow nagios_t nagios_spool_t:file map;
|
|
manage_files_pattern(nagios_t, nagios_var_lib_t, nagios_var_lib_t)
|
|
manage_fifo_files_pattern(nagios_t, nagios_var_lib_t, nagios_var_lib_t)
|
|
manage_dirs_pattern(nagios_t, nagios_var_lib_t, nagios_var_lib_t)
|
|
+manage_sock_files_pattern(nagios_t, nagios_var_lib_t, nagios_var_lib_t)
|
|
files_var_lib_filetrans(nagios_t, nagios_var_lib_t, { dir file fifo_file })
|
|
|
|
kernel_read_system_state(nagios_t)
|