forked from pool/selinux-policy
- Enable sap module - Add equivalency in file_contexts.subs_dist * /bin /usr/bin * /sbin /usr/bin * /usr/sbin /usr/bin - Update to version 20240710: * Change fc in rebootmgr module for /sbin -> /usr/bin * Change fc in rpm module for /sbin -> /usr/bin * Change fc in rsync module for /sbin -> /usr/bin * Change fc in wicked module for /sbin -> /usr/bin * Confine libvirt-dbus * Allow virtqemud the kill capability in user namespace * Allow rshim get options of the netlink class for KOBJECT_UEVENT family * Allow dhcpcd the kill capability * Allow systemd-networkd list /var/lib/systemd/network * Allow sysadm_t run systemd-nsresourced bpf programs * Update policy for systemd generators interactions * Allow create memory.pressure files with cgroup_memory_pressure_t * Add support for libvirt hooks * Allow certmonger read and write tpm devices * Allow all domains to connect to systemd-nsresourced over a unix socket * Allow systemd-machined read the vsock device * Update policy for systemd generators * Allow ptp4l_t request that the kernel load a kernel module * Allow sbd to trace processes in user namespace * Allow request-key execute scripts * Update policy for haproxyd * Update policy for systemd-nsresourced * Correct sbin-related file context entries * Allow login_userdomain execute systemd-tmpfiles in the caller domain * Allow virt_driver_domain read files labeled unconfined_t * Allow virt_driver_domain dbus chat with policykit * Allow virtqemud manage nfs files when virt_use_nfs boolean is on * Add rules for interactions between generators * Label memory.pressure files with cgroup_memory_pressure_t * Revert "Allow some systemd services write to cgroup files" * Update policy for systemd-nsresourced * Label /usr/bin/ntfsck with fsadm_exec_t * Allow systemd_fstab_generator_t read tmpfs files * Update policy for systemd-nsresourced * Alias /usr/sbin to /usr/bin and change all /usr/sbin paths to /usr/bin * Remove a few lines duplicated between {dkim,milter}.fc * Alias /bin → /usr/bin and remove redundant paths * Drop duplicate line for /usr/sbin/unix_chkpwd * Drop duplicate paths for /usr/sbin * Update systemd-generator policy * Remove permissive domain for bootupd_t * Remove permissive domain for coreos_installer_t * Remove permissive domain for afterburn_t * Add the sap module to modules.conf * Move unconfined_domain(sap_unconfined_t) to an optional block * Create the sap module * Allow systemd-coredumpd sys_admin and sys_resource capabilities * Allow systemd-coredump read nsfs files * Allow generators auto file transition only for plain files * Allow systemd-hwdb write to the kernel messages device * Escape "interface" as a file name in a virt filetrans pattern * Allow gnome-software work for login_userdomain * Allow systemd-machined manage runtime sockets * Revert "Allow systemd-machined manage runtime sockets" * Allow postfix_domain connect to postgresql over a unix socket * Dontaudit systemd-coredump sys_admin capability - Update container-selinux OBS-URL: https://build.opensuse.org/request/show/1186574 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=233
188 lines
7.1 KiB
Plaintext
188 lines
7.1 KiB
Plaintext
# Copyright (C) 2017 Red Hat, Inc. All rights reserved.
|
|
#
|
|
# Author: Petr Lautrbach <plautrba@redhat.com>
|
|
# Author: Lukáš Vrabec <lvrabec@redhat.com>
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
## Changes done for openSUSE/SUSE:
|
|
## - move /var/lib/rpm-state to /run/rpm-state and create that directory
|
|
##
|
|
|
|
# RPM macros for packages installing SELinux modules
|
|
|
|
%_selinux_policy_version SELINUXPOLICYVERSION
|
|
|
|
%_selinux_store_path SELINUXSTOREPATH
|
|
%_selinux_store_policy_path %{_selinux_store_path}/${_policytype}
|
|
|
|
%_file_context_file %{_sysconfdir}/selinux/${SELINUXTYPE}/contexts/files/file_contexts
|
|
%_file_context_file_pre /var/adm/update-scripts/file_contexts.pre
|
|
|
|
%_file_custom_defined_booleans %{_selinux_store_policy_path}/rpmbooleans.custom
|
|
%_file_custom_defined_booleans_tmp %{_selinux_store_policy_path}/rpmbooleans.custom.tmp
|
|
|
|
# %selinux_requires
|
|
%selinux_requires \
|
|
Requires: selinux-policy >= %{_selinux_policy_version} \
|
|
BuildRequires: pkgconfig(systemd) \
|
|
BuildRequires: selinux-policy \
|
|
BuildRequires: selinux-policy-devel \
|
|
Requires(post): selinux-policy-base >= %{_selinux_policy_version} \
|
|
Requires(post): libselinux-utils \
|
|
Requires(post): policycoreutils \
|
|
%if 0%{?fedora} || 0%{?rhel} > 7 || 0%{suse_version} > 1500\
|
|
Requires(post): policycoreutils-python-utils \
|
|
%else \
|
|
Requires(post): policycoreutils-python \
|
|
%endif \
|
|
%{nil}
|
|
|
|
# %selinux_modules_install [-s <policytype>] [-p <modulepriority>] module [module]...
|
|
%selinux_modules_install("s:p:") \
|
|
if [ -e /etc/selinux/config ]; then \
|
|
. /etc/selinux/config \
|
|
fi \
|
|
_policytype=%{-s*} \
|
|
if [ -z "${_policytype}" ]; then \
|
|
_policytype="targeted" \
|
|
fi \
|
|
if [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
|
%{_sbindir}/semodule -n -s ${_policytype} -X %{!-p:200}%{-p*} -i %* || : \
|
|
%{_sbindir}/selinuxenabled && %{_sbindir}/load_policy || : \
|
|
fi \
|
|
%{nil}
|
|
|
|
# %selinux_modules_uninstall [-s <policytype>] [-p <modulepriority>] module [module]...
|
|
%selinux_modules_uninstall("s:p:") \
|
|
if [ -e /etc/selinux/config ]; then \
|
|
. /etc/selinux/config \
|
|
fi \
|
|
_policytype=%{-s*} \
|
|
if [ -z "${_policytype}" ]; then \
|
|
_policytype="targeted" \
|
|
fi \
|
|
if [ $1 -eq 0 ]; then \
|
|
if [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
|
%{_sbindir}/semodule -n -X %{!-p:200}%{-p*} -s ${_policytype} -r %* &> /dev/null || : \
|
|
%{_sbindir}/selinuxenabled && %{_sbindir}/load_policy || : \
|
|
fi \
|
|
fi \
|
|
%{nil}
|
|
|
|
# %selinux_relabel_pre [-s <policytype>]
|
|
%selinux_relabel_pre("s:") \
|
|
if %{_sbindir}/selinuxenabled; then \
|
|
if [ -e /etc/selinux/config ]; then \
|
|
. /etc/selinux/config \
|
|
fi \
|
|
_policytype=%{-s*} \
|
|
if [ -z "${_policytype}" ]; then \
|
|
_policytype="targeted" \
|
|
fi \
|
|
if [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
|
mkdir -p $(dirname %{_file_context_file_pre}) \
|
|
[ -f %{_file_context_file_pre} ] || cp -f %{_file_context_file} %{_file_context_file_pre} \
|
|
fi \
|
|
fi \
|
|
%{nil}
|
|
|
|
|
|
# %selinux_relabel_post [-s <policytype>]
|
|
%selinux_relabel_post("s:") \
|
|
if [ -e /etc/selinux/config ]; then \
|
|
. /etc/selinux/config \
|
|
fi \
|
|
_policytype=%{-s*} \
|
|
if [ -z "${_policytype}" ]; then \
|
|
_policytype="targeted" \
|
|
fi \
|
|
if %{_sbindir}/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
|
if [ -f %{_file_context_file_pre} ]; then \
|
|
%{_sbindir}/fixfiles -C %{_file_context_file_pre} restore &> /dev/null \
|
|
rm -f %{_file_context_file_pre} \
|
|
fi \
|
|
fi \
|
|
%{nil}
|
|
|
|
# %selinux_set_booleans [-s <policytype>] boolean [boolean]...
|
|
%selinux_set_booleans("s:") \
|
|
if [ -e /etc/selinux/config ]; then \
|
|
. /etc/selinux/config \
|
|
fi \
|
|
_policytype=%{-s*} \
|
|
if [ -z "${_policytype}" ]; then \
|
|
_policytype="targeted" \
|
|
fi \
|
|
if [ -d "%{_selinux_store_policy_path}" ]; then \
|
|
LOCAL_MODIFICATIONS=$(%{_sbindir}/semanage boolean -E) \
|
|
if [ ! -f %_file_custom_defined_booleans ]; then \
|
|
/bin/echo "# This file is managed by macros.selinux-policy. Do not edit it manually" > %_file_custom_defined_booleans \
|
|
fi \
|
|
semanage_import='' \
|
|
for boolean in %*; do \
|
|
boolean_name=${boolean%=*} \
|
|
boolean_value=${boolean#*=} \
|
|
boolean_local_string=$(grep "$boolean_name\$" <<<$LOCAL_MODIFICATIONS) \
|
|
if [ -n "$boolean_local_string" ]; then \
|
|
semanage_import="${semanage_import}\\nboolean -m -$boolean_value $boolean_name" \
|
|
boolean_customized_string=$(grep "$boolean_name\$" %_file_custom_defined_booleans | tail -n 1) \
|
|
if [ -n "$boolean_customized_string" ]; then \
|
|
/bin/echo $boolean_customized_string >> %_file_custom_defined_booleans \
|
|
else \
|
|
/bin/echo $boolean_local_string >> %_file_custom_defined_booleans \
|
|
fi \
|
|
else \
|
|
semanage_import="${semanage_import}\\nboolean -m -$boolean_value $boolean_name" \
|
|
boolean_default_value=$(LC_ALL=C %{_sbindir}/semanage boolean -l | grep "^$boolean_name " | sed 's/[^(]*([^,]*, *\\(on\\|off\\).*/\\1/') \
|
|
/bin/echo "boolean -m --$boolean_default_value $boolean_name" >> %_file_custom_defined_booleans \
|
|
fi \
|
|
done; \
|
|
if %{_sbindir}/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
|
/bin/echo -e "$semanage_import" | %{_sbindir}/semanage import -S "${_policytype}" \
|
|
elif test -d /usr/share/selinux/"${_policytype}"/base.lst; then \
|
|
/bin/echo -e "$semanage_import" | %{_sbindir}/semanage import -S "${_policytype}" -N \
|
|
fi \
|
|
fi \
|
|
%{nil}
|
|
|
|
# %selinux_unset_booleans [-s <policytype>] boolean [boolean]...
|
|
%selinux_unset_booleans("s:") \
|
|
if [ -e /etc/selinux/config ]; then \
|
|
. /etc/selinux/config \
|
|
fi \
|
|
_policytype=%{-s*} \
|
|
if [ -z "${_policytype}" ]; then \
|
|
_policytype="targeted" \
|
|
fi \
|
|
if [ -d "%{_selinux_store_policy_path}" ]; then \
|
|
semanage_import='' \
|
|
for boolean in %*; do \
|
|
boolean_name=${boolean%=*} \
|
|
boolean_customized_string=$(grep "$boolean_name\$" %_file_custom_defined_booleans | tail -n 1) \
|
|
if [ -n "$boolean_customized_string" ]; then \
|
|
awk "/$boolean_customized_string/ && !f{f=1; next} 1" %_file_custom_defined_booleans > %_file_custom_defined_booleans_tmp && mv %_file_custom_defined_booleans_tmp %_file_custom_defined_booleans \
|
|
if ! grep -q "$boolean_name\$" %_file_custom_defined_booleans; then \
|
|
semanage_import="${semanage_import}\\n${boolean_customized_string}" \
|
|
fi \
|
|
fi \
|
|
done; \
|
|
if %{_sbindir}/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then \
|
|
/bin/echo -e "$semanage_import" | %{_sbindir}/semanage import -S "${_policytype}" \
|
|
elif test -d /usr/share/selinux/"${_policytype}"/base.lst; then \
|
|
/bin/echo -e "$semanage_import" | %{_sbindir}/semanage import -S "${_policytype}" -N \
|
|
fi \
|
|
fi \
|
|
%{nil}
|