forked from pool/selinux-policy
b66c2b8ce6
- Update to version 20221019. Refreshed: * distro_suse_to_distro_redhat.patch * fix_apache.patch * fix_chronyd.patch * fix_cron.patch * fix_init.patch * fix_kernel_sysctl.patch * fix_networkmanager.patch * fix_rpm.patch * fix_sysnetwork.patch * fix_systemd.patch * fix_systemd_watch.patch * fix_unconfined.patch * fix_unconfineduser.patch * fix_unprivuser.patch * fix_xserver.patch - Dropped fix_cockpit.patch as this is now packaged with cockpit itself - Remove the ipa module, freeip ships their own module - Added fix_alsa.patch to allow reading of config files in home directories - Extended fix_networkmanager.patch and fix_postfix.patch to account for SUSE systems - Added dontaudit_interface_kmod_tmpfs.patch to prevent AVCs when startproc queries the running processes - Updated fix_snapper.patch to allow snapper to talk to rpm via dbus OBS-URL: https://build.opensuse.org/request/show/1035580 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=155
69 lines
2.8 KiB
Diff
69 lines
2.8 KiB
Diff
Index: fedora-policy-20221019/policy/modules/contrib/snapper.te
|
|
===================================================================
|
|
--- fedora-policy-20221019.orig/policy/modules/contrib/snapper.te
|
|
+++ fedora-policy-20221019/policy/modules/contrib/snapper.te
|
|
@@ -18,6 +18,9 @@ files_config_file(snapperd_conf_t)
|
|
type snapperd_data_t;
|
|
files_type(snapperd_data_t)
|
|
|
|
+type snapperd_tmp_t;
|
|
+files_tmp_file(snapperd_tmp_t)
|
|
+
|
|
########################################
|
|
#
|
|
# snapperd local policy
|
|
@@ -43,6 +46,10 @@ allow snapperd_t snapperd_data_t:dir { r
|
|
allow snapperd_t snapperd_data_t:file relabelfrom;
|
|
snapper_filetrans_named_content(snapperd_t)
|
|
|
|
+allow snapperd_t snapperd_tmp_t:file manage_file_perms;
|
|
+allow snapperd_t snapperd_tmp_t:dir manage_dir_perms;
|
|
+files_tmp_filetrans(snapperd_t, snapperd_tmp_t, { file dir })
|
|
+
|
|
kernel_setsched(snapperd_t)
|
|
|
|
domain_read_all_domains_state(snapperd_t)
|
|
@@ -73,6 +80,14 @@ storage_raw_read_fixed_disk(snapperd_t)
|
|
auth_use_nsswitch(snapperd_t)
|
|
|
|
optional_policy(`
|
|
+ packagekit_dbus_chat(snapperd_t)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
+ rpm_dbus_chat(snapperd_t)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
cron_system_entry(snapperd_t, snapperd_exec_t)
|
|
')
|
|
|
|
Index: fedora-policy-20221019/policy/modules/contrib/snapper.fc
|
|
===================================================================
|
|
--- fedora-policy-20221019.orig/policy/modules/contrib/snapper.fc
|
|
+++ fedora-policy-20221019/policy/modules/contrib/snapper.fc
|
|
@@ -7,9 +7,17 @@
|
|
|
|
/var/log/snapper\.log.* -- gen_context(system_u:object_r:snapperd_log_t,s0)
|
|
|
|
-/mnt/(.*/)?\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
-/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
-/usr/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
-/var/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
-/etc/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
-HOME_ROOT/(.*/)?\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
+/mnt/(.*/)?\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
+/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
+/usr/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
+/var/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
+/etc/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
+HOME_ROOT/(.*/)?\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
|
|
+
|
|
+# ensure that the snapshots itself aren't relabled
|
|
+/mnt/(.*/)?\.snapshots/[^/]*/snapshot(/.*)? <<none>>
|
|
+/\.snapshots/[^/]*/snapshot(/.*)? <<none>>
|
|
+/usr/\.snapshots/[^/]*/snapshot(/.*)? <<none>>
|
|
+/var/\.snapshots/[^/]*/snapshot(/.*)? <<none>>
|
|
+/etc/\.snapshots/[^/]*/snapshot(/.*)? <<none>>
|
|
+HOME_ROOT/(.*/)?\.snapshots/[^/]*/snapshot(/.*)? <<none>>
|