[selinux-policy] Policy update should not modify local contexts
Daniel J Walsh
dwalsh at fedoraproject.org
Fri Oct 21 14:29:02 UTC 2011
commit 62727652ebc4bcd144fc1ea676efdff6dc418de8
Author: Dan Walsh <dwalsh at redhat.com>
Date: Fri Oct 21 10:28:58 2011 -0400
Policy update should not modify local contexts
policy-F16.patch | 48 ++++++++++++++++++++++++------------------------
1 files changed, 24 insertions(+), 24 deletions(-)
---
diff --git a/policy-F16.patch b/policy-F16.patch
index 1d7ce0d..f5e1655 100644
--- a/policy-F16.patch
+++ b/policy-F16.patch
@@ -322,18 +322,10 @@ index 63ef90e..a535b31 100644
')
diff --git a/policy/modules/admin/alsa.if b/policy/modules/admin/alsa.if
-index 1392679..e75873a 100644
+index 1392679..7793407 100644
--- a/policy/modules/admin/alsa.if
+++ b/policy/modules/admin/alsa.if
-@@ -148,6 +148,7 @@ interface(`alsa_manage_home_files',`
-
- userdom_search_user_home_dirs($1)
- allow $1 alsa_home_t:file manage_file_perms;
-+ alsa_filetrans_home_content(unpriv_userdomain)
- ')
-
- ########################################
-@@ -206,3 +207,47 @@ interface(`alsa_read_lib',`
+@@ -206,3 +206,47 @@ interface(`alsa_read_lib',`
files_search_var_lib($1)
read_files_pattern($1, alsa_var_lib_t, alsa_var_lib_t)
')
@@ -20678,10 +20670,10 @@ index be4de58..7e8b6ec 100644
init_exec(secadm_t)
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
-index 2be17d2..2c588ca 100644
+index 2be17d2..a1913e8 100644
--- a/policy/modules/roles/staff.te
+++ b/policy/modules/roles/staff.te
-@@ -8,12 +8,55 @@ policy_module(staff, 2.2.0)
+@@ -8,12 +8,59 @@ policy_module(staff, 2.2.0)
role staff_r;
userdom_unpriv_user_template(staff)
@@ -20734,10 +20726,14 @@ index 2be17d2..2c588ca 100644
+ abrt_read_cache(staff_t)
+')
+
++optional_policy(`
++ alsa_filetrans_home_content(staff_t)
++')
++
optional_policy(`
apache_role(staff_r, staff_t)
')
-@@ -27,19 +70,113 @@ optional_policy(`
+@@ -27,19 +74,113 @@ optional_policy(`
')
optional_policy(`
@@ -20853,7 +20849,7 @@ index 2be17d2..2c588ca 100644
')
optional_policy(`
-@@ -48,10 +185,48 @@ optional_policy(`
+@@ -48,10 +189,48 @@ optional_policy(`
')
optional_policy(`
@@ -20902,7 +20898,7 @@ index 2be17d2..2c588ca 100644
xserver_role(staff_r, staff_t)
')
-@@ -89,18 +264,10 @@ ifndef(`distro_redhat',`
+@@ -89,18 +268,10 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -20921,7 +20917,7 @@ index 2be17d2..2c588ca 100644
java_role(staff_r, staff_t)
')
-@@ -121,10 +288,6 @@ ifndef(`distro_redhat',`
+@@ -121,10 +292,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -20932,7 +20928,7 @@ index 2be17d2..2c588ca 100644
pyzor_role(staff_r, staff_t)
')
-@@ -137,10 +300,6 @@ ifndef(`distro_redhat',`
+@@ -137,10 +304,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -20943,7 +20939,7 @@ index 2be17d2..2c588ca 100644
spamassassin_role(staff_r, staff_t)
')
-@@ -172,3 +331,7 @@ ifndef(`distro_redhat',`
+@@ -172,3 +335,7 @@ ifndef(`distro_redhat',`
wireshark_role(staff_r, staff_t)
')
')
@@ -22632,10 +22628,10 @@ index 0000000..50c38f9
+gen_user(unconfined_u, user, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
+
diff --git a/policy/modules/roles/unprivuser.te b/policy/modules/roles/unprivuser.te
-index e5bfdd4..50e49e6 100644
+index e5bfdd4..59f013e 100644
--- a/policy/modules/roles/unprivuser.te
+++ b/policy/modules/roles/unprivuser.te
-@@ -12,15 +12,93 @@ role user_r;
+@@ -12,15 +12,97 @@ role user_r;
userdom_unpriv_user_template(user)
@@ -22653,6 +22649,10 @@ index e5bfdd4..50e49e6 100644
+ abrt_read_cache(user_t)
+')
+
++optional_policy(`
++ alsa_filetrans_home_content(user_t)
++')
++
optional_policy(`
apache_role(user_r, user_t)
')
@@ -22729,7 +22729,7 @@ index e5bfdd4..50e49e6 100644
vlock_run(user_t, user_r)
')
-@@ -62,19 +140,11 @@ ifndef(`distro_redhat',`
+@@ -62,19 +144,11 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -22750,7 +22750,7 @@ index e5bfdd4..50e49e6 100644
')
optional_policy(`
-@@ -98,10 +168,6 @@ ifndef(`distro_redhat',`
+@@ -98,10 +172,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -22761,7 +22761,7 @@ index e5bfdd4..50e49e6 100644
postgresql_role(user_r, user_t)
')
-@@ -118,11 +184,7 @@ ifndef(`distro_redhat',`
+@@ -118,11 +188,7 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -22774,7 +22774,7 @@ index e5bfdd4..50e49e6 100644
')
optional_policy(`
-@@ -157,3 +219,4 @@ ifndef(`distro_redhat',`
+@@ -157,3 +223,4 @@ ifndef(`distro_redhat',`
wireshark_role(user_r, user_t)
')
')
More information about the scm-commits
mailing list