Compare commits
1310 Commits
policycore
...
master
Author | SHA1 | Date | |
---|---|---|---|
|
d56dce0a5d | ||
|
c808ccc35c | ||
|
b0ed1f8d21 | ||
|
f052664e78 | ||
|
7a6b569fa6 | ||
|
b47cf5c7c2 | ||
|
f978fdc2d2 | ||
|
98cfe16c02 | ||
|
c65daa990e | ||
|
d151b2c053 | ||
|
f853c76a5b | ||
|
a73719697a | ||
|
50de5507f3 | ||
|
2af2f550d6 | ||
|
44dfe0fd37 | ||
|
efa9d6cac8 | ||
|
c00b4867ac | ||
|
7ccd1ee567 | ||
|
ef4795f423 | ||
|
da2585a281 | ||
|
d4e16d7c7d | ||
|
bfe01763d9 | ||
|
757b820a2b | ||
|
d6f96f416d | ||
|
a2e668e9c9 | ||
|
5ea7b37cde | ||
|
78ffe5c66e | ||
|
2dc66df8a9 | ||
|
21fff37ccc | ||
|
61d9b74e3d | ||
|
d01ff1b97d | ||
|
88ef143cf4 | ||
|
18e735df1b | ||
|
d98f342921 | ||
|
d378c732b0 | ||
|
f62c86f32c | ||
|
8008fc1f39 | ||
|
8478235a3c | ||
|
67598f5a41 | ||
|
a21e2f9484 | ||
|
3a6c8251f5 | ||
|
ea40a6c901 | ||
|
e3a75fa174 | ||
|
9c1b897074 | ||
|
a56e58893b | ||
|
3183fc4035 | ||
|
d0a54fbf96 | ||
|
10ed19a560 | ||
|
3d37582bc2 | ||
|
06ebc75d30 | ||
|
6456a752da | ||
|
9d43d20386 | ||
|
dbb0324fb0 | ||
|
2001cdc01d | ||
|
1cf65c551e | ||
|
ad810ff414 | ||
|
03a027dfaa | ||
|
0da684cc41 | ||
|
1a9e2c70e4 | ||
|
e8cd8997c5 | ||
|
2e1ddce936 | ||
|
2f16dd5c7d | ||
|
748028495e | ||
|
7505971712 | ||
|
3a5478fbe1 | ||
|
ed5913bed9 | ||
|
c1291665a7 | ||
|
3bbe617cee | ||
|
a16e7bc7bb | ||
|
426ef33d7b | ||
|
e02a588654 | ||
|
dafef9cd56 | ||
|
f5a2299168 | ||
|
4af347c8e5 | ||
|
5da1961fa7 | ||
|
b05095b2d3 | ||
|
b1b5b44bff | ||
|
6545ae2ada | ||
|
1d2d2bc1ce | ||
|
6035a0be1e | ||
|
3581fc76d3 | ||
|
a707f868c5 | ||
|
3b2c0121a0 | ||
|
e7588169c3 | ||
|
389ac0b9c7 | ||
|
320398f39a | ||
|
ebb2c5bfea | ||
|
8f22730766 | ||
|
38ab1da754 | ||
|
3b55d7f197 | ||
|
005a370f1c | ||
|
d3d971ba91 | ||
|
2c47aaddd8 | ||
|
c6b051c966 | ||
|
b11cdd32ec | ||
|
1bb4ee0d45 | ||
|
b16a211432 | ||
|
203045ec1e | ||
|
7ef4db2ba4 | ||
|
c5c508337c | ||
|
f81f64ddb6 | ||
|
dfb5be5ac0 | ||
|
d6b46ca1c4 | ||
|
1083f0e66f | ||
|
846a16972b | ||
|
e7309b2ad3 | ||
|
8fe4dec985 | ||
|
4b74ff6678 | ||
|
3cd3d543c6 | ||
|
c33737fa2a | ||
|
24037d1412 | ||
|
0931850ffa | ||
|
629a62a8a9 | ||
|
bd497b9fd6 | ||
|
e1f5c9548b | ||
|
8fd0cedde2 | ||
|
7f2e82a8aa | ||
|
3ed3f18813 | ||
|
5c06281133 | ||
|
0ea988e102 | ||
|
19abd3c9a6 | ||
|
4626f61be9 | ||
|
c7d01b205b | ||
|
25056c1087 | ||
|
797c314efa | ||
|
fa2a3b271b | ||
|
b185f8151d | ||
|
db14db8479 | ||
|
469f6b64e9 | ||
|
c12014f9e3 | ||
|
fbd38097f4 | ||
|
6d99bda7c6 | ||
|
d6bd0d5a9b | ||
|
3cb802ddd1 | ||
|
15fa2e5ee2 | ||
|
2f945d420b | ||
|
c54847bdaa | ||
|
707dcc5ef3 | ||
|
1888063970 | ||
|
953350ddce | ||
|
5e59af1d9e | ||
|
ad3893177f | ||
|
380c7cbbab | ||
|
183d121f7f | ||
|
971f8c4099 | ||
|
6bfc7cc0ba | ||
|
62f824402e | ||
|
a29f8e0d18 | ||
|
6e4d1c4453 | ||
|
37f792eedc | ||
|
72f5beeec0 | ||
|
0921732e44 | ||
|
9753a77a76 | ||
|
6c6496a616 | ||
|
e41aa2fbd5 | ||
|
86e29572df | ||
|
5ab4f1c125 | ||
|
8341d78286 | ||
|
afee0d840d | ||
|
affcba34d7 | ||
|
a269971399 | ||
|
0f840ce127 | ||
|
dddf6be78a | ||
|
a69630b7b6 | ||
|
d0523c635c | ||
|
426d89c7eb | ||
|
70c2813895 | ||
|
25e044c4ee | ||
|
c315b4015b | ||
|
73b8ccd58d | ||
|
f8062d58e4 | ||
|
90c72fdbb7 | ||
|
3ee7654775 | ||
|
d2c9993f24 | ||
|
45b6c21434 | ||
|
6719f8ed42 | ||
|
27a1dde02d | ||
|
8e5935ed03 | ||
|
d0392a9475 | ||
|
9ef0d2c14c | ||
|
9f8ae8aaaa | ||
|
98befff199 | ||
|
64bcc9bb50 | ||
|
3c89d24456 | ||
|
f26322759f | ||
|
d1ae71004b | ||
|
ebb9f41c51 | ||
|
8274ef3855 | ||
|
2313540d11 | ||
|
056cb287fa | ||
|
8da01b879c | ||
|
afd6abb634 | ||
|
abb3fe419e | ||
|
05e5724843 | ||
|
3d60165989 | ||
|
1f399f401e | ||
|
5f7a92e79b | ||
|
4ec76c511d | ||
|
087b495201 | ||
|
d6200858a5 | ||
|
4f439d2638 | ||
|
dec177337d | ||
|
6f0ed04ef2 | ||
|
bee8c3ec5f | ||
|
be16d7c136 | ||
|
06e7b82eb9 | ||
|
15238906cb | ||
|
93602ec85a | ||
|
8f1d11b7c0 | ||
|
bb04b4de9b | ||
|
9d99a57696 | ||
|
648c87fea3 | ||
|
4db62cd26e | ||
|
0b82466d22 | ||
|
40fed64a3a | ||
|
b153c00225 | ||
|
2a1e3be828 | ||
|
9c335fab20 | ||
|
745809503f | ||
|
b82f4f6e94 | ||
|
766e677550 | ||
|
180235ba1d | ||
|
bfa3cbb7ef | ||
|
80c825c98f | ||
|
a3adc5bf70 | ||
|
a0f67d4a93 | ||
|
cbb4c3ee48 | ||
|
3fe9255f89 | ||
|
f8435958ae | ||
|
d60939fccd | ||
|
998c56497f | ||
|
78088dae9e | ||
|
231d059f2a | ||
|
cc5a0e201f | ||
|
35e5459a69 | ||
|
110c90c00a | ||
|
e9004a6bf6 | ||
|
86feb38872 | ||
|
d5a13602dd | ||
|
60924625b8 | ||
|
69fae7632e | ||
|
794d8879f7 | ||
|
f30728b86b | ||
|
1ccde5adcd | ||
|
fec09b4310 | ||
|
23e0198817 | ||
|
f17032379c | ||
|
5dc80ea534 | ||
|
57422a62c6 | ||
|
a3dfb2e273 | ||
|
16f2333d36 | ||
|
b371ba3420 | ||
|
b9afd68089 | ||
|
2200ddeea6 | ||
|
53ac00459c | ||
|
8a88784fab | ||
|
fa2e38d15a | ||
|
e467d097c8 | ||
|
6df7d46d73 | ||
|
576b3e8a80 | ||
|
5c1fb32c8b | ||
|
e0ae96d544 | ||
|
934834e6cb | ||
|
50cb89c077 | ||
|
d028c1652f | ||
|
394f387019 | ||
|
5d97d38d1b | ||
|
6e2e7ad1d8 | ||
|
2b7d10b4f0 | ||
|
256317fccc | ||
|
8f0685b998 | ||
|
9f7fe58ac4 | ||
|
58b140fa6b | ||
|
744effa009 | ||
|
f00bc4f487 | ||
|
685bf50ba2 | ||
|
2683a97019 | ||
|
d136271edc | ||
|
6879d63783 | ||
|
0a77d12b6f | ||
|
05a4073c77 | ||
|
02d8b93ce5 | ||
|
79e2d33ac3 | ||
|
9f373bc68a | ||
|
e61d91108f | ||
|
56c629dbeb | ||
|
0385dda17f | ||
|
0eb608c431 | ||
|
04c19314d5 | ||
|
f8c8b42b7a | ||
|
d21896c450 | ||
|
7fa44b7304 | ||
|
27d056afb8 | ||
|
101341aa44 | ||
|
2ab6b02e3c | ||
|
e396b39f10 | ||
|
863699842d | ||
|
5f68ab8fd2 | ||
|
a904d22fb4 | ||
|
56882a583a | ||
|
11643b3535 | ||
|
82362e85ca | ||
|
544468684c | ||
|
4f89c533b5 | ||
|
69da86fcf8 | ||
|
305ae476dd | ||
|
39c0a6ec6a | ||
|
b8c1b26e16 | ||
|
ad349ef1ad | ||
|
4f084e9fcd | ||
|
e90e9c6c30 | ||
|
16ab1d5de7 | ||
|
4254724cef | ||
|
6dcb7ec4af | ||
|
f5d4f8f0dd | ||
|
a956fd7105 | ||
|
b0bf57fdb1 | ||
|
81224adaf3 | ||
|
68b643cce8 | ||
|
5918716f29 | ||
|
4adc19aea3 | ||
|
d610eb1fd8 | ||
|
a941cc9a2c | ||
|
6a213d1e94 | ||
|
b4c5b4829d | ||
|
19201f72c6 | ||
|
6b0d365200 | ||
|
bbf6a880b6 | ||
|
0dad6598dd | ||
|
f7ec68c101 | ||
|
5b06f96755 | ||
|
d4ae6ccd66 | ||
|
3cc0cfcac3 | ||
|
4084a6ea89 | ||
|
e9b167e78d | ||
|
8e3bfe0949 | ||
|
98c418def3 | ||
|
c1e35cdc89 | ||
|
71f3efb73d | ||
|
8be0816a98 | ||
|
3aca74a161 | ||
|
b4e4f79ed5 | ||
|
e5aaa46215 | ||
|
fefce8f581 | ||
|
5324d20ca0 | ||
|
10913b779d | ||
|
4cc4167518 | ||
|
1dd3bee373 | ||
|
b1cf8c69ac | ||
|
8c07616121 | ||
|
c617c0cebf | ||
|
21179e1822 | ||
|
3f69c2f15b | ||
|
d421fd0097 | ||
|
8779e924e9 | ||
|
92a9b8454b | ||
|
3234f310f1 | ||
|
68cfa786ad | ||
|
5855410892 | ||
|
9057b25d2b | ||
|
f79f9d24b6 | ||
|
296f63cbc3 | ||
|
0e639a9ea0 | ||
|
205e3429b9 | ||
|
14f88c192c | ||
|
3aa7d3a916 | ||
|
eef44bd006 | ||
|
d6717e2cff | ||
|
c910a0cf10 | ||
|
06ab21ffa7 | ||
|
422fcbbd1a | ||
|
6be5fbacb4 | ||
|
5a6000efc7 | ||
|
c488be004d | ||
|
a61d456504 | ||
|
c28ba657ed | ||
|
8826d7e0fd | ||
|
558e4d0e2d | ||
|
2a0d3b9155 | ||
|
ceff76e017 | ||
|
4933c11cf0 | ||
|
91c5cd51d5 | ||
|
844afda5b6 | ||
|
ad24fe0d6f | ||
|
ee03d6c97d | ||
|
de745c0321 | ||
|
c7b078ec4b | ||
|
5ffa11c17a | ||
|
c80e41cce5 | ||
|
77c01a631e | ||
|
3df9272539 | ||
|
356d85e93c | ||
|
dcda6e4336 | ||
|
435b38a137 | ||
|
bd8b5a05a7 | ||
|
442a7187fc | ||
|
6dfb3b920c | ||
|
16444033da | ||
|
321b3f2caa | ||
|
ddeee18742 | ||
|
cc08d7735b | ||
|
1cc95772be | ||
|
d76fa39cad | ||
|
13f0c57022 | ||
|
7d197203b0 | ||
|
7e71323398 | ||
|
43cb5fa238 | ||
|
70bff091fa | ||
|
91f5677207 | ||
|
4a63d32419 | ||
|
655a2656e3 | ||
|
12a6440402 | ||
|
6d5c3dfe44 | ||
|
2d7c6d02f4 | ||
|
6e9d4c92ea | ||
|
775d48fd41 | ||
|
92907b214d | ||
|
634c0824af | ||
|
7e579fc0a2 | ||
|
9c3e56bd25 | ||
|
4ab9c398e5 | ||
|
f35df462e0 | ||
|
b97e271674 | ||
|
f7d5cb7960 | ||
|
03b8834355 | ||
|
1b634710d1 | ||
|
9d30639944 | ||
|
31cb4ccac2 | ||
|
4f5186ec4f | ||
|
3348eaa82b | ||
|
9d3be2cefc | ||
|
c938748d91 | ||
|
01c8a3601e | ||
|
e6f13dc63b | ||
|
bd477696df | ||
|
e8601ffa5d | ||
|
5e219f960d | ||
|
9b6eb5adbc | ||
|
90329f9593 | ||
|
697e7c645d | ||
|
186fd9068c | ||
|
071409ede1 | ||
|
273033cb24 | ||
|
821c8a5d61 | ||
|
a0ea1de748 | ||
|
d4088bfa91 | ||
|
662a1ad3a8 | ||
|
132b0f633b | ||
|
1eac07342c | ||
|
f8bca8aa02 | ||
|
626dd026d1 | ||
|
05b05a3209 | ||
|
b4f656f9ce | ||
|
53f4a4c7dc | ||
|
acc953768b | ||
|
68264eb77e | ||
|
685c820b6d | ||
|
3886f5e4a9 | ||
|
6312df65b6 | ||
|
db51c1ef98 | ||
|
e1a62b20ba | ||
|
42e269dd3c | ||
|
6525007747 | ||
|
414b6a904d | ||
|
1bf48c8679 | ||
|
977eb87438 | ||
|
1bb3b98779 | ||
|
076ffc0b0a | ||
|
6b9bc0eb8f | ||
|
656414a035 | ||
|
c165d4c12a | ||
|
e0ffc386e8 | ||
|
97d6c28e36 | ||
|
35a1c24b59 | ||
|
e71cb0d5d0 | ||
|
6119a6b9f8 | ||
|
2c4e323ce5 | ||
|
2392ca1483 | ||
|
4f4e4913d7 | ||
|
6c13d007c9 | ||
|
ebadcd67f7 | ||
|
3507aa6632 | ||
|
b6236f9023 | ||
|
e5b91b64fc | ||
|
b91e98e2c2 | ||
|
64a1a56e71 | ||
|
2d6eafee19 | ||
|
78175de296 | ||
|
fb1cfc265c | ||
|
04b2851781 | ||
|
42466e2b7e | ||
|
8b0727dc56 | ||
|
dafba41234 | ||
|
831d6fd46c | ||
|
a648c6f239 | ||
|
af0f4926da | ||
|
8dbd4d49f6 | ||
|
759501823b | ||
|
173e9f90db | ||
|
24d29a5015 | ||
|
299d98087e | ||
|
dc86b007cf | ||
|
c2ef4a0bea | ||
|
93a347a42a | ||
|
ed0051b493 | ||
|
a7dd92d42a | ||
|
0b324049b3 | ||
|
4a56398540 | ||
|
e1285d4541 | ||
|
588030fc2c | ||
|
61f1bc2068 | ||
|
822e503b13 | ||
|
9f65a26864 | ||
|
5898ea81d9 | ||
|
8acc019498 | ||
|
1da0399e25 | ||
|
be38aa471e | ||
|
b855a50ea5 | ||
|
a710a4e711 | ||
|
433953b033 | ||
|
331e9ad06d | ||
|
e764b2d2b6 | ||
|
971f278f98 | ||
|
b49eb13451 | ||
|
01e471247b | ||
|
afa2535b24 | ||
|
12eb5b45f4 | ||
|
c76dc0c642 | ||
|
448a84b06a | ||
|
18119ffd24 | ||
|
b1a3235896 | ||
|
a548207cc4 | ||
|
8937a040d8 | ||
|
3108046cf7 | ||
|
6c80e8dc19 | ||
|
8c1d9b0f48 | ||
|
63fda8aa74 | ||
|
f0e85a70d6 | ||
|
af19df0f00 | ||
|
b9b7f4161c | ||
|
d7e1c238f4 | ||
|
cdcc4526b7 | ||
|
622bb69d77 | ||
|
9852e61813 | ||
|
c9df11e933 | ||
|
cccd96b8cf | ||
|
e500ad80f0 | ||
|
019847a195 | ||
|
57906a7d95 | ||
|
3fd25d56a5 | ||
|
1eab65cee2 | ||
|
dee9b43382 | ||
|
d6510fbca2 | ||
|
614ca03ae7 | ||
|
dd0f3a9721 | ||
|
b467ef31d0 | ||
|
ecdab5563c | ||
|
73342918cd | ||
|
c6d112a36e | ||
|
70b2ff10d0 | ||
|
9ff9a87a26 | ||
|
85a18e3dcc | ||
|
d98a8977c6 | ||
|
829762e693 | ||
|
be45950990 | ||
|
f354d4ef3b | ||
|
fc6c93ebeb | ||
|
8fd9d71264 | ||
|
fce031b620 | ||
|
ee3649bda5 | ||
|
e7737e34ea | ||
|
c8f4893a95 | ||
|
35da894f0e | ||
|
db71b70994 | ||
|
ab47b01339 | ||
|
fc6e11b600 | ||
|
dd674534b4 | ||
|
88295c72ea | ||
|
5b80bc7b2c | ||
|
a02089d628 | ||
|
54e6651778 | ||
|
fc860fa036 | ||
|
6c22c6b1f6 | ||
|
0779b0302c | ||
|
6ed2be87b5 | ||
|
29b74ccd7d | ||
|
beaed6f629 | ||
|
37227819c9 | ||
|
a1bf0daa6c | ||
|
79944fd474 | ||
|
3fbc112632 | ||
|
96d595744b | ||
|
3eb778ff1d | ||
|
f3a1cbae2a | ||
|
e973847bf6 | ||
|
c5e196508e | ||
|
4e4a82e887 | ||
|
a1e42cb153 | ||
|
942b683f29 | ||
|
44bb682976 | ||
|
8cf3bcfdee | ||
|
d189740fc7 | ||
|
573cd1c340 | ||
|
bf48090916 | ||
|
fd3c8c94ea | ||
|
ac48b0b34b | ||
|
678a86d335 | ||
|
d909dfe9a1 | ||
|
f466aa0b3b | ||
|
6c27d724c5 | ||
|
425e7d2796 | ||
|
b98d816316 | ||
|
26d020dedb | ||
|
1696e8f7d1 | ||
|
c9fdf240be | ||
|
f109f0076e | ||
|
b87b8212fa | ||
|
fc20c42a12 | ||
|
b745fe1161 | ||
|
7ae4fd64fa | ||
|
05becad504 | ||
|
7b3ab100a9 | ||
|
6c6ee0fad7 | ||
|
a39af4db38 | ||
|
0a51336809 | ||
|
7b1b3e71e3 | ||
|
a45221f297 | ||
|
2d7c5b6d7a | ||
|
349a457593 | ||
|
4b8a9749e9 | ||
|
f6cc437735 | ||
|
7c396f5fa5 | ||
|
4bf248f359 | ||
|
3f2af1bab0 | ||
|
c14fb87560 | ||
|
8c640c000d | ||
|
48ee7275f3 | ||
|
8efd3b07e1 | ||
|
e96c403a63 | ||
|
2b1f1bd524 | ||
|
a66c52cf6b | ||
|
d2c83ee012 | ||
|
2267915618 | ||
|
7bb7784c7d | ||
|
afa7adf27e | ||
|
f23e0fcdf3 | ||
|
9cbebb253b | ||
|
886ea9345c | ||
|
c57e98ae82 | ||
|
d03de9fdcd | ||
|
d34f2573e0 | ||
|
5f4607465f | ||
|
2cc7fbfc2e | ||
|
096b58de8c | ||
|
1734292fff | ||
|
b30ac013f1 | ||
|
61c2d77e4e | ||
|
e785375a96 | ||
|
7d0ef81ff4 | ||
|
ff7a9e96a2 | ||
|
e265547be3 | ||
|
43016e2233 | ||
|
56e1de46e2 | ||
|
b61040e0cd | ||
|
20fb912a16 | ||
|
cdfce15287 | ||
|
a8ac23f196 | ||
|
28aeded808 | ||
|
e5ab0eb59c | ||
|
ca6c46fd19 | ||
|
28777e87d2 | ||
|
15a087f5e4 | ||
|
7a66b67402 | ||
|
3a53f1bcb5 | ||
|
badeadc2fc | ||
|
b64d03f609 | ||
|
71c8918c91 | ||
|
fdaed91e49 | ||
|
7d8dcb3134 | ||
|
ea51d58adb | ||
|
5b46cccaf5 | ||
|
15ec5ed084 | ||
|
93692e06c1 | ||
|
d30e36478c | ||
|
1fa363a8cc | ||
|
b9ee74bd7b | ||
|
f689b5c1ff | ||
|
114d182b28 | ||
|
e2044195fe | ||
|
55a7005067 | ||
|
9f9bcaaa18 | ||
|
c65f316b59 | ||
|
634db16783 | ||
|
f4379014a9 | ||
|
461604839c | ||
|
62ef29b0dc | ||
|
127ce1fef4 | ||
|
69a016d597 | ||
|
4b9c47a54b | ||
|
acb7809eb8 | ||
|
6142b407fc | ||
|
ac45055c8c | ||
|
2560349477 | ||
|
6389ce25ff | ||
|
3f2ca56c60 | ||
|
1fd30f90e9 | ||
|
20b4a0e287 | ||
|
1b0693a203 | ||
|
26e1328daf | ||
|
9bb9beca12 | ||
|
2cfc77b157 | ||
|
77ffddfa2c | ||
|
8bd2afcec2 | ||
|
88dfc26d3c | ||
|
5483ca1ccd | ||
|
9f10e60d0d | ||
|
f015700775 | ||
|
ac5ad8648b | ||
|
8b3cb0f67c | ||
|
2a4d967daa | ||
|
b67978a729 | ||
|
51c06b5513 | ||
|
b0592a727f | ||
|
c7da14e85c | ||
|
875701c42a | ||
|
67e7928a28 | ||
|
14f807a094 | ||
|
0fdc47a89f | ||
|
e6df70d44d | ||
|
cee9553174 | ||
|
1e4d97ba6c | ||
|
1c5205b81f | ||
|
794090192b | ||
|
fab4898fba | ||
|
b54c5a833b | ||
|
df8efb5fb3 | ||
|
c66a0ee3f8 | ||
|
7b711efa39 | ||
|
8ac1404c6b | ||
|
ad9ae902cf | ||
|
adf7360bca | ||
|
d21474fea3 | ||
|
d0f20a4df5 | ||
|
9236954d7c | ||
|
66f5edd31b | ||
|
6efadc5ec5 | ||
|
559a178835 | ||
|
cec42f53db | ||
|
e3c69f6b4f | ||
|
69499e5535 | ||
|
6ead03f02f | ||
|
e6578b4da8 | ||
|
420f97e4b1 | ||
|
6c5a205c34 | ||
|
3623aa968e | ||
|
d8a7e13fd5 | ||
|
26821691ec | ||
|
2219648009 | ||
|
8e3de337f4 | ||
|
c2b0b017a5 | ||
|
1fc358c943 | ||
|
c22424dd48 | ||
|
1f4b8a30fb | ||
|
7d1caca617 | ||
|
ea11570a87 | ||
|
fc19e287d6 | ||
|
08594f6d5f | ||
|
813c122421 | ||
|
0568ee7f2d | ||
|
68de8438ea | ||
|
75c4c38f00 | ||
|
dc637d77fd | ||
|
375c226ef2 | ||
|
1392cbabd2 | ||
|
5031b9bd5a | ||
|
dc277d2b31 | ||
|
f8fdb548ab | ||
|
138cbeabb6 | ||
|
1aa6d7bef2 | ||
|
feaf320062 | ||
|
b16ae3b80f | ||
|
34a3b99b21 | ||
|
c3a0872af7 | ||
|
7870eae9ac | ||
|
d7cddef625 | ||
|
856619e48c | ||
|
d40cc99c51 | ||
|
60ad59cab9 | ||
|
ec80e1ce63 | ||
|
7f6f58266d | ||
|
bac931cd73 | ||
|
e61ad2382c | ||
|
206b23918e | ||
|
96e66fc5d3 | ||
|
ac18122279 | ||
|
9ecec66343 | ||
|
44cc1f1bc3 | ||
|
8d32038fbc | ||
|
b458bb5fd5 | ||
|
616f54d725 | ||
|
ffb96ec3c8 | ||
|
f51cda3313 | ||
|
d2285e6e8b | ||
|
f5a3b73fcd | ||
|
3ac73d19b1 | ||
|
7c2e75773b | ||
|
f73ca01a5e | ||
|
951b855b36 | ||
|
7791fd5472 | ||
|
95c2ff0c21 | ||
|
6e11e14635 | ||
|
3002dbceac | ||
|
2d640c093d | ||
|
2f136a328b | ||
|
8700841752 | ||
|
f74e70aee1 | ||
|
ccbc11e287 | ||
|
105dca2943 | ||
|
6827dc2d8b | ||
|
07be4dd9c6 | ||
|
dc35f1b2f5 | ||
|
25ac073f85 | ||
|
76680e0455 | ||
|
8f66192228 | ||
|
a8f58ae116 | ||
|
a33870f392 | ||
|
d1bf9de62b | ||
|
1f2b67a04d | ||
|
1452353611 | ||
|
e99a8a65cb | ||
|
d7f1fcd1a3 | ||
|
835e07e0e6 | ||
|
fcb8db4597 | ||
|
162ba434ca | ||
|
a91903f082 | ||
|
35a05d0eef | ||
|
7683888461 | ||
|
f6b16765a3 | ||
|
08b9f6e005 | ||
|
d0035566d5 | ||
|
77822be0ca | ||
|
4373ede8c2 | ||
|
981bea936b | ||
|
32455f343f | ||
|
4bf679be9e | ||
|
0f56395076 | ||
|
3de9d83f00 | ||
|
4ecb32d9da | ||
|
b9cac613d7 | ||
|
85e2ce7e5a | ||
|
4a02fad3a2 | ||
|
27013450e0 | ||
|
a389a8568f | ||
|
2ca34c3096 | ||
|
4877d0eb59 | ||
|
ce6cc5a5bd | ||
|
18e5e753c6 | ||
|
e0e7edadda | ||
|
250de71949 | ||
|
9c2c4da554 | ||
|
0eeb57db00 | ||
|
df5eceb2a1 | ||
|
a57e4b7bc5 | ||
|
4172449da2 | ||
|
2112f918a0 | ||
|
a0ef77a17e | ||
|
23b8362100 | ||
|
4efe23c541 | ||
|
1f766d055e | ||
|
4c20f47670 | ||
|
2b62f3a02f | ||
|
6f8d76967a | ||
|
2542ef46ba | ||
|
5bafb36498 | ||
|
323af3f0d5 | ||
|
68130465c9 | ||
|
ad6111b387 | ||
|
0652cce264 | ||
|
ca8e5bbe7c | ||
|
1dd185bcfd | ||
|
27712930f0 | ||
|
bd54d240df | ||
|
a55b66ed45 | ||
|
64fb16ae88 | ||
|
7f4e5a887b | ||
|
e041426664 | ||
|
8548a07e56 | ||
|
3b8fa49a15 | ||
|
c3f42435f3 | ||
|
57b2072450 | ||
|
ce5e206c5d | ||
|
4e8620791c | ||
|
0fad80a584 | ||
|
841174a0a4 | ||
|
3001352ed7 | ||
|
983d80958f | ||
|
5b8c007d5a | ||
|
9c825df213 | ||
|
24e0b4d5d3 | ||
|
bb82af009d | ||
|
9eedb8e684 | ||
|
8607eefd72 | ||
|
7e97034f67 | ||
|
aedc2f975f | ||
|
1f727605c3 | ||
|
d166c332ff | ||
|
02673a5a68 | ||
|
2b3bf6c51c | ||
|
0c1f00864b | ||
|
454e344780 | ||
|
1e9f6c8a11 | ||
|
565fe97388 | ||
|
3cb9b1982b | ||
|
4215f9a636 | ||
|
96330cc402 | ||
|
3ac0440eff | ||
|
facaf7c767 | ||
|
1933b44f16 | ||
|
f1efb4d7ce | ||
|
702971bc39 | ||
|
f980d990af | ||
|
6164c43b6c | ||
|
e35ae98d98 | ||
|
76e419bed5 | ||
|
a43d594198 | ||
|
a764ad3ab5 | ||
|
eac88e8038 | ||
|
528cec7318 | ||
|
cda33cabb1 | ||
|
7d7e0bdd54 | ||
|
a7ddfb4786 | ||
|
79387e42a7 | ||
|
06aa46e29d | ||
|
2277c61e04 | ||
|
8ddaa9d169 | ||
|
84ce12524d | ||
|
8672af3e7f | ||
|
af17275c2a | ||
|
663f954f37 | ||
|
6685d53a69 | ||
|
a5e6db9ac1 | ||
|
7706afa85e | ||
|
8cdb69610b | ||
|
2537a974eb | ||
|
9ac2144a22 | ||
|
c5e5d1fec3 | ||
|
252a932c4d | ||
|
d92d02a759 | ||
|
1645ebedf1 | ||
|
9fc2c34117 | ||
|
159de8e8cd | ||
|
ebdc59a2ed | ||
|
4c1cdee89a | ||
|
0455957ae4 | ||
|
0859f2541a | ||
|
70761a0909 | ||
|
28bf8bf40a | ||
|
bf8c80923e | ||
|
73f3144d82 | ||
|
0634958eb6 | ||
|
ed275eb345 | ||
|
e568e7aef9 | ||
|
1921460634 | ||
|
2ce739f558 | ||
|
deeee024b1 | ||
|
d0a35325c9 | ||
|
12eda6fb9a | ||
|
46d5a37267 | ||
|
c6fcc82665 | ||
|
b77559325d | ||
|
e4d5ab9795 | ||
|
9c2204390f | ||
|
0e300cf3bd | ||
|
7e8bdec007 | ||
|
f53c7967db | ||
|
6918f70153 | ||
|
72a1c64a8f | ||
|
88f4a77507 | ||
|
8cb659d621 | ||
|
72914cc7cb | ||
|
524f29009b | ||
|
52a6c1e8f8 | ||
|
d72d09b99f | ||
|
1a2e0fd5d7 | ||
|
5f565a24a5 | ||
|
8ff01f9361 | ||
|
9361ca2bd0 | ||
|
18b9b3adf9 | ||
|
eab5cfc041 | ||
|
c3d45a3833 | ||
|
d7dcedebef | ||
|
d06137bce3 | ||
|
5f19ebe323 | ||
|
7afda3cb6a | ||
|
7a3df9c719 | ||
|
e16513249e | ||
|
0e0690a04d | ||
|
62b2cace20 | ||
|
abd7fb876d | ||
|
7335c154f8 | ||
|
8804a0d56e | ||
|
e414038b9a | ||
|
ec4979fbb1 | ||
|
30ac94943b | ||
|
90f5b53a4d | ||
|
4830f6fafe | ||
|
0f0c842064 | ||
|
6ec3e2b290 | ||
|
030a28bfcf | ||
|
97edb5d2aa | ||
|
bb6b397b53 | ||
|
3b9583e19e | ||
|
d3fac0dad5 | ||
|
43247712b5 | ||
|
d60d42be03 | ||
|
b49bb38908 | ||
|
236c158843 | ||
|
87674a86bb | ||
|
bd45f118df | ||
|
126faf5583 | ||
|
780ce9d868 | ||
|
0d99510bf4 | ||
|
30887f2b45 | ||
|
3282f8ef62 | ||
|
17530a7063 | ||
|
8c88187a43 | ||
|
b544b44915 | ||
|
0ce4a5078c | ||
|
4d204b27e4 | ||
|
d72d2577d9 | ||
|
9b675df395 | ||
|
d60124d95f | ||
|
cf3ea24444 | ||
|
6705ebd096 | ||
|
997b60dcc1 | ||
|
e94e3a00f6 | ||
|
333aa50e52 | ||
|
3bce4420a0 | ||
|
93ddabdfee | ||
|
29c2369bbe | ||
|
a7b6d1a77e | ||
|
2f73ae6a68 | ||
|
a63185882d | ||
|
19ac317520 | ||
|
4d22704ff8 | ||
|
70c74b9bdd | ||
|
0965f99c89 | ||
|
751b4ff02b | ||
|
b0a7b268a9 | ||
|
2fc100201a | ||
|
c5e1e98d9b | ||
|
6be389f61f | ||
|
f459d26ec3 | ||
|
ec67d7567a | ||
|
a92bc1d738 | ||
|
65ff0bc4f0 | ||
|
db3eff29f7 | ||
|
971815adbf | ||
|
a239583a43 | ||
|
93779e5bff | ||
|
0c62d7e6bd | ||
|
15119ec30a | ||
|
c2f80b696b | ||
|
4c107ae3b8 | ||
|
49470329fc | ||
|
4eac240f2d | ||
|
239bbcc0d5 | ||
|
51ac56c9cb | ||
|
ca7a726862 | ||
|
b499644179 | ||
|
a336777890 | ||
|
a1b21192f2 | ||
|
f3502b2723 | ||
|
43e3506502 | ||
|
2ff281da27 | ||
|
2ef5159db8 | ||
|
f8ffb4e460 | ||
|
3fe64b5cc9 | ||
|
8c7652fa1d | ||
|
02097a7562 | ||
|
b53e6f7552 | ||
|
a482441cd0 | ||
|
37eaabdd95 | ||
|
94d1c66432 | ||
|
400cff82a6 | ||
|
03f7110c61 | ||
|
3767b9266f | ||
|
a76ee7dadd | ||
|
1245d1f05a | ||
|
cdca00d223 | ||
|
f0d6d7561d | ||
|
f1e361ef1c | ||
|
3c5f6e8b35 | ||
|
25eeaeed66 | ||
|
4c35281455 | ||
|
f7cf161040 | ||
|
2700d2d0ed | ||
|
ab201d7429 | ||
|
ac28401fbc | ||
|
3646f657eb | ||
|
7e64d5bb54 | ||
|
235a937b7a | ||
|
69182daad3 | ||
|
7238655897 | ||
|
6ffca6f764 | ||
|
d5d71285dc | ||
|
5375535149 | ||
|
2905d6f85a | ||
|
fcee9aec89 | ||
|
d4a154c1d9 | ||
|
2af5d4efc4 | ||
|
78a6ed5399 | ||
|
58f329dd4d | ||
|
80b61a63f9 | ||
|
f32c1f36b1 | ||
|
f87e146465 | ||
|
7f5880a445 | ||
|
b36bfa063a | ||
|
df624fe500 | ||
|
f9db9c1e29 | ||
|
ecae8883a5 | ||
|
0d005683d6 | ||
|
70ccd9923e | ||
|
a770942374 | ||
|
6b6d439e72 | ||
|
c264106d43 | ||
|
2e57c61e4f | ||
|
15d8551a97 | ||
|
a95038d775 | ||
|
e27699418d | ||
|
7fb8345697 | ||
|
e48e95e5da | ||
|
6c7ca7b42a | ||
|
d14b8688f8 | ||
|
0bfa56ba19 | ||
|
77fc72c7ad | ||
|
54ecf23b9a | ||
|
03496a1f36 | ||
|
cae7e9aca8 | ||
|
3c423ae870 | ||
|
3b83aa4b95 | ||
|
98865618f9 | ||
|
7748a6417b | ||
|
af9f444b4a | ||
|
e0e0d3970e | ||
|
e2539cf5af | ||
|
10bbcc68d7 | ||
|
0f61d9e932 | ||
|
95a98894e0 | ||
|
f739a61c9c | ||
|
e4ea758e93 | ||
|
b3429efbea | ||
|
f30e7552f6 | ||
|
6c28dbbe27 | ||
|
edae444ba1 | ||
|
e4000499da | ||
|
69c20bd956 | ||
|
ab21aae5ca | ||
|
828e5b0a3f | ||
|
7c45e05b5b | ||
|
4a318b2c39 | ||
|
996a3acf5a | ||
|
a23b56f059 | ||
|
a4eddc5bd9 | ||
|
e2f354abb2 | ||
|
b14fed2892 | ||
|
aa4225a30f | ||
|
a128573f61 | ||
|
35b57c9442 | ||
|
905895c931 | ||
|
7800ad0dc0 | ||
|
dd855d4916 | ||
|
5a5946a622 | ||
|
1320e158e3 | ||
|
744ff8dd67 | ||
|
603d6fd7b1 | ||
|
4172c15ac9 | ||
|
f2d4996b0f | ||
|
e817f89adf | ||
|
3bab395eb3 | ||
|
496e664f46 | ||
|
146de04654 | ||
|
3ff1aebc51 | ||
|
8db28853c1 | ||
|
2691608b82 | ||
|
af6aa62ce9 | ||
|
ee898f2f7e | ||
|
6124877e2e | ||
|
77b3c784ce | ||
|
be1c1f2f87 | ||
|
abd6b8aa00 | ||
|
2eba14d387 | ||
|
af3c4b70cd | ||
|
49e5ce8ced | ||
|
a618e17dc9 | ||
|
316313f3e5 | ||
|
9bc29a0558 | ||
|
60aab1a370 | ||
|
7f5e289547 | ||
|
d34c8f7d88 | ||
|
62165460b9 | ||
|
d513bef494 | ||
|
f9d71f4c01 | ||
|
feb45d8c20 | ||
|
ae8bbf5a65 | ||
|
2919c0f4b8 | ||
|
bd862ff816 | ||
|
9874bbbdb4 | ||
|
407451201f | ||
|
69a80f1250 | ||
|
c40c765680 | ||
|
c4c67d25f1 | ||
|
e69fc8144c | ||
|
60658cab33 | ||
|
1c0e3421bd | ||
|
c46a192994 | ||
|
8971d9ad08 | ||
|
e4e544ece9 | ||
|
12b6a62a7a | ||
|
cc0bd43aff | ||
|
6723998b81 | ||
|
8788976044 | ||
|
4202db94de | ||
|
ba42e191b5 | ||
|
485d2dcb05 | ||
|
9cde60440f | ||
|
86ff526165 | ||
|
f3e86ad067 | ||
|
a5df24477e | ||
|
b26d374a91 | ||
|
5e0b9272b3 | ||
|
7500758a95 | ||
|
93d1c9d780 | ||
|
95b00893e6 | ||
|
7379f2cf6b | ||
|
cd9a16b315 | ||
|
103aa47c05 | ||
|
41f522a921 | ||
|
9ebf8c976d | ||
|
af48e39952 | ||
|
859013f3be | ||
|
41933ac0b5 | ||
|
829c705f9c | ||
|
5823eec412 | ||
|
91c40446f1 | ||
|
aba4d96b05 | ||
|
a74df22263 | ||
|
f22a263f26 | ||
|
f5df4d17e9 | ||
|
ba982e52e7 | ||
|
83027e5586 | ||
|
602612a004 | ||
|
e1affd86ed | ||
|
a64186fd3d | ||
|
b1d45be991 | ||
|
8621a0d226 | ||
|
1bb6056f2f | ||
|
a52deb4d72 | ||
|
fc11f85f43 | ||
|
9fb0a29c97 | ||
|
29309fe6a6 | ||
|
7ac30031a8 | ||
|
3673618fbf | ||
|
38d8cfc55c | ||
|
770517b05a | ||
|
8027a4d6d4 | ||
|
d8c9ba4287 | ||
|
e03c046cd0 | ||
|
85196f1e13 | ||
|
1230cb57a4 | ||
|
d855c2dccc | ||
|
d6dffe8d2b | ||
|
2d79300263 | ||
|
d337e9cbc9 | ||
|
34ca4fe9ed | ||
|
c7495d8641 | ||
|
edf3ef09e6 | ||
|
c259edf0b3 | ||
|
9246f4b79e | ||
|
7cefc43b13 | ||
|
1c8e460b14 | ||
|
6a9a40b3c1 | ||
|
1615759700 | ||
|
bb92ed9cdc | ||
|
a2883704f9 | ||
|
a71897479f | ||
|
60067cac0d | ||
|
e824fc2cd1 | ||
|
8b82a967f2 | ||
|
89c38b4eca | ||
|
b6215c2a9e | ||
|
dfef97bd9c | ||
|
8fcb338bec | ||
|
634084fef4 | ||
|
5885d1db00 | ||
|
876dc32e3e | ||
|
21bee1bb5a | ||
|
fa252fd27e | ||
|
a4a3a6e807 | ||
|
984cf332e1 | ||
|
0ad2425731 | ||
|
a1449eece0 | ||
|
a2b2c59f77 | ||
|
952623e6f2 | ||
|
9140b8d116 | ||
|
578505d38d | ||
|
69b87c3504 | ||
|
06e15c6c4b | ||
|
af1869ce11 | ||
|
24ae558df4 |
@ -1 +0,0 @@
|
|||||||
policycoreutils-1.13.tgz
|
|
324
.gitignore
vendored
Normal file
324
.gitignore
vendored
Normal file
@ -0,0 +1,324 @@
|
|||||||
|
*.rpm
|
||||||
|
.svn
|
||||||
|
*.tgz
|
||||||
|
policycoreutils-1.17.5.tgz
|
||||||
|
policycoreutils-1.17.6.tgz
|
||||||
|
policycoreutils-1.17.7.tgz
|
||||||
|
policycoreutils-1.18.1.tgz
|
||||||
|
policycoreutils-1.19.1.tgz
|
||||||
|
policycoreutils-1.19.2.tgz
|
||||||
|
policycoreutils-1.19.3.tgz
|
||||||
|
policycoreutils-1.20.1.tgz
|
||||||
|
policycoreutils-1.21.1.tgz
|
||||||
|
policycoreutils-1.21.3.tgz
|
||||||
|
policycoreutils-1.21.4.tgz
|
||||||
|
policycoreutils-1.21.5.tgz
|
||||||
|
policycoreutils-1.21.7.tgz
|
||||||
|
policycoreutils-1.21.9.tgz
|
||||||
|
policycoreutils-1.21.10.tgz
|
||||||
|
policycoreutils-1.21.12.tgz
|
||||||
|
policycoreutils-1.21.13.tgz
|
||||||
|
policycoreutils-1.21.14.tgz
|
||||||
|
nsadiff
|
||||||
|
exclude
|
||||||
|
nsapolicycoreutils
|
||||||
|
policycoreutils-1.21.15.tgz
|
||||||
|
policycoreutils-1.21.17.tgz
|
||||||
|
policycoreutils-1.21.18.tgz
|
||||||
|
policycoreutils-1.21.19.tgz
|
||||||
|
policycoreutils-1.21.20.tgz
|
||||||
|
policycoreutils-1.21.21.tgz
|
||||||
|
policycoreutils-1.21.22.tgz
|
||||||
|
policycoreutils-1.22.tgz
|
||||||
|
policycoreutils-1.23.1.tgz
|
||||||
|
policycoreutils-1.23.2.tgz
|
||||||
|
policycoreutils-1.23.3.tgz
|
||||||
|
policycoreutils-1.23.4.tgz
|
||||||
|
policycoreutils-1.23.5.tgz
|
||||||
|
policycoreutils-1.23.6.tgz
|
||||||
|
policycoreutils-1.23.7.tgz
|
||||||
|
policycoreutils-1.23.8.tgz
|
||||||
|
policycoreutils-1.23.9.tgz
|
||||||
|
policycoreutils-1.23.10.tgz
|
||||||
|
policycoreutils-1.23.11.tgz
|
||||||
|
policycoreutils-1.24.tgz
|
||||||
|
policycoreutils-1.25.1.tgz
|
||||||
|
policycoreutils-1.25.2.tgz
|
||||||
|
policycoreutils-1.25.3.tgz
|
||||||
|
policycoreutils-1.25.4.tgz
|
||||||
|
policycoreutils-1.25.5.tgz
|
||||||
|
policycoreutils-1.25.6.tgz
|
||||||
|
policycoreutils-1.25.7.tgz
|
||||||
|
policycoreutils-1.25.9.tgz
|
||||||
|
policycoreutils-1.26.tgz
|
||||||
|
policycoreutils-1.27.1.tgz
|
||||||
|
policycoreutils-1.27.2.tgz
|
||||||
|
policycoreutils-1.27.3.tgz
|
||||||
|
policycoreutils-1.27.5.tgz
|
||||||
|
policycoreutils-1.27.6.tgz
|
||||||
|
policycoreutils-1.27.7.tgz
|
||||||
|
policycoreutils-1.27.11.tgz
|
||||||
|
policycoreutils-1.27.12.tgz
|
||||||
|
policycoreutils-1.27.13.tgz
|
||||||
|
policycoreutils-1.27.14.tgz
|
||||||
|
policycoreutils-1.27.18.tgz
|
||||||
|
policycoreutils-1.27.19.tgz
|
||||||
|
policycoreutils-1.27.20.tgz
|
||||||
|
policycoreutils-1.27.22.tgz
|
||||||
|
policycoreutils-1.27.23.tgz
|
||||||
|
policycoreutils-1.27.26.tgz
|
||||||
|
policycoreutils-1.27.27.tgz
|
||||||
|
policycoreutils-1.27.28.tgz
|
||||||
|
policycoreutils-1.27.29.tgz
|
||||||
|
policycoreutils-1.27.30.tgz
|
||||||
|
policycoreutils-1.27.31.tgz
|
||||||
|
policycoreutils-1.27.33.tgz
|
||||||
|
policycoreutils-1.27.35.tgz
|
||||||
|
policycoreutils-1.27.36.tgz
|
||||||
|
policycoreutils-1.27.37.tgz
|
||||||
|
policycoreutils-1.28.tgz
|
||||||
|
policycoreutils-1.29.1.tgz
|
||||||
|
policycoreutils-1.29.2.tgz
|
||||||
|
policycoreutils-1.29.3.tgz
|
||||||
|
policycoreutils-1.29.4.tgz
|
||||||
|
policycoreutils-1.29.5.tgz
|
||||||
|
policycoreutils-1.29.7.tgz
|
||||||
|
policycoreutils-1.29.8.tgz
|
||||||
|
policycoreutils-1.29.9.tgz
|
||||||
|
policycoreutils-1.29.10.tgz
|
||||||
|
policycoreutils-1.29.11.tgz
|
||||||
|
policycoreutils-1.29.12.tgz
|
||||||
|
policycoreutils-1.29.15.tgz
|
||||||
|
policycoreutils-1.29.17.tgz
|
||||||
|
policycoreutils-1.29.18.tgz
|
||||||
|
policycoreutils-1.29.19.tgz
|
||||||
|
policycoreutils-1.29.20.tgz
|
||||||
|
policycoreutils-1.29.23.tgz
|
||||||
|
policycoreutils-1.29.26.tgz
|
||||||
|
policycoreutils-1.29.27.tgz
|
||||||
|
policycoreutils-1.30.tgz
|
||||||
|
policycoreutils-1.30.1.tgz
|
||||||
|
policycoreutils-1.30.4.tgz
|
||||||
|
policycoreutils-1.30.5.tgz
|
||||||
|
policycoreutils-1.30.6.tgz
|
||||||
|
policycoreutils-1.30.7.tgz
|
||||||
|
policycoreutils-1.30.8.tgz
|
||||||
|
policycoreutils-1.30.9.tgz
|
||||||
|
policycoreutils-1.30.10.tgz
|
||||||
|
policycoreutils-1.30.11.tgz
|
||||||
|
policycoreutils-1.30.12.tgz
|
||||||
|
policycoreutils-1.30.14.tgz
|
||||||
|
policycoreutils-1.30.17.tgz
|
||||||
|
policycoreutils-1.30.22.tgz
|
||||||
|
policycoreutils-1.30.25.tgz
|
||||||
|
policycoreutils-1.30.26.tgz
|
||||||
|
policycoreutils-1.30.27.tgz
|
||||||
|
policycoreutils-1.30.28.tgz
|
||||||
|
policycoreutils-1.30.29.tgz
|
||||||
|
policycoreutils-1.30.30.tgz
|
||||||
|
policycoreutils-1.32.tgz
|
||||||
|
policycoreutils-1.33.1.tgz
|
||||||
|
policycoreutils-1.33.2.tgz
|
||||||
|
policycoreutils-1.33.4.tgz
|
||||||
|
policycoreutils-1.33.5.tgz
|
||||||
|
policycoreutils-1.33.6.tgz
|
||||||
|
policycoreutils-1.33.7.tgz
|
||||||
|
policycoreutils-1.33.8.tgz
|
||||||
|
policycoreutils-1.33.10.tgz
|
||||||
|
policycoreutils-1.33.11.tgz
|
||||||
|
policycoreutils-1.33.12.tgz
|
||||||
|
policycoreutils-1.33.14.tgz
|
||||||
|
policycoreutils-1.33.15.tgz
|
||||||
|
policycoreutils-1.34.0.tgz
|
||||||
|
policycoreutils-1.34.1.tgz
|
||||||
|
policycoreutils-2.0.0.tgz
|
||||||
|
policycoreutils-2.0.1.tgz
|
||||||
|
sepolgen-1.0.0.tgz
|
||||||
|
policycoreutils-2.0.2.tgz
|
||||||
|
policycoreutils-2.0.3.tgz
|
||||||
|
sepolgen-1.0.1.tgz
|
||||||
|
policycoreutils-2.0.6.tgz
|
||||||
|
sepolgen-1.0.2.tgz
|
||||||
|
sepolgen-1.0.3.tgz
|
||||||
|
policycoreutils-2.0.7.tgz
|
||||||
|
sepolgen-1.0.4.tgz
|
||||||
|
sepolgen-1.0.6.tgz
|
||||||
|
sepolgen-1.0.7.tgz
|
||||||
|
policycoreutils-2.0.8.tgz
|
||||||
|
sepolgen-1.0.8.tgz
|
||||||
|
policycoreutils-2.0.9.tgz
|
||||||
|
policycoreutils-2.0.10.tgz
|
||||||
|
policycoreutils-2.0.13.tgz
|
||||||
|
policycoreutils-2.0.14.tgz
|
||||||
|
policycoreutils-2.0.15.tgz
|
||||||
|
policycoreutils-2.0.16.tgz
|
||||||
|
policycoreutils-2.0.19.tgz
|
||||||
|
policycoreutils-2.0.20.tgz
|
||||||
|
policycoreutils-2.0.21.tgz
|
||||||
|
policycoreutils-2.0.22.tgz
|
||||||
|
policycoreutils-2.0.23.tgz
|
||||||
|
policycoreutils-2.0.25.tgz
|
||||||
|
sepolgen-1.0.9.tgz
|
||||||
|
sepolgen-1.0.10.tgz
|
||||||
|
policycoreutils-2.0.26.tgz
|
||||||
|
policycoreutils-2.0.27.tgz
|
||||||
|
policycoreutils-2.0.28.tgz
|
||||||
|
policycoreutils-2.0.29.tgz
|
||||||
|
policycoreutils-2.0.31.tgz
|
||||||
|
policycoreutils-2.0.32.tgz
|
||||||
|
policycoreutils-2.0.33.tgz
|
||||||
|
policycoreutils-2.0.34.tgz
|
||||||
|
policycoreutils-2.0.35.tgz
|
||||||
|
policycoreutils-2.0.36.tgz
|
||||||
|
policycoreutils-2.0.37.tgz
|
||||||
|
sepolgen-1.0.11.tgz
|
||||||
|
policycoreutils-2.0.38.tgz
|
||||||
|
policycoreutils-2.0.39.tgz
|
||||||
|
policycoreutils-2.0.41.tgz
|
||||||
|
policycoreutils-2.0.42.tgz
|
||||||
|
policycoreutils-2.0.43.tgz
|
||||||
|
policycoreutils-2.0.44.tgz
|
||||||
|
policycoreutils-2.0.46.tgz
|
||||||
|
policycoreutils-2.0.47.tgz
|
||||||
|
policycoreutils-2.0.49.tgz
|
||||||
|
policycoreutils-2.0.50.tgz
|
||||||
|
sepolgen-1.0.12.tgz
|
||||||
|
policycoreutils-2.0.51.tgz
|
||||||
|
policycoreutils-2.0.52.tgz
|
||||||
|
sepolgen-1.0.13.tgz
|
||||||
|
policycoreutils-2.0.53.tgz
|
||||||
|
policycoreutils-2.0.54.tgz
|
||||||
|
policycoreutils-2.0.55.tgz
|
||||||
|
policycoreutils-2.0.56.tgz
|
||||||
|
policycoreutils-2.0.57.tgz
|
||||||
|
policycoreutils-2.0.58.tgz
|
||||||
|
policycoreutils-2.0.59.tgz
|
||||||
|
policycoreutils-2.0.60.tgz
|
||||||
|
sepolgen-1.0.14.tgz
|
||||||
|
policycoreutils-2.0.61.tgz
|
||||||
|
sepolgen-1.0.15.tgz
|
||||||
|
policycoreutils-2.0.62.tgz
|
||||||
|
sepolgen-1.0.16.tgz
|
||||||
|
policycoreutils-2.0.63.tgz
|
||||||
|
policycoreutils-2.0.64.tgz
|
||||||
|
policycoreutils-2.0.65.tgz
|
||||||
|
policycoreutils-2.0.67.tgz
|
||||||
|
policycoreutils-2.0.68.tgz
|
||||||
|
policycoreutils-2.0.70.tgz
|
||||||
|
policycoreutils_man_ru2.tar.bz2
|
||||||
|
policycoreutils-2.0.71.tgz
|
||||||
|
sepolgen-1.0.17.tgz
|
||||||
|
policycoreutils-2.0.73.tgz
|
||||||
|
policycoreutils-2.0.74.tgz
|
||||||
|
policycoreutils-2.0.75.tgz
|
||||||
|
policycoreutils-2.0.76.tgz
|
||||||
|
policycoreutils-2.0.77.tgz
|
||||||
|
policycoreutils-2.0.78.tgz
|
||||||
|
sepolgen-1.0.19.tgz
|
||||||
|
policycoreutils-2.0.79.tgz
|
||||||
|
policycoreutils-2.0.80.tgz
|
||||||
|
policycoreutils-2.0.81.tgz
|
||||||
|
sepolgen-1.0.20.tgz
|
||||||
|
sepolgen-1.0.22.tgz
|
||||||
|
policycoreutils-2.0.82.tgz
|
||||||
|
sepolgen-1.0.23.tgz
|
||||||
|
policycoreutils-2.0.83.tgz
|
||||||
|
/policycoreutils-2.0.84.tgz
|
||||||
|
/policycoreutils-2.0.85.tgz
|
||||||
|
/policycoreutils-2.0.86.tgz
|
||||||
|
/policycoreutils-2.1.4.tgz
|
||||||
|
/policycoreutils-2.1.5.tgz
|
||||||
|
/sepolgen-1.1.1.tgz
|
||||||
|
/sepolgen-1.1.2.tgz
|
||||||
|
/policycoreutils-2.1.6.tgz
|
||||||
|
/policycoreutils-2.3.tar.gz
|
||||||
|
/sepolgen-1.2.1.tar.gz
|
||||||
|
/sepolgen-1.2.2.tar.gz
|
||||||
|
/policycoreutils-2.4.tar.gz
|
||||||
|
/sepolgen-1.2.3-rc1.tar.gz
|
||||||
|
/policycoreutils-2.5-rc1.tar.gz
|
||||||
|
/policycoreutils-2.5.tar.gz
|
||||||
|
/sepolgen-1.2.3.tar.gz
|
||||||
|
/policycoreutils-2.6.tar.gz
|
||||||
|
/sepolgen-2.6.tar.gz
|
||||||
|
/policycoreutils-2.7.tar.gz
|
||||||
|
/selinux-python-2.7.tar.gz
|
||||||
|
/selinux-gui-2.7.tar.gz
|
||||||
|
/selinux-sandbox-2.7.tar.gz
|
||||||
|
/selinux-dbus-2.7.tar.gz
|
||||||
|
/semodule-utils-2.7.tar.gz
|
||||||
|
/restorecond-2.7.tar.gz
|
||||||
|
/policycoreutils-2.8-rc1.tar.gz
|
||||||
|
/restorecond-2.8-rc1.tar.gz
|
||||||
|
/selinux-dbus-2.8-rc1.tar.gz
|
||||||
|
/selinux-gui-2.8-rc1.tar.gz
|
||||||
|
/selinux-python-2.8-rc1.tar.gz
|
||||||
|
/selinux-sandbox-2.8-rc1.tar.gz
|
||||||
|
/semodule-utils-2.8-rc1.tar.gz
|
||||||
|
/policycoreutils-2.8-rc2.tar.gz
|
||||||
|
/restorecond-2.8-rc2.tar.gz
|
||||||
|
/selinux-dbus-2.8-rc2.tar.gz
|
||||||
|
/selinux-gui-2.8-rc2.tar.gz
|
||||||
|
/selinux-python-2.8-rc2.tar.gz
|
||||||
|
/selinux-sandbox-2.8-rc2.tar.gz
|
||||||
|
/semodule-utils-2.8-rc2.tar.gz
|
||||||
|
/policycoreutils-2.8-rc3.tar.gz
|
||||||
|
/restorecond-2.8-rc3.tar.gz
|
||||||
|
/selinux-dbus-2.8-rc3.tar.gz
|
||||||
|
/selinux-gui-2.8-rc3.tar.gz
|
||||||
|
/selinux-python-2.8-rc3.tar.gz
|
||||||
|
/selinux-sandbox-2.8-rc3.tar.gz
|
||||||
|
/semodule-utils-2.8-rc3.tar.gz
|
||||||
|
/policycoreutils-2.8.tar.gz
|
||||||
|
/restorecond-2.8.tar.gz
|
||||||
|
/selinux-dbus-2.8.tar.gz
|
||||||
|
/selinux-gui-2.8.tar.gz
|
||||||
|
/selinux-python-2.8.tar.gz
|
||||||
|
/selinux-sandbox-2.8.tar.gz
|
||||||
|
/semodule-utils-2.8.tar.gz
|
||||||
|
/gui-po.tgz
|
||||||
|
/policycoreutils-po.tgz
|
||||||
|
/python-po.tgz
|
||||||
|
/sandbox-po.tgz
|
||||||
|
/policycoreutils-2.9-rc1.tar.gz
|
||||||
|
/selinux-python-2.9-rc1.tar.gz
|
||||||
|
/selinux-gui-2.9-rc1.tar.gz
|
||||||
|
/selinux-sandbox-2.9-rc1.tar.gz
|
||||||
|
/selinux-dbus-2.9-rc1.tar.gz
|
||||||
|
/semodule-utils-2.9-rc1.tar.gz
|
||||||
|
/restorecond-2.9-rc1.tar.gz
|
||||||
|
/policycoreutils-2.9-rc2.tar.gz
|
||||||
|
/restorecond-2.9-rc2.tar.gz
|
||||||
|
/selinux-dbus-2.9-rc2.tar.gz
|
||||||
|
/selinux-gui-2.9-rc2.tar.gz
|
||||||
|
/selinux-python-2.9-rc2.tar.gz
|
||||||
|
/selinux-sandbox-2.9-rc2.tar.gz
|
||||||
|
/semodule-utils-2.9-rc2.tar.gz
|
||||||
|
/policycoreutils-2.9.tar.gz
|
||||||
|
/restorecond-2.9.tar.gz
|
||||||
|
/selinux-dbus-2.9.tar.gz
|
||||||
|
/selinux-gui-2.9.tar.gz
|
||||||
|
/selinux-python-2.9.tar.gz
|
||||||
|
/selinux-sandbox-2.9.tar.gz
|
||||||
|
/semodule-utils-2.9.tar.gz
|
||||||
|
/policycoreutils-3.0-rc1.tar.gz
|
||||||
|
/restorecond-3.0-rc1.tar.gz
|
||||||
|
/selinux-dbus-3.0-rc1.tar.gz
|
||||||
|
/selinux-gui-3.0-rc1.tar.gz
|
||||||
|
/selinux-python-3.0-rc1.tar.gz
|
||||||
|
/selinux-sandbox-3.0-rc1.tar.gz
|
||||||
|
/semodule-utils-3.0-rc1.tar.gz
|
||||||
|
/policycoreutils-3.0.tar.gz
|
||||||
|
/restorecond-3.0.tar.gz
|
||||||
|
/selinux-dbus-3.0.tar.gz
|
||||||
|
/selinux-gui-3.0.tar.gz
|
||||||
|
/selinux-python-3.0.tar.gz
|
||||||
|
/selinux-sandbox-3.0.tar.gz
|
||||||
|
/semodule-utils-3.0.tar.gz
|
||||||
|
/policycoreutils-3.1.tar.gz
|
||||||
|
/restorecond-3.1.tar.gz
|
||||||
|
/selinux-dbus-3.1.tar.gz
|
||||||
|
/selinux-gui-3.1.tar.gz
|
||||||
|
/selinux-python-3.1.tar.gz
|
||||||
|
/selinux-sandbox-3.1.tar.gz
|
||||||
|
/semodule-utils-3.1.tar.gz
|
@ -0,0 +1,34 @@
|
|||||||
|
From ccd973f721c48945fc706d8fef6b396580853a9f Mon Sep 17 00:00:00 2001
|
||||||
|
From: "W. Michael Petullo" <mike@flyn.org>
|
||||||
|
Date: Thu, 16 Jul 2020 15:29:20 -0500
|
||||||
|
Subject: [PATCH] python/audit2allow: add #include <limits.h> to
|
||||||
|
sepolgen-ifgen-attr-helper.c
|
||||||
|
|
||||||
|
I found that building on OpenWrt/musl failed with:
|
||||||
|
|
||||||
|
sepolgen-ifgen-attr-helper.c:152:16: error: 'PATH_MAX' undeclared ...
|
||||||
|
|
||||||
|
Musl is less "generous" than glibc in recursively including header
|
||||||
|
files, and I suspect this is the reason for this error. Explicitly
|
||||||
|
including limits.h fixes the problem.
|
||||||
|
|
||||||
|
Signed-off-by: W. Michael Petullo <mike@flyn.org>
|
||||||
|
---
|
||||||
|
python/audit2allow/sepolgen-ifgen-attr-helper.c | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/python/audit2allow/sepolgen-ifgen-attr-helper.c b/python/audit2allow/sepolgen-ifgen-attr-helper.c
|
||||||
|
index 53f20818722a..f010c9584c1f 100644
|
||||||
|
--- a/python/audit2allow/sepolgen-ifgen-attr-helper.c
|
||||||
|
+++ b/python/audit2allow/sepolgen-ifgen-attr-helper.c
|
||||||
|
@@ -28,6 +28,7 @@
|
||||||
|
|
||||||
|
#include <selinux/selinux.h>
|
||||||
|
|
||||||
|
+#include <limits.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <sys/stat.h>
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
@ -0,0 +1,26 @@
|
|||||||
|
From 9e2b8c61bfd275d0f007a736721c557755edf4a0 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Laurent Bigonville <bigon@bigon.be>
|
||||||
|
Date: Thu, 16 Jul 2020 14:22:13 +0200
|
||||||
|
Subject: [PATCH] restorecond: Set X-GNOME-HiddenUnderSystemd=true in
|
||||||
|
restorecond.desktop file
|
||||||
|
|
||||||
|
This completely inactivate the .desktop file incase the user session is
|
||||||
|
managed by systemd as restorecond also provide a service file
|
||||||
|
|
||||||
|
Signed-off-by: Laurent Bigonville <bigon@bigon.be>
|
||||||
|
---
|
||||||
|
restorecond/restorecond.desktop | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/restorecond/restorecond.desktop b/restorecond/restorecond.desktop
|
||||||
|
index af7286801c24..7df854727a3f 100644
|
||||||
|
--- a/restorecond/restorecond.desktop
|
||||||
|
+++ b/restorecond/restorecond.desktop
|
||||||
|
@@ -5,3 +5,4 @@ Comment=Fix file context in owned by the user
|
||||||
|
Type=Application
|
||||||
|
StartupNotify=false
|
||||||
|
X-GNOME-Autostart-enabled=false
|
||||||
|
+X-GNOME-HiddenUnderSystemd=true
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
136
0003-fixfiles-correctly-restore-context-of-mountpoints.patch
Normal file
136
0003-fixfiles-correctly-restore-context-of-mountpoints.patch
Normal file
@ -0,0 +1,136 @@
|
|||||||
|
From ba2d6c10635a021d2b1a5fc2123fde13b04295a5 Mon Sep 17 00:00:00 2001
|
||||||
|
From: bauen1 <j2468h@googlemail.com>
|
||||||
|
Date: Thu, 6 Aug 2020 16:48:36 +0200
|
||||||
|
Subject: [PATCH] fixfiles: correctly restore context of mountpoints
|
||||||
|
|
||||||
|
By bind mounting every filesystem we want to relabel we can access all
|
||||||
|
files without anything hidden due to active mounts.
|
||||||
|
|
||||||
|
This comes at the cost of user experience, because setfiles only
|
||||||
|
displays the percentage if no path is given or the path is /
|
||||||
|
|
||||||
|
Signed-off-by: Jonathan Hettwer <j2468h@gmail.com>
|
||||||
|
Acked-by: Stephen Smalley <stephen.smalley.work@gmail.com>
|
||||||
|
---
|
||||||
|
policycoreutils/scripts/fixfiles | 29 +++++++++++++++++++++++++----
|
||||||
|
policycoreutils/scripts/fixfiles.8 | 8 ++++++--
|
||||||
|
2 files changed, 31 insertions(+), 6 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/policycoreutils/scripts/fixfiles b/policycoreutils/scripts/fixfiles
|
||||||
|
index 5d7770348349..30dadb4f4cb6 100755
|
||||||
|
--- a/policycoreutils/scripts/fixfiles
|
||||||
|
+++ b/policycoreutils/scripts/fixfiles
|
||||||
|
@@ -112,6 +112,7 @@ FORCEFLAG=""
|
||||||
|
RPMFILES=""
|
||||||
|
PREFC=""
|
||||||
|
RESTORE_MODE=""
|
||||||
|
+BIND_MOUNT_FILESYSTEMS=""
|
||||||
|
SETFILES=/sbin/setfiles
|
||||||
|
RESTORECON=/sbin/restorecon
|
||||||
|
FILESYSTEMSRW=`get_rw_labeled_mounts`
|
||||||
|
@@ -243,7 +244,23 @@ case "$RESTORE_MODE" in
|
||||||
|
if [ -n "${FILESYSTEMSRW}" ]; then
|
||||||
|
LogReadOnly
|
||||||
|
echo "${OPTION}ing `echo ${FILESYSTEMSRW}`"
|
||||||
|
- ${SETFILES} ${VERBOSE} ${EXCLUDEDIRS} ${FORCEFLAG} $* -q ${FC} ${FILESYSTEMSRW}
|
||||||
|
+
|
||||||
|
+ if [ -z "$BIND_MOUNT_FILESYSTEMS" ]; then
|
||||||
|
+ ${SETFILES} ${VERBOSE} ${EXCLUDEDIRS} ${FORCEFLAG} $* -q ${FC} ${FILESYSTEMSRW}
|
||||||
|
+ else
|
||||||
|
+ # we bind mount so we can fix the labels of files that have already been
|
||||||
|
+ # mounted over
|
||||||
|
+ for m in `echo $FILESYSTEMSRW`; do
|
||||||
|
+ TMP_MOUNT="$(mktemp -d)"
|
||||||
|
+ test -z ${TMP_MOUNT+x} && echo "Unable to find temporary directory!" && exit 1
|
||||||
|
+
|
||||||
|
+ mkdir -p "${TMP_MOUNT}${m}" || exit 1
|
||||||
|
+ mount --bind "${m}" "${TMP_MOUNT}${m}" || exit 1
|
||||||
|
+ ${SETFILES} ${VERBOSE} ${EXCLUDEDIRS} ${FORCEFLAG} $* -q ${FC} -r "${TMP_MOUNT}" "${TMP_MOUNT}${m}"
|
||||||
|
+ umount "${TMP_MOUNT}${m}" || exit 1
|
||||||
|
+ rm -rf "${TMP_MOUNT}" || echo "Error cleaning up."
|
||||||
|
+ done;
|
||||||
|
+ fi
|
||||||
|
else
|
||||||
|
echo >&2 "fixfiles: No suitable file systems found"
|
||||||
|
fi
|
||||||
|
@@ -313,6 +330,7 @@ case "$1" in
|
||||||
|
> /.autorelabel || exit $?
|
||||||
|
[ -z "$FORCEFLAG" ] || echo -n "$FORCEFLAG " >> /.autorelabel
|
||||||
|
[ -z "$BOOTTIME" ] || echo -N $BOOTTIME >> /.autorelabel
|
||||||
|
+ [ -z "$BIND_MOUNT_FILESYSTEMS" ] || echo "-M" >> /.autorelabel
|
||||||
|
# Force full relabel if SELinux is not enabled
|
||||||
|
selinuxenabled || echo -F > /.autorelabel
|
||||||
|
echo "System will relabel on next boot"
|
||||||
|
@@ -324,7 +342,7 @@ esac
|
||||||
|
}
|
||||||
|
usage() {
|
||||||
|
echo $"""
|
||||||
|
-Usage: $0 [-v] [-F] [-f] relabel
|
||||||
|
+Usage: $0 [-v] [-F] [-M] [-f] relabel
|
||||||
|
or
|
||||||
|
Usage: $0 [-v] [-F] [-B | -N time ] { check | restore | verify }
|
||||||
|
or
|
||||||
|
@@ -334,7 +352,7 @@ Usage: $0 [-v] [-F] -R rpmpackage[,rpmpackage...] { check | restore | verify }
|
||||||
|
or
|
||||||
|
Usage: $0 [-v] [-F] -C PREVIOUS_FILECONTEXT { check | restore | verify }
|
||||||
|
or
|
||||||
|
-Usage: $0 [-F] [-B] onboot
|
||||||
|
+Usage: $0 [-F] [-M] [-B] onboot
|
||||||
|
"""
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -353,7 +371,7 @@ set_restore_mode() {
|
||||||
|
}
|
||||||
|
|
||||||
|
# See how we were called.
|
||||||
|
-while getopts "N:BC:FfR:l:v" i; do
|
||||||
|
+while getopts "N:BC:FfR:l:vM" i; do
|
||||||
|
case "$i" in
|
||||||
|
B)
|
||||||
|
BOOTTIME=`/bin/who -b | awk '{print $3}'`
|
||||||
|
@@ -379,6 +397,9 @@ while getopts "N:BC:FfR:l:v" i; do
|
||||||
|
echo "Redirecting output to $OPTARG"
|
||||||
|
exec >>"$OPTARG" 2>&1
|
||||||
|
;;
|
||||||
|
+ M)
|
||||||
|
+ BIND_MOUNT_FILESYSTEMS="-M"
|
||||||
|
+ ;;
|
||||||
|
F)
|
||||||
|
FORCEFLAG="-F"
|
||||||
|
;;
|
||||||
|
diff --git a/policycoreutils/scripts/fixfiles.8 b/policycoreutils/scripts/fixfiles.8
|
||||||
|
index 9f447f03d444..123425308416 100644
|
||||||
|
--- a/policycoreutils/scripts/fixfiles.8
|
||||||
|
+++ b/policycoreutils/scripts/fixfiles.8
|
||||||
|
@@ -6,7 +6,7 @@ fixfiles \- fix file SELinux security contexts.
|
||||||
|
.na
|
||||||
|
|
||||||
|
.B fixfiles
|
||||||
|
-.I [\-v] [\-F] [\-f] relabel
|
||||||
|
+.I [\-v] [\-F] [-M] [\-f] relabel
|
||||||
|
|
||||||
|
.B fixfiles
|
||||||
|
.I [\-v] [\-F] { check | restore | verify } dir/file ...
|
||||||
|
@@ -21,7 +21,7 @@ fixfiles \- fix file SELinux security contexts.
|
||||||
|
.I [\-v] [\-F] \-C PREVIOUS_FILECONTEXT { check | restore | verify }
|
||||||
|
|
||||||
|
.B fixfiles
|
||||||
|
-.I [-F] [-B] onboot
|
||||||
|
+.I [-F] [-M] [-B] onboot
|
||||||
|
|
||||||
|
.ad
|
||||||
|
|
||||||
|
@@ -68,6 +68,10 @@ Run a diff on the PREVIOUS_FILECONTEXT file to the currently installed one, and
|
||||||
|
Only act on files created after the specified date. Date must be specified in
|
||||||
|
"YYYY\-MM\-DD HH:MM" format. Date field will be passed to find \-\-newermt command.
|
||||||
|
|
||||||
|
+.TP
|
||||||
|
+.B \-M
|
||||||
|
+Bind mount filesystems before relabeling them, this allows fixing the context of files or directories that have been mounted over.
|
||||||
|
+
|
||||||
|
.TP
|
||||||
|
.B -v
|
||||||
|
Modify verbosity from progress to verbose. (Run restorecon with \-v instead of \-p)
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
112
0004-sepolgen-print-extended-permissions-in-hexadecimal.patch
Normal file
112
0004-sepolgen-print-extended-permissions-in-hexadecimal.patch
Normal file
@ -0,0 +1,112 @@
|
|||||||
|
From 9e239e55692b578ba546b4dff2b07604a2ca6baa Mon Sep 17 00:00:00 2001
|
||||||
|
From: =?UTF-8?q?Christian=20G=C3=B6ttsche?= <cgzones@googlemail.com>
|
||||||
|
Date: Wed, 19 Aug 2020 17:05:33 +0200
|
||||||
|
Subject: [PATCH] sepolgen: print extended permissions in hexadecimal
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=UTF-8
|
||||||
|
Content-Transfer-Encoding: 8bit
|
||||||
|
|
||||||
|
All tools like ausearch(8) or sesearch(1) and online documentation[1]
|
||||||
|
use hexadecimal values for extended permissions.
|
||||||
|
Hence use them, e.g. for audit2allow output, as well.
|
||||||
|
|
||||||
|
[1]: https://github.com/strace/strace/blob/master/linux/64/ioctls_inc.h
|
||||||
|
|
||||||
|
Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
|
||||||
|
Acked-by: Stephen Smalley <stephen.smalley.work@gmail.com>
|
||||||
|
---
|
||||||
|
python/sepolgen/src/sepolgen/refpolicy.py | 5 ++---
|
||||||
|
python/sepolgen/tests/test_access.py | 10 +++++-----
|
||||||
|
python/sepolgen/tests/test_refpolicy.py | 12 ++++++------
|
||||||
|
3 files changed, 13 insertions(+), 14 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py
|
||||||
|
index 43cecfc77385..747636875ef7 100644
|
||||||
|
--- a/python/sepolgen/src/sepolgen/refpolicy.py
|
||||||
|
+++ b/python/sepolgen/src/sepolgen/refpolicy.py
|
||||||
|
@@ -407,10 +407,9 @@ class XpermSet():
|
||||||
|
|
||||||
|
# print single value without braces
|
||||||
|
if len(self.ranges) == 1 and self.ranges[0][0] == self.ranges[0][1]:
|
||||||
|
- return compl + str(self.ranges[0][0])
|
||||||
|
+ return compl + hex(self.ranges[0][0])
|
||||||
|
|
||||||
|
- vals = map(lambda x: str(x[0]) if x[0] == x[1] else "%s-%s" % x,
|
||||||
|
- self.ranges)
|
||||||
|
+ vals = map(lambda x: hex(x[0]) if x[0] == x[1] else "%s-%s" % (hex(x[0]), hex(x[1]), ), self.ranges)
|
||||||
|
|
||||||
|
return "%s{ %s }" % (compl, " ".join(vals))
|
||||||
|
|
||||||
|
diff --git a/python/sepolgen/tests/test_access.py b/python/sepolgen/tests/test_access.py
|
||||||
|
index 73a5407df617..623588e09aeb 100644
|
||||||
|
--- a/python/sepolgen/tests/test_access.py
|
||||||
|
+++ b/python/sepolgen/tests/test_access.py
|
||||||
|
@@ -171,7 +171,7 @@ class TestAccessVector(unittest.TestCase):
|
||||||
|
a.merge(b)
|
||||||
|
self.assertEqual(sorted(list(a.perms)), ["append", "read", "write"])
|
||||||
|
self.assertEqual(list(a.xperms.keys()), ["ioctl"])
|
||||||
|
- self.assertEqual(a.xperms["ioctl"].to_string(), "{ 42 12345 }")
|
||||||
|
+ self.assertEqual(a.xperms["ioctl"].to_string(), "{ 0x2a 0x3039 }")
|
||||||
|
|
||||||
|
def text_merge_xperm2(self):
|
||||||
|
"""Test merging AV that does not contain xperms with AV that does"""
|
||||||
|
@@ -185,7 +185,7 @@ class TestAccessVector(unittest.TestCase):
|
||||||
|
a.merge(b)
|
||||||
|
self.assertEqual(sorted(list(a.perms)), ["append", "read", "write"])
|
||||||
|
self.assertEqual(list(a.xperms.keys()), ["ioctl"])
|
||||||
|
- self.assertEqual(a.xperms["ioctl"].to_string(), "{ 42 12345 }")
|
||||||
|
+ self.assertEqual(a.xperms["ioctl"].to_string(), "{ 0x2a 0x3039 }")
|
||||||
|
|
||||||
|
def test_merge_xperm_diff_op(self):
|
||||||
|
"""Test merging two AVs that contain xperms with different operation"""
|
||||||
|
@@ -203,8 +203,8 @@ class TestAccessVector(unittest.TestCase):
|
||||||
|
a.merge(b)
|
||||||
|
self.assertEqual(list(a.perms), ["read"])
|
||||||
|
self.assertEqual(sorted(list(a.xperms.keys())), ["asdf", "ioctl"])
|
||||||
|
- self.assertEqual(a.xperms["asdf"].to_string(), "23")
|
||||||
|
- self.assertEqual(a.xperms["ioctl"].to_string(), "{ 42 12345 }")
|
||||||
|
+ self.assertEqual(a.xperms["asdf"].to_string(), "0x17")
|
||||||
|
+ self.assertEqual(a.xperms["ioctl"].to_string(), "{ 0x2a 0x3039 }")
|
||||||
|
|
||||||
|
def test_merge_xperm_same_op(self):
|
||||||
|
"""Test merging two AVs that contain xperms with same operation"""
|
||||||
|
@@ -222,7 +222,7 @@ class TestAccessVector(unittest.TestCase):
|
||||||
|
a.merge(b)
|
||||||
|
self.assertEqual(list(a.perms), ["read"])
|
||||||
|
self.assertEqual(list(a.xperms.keys()), ["ioctl"])
|
||||||
|
- self.assertEqual(a.xperms["ioctl"].to_string(), "{ 23 42 12345 }")
|
||||||
|
+ self.assertEqual(a.xperms["ioctl"].to_string(), "{ 0x17 0x2a 0x3039 }")
|
||||||
|
|
||||||
|
class TestUtilFunctions(unittest.TestCase):
|
||||||
|
def test_is_idparam(self):
|
||||||
|
diff --git a/python/sepolgen/tests/test_refpolicy.py b/python/sepolgen/tests/test_refpolicy.py
|
||||||
|
index 4b50c8aada96..c7219fd568e9 100644
|
||||||
|
--- a/python/sepolgen/tests/test_refpolicy.py
|
||||||
|
+++ b/python/sepolgen/tests/test_refpolicy.py
|
||||||
|
@@ -90,17 +90,17 @@ class TestXpermSet(unittest.TestCase):
|
||||||
|
a.complement = True
|
||||||
|
self.assertEqual(a.to_string(), "")
|
||||||
|
a.add(1234)
|
||||||
|
- self.assertEqual(a.to_string(), "~ 1234")
|
||||||
|
+ self.assertEqual(a.to_string(), "~ 0x4d2")
|
||||||
|
a.complement = False
|
||||||
|
- self.assertEqual(a.to_string(), "1234")
|
||||||
|
+ self.assertEqual(a.to_string(), "0x4d2")
|
||||||
|
a.add(2345)
|
||||||
|
- self.assertEqual(a.to_string(), "{ 1234 2345 }")
|
||||||
|
+ self.assertEqual(a.to_string(), "{ 0x4d2 0x929 }")
|
||||||
|
a.complement = True
|
||||||
|
- self.assertEqual(a.to_string(), "~ { 1234 2345 }")
|
||||||
|
+ self.assertEqual(a.to_string(), "~ { 0x4d2 0x929 }")
|
||||||
|
a.add(42,64)
|
||||||
|
- self.assertEqual(a.to_string(), "~ { 42-64 1234 2345 }")
|
||||||
|
+ self.assertEqual(a.to_string(), "~ { 0x2a-0x40 0x4d2 0x929 }")
|
||||||
|
a.complement = False
|
||||||
|
- self.assertEqual(a.to_string(), "{ 42-64 1234 2345 }")
|
||||||
|
+ self.assertEqual(a.to_string(), "{ 0x2a-0x40 0x4d2 0x929 }")
|
||||||
|
|
||||||
|
class TestSecurityContext(unittest.TestCase):
|
||||||
|
def test_init(self):
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
109
0005-sepolgen-sort-extended-rules-like-normal-ones.patch
Normal file
109
0005-sepolgen-sort-extended-rules-like-normal-ones.patch
Normal file
@ -0,0 +1,109 @@
|
|||||||
|
From 2a60de8eca6bd91e276b60441a5dc72d85c6eda3 Mon Sep 17 00:00:00 2001
|
||||||
|
From: =?UTF-8?q?Christian=20G=C3=B6ttsche?= <cgzones@googlemail.com>
|
||||||
|
Date: Wed, 19 Aug 2020 17:05:34 +0200
|
||||||
|
Subject: [PATCH] sepolgen: sort extended rules like normal ones
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=UTF-8
|
||||||
|
Content-Transfer-Encoding: 8bit
|
||||||
|
|
||||||
|
Currently:
|
||||||
|
|
||||||
|
#============= sshd_t ==============
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow sshd_t ptmx_t:chr_file ioctl;
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow sshd_t sshd_devpts_t:chr_file ioctl;
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow sshd_t user_devpts_t:chr_file ioctl;
|
||||||
|
|
||||||
|
#============= user_t ==============
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow user_t devtty_t:chr_file ioctl;
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow user_t user_devpts_t:chr_file ioctl;
|
||||||
|
allowxperm sshd_t ptmx_t:chr_file ioctl { 0x5430-0x5431 0x5441 };
|
||||||
|
allowxperm sshd_t sshd_devpts_t:chr_file ioctl 0x5401;
|
||||||
|
allowxperm sshd_t user_devpts_t:chr_file ioctl { 0x5401-0x5402 0x540e };
|
||||||
|
allowxperm user_t user_devpts_t:chr_file ioctl { 0x4b33 0x5401 0x5403 0x540a 0x540f-0x5410 0x5413-0x5414 };
|
||||||
|
allowxperm user_t devtty_t:chr_file ioctl 0x4b33;
|
||||||
|
|
||||||
|
Changed:
|
||||||
|
|
||||||
|
#============= sshd_t ==============
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow sshd_t ptmx_t:chr_file ioctl;
|
||||||
|
allowxperm sshd_t ptmx_t:chr_file ioctl { 0x5430-0x5431 0x5441 };
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow sshd_t sshd_devpts_t:chr_file ioctl;
|
||||||
|
allowxperm sshd_t sshd_devpts_t:chr_file ioctl 0x5401;
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow sshd_t user_devpts_t:chr_file ioctl;
|
||||||
|
allowxperm sshd_t user_devpts_t:chr_file ioctl { 0x5401-0x5402 0x540e };
|
||||||
|
|
||||||
|
#============= user_t ==============
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow user_t devtty_t:chr_file ioctl;
|
||||||
|
allowxperm user_t devtty_t:chr_file ioctl 0x4b33;
|
||||||
|
|
||||||
|
#!!!! This avc is allowed in the current policy
|
||||||
|
#!!!! This av rule may have been overridden by an extended permission av rule
|
||||||
|
allow user_t user_devpts_t:chr_file ioctl;
|
||||||
|
allowxperm user_t user_devpts_t:chr_file ioctl { 0x4b33 0x5401 0x5403 0x540a 0x540f-0x5410 0x5413-0x5414 };
|
||||||
|
|
||||||
|
Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
|
||||||
|
Acked-by: Stephen Smalley <stephen.smalley.work@gmail.com>
|
||||||
|
---
|
||||||
|
python/sepolgen/src/sepolgen/output.py | 5 +++--
|
||||||
|
1 file changed, 3 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolgen/src/sepolgen/output.py b/python/sepolgen/src/sepolgen/output.py
|
||||||
|
index 3a21b64c19f7..aeeaafc889e7 100644
|
||||||
|
--- a/python/sepolgen/src/sepolgen/output.py
|
||||||
|
+++ b/python/sepolgen/src/sepolgen/output.py
|
||||||
|
@@ -84,7 +84,7 @@ def avrule_cmp(a, b):
|
||||||
|
return ret
|
||||||
|
|
||||||
|
# At this point, who cares - just return something
|
||||||
|
- return cmp(len(a.perms), len(b.perms))
|
||||||
|
+ return 0
|
||||||
|
|
||||||
|
# Compare two interface calls
|
||||||
|
def ifcall_cmp(a, b):
|
||||||
|
@@ -100,7 +100,7 @@ def rule_cmp(a, b):
|
||||||
|
else:
|
||||||
|
return id_set_cmp([a.args[0]], b.src_types)
|
||||||
|
else:
|
||||||
|
- if isinstance(b, refpolicy.AVRule):
|
||||||
|
+ if isinstance(b, refpolicy.AVRule) or isinstance(b, refpolicy.AVExtRule):
|
||||||
|
return avrule_cmp(a,b)
|
||||||
|
else:
|
||||||
|
return id_set_cmp(a.src_types, [b.args[0]])
|
||||||
|
@@ -130,6 +130,7 @@ def sort_filter(module):
|
||||||
|
# we assume is the first argument for interfaces).
|
||||||
|
rules = []
|
||||||
|
rules.extend(node.avrules())
|
||||||
|
+ rules.extend(node.avextrules())
|
||||||
|
rules.extend(node.interface_calls())
|
||||||
|
rules.sort(key=util.cmp_to_key(rule_cmp))
|
||||||
|
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
@ -0,0 +1,32 @@
|
|||||||
|
From 8bc865e1fe8f6f734b7306441ccbeec3b7c37f97 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Dominick Grift <dominick.grift@defensec.nl>
|
||||||
|
Date: Tue, 1 Sep 2020 18:16:41 +0200
|
||||||
|
Subject: [PATCH] newrole: support cross-compilation with PAM and audit
|
||||||
|
|
||||||
|
Compilation of newrole with PAM and audit support currently requires that you have the respective headers installed on the host. Instead make the header location customizable to accomodate cross-compilation.
|
||||||
|
|
||||||
|
Signed-off-by: Dominick Grift <dominick.grift@defensec.nl>
|
||||||
|
Acked-by: Stephen Smalley <stephen.smalley.work@gmail.com>
|
||||||
|
---
|
||||||
|
policycoreutils/newrole/Makefile | 5 +++--
|
||||||
|
1 file changed, 3 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/policycoreutils/newrole/Makefile b/policycoreutils/newrole/Makefile
|
||||||
|
index 73ebd413da85..0e7ebce3dd56 100644
|
||||||
|
--- a/policycoreutils/newrole/Makefile
|
||||||
|
+++ b/policycoreutils/newrole/Makefile
|
||||||
|
@@ -5,8 +5,9 @@ BINDIR ?= $(PREFIX)/bin
|
||||||
|
MANDIR ?= $(PREFIX)/share/man
|
||||||
|
ETCDIR ?= /etc
|
||||||
|
LOCALEDIR = $(DESTDIR)$(PREFIX)/share/locale
|
||||||
|
-PAMH ?= $(shell test -f /usr/include/security/pam_appl.h && echo y)
|
||||||
|
-AUDITH ?= $(shell test -f /usr/include/libaudit.h && echo y)
|
||||||
|
+INCLUDEDIR ?= $(PREFIX)/include
|
||||||
|
+PAMH ?= $(shell test -f $(INCLUDEDIR)/security/pam_appl.h && echo y)
|
||||||
|
+AUDITH ?= $(shell test -f $(INCLUDEDIR)/libaudit.h && echo y)
|
||||||
|
# Enable capabilities to permit newrole to generate audit records.
|
||||||
|
# This will make newrole a setuid root program.
|
||||||
|
# The capabilities used are: CAP_AUDIT_WRITE.
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
@ -0,0 +1,26 @@
|
|||||||
|
From ea624dcc70d93867f23b94c368b8cf102269c13b Mon Sep 17 00:00:00 2001
|
||||||
|
From: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
Date: Thu, 20 Aug 2015 12:58:41 +0200
|
||||||
|
Subject: [PATCH] sandbox: add -reset to Xephyr as it works better with it in
|
||||||
|
recent Fedoras
|
||||||
|
|
||||||
|
---
|
||||||
|
sandbox/sandboxX.sh | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/sandbox/sandboxX.sh b/sandbox/sandboxX.sh
|
||||||
|
index eaa500d08143..4774528027ef 100644
|
||||||
|
--- a/sandbox/sandboxX.sh
|
||||||
|
+++ b/sandbox/sandboxX.sh
|
||||||
|
@@ -20,7 +20,7 @@ cat > ~/.config/openbox/rc.xml << EOF
|
||||||
|
</openbox_config>
|
||||||
|
EOF
|
||||||
|
|
||||||
|
-(/usr/bin/Xephyr -resizeable -title "$TITLE" -terminate -screen $SCREENSIZE -dpi $DPI -nolisten tcp -displayfd 5 5>&1 2>/dev/null) | while read D; do
|
||||||
|
+(/usr/bin/Xephyr -resizeable -title "$TITLE" -terminate -reset -screen $SCREENSIZE -dpi $DPI -nolisten tcp -displayfd 5 5>&1 2>/dev/null) | while read D; do
|
||||||
|
export DISPLAY=:$D
|
||||||
|
cat > ~/seremote << __EOF
|
||||||
|
#!/bin/sh
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
46
0008-Fix-STANDARD_FILE_CONTEXT-section-in-man-pages.patch
Normal file
46
0008-Fix-STANDARD_FILE_CONTEXT-section-in-man-pages.patch
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
From 932c1244bc98d3a05a238f3f0b333cf8c429113b Mon Sep 17 00:00:00 2001
|
||||||
|
From: Dan Walsh <dwalsh@redhat.com>
|
||||||
|
Date: Mon, 21 Apr 2014 13:54:40 -0400
|
||||||
|
Subject: [PATCH] Fix STANDARD_FILE_CONTEXT section in man pages
|
||||||
|
|
||||||
|
Signed-off-by: Miroslav Grepl <mgrepl@redhat.com>
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/manpage.py | 7 +++++--
|
||||||
|
1 file changed, 5 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
index 3e8a3be907e3..a1d70623cff0 100755
|
||||||
|
--- a/python/sepolicy/sepolicy/manpage.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
@@ -735,10 +735,13 @@ Default Defined Ports:""")
|
||||||
|
|
||||||
|
def _file_context(self):
|
||||||
|
flist = []
|
||||||
|
+ flist_non_exec = []
|
||||||
|
mpaths = []
|
||||||
|
for f in self.all_file_types:
|
||||||
|
if f.startswith(self.domainname):
|
||||||
|
flist.append(f)
|
||||||
|
+ if not file_type_is_executable(f) or not file_type_is_entrypoint(f):
|
||||||
|
+ flist_non_exec.append(f)
|
||||||
|
if f in self.fcdict:
|
||||||
|
mpaths = mpaths + self.fcdict[f]["regex"]
|
||||||
|
if len(mpaths) == 0:
|
||||||
|
@@ -797,12 +800,12 @@ SELinux %(domainname)s policy is very flexible allowing users to setup their %(d
|
||||||
|
SELinux defines the file context types for the %(domainname)s, if you wanted to
|
||||||
|
store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk.
|
||||||
|
|
||||||
|
-.B semanage fcontext -a -t %(type)s '/srv/%(domainname)s/content(/.*)?'
|
||||||
|
+.B semanage fcontext -a -t %(type)s '/srv/my%(domainname)s_content(/.*)?'
|
||||||
|
.br
|
||||||
|
.B restorecon -R -v /srv/my%(domainname)s_content
|
||||||
|
|
||||||
|
Note: SELinux often uses regular expressions to specify labels that match multiple files.
|
||||||
|
-""" % {'domainname': self.domainname, "type": flist[0]})
|
||||||
|
+""" % {'domainname': self.domainname, "type": flist_non_exec[-1]})
|
||||||
|
|
||||||
|
self.fd.write(r"""
|
||||||
|
.I The following file types are defined for %(domainname)s:
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
@ -0,0 +1,27 @@
|
|||||||
|
From ae3780eb560fa5f00a3dd591c8233c2a9068a348 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Miroslav Grepl <mgrepl@redhat.com>
|
||||||
|
Date: Mon, 12 May 2014 14:11:22 +0200
|
||||||
|
Subject: [PATCH] If there is no executable we don't want to print a part of
|
||||||
|
STANDARD FILE CONTEXT
|
||||||
|
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/manpage.py | 3 ++-
|
||||||
|
1 file changed, 2 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
index a1d70623cff0..2d33eabb2536 100755
|
||||||
|
--- a/python/sepolicy/sepolicy/manpage.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
@@ -793,7 +793,8 @@ SELinux %(domainname)s policy is very flexible allowing users to setup their %(d
|
||||||
|
.PP
|
||||||
|
""" % {'domainname': self.domainname, 'equiv': e, 'alt': e.split('/')[-1]})
|
||||||
|
|
||||||
|
- self.fd.write(r"""
|
||||||
|
+ if flist_non_exec:
|
||||||
|
+ self.fd.write(r"""
|
||||||
|
.PP
|
||||||
|
.B STANDARD FILE CONTEXT
|
||||||
|
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
169
0010-Simplication-of-sepolicy-manpage-web-functionality.-.patch
Normal file
169
0010-Simplication-of-sepolicy-manpage-web-functionality.-.patch
Normal file
@ -0,0 +1,169 @@
|
|||||||
|
From 7d21b9f41c4d00f1e0499a64089a5e13a8f636ab Mon Sep 17 00:00:00 2001
|
||||||
|
From: Miroslav Grepl <mgrepl@redhat.com>
|
||||||
|
Date: Thu, 19 Feb 2015 17:45:15 +0100
|
||||||
|
Subject: [PATCH] Simplication of sepolicy-manpage web functionality.
|
||||||
|
system_release is no longer hardcoded and it creates only index.html and html
|
||||||
|
man pages in the directory for the system release.
|
||||||
|
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/__init__.py | 25 +++--------
|
||||||
|
python/sepolicy/sepolicy/manpage.py | 65 +++-------------------------
|
||||||
|
2 files changed, 13 insertions(+), 77 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/__init__.py b/python/sepolicy/sepolicy/__init__.py
|
||||||
|
index e4540977d042..ad718797ca68 100644
|
||||||
|
--- a/python/sepolicy/sepolicy/__init__.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/__init__.py
|
||||||
|
@@ -1208,27 +1208,14 @@ def boolean_desc(boolean):
|
||||||
|
|
||||||
|
|
||||||
|
def get_os_version():
|
||||||
|
- os_version = ""
|
||||||
|
- pkg_name = "selinux-policy"
|
||||||
|
+ system_release = ""
|
||||||
|
try:
|
||||||
|
- try:
|
||||||
|
- from commands import getstatusoutput
|
||||||
|
- except ImportError:
|
||||||
|
- from subprocess import getstatusoutput
|
||||||
|
- rc, output = getstatusoutput("rpm -q '%s'" % pkg_name)
|
||||||
|
- if rc == 0:
|
||||||
|
- os_version = output.split(".")[-2]
|
||||||
|
- except:
|
||||||
|
- os_version = ""
|
||||||
|
-
|
||||||
|
- if os_version[0:2] == "fc":
|
||||||
|
- os_version = "Fedora" + os_version[2:]
|
||||||
|
- elif os_version[0:2] == "el":
|
||||||
|
- os_version = "RHEL" + os_version[2:]
|
||||||
|
- else:
|
||||||
|
- os_version = ""
|
||||||
|
+ with open('/etc/system-release') as f:
|
||||||
|
+ system_release = f.readline()
|
||||||
|
+ except IOError:
|
||||||
|
+ system_release = "Misc"
|
||||||
|
|
||||||
|
- return os_version
|
||||||
|
+ return system_release
|
||||||
|
|
||||||
|
|
||||||
|
def reinit():
|
||||||
|
diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
index 2d33eabb2536..acc77f368d95 100755
|
||||||
|
--- a/python/sepolicy/sepolicy/manpage.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
@@ -149,10 +149,6 @@ def prettyprint(f, trim):
|
||||||
|
manpage_domains = []
|
||||||
|
manpage_roles = []
|
||||||
|
|
||||||
|
-fedora_releases = ["Fedora17", "Fedora18"]
|
||||||
|
-rhel_releases = ["RHEL6", "RHEL7"]
|
||||||
|
-
|
||||||
|
-
|
||||||
|
def get_alphabet_manpages(manpage_list):
|
||||||
|
alphabet_manpages = dict.fromkeys(string.ascii_letters, [])
|
||||||
|
for i in string.ascii_letters:
|
||||||
|
@@ -182,7 +178,7 @@ def convert_manpage_to_html(html_manpage, manpage):
|
||||||
|
class HTMLManPages:
|
||||||
|
|
||||||
|
"""
|
||||||
|
- Generate a HHTML Manpages on an given SELinux domains
|
||||||
|
+ Generate a HTML Manpages on an given SELinux domains
|
||||||
|
"""
|
||||||
|
|
||||||
|
def __init__(self, manpage_roles, manpage_domains, path, os_version):
|
||||||
|
@@ -190,9 +186,9 @@ class HTMLManPages:
|
||||||
|
self.manpage_domains = get_alphabet_manpages(manpage_domains)
|
||||||
|
self.os_version = os_version
|
||||||
|
self.old_path = path + "/"
|
||||||
|
- self.new_path = self.old_path + self.os_version + "/"
|
||||||
|
+ self.new_path = self.old_path
|
||||||
|
|
||||||
|
- if self.os_version in fedora_releases or self.os_version in rhel_releases:
|
||||||
|
+ if self.os_version:
|
||||||
|
self.__gen_html_manpages()
|
||||||
|
else:
|
||||||
|
print("SELinux HTML man pages can not be generated for this %s" % os_version)
|
||||||
|
@@ -201,7 +197,6 @@ class HTMLManPages:
|
||||||
|
def __gen_html_manpages(self):
|
||||||
|
self._write_html_manpage()
|
||||||
|
self._gen_index()
|
||||||
|
- self._gen_body()
|
||||||
|
self._gen_css()
|
||||||
|
|
||||||
|
def _write_html_manpage(self):
|
||||||
|
@@ -219,67 +214,21 @@ class HTMLManPages:
|
||||||
|
convert_manpage_to_html((self.new_path + r.rsplit("_selinux", 1)[0] + ".html"), self.old_path + r)
|
||||||
|
|
||||||
|
def _gen_index(self):
|
||||||
|
- index = self.old_path + "index.html"
|
||||||
|
- fd = open(index, 'w')
|
||||||
|
- fd.write("""
|
||||||
|
-<html>
|
||||||
|
-<head>
|
||||||
|
- <link rel=stylesheet type="text/css" href="style.css" title="style">
|
||||||
|
- <title>SELinux man pages online</title>
|
||||||
|
-</head>
|
||||||
|
-<body>
|
||||||
|
-<h1>SELinux man pages</h1>
|
||||||
|
-<br></br>
|
||||||
|
-Fedora or Red Hat Enterprise Linux Man Pages.</h2>
|
||||||
|
-<br></br>
|
||||||
|
-<hr>
|
||||||
|
-<h3>Fedora</h3>
|
||||||
|
-<table><tr>
|
||||||
|
-<td valign="middle">
|
||||||
|
-</td>
|
||||||
|
-</tr></table>
|
||||||
|
-<pre>
|
||||||
|
-""")
|
||||||
|
- for f in fedora_releases:
|
||||||
|
- fd.write("""
|
||||||
|
-<a href=%s/%s.html>%s</a> - SELinux man pages for %s """ % (f, f, f, f))
|
||||||
|
-
|
||||||
|
- fd.write("""
|
||||||
|
-</pre>
|
||||||
|
-<hr>
|
||||||
|
-<h3>RHEL</h3>
|
||||||
|
-<table><tr>
|
||||||
|
-<td valign="middle">
|
||||||
|
-</td>
|
||||||
|
-</tr></table>
|
||||||
|
-<pre>
|
||||||
|
-""")
|
||||||
|
- for r in rhel_releases:
|
||||||
|
- fd.write("""
|
||||||
|
-<a href=%s/%s.html>%s</a> - SELinux man pages for %s """ % (r, r, r, r))
|
||||||
|
-
|
||||||
|
- fd.write("""
|
||||||
|
-</pre>
|
||||||
|
- """)
|
||||||
|
- fd.close()
|
||||||
|
- print("%s has been created" % index)
|
||||||
|
-
|
||||||
|
- def _gen_body(self):
|
||||||
|
html = self.new_path + self.os_version + ".html"
|
||||||
|
fd = open(html, 'w')
|
||||||
|
fd.write("""
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
- <link rel=stylesheet type="text/css" href="../style.css" title="style">
|
||||||
|
- <title>Linux man-pages online for Fedora18</title>
|
||||||
|
+ <link rel=stylesheet type="text/css" href="style.css" title="style">
|
||||||
|
+ <title>SELinux man pages online</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
-<h1>SELinux man pages for Fedora18</h1>
|
||||||
|
+<h1>SELinux man pages for %s</h1>
|
||||||
|
<hr>
|
||||||
|
<table><tr>
|
||||||
|
<td valign="middle">
|
||||||
|
<h3>SELinux roles</h3>
|
||||||
|
-""")
|
||||||
|
+""" % self.os_version)
|
||||||
|
for letter in self.manpage_roles:
|
||||||
|
if len(self.manpage_roles[letter]):
|
||||||
|
fd.write("""
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
@ -0,0 +1,26 @@
|
|||||||
|
From f0f030495dddb2e633403f360fdaaf6951da11ad Mon Sep 17 00:00:00 2001
|
||||||
|
From: Miroslav Grepl <mgrepl@redhat.com>
|
||||||
|
Date: Fri, 20 Feb 2015 16:42:01 +0100
|
||||||
|
Subject: [PATCH] We want to remove the trailing newline for
|
||||||
|
/etc/system_release.
|
||||||
|
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/__init__.py | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/__init__.py b/python/sepolicy/sepolicy/__init__.py
|
||||||
|
index ad718797ca68..ea05d892bf3b 100644
|
||||||
|
--- a/python/sepolicy/sepolicy/__init__.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/__init__.py
|
||||||
|
@@ -1211,7 +1211,7 @@ def get_os_version():
|
||||||
|
system_release = ""
|
||||||
|
try:
|
||||||
|
with open('/etc/system-release') as f:
|
||||||
|
- system_release = f.readline()
|
||||||
|
+ system_release = f.readline().rstrip()
|
||||||
|
except IOError:
|
||||||
|
system_release = "Misc"
|
||||||
|
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
25
0012-Fix-title-in-manpage.py-to-not-contain-online.patch
Normal file
25
0012-Fix-title-in-manpage.py-to-not-contain-online.patch
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
From 4a18939d21c06d036f1063cbfd2d0b5ae9d0010f Mon Sep 17 00:00:00 2001
|
||||||
|
From: Miroslav Grepl <mgrepl@redhat.com>
|
||||||
|
Date: Fri, 20 Feb 2015 16:42:53 +0100
|
||||||
|
Subject: [PATCH] Fix title in manpage.py to not contain 'online'.
|
||||||
|
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/manpage.py | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
index acc77f368d95..4aeb3e2e51ba 100755
|
||||||
|
--- a/python/sepolicy/sepolicy/manpage.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
@@ -220,7 +220,7 @@ class HTMLManPages:
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<link rel=stylesheet type="text/css" href="style.css" title="style">
|
||||||
|
- <title>SELinux man pages online</title>
|
||||||
|
+ <title>SELinux man pages</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<h1>SELinux man pages for %s</h1>
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
24
0013-Don-t-be-verbose-if-you-are-not-on-a-tty.patch
Normal file
24
0013-Don-t-be-verbose-if-you-are-not-on-a-tty.patch
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
From ffe429b49874175f5ec1156e9c89e75cc67a0ddd Mon Sep 17 00:00:00 2001
|
||||||
|
From: Dan Walsh <dwalsh@redhat.com>
|
||||||
|
Date: Fri, 14 Feb 2014 12:32:12 -0500
|
||||||
|
Subject: [PATCH] Don't be verbose if you are not on a tty
|
||||||
|
|
||||||
|
---
|
||||||
|
policycoreutils/scripts/fixfiles | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/policycoreutils/scripts/fixfiles b/policycoreutils/scripts/fixfiles
|
||||||
|
index 30dadb4f4cb6..e73bb81c3336 100755
|
||||||
|
--- a/policycoreutils/scripts/fixfiles
|
||||||
|
+++ b/policycoreutils/scripts/fixfiles
|
||||||
|
@@ -108,6 +108,7 @@ exclude_dirs_from_relabelling() {
|
||||||
|
fullFlag=0
|
||||||
|
BOOTTIME=""
|
||||||
|
VERBOSE="-p"
|
||||||
|
+[ -t 1 ] || VERBOSE=""
|
||||||
|
FORCEFLAG=""
|
||||||
|
RPMFILES=""
|
||||||
|
PREFC=""
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
@ -0,0 +1,63 @@
|
|||||||
|
From 4a337405da16857dc2a979e4b4963a6fd7b975c6 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
Date: Mon, 27 Feb 2017 17:12:39 +0100
|
||||||
|
Subject: [PATCH] sepolicy: Drop old interface file_type_is_executable(f) and
|
||||||
|
file_type_is_entrypoint(f)
|
||||||
|
|
||||||
|
- use direct queries
|
||||||
|
- load exec_types and entry_types only once
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/manpage.py | 22 ++++++++++++++++++++--
|
||||||
|
1 file changed, 20 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
index 4aeb3e2e51ba..330b055af214 100755
|
||||||
|
--- a/python/sepolicy/sepolicy/manpage.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
@@ -125,8 +125,24 @@ def gen_domains():
|
||||||
|
domains.sort()
|
||||||
|
return domains
|
||||||
|
|
||||||
|
-types = None
|
||||||
|
|
||||||
|
+exec_types = None
|
||||||
|
+
|
||||||
|
+def _gen_exec_types():
|
||||||
|
+ global exec_types
|
||||||
|
+ if exec_types is None:
|
||||||
|
+ exec_types = next(sepolicy.info(sepolicy.ATTRIBUTE, "exec_type"))["types"]
|
||||||
|
+ return exec_types
|
||||||
|
+
|
||||||
|
+entry_types = None
|
||||||
|
+
|
||||||
|
+def _gen_entry_types():
|
||||||
|
+ global entry_types
|
||||||
|
+ if entry_types is None:
|
||||||
|
+ entry_types = next(sepolicy.info(sepolicy.ATTRIBUTE, "entry_type"))["types"]
|
||||||
|
+ return entry_types
|
||||||
|
+
|
||||||
|
+types = None
|
||||||
|
|
||||||
|
def _gen_types():
|
||||||
|
global types
|
||||||
|
@@ -372,6 +388,8 @@ class ManPage:
|
||||||
|
self.all_file_types = sepolicy.get_all_file_types()
|
||||||
|
self.role_allows = sepolicy.get_all_role_allows()
|
||||||
|
self.types = _gen_types()
|
||||||
|
+ self.exec_types = _gen_exec_types()
|
||||||
|
+ self.entry_types = _gen_entry_types()
|
||||||
|
|
||||||
|
if self.source_files:
|
||||||
|
self.fcpath = self.root + "file_contexts"
|
||||||
|
@@ -689,7 +707,7 @@ Default Defined Ports:""")
|
||||||
|
for f in self.all_file_types:
|
||||||
|
if f.startswith(self.domainname):
|
||||||
|
flist.append(f)
|
||||||
|
- if not file_type_is_executable(f) or not file_type_is_entrypoint(f):
|
||||||
|
+ if not f in self.exec_types or not f in self.entry_types:
|
||||||
|
flist_non_exec.append(f)
|
||||||
|
if f in self.fcdict:
|
||||||
|
mpaths = mpaths + self.fcdict[f]["regex"]
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
53
0015-sepolicy-Another-small-optimization-for-mcs-types.patch
Normal file
53
0015-sepolicy-Another-small-optimization-for-mcs-types.patch
Normal file
@ -0,0 +1,53 @@
|
|||||||
|
From 7c315fff5e7ce74b0598b62d9aa0b21ca6b06b6d Mon Sep 17 00:00:00 2001
|
||||||
|
From: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
Date: Tue, 28 Feb 2017 21:29:46 +0100
|
||||||
|
Subject: [PATCH] sepolicy: Another small optimization for mcs types
|
||||||
|
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/manpage.py | 16 +++++++++++-----
|
||||||
|
1 file changed, 11 insertions(+), 5 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
index 330b055af214..f8584436960d 100755
|
||||||
|
--- a/python/sepolicy/sepolicy/manpage.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
@@ -142,6 +142,15 @@ def _gen_entry_types():
|
||||||
|
entry_types = next(sepolicy.info(sepolicy.ATTRIBUTE, "entry_type"))["types"]
|
||||||
|
return entry_types
|
||||||
|
|
||||||
|
+mcs_constrained_types = None
|
||||||
|
+
|
||||||
|
+def _gen_mcs_constrained_types():
|
||||||
|
+ global mcs_constrained_types
|
||||||
|
+ if mcs_constrained_types is None:
|
||||||
|
+ mcs_constrained_types = next(sepolicy.info(sepolicy.ATTRIBUTE, "mcs_constrained_type"))
|
||||||
|
+ return mcs_constrained_types
|
||||||
|
+
|
||||||
|
+
|
||||||
|
types = None
|
||||||
|
|
||||||
|
def _gen_types():
|
||||||
|
@@ -390,6 +399,7 @@ class ManPage:
|
||||||
|
self.types = _gen_types()
|
||||||
|
self.exec_types = _gen_exec_types()
|
||||||
|
self.entry_types = _gen_entry_types()
|
||||||
|
+ self.mcs_constrained_types = _gen_mcs_constrained_types()
|
||||||
|
|
||||||
|
if self.source_files:
|
||||||
|
self.fcpath = self.root + "file_contexts"
|
||||||
|
@@ -944,11 +954,7 @@ All executables with the default executable label, usually stored in /usr/bin an
|
||||||
|
%s""" % ", ".join(paths))
|
||||||
|
|
||||||
|
def _mcs_types(self):
|
||||||
|
- try:
|
||||||
|
- mcs_constrained_type = next(sepolicy.info(sepolicy.ATTRIBUTE, "mcs_constrained_type"))
|
||||||
|
- except StopIteration:
|
||||||
|
- return
|
||||||
|
- if self.type not in mcs_constrained_type['types']:
|
||||||
|
+ if self.type not in self.mcs_constrained_types['types']:
|
||||||
|
return
|
||||||
|
self.fd.write ("""
|
||||||
|
.SH "MCS Constrained"
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
515
0016-Move-po-translation-files-into-the-right-sub-directo.patch
Normal file
515
0016-Move-po-translation-files-into-the-right-sub-directo.patch
Normal file
@ -0,0 +1,515 @@
|
|||||||
|
From a07e9652785c6196d916dfca3d36c898959406b4 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
Date: Mon, 6 Aug 2018 13:23:00 +0200
|
||||||
|
Subject: [PATCH] Move po/ translation files into the right sub-directories
|
||||||
|
|
||||||
|
When policycoreutils was split into policycoreutils/ python/ gui/ and sandbox/
|
||||||
|
sub-directories, po/ translation files stayed in policycoreutils/.
|
||||||
|
|
||||||
|
This commit split original policycoreutils/po directory into
|
||||||
|
policycoreutils/po
|
||||||
|
python/po
|
||||||
|
gui/po
|
||||||
|
sandbox/po
|
||||||
|
|
||||||
|
See https://github.com/fedora-selinux/selinux/issues/43
|
||||||
|
---
|
||||||
|
gui/Makefile | 3 ++
|
||||||
|
gui/po/Makefile | 82 ++++++++++++++++++++++++++++++++++++
|
||||||
|
gui/po/POTFILES | 17 ++++++++
|
||||||
|
policycoreutils/po/Makefile | 70 ++-----------------------------
|
||||||
|
policycoreutils/po/POTFILES | 9 ++++
|
||||||
|
python/Makefile | 2 +-
|
||||||
|
python/po/Makefile | 83 +++++++++++++++++++++++++++++++++++++
|
||||||
|
python/po/POTFILES | 10 +++++
|
||||||
|
sandbox/Makefile | 2 +
|
||||||
|
sandbox/po/Makefile | 82 ++++++++++++++++++++++++++++++++++++
|
||||||
|
sandbox/po/POTFILES | 1 +
|
||||||
|
11 files changed, 293 insertions(+), 68 deletions(-)
|
||||||
|
create mode 100644 gui/po/Makefile
|
||||||
|
create mode 100644 gui/po/POTFILES
|
||||||
|
create mode 100644 policycoreutils/po/POTFILES
|
||||||
|
create mode 100644 python/po/Makefile
|
||||||
|
create mode 100644 python/po/POTFILES
|
||||||
|
create mode 100644 sandbox/po/Makefile
|
||||||
|
create mode 100644 sandbox/po/POTFILES
|
||||||
|
|
||||||
|
diff --git a/gui/Makefile b/gui/Makefile
|
||||||
|
index ca965c942912..5a5bf6dcae19 100644
|
||||||
|
--- a/gui/Makefile
|
||||||
|
+++ b/gui/Makefile
|
||||||
|
@@ -22,6 +22,7 @@ system-config-selinux.ui \
|
||||||
|
usersPage.py
|
||||||
|
|
||||||
|
all: $(TARGETS) system-config-selinux.py polgengui.py
|
||||||
|
+ (cd po && $(MAKE) $@)
|
||||||
|
|
||||||
|
install: all
|
||||||
|
-mkdir -p $(DESTDIR)$(MANDIR)/man8
|
||||||
|
@@ -54,6 +55,8 @@ install: all
|
||||||
|
install -m 644 sepolicy_$${i}.png $(DESTDIR)$(DATADIR)/icons/hicolor/$${i}x$${i}/apps/sepolicy.png; \
|
||||||
|
done
|
||||||
|
install -m 644 org.selinux.config.policy $(DESTDIR)$(DATADIR)/polkit-1/actions/
|
||||||
|
+ (cd po && $(MAKE) $@)
|
||||||
|
+
|
||||||
|
clean:
|
||||||
|
|
||||||
|
indent:
|
||||||
|
diff --git a/gui/po/Makefile b/gui/po/Makefile
|
||||||
|
new file mode 100644
|
||||||
|
index 000000000000..a0f5439f2d1c
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/gui/po/Makefile
|
||||||
|
@@ -0,0 +1,82 @@
|
||||||
|
+#
|
||||||
|
+# Makefile for the PO files (translation) catalog
|
||||||
|
+#
|
||||||
|
+
|
||||||
|
+PREFIX ?= /usr
|
||||||
|
+
|
||||||
|
+# What is this package?
|
||||||
|
+NLSPACKAGE = gui
|
||||||
|
+POTFILE = $(NLSPACKAGE).pot
|
||||||
|
+INSTALL = /usr/bin/install -c -p
|
||||||
|
+INSTALL_DATA = $(INSTALL) -m 644
|
||||||
|
+INSTALL_DIR = /usr/bin/install -d
|
||||||
|
+
|
||||||
|
+# destination directory
|
||||||
|
+INSTALL_NLS_DIR = $(PREFIX)/share/locale
|
||||||
|
+
|
||||||
|
+# PO catalog handling
|
||||||
|
+MSGMERGE = msgmerge
|
||||||
|
+MSGMERGE_FLAGS = -q
|
||||||
|
+XGETTEXT = xgettext --default-domain=$(NLSPACKAGE)
|
||||||
|
+MSGFMT = msgfmt
|
||||||
|
+
|
||||||
|
+# All possible linguas
|
||||||
|
+PO_LINGUAS := $(sort $(patsubst %.po,%,$(wildcard *.po)))
|
||||||
|
+
|
||||||
|
+# Only the files matching what the user has set in LINGUAS
|
||||||
|
+USER_LINGUAS := $(filter $(patsubst %,%%,$(LINGUAS)),$(PO_LINGUAS))
|
||||||
|
+
|
||||||
|
+# if no valid LINGUAS, build all languages
|
||||||
|
+USE_LINGUAS := $(if $(USER_LINGUAS),$(USER_LINGUAS),$(PO_LINGUAS))
|
||||||
|
+
|
||||||
|
+POFILES = $(patsubst %,%.po,$(USE_LINGUAS))
|
||||||
|
+MOFILES = $(patsubst %.po,%.mo,$(POFILES))
|
||||||
|
+POTFILES = $(shell cat POTFILES)
|
||||||
|
+
|
||||||
|
+#default:: clean
|
||||||
|
+
|
||||||
|
+all:: $(MOFILES)
|
||||||
|
+
|
||||||
|
+$(POTFILE): $(POTFILES)
|
||||||
|
+ $(XGETTEXT) --keyword=_ --keyword=N_ $(POTFILES)
|
||||||
|
+ @if cmp -s $(NLSPACKAGE).po $(POTFILE); then \
|
||||||
|
+ rm -f $(NLSPACKAGE).po; \
|
||||||
|
+ else \
|
||||||
|
+ mv -f $(NLSPACKAGE).po $(POTFILE); \
|
||||||
|
+ fi; \
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+refresh-po: Makefile
|
||||||
|
+ for cat in $(POFILES); do \
|
||||||
|
+ lang=`basename $$cat .po`; \
|
||||||
|
+ if $(MSGMERGE) $(MSGMERGE_FLAGS) $$lang.po $(POTFILE) > $$lang.pot ; then \
|
||||||
|
+ mv -f $$lang.pot $$lang.po ; \
|
||||||
|
+ echo "$(MSGMERGE) of $$lang succeeded" ; \
|
||||||
|
+ else \
|
||||||
|
+ echo "$(MSGMERGE) of $$lang failed" ; \
|
||||||
|
+ rm -f $$lang.pot ; \
|
||||||
|
+ fi \
|
||||||
|
+ done
|
||||||
|
+
|
||||||
|
+clean:
|
||||||
|
+ @rm -fv *mo *~ .depend
|
||||||
|
+ @rm -rf tmp
|
||||||
|
+
|
||||||
|
+install: $(MOFILES)
|
||||||
|
+ @for n in $(MOFILES); do \
|
||||||
|
+ l=`basename $$n .mo`; \
|
||||||
|
+ $(INSTALL_DIR) $(DESTDIR)$(INSTALL_NLS_DIR)/$$l/LC_MESSAGES; \
|
||||||
|
+ $(INSTALL_DATA) --verbose $$n $(DESTDIR)$(INSTALL_NLS_DIR)/$$l/LC_MESSAGES/selinux-$(NLSPACKAGE).mo; \
|
||||||
|
+ done
|
||||||
|
+
|
||||||
|
+%.mo: %.po
|
||||||
|
+ $(MSGFMT) -o $@ $<
|
||||||
|
+report:
|
||||||
|
+ @for cat in $(wildcard *.po); do \
|
||||||
|
+ echo -n "$$cat: "; \
|
||||||
|
+ msgfmt -v --statistics -o /dev/null $$cat; \
|
||||||
|
+ done
|
||||||
|
+
|
||||||
|
+.PHONY: missing depend
|
||||||
|
+
|
||||||
|
+relabel:
|
||||||
|
diff --git a/gui/po/POTFILES b/gui/po/POTFILES
|
||||||
|
new file mode 100644
|
||||||
|
index 000000000000..1795c5c1951b
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/gui/po/POTFILES
|
||||||
|
@@ -0,0 +1,17 @@
|
||||||
|
+../booleansPage.py
|
||||||
|
+../domainsPage.py
|
||||||
|
+../fcontextPage.py
|
||||||
|
+../loginsPage.py
|
||||||
|
+../modulesPage.py
|
||||||
|
+../org.selinux.config.policy
|
||||||
|
+../polgengui.py
|
||||||
|
+../polgen.ui
|
||||||
|
+../portsPage.py
|
||||||
|
+../selinux-polgengui.desktop
|
||||||
|
+../semanagePage.py
|
||||||
|
+../sepolicy.desktop
|
||||||
|
+../statusPage.py
|
||||||
|
+../system-config-selinux.desktop
|
||||||
|
+../system-config-selinux.py
|
||||||
|
+../system-config-selinux.ui
|
||||||
|
+../usersPage.py
|
||||||
|
diff --git a/policycoreutils/po/Makefile b/policycoreutils/po/Makefile
|
||||||
|
index 575e143122e6..18bc1dff8d1f 100644
|
||||||
|
--- a/policycoreutils/po/Makefile
|
||||||
|
+++ b/policycoreutils/po/Makefile
|
||||||
|
@@ -3,7 +3,6 @@
|
||||||
|
#
|
||||||
|
|
||||||
|
PREFIX ?= /usr
|
||||||
|
-TOP = ../..
|
||||||
|
|
||||||
|
# What is this package?
|
||||||
|
NLSPACKAGE = policycoreutils
|
||||||
|
@@ -32,74 +31,13 @@ USE_LINGUAS := $(if $(USER_LINGUAS),$(USER_LINGUAS),$(PO_LINGUAS))
|
||||||
|
|
||||||
|
POFILES = $(patsubst %,%.po,$(USE_LINGUAS))
|
||||||
|
MOFILES = $(patsubst %.po,%.mo,$(POFILES))
|
||||||
|
-POTFILES = \
|
||||||
|
- ../run_init/open_init_pty.c \
|
||||||
|
- ../run_init/run_init.c \
|
||||||
|
- ../semodule_link/semodule_link.c \
|
||||||
|
- ../audit2allow/audit2allow \
|
||||||
|
- ../semanage/seobject.py \
|
||||||
|
- ../setsebool/setsebool.c \
|
||||||
|
- ../newrole/newrole.c \
|
||||||
|
- ../load_policy/load_policy.c \
|
||||||
|
- ../sestatus/sestatus.c \
|
||||||
|
- ../semodule/semodule.c \
|
||||||
|
- ../setfiles/setfiles.c \
|
||||||
|
- ../semodule_package/semodule_package.c \
|
||||||
|
- ../semodule_deps/semodule_deps.c \
|
||||||
|
- ../semodule_expand/semodule_expand.c \
|
||||||
|
- ../scripts/chcat \
|
||||||
|
- ../scripts/fixfiles \
|
||||||
|
- ../restorecond/stringslist.c \
|
||||||
|
- ../restorecond/restorecond.h \
|
||||||
|
- ../restorecond/utmpwatcher.h \
|
||||||
|
- ../restorecond/stringslist.h \
|
||||||
|
- ../restorecond/restorecond.c \
|
||||||
|
- ../restorecond/utmpwatcher.c \
|
||||||
|
- ../gui/booleansPage.py \
|
||||||
|
- ../gui/fcontextPage.py \
|
||||||
|
- ../gui/loginsPage.py \
|
||||||
|
- ../gui/mappingsPage.py \
|
||||||
|
- ../gui/modulesPage.py \
|
||||||
|
- ../gui/polgen.glade \
|
||||||
|
- ../gui/polgengui.py \
|
||||||
|
- ../gui/portsPage.py \
|
||||||
|
- ../gui/semanagePage.py \
|
||||||
|
- ../gui/statusPage.py \
|
||||||
|
- ../gui/system-config-selinux.glade \
|
||||||
|
- ../gui/system-config-selinux.py \
|
||||||
|
- ../gui/usersPage.py \
|
||||||
|
- ../secon/secon.c \
|
||||||
|
- booleans.py \
|
||||||
|
- ../sepolicy/sepolicy.py \
|
||||||
|
- ../sepolicy/sepolicy/communicate.py \
|
||||||
|
- ../sepolicy/sepolicy/__init__.py \
|
||||||
|
- ../sepolicy/sepolicy/network.py \
|
||||||
|
- ../sepolicy/sepolicy/generate.py \
|
||||||
|
- ../sepolicy/sepolicy/sepolicy.glade \
|
||||||
|
- ../sepolicy/sepolicy/gui.py \
|
||||||
|
- ../sepolicy/sepolicy/manpage.py \
|
||||||
|
- ../sepolicy/sepolicy/transition.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/executable.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/__init__.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/network.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/rw.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/script.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/semodule.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/tmp.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/user.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/var_lib.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/var_log.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/var_run.py \
|
||||||
|
- ../sepolicy/sepolicy/templates/var_spool.py
|
||||||
|
+POTFILES = $(shell cat POTFILES)
|
||||||
|
|
||||||
|
#default:: clean
|
||||||
|
|
||||||
|
-all:: $(MOFILES)
|
||||||
|
+all:: $(POTFILE) $(MOFILES)
|
||||||
|
|
||||||
|
-booleans.py:
|
||||||
|
- sepolicy booleans -a > booleans.py
|
||||||
|
-
|
||||||
|
-$(POTFILE): $(POTFILES) booleans.py
|
||||||
|
+$(POTFILE): $(POTFILES)
|
||||||
|
$(XGETTEXT) --keyword=_ --keyword=N_ $(POTFILES)
|
||||||
|
@if cmp -s $(NLSPACKAGE).po $(POTFILE); then \
|
||||||
|
rm -f $(NLSPACKAGE).po; \
|
||||||
|
@@ -107,8 +45,6 @@ $(POTFILE): $(POTFILES) booleans.py
|
||||||
|
mv -f $(NLSPACKAGE).po $(POTFILE); \
|
||||||
|
fi; \
|
||||||
|
|
||||||
|
-update-po: Makefile $(POTFILE) refresh-po
|
||||||
|
- @rm -f booleans.py
|
||||||
|
|
||||||
|
refresh-po: Makefile
|
||||||
|
for cat in $(POFILES); do \
|
||||||
|
diff --git a/policycoreutils/po/POTFILES b/policycoreutils/po/POTFILES
|
||||||
|
new file mode 100644
|
||||||
|
index 000000000000..12237dc61ee4
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/policycoreutils/po/POTFILES
|
||||||
|
@@ -0,0 +1,9 @@
|
||||||
|
+../run_init/open_init_pty.c
|
||||||
|
+../run_init/run_init.c
|
||||||
|
+../setsebool/setsebool.c
|
||||||
|
+../newrole/newrole.c
|
||||||
|
+../load_policy/load_policy.c
|
||||||
|
+../sestatus/sestatus.c
|
||||||
|
+../semodule/semodule.c
|
||||||
|
+../setfiles/setfiles.c
|
||||||
|
+../secon/secon.c
|
||||||
|
diff --git a/python/Makefile b/python/Makefile
|
||||||
|
index 9b66d52fbd4d..00312dbdb5c6 100644
|
||||||
|
--- a/python/Makefile
|
||||||
|
+++ b/python/Makefile
|
||||||
|
@@ -1,4 +1,4 @@
|
||||||
|
-SUBDIRS = sepolicy audit2allow semanage sepolgen chcat
|
||||||
|
+SUBDIRS = sepolicy audit2allow semanage sepolgen chcat po
|
||||||
|
|
||||||
|
all install relabel clean indent test:
|
||||||
|
@for subdir in $(SUBDIRS); do \
|
||||||
|
diff --git a/python/po/Makefile b/python/po/Makefile
|
||||||
|
new file mode 100644
|
||||||
|
index 000000000000..4e052d5a2bd7
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/python/po/Makefile
|
||||||
|
@@ -0,0 +1,83 @@
|
||||||
|
+#
|
||||||
|
+# Makefile for the PO files (translation) catalog
|
||||||
|
+#
|
||||||
|
+
|
||||||
|
+PREFIX ?= /usr
|
||||||
|
+
|
||||||
|
+# What is this package?
|
||||||
|
+NLSPACKAGE = python
|
||||||
|
+POTFILE = $(NLSPACKAGE).pot
|
||||||
|
+INSTALL = /usr/bin/install -c -p
|
||||||
|
+INSTALL_DATA = $(INSTALL) -m 644
|
||||||
|
+INSTALL_DIR = /usr/bin/install -d
|
||||||
|
+
|
||||||
|
+# destination directory
|
||||||
|
+INSTALL_NLS_DIR = $(PREFIX)/share/locale
|
||||||
|
+
|
||||||
|
+# PO catalog handling
|
||||||
|
+MSGMERGE = msgmerge
|
||||||
|
+MSGMERGE_FLAGS = -q
|
||||||
|
+XGETTEXT = xgettext --default-domain=$(NLSPACKAGE)
|
||||||
|
+MSGFMT = msgfmt
|
||||||
|
+
|
||||||
|
+# All possible linguas
|
||||||
|
+PO_LINGUAS := $(sort $(patsubst %.po,%,$(wildcard *.po)))
|
||||||
|
+
|
||||||
|
+# Only the files matching what the user has set in LINGUAS
|
||||||
|
+USER_LINGUAS := $(filter $(patsubst %,%%,$(LINGUAS)),$(PO_LINGUAS))
|
||||||
|
+
|
||||||
|
+# if no valid LINGUAS, build all languages
|
||||||
|
+USE_LINGUAS := $(if $(USER_LINGUAS),$(USER_LINGUAS),$(PO_LINGUAS))
|
||||||
|
+
|
||||||
|
+POFILES = $(patsubst %,%.po,$(USE_LINGUAS))
|
||||||
|
+MOFILES = $(patsubst %.po,%.mo,$(POFILES))
|
||||||
|
+POTFILES = $(shell cat POTFILES)
|
||||||
|
+
|
||||||
|
+#default:: clean
|
||||||
|
+
|
||||||
|
+all:: $(MOFILES)
|
||||||
|
+
|
||||||
|
+$(POTFILE): $(POTFILES)
|
||||||
|
+ $(XGETTEXT) -L Python --keyword=_ --keyword=N_ $(POTFILES)
|
||||||
|
+ $(XGETTEXT) -j --keyword=_ --keyword=N_ ../sepolicy/sepolicy/sepolicy.glade
|
||||||
|
+ @if cmp -s $(NLSPACKAGE).po $(POTFILE); then \
|
||||||
|
+ rm -f $(NLSPACKAGE).po; \
|
||||||
|
+ else \
|
||||||
|
+ mv -f $(NLSPACKAGE).po $(POTFILE); \
|
||||||
|
+ fi; \
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+refresh-po: Makefile
|
||||||
|
+ for cat in $(POFILES); do \
|
||||||
|
+ lang=`basename $$cat .po`; \
|
||||||
|
+ if $(MSGMERGE) $(MSGMERGE_FLAGS) $$lang.po $(POTFILE) > $$lang.pot ; then \
|
||||||
|
+ mv -f $$lang.pot $$lang.po ; \
|
||||||
|
+ echo "$(MSGMERGE) of $$lang succeeded" ; \
|
||||||
|
+ else \
|
||||||
|
+ echo "$(MSGMERGE) of $$lang failed" ; \
|
||||||
|
+ rm -f $$lang.pot ; \
|
||||||
|
+ fi \
|
||||||
|
+ done
|
||||||
|
+
|
||||||
|
+clean:
|
||||||
|
+ @rm -fv *mo *~ .depend
|
||||||
|
+ @rm -rf tmp
|
||||||
|
+
|
||||||
|
+install: $(MOFILES)
|
||||||
|
+ @for n in $(MOFILES); do \
|
||||||
|
+ l=`basename $$n .mo`; \
|
||||||
|
+ $(INSTALL_DIR) $(DESTDIR)$(INSTALL_NLS_DIR)/$$l/LC_MESSAGES; \
|
||||||
|
+ $(INSTALL_DATA) --verbose $$n $(DESTDIR)$(INSTALL_NLS_DIR)/$$l/LC_MESSAGES/selinux-$(NLSPACKAGE).mo; \
|
||||||
|
+ done
|
||||||
|
+
|
||||||
|
+%.mo: %.po
|
||||||
|
+ $(MSGFMT) -o $@ $<
|
||||||
|
+report:
|
||||||
|
+ @for cat in $(wildcard *.po); do \
|
||||||
|
+ echo -n "$$cat: "; \
|
||||||
|
+ msgfmt -v --statistics -o /dev/null $$cat; \
|
||||||
|
+ done
|
||||||
|
+
|
||||||
|
+.PHONY: missing depend
|
||||||
|
+
|
||||||
|
+relabel:
|
||||||
|
diff --git a/python/po/POTFILES b/python/po/POTFILES
|
||||||
|
new file mode 100644
|
||||||
|
index 000000000000..128eb870a69e
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/python/po/POTFILES
|
||||||
|
@@ -0,0 +1,10 @@
|
||||||
|
+../audit2allow/audit2allow
|
||||||
|
+../chcat/chcat
|
||||||
|
+../semanage/semanage
|
||||||
|
+../semanage/seobject.py
|
||||||
|
+../sepolgen/src/sepolgen/interfaces.py
|
||||||
|
+../sepolicy/sepolicy/generate.py
|
||||||
|
+../sepolicy/sepolicy/gui.py
|
||||||
|
+../sepolicy/sepolicy/__init__.py
|
||||||
|
+../sepolicy/sepolicy/interface.py
|
||||||
|
+../sepolicy/sepolicy.py
|
||||||
|
diff --git a/sandbox/Makefile b/sandbox/Makefile
|
||||||
|
index 9da5e58db9e6..b817824e2102 100644
|
||||||
|
--- a/sandbox/Makefile
|
||||||
|
+++ b/sandbox/Makefile
|
||||||
|
@@ -13,6 +13,7 @@ override LDLIBS += -lselinux -lcap-ng
|
||||||
|
SEUNSHARE_OBJS = seunshare.o
|
||||||
|
|
||||||
|
all: sandbox seunshare sandboxX.sh start
|
||||||
|
+ (cd po && $(MAKE) $@)
|
||||||
|
|
||||||
|
seunshare: $(SEUNSHARE_OBJS)
|
||||||
|
|
||||||
|
@@ -39,6 +40,7 @@ install: all
|
||||||
|
install -m 755 start $(DESTDIR)$(SHAREDIR)
|
||||||
|
-mkdir -p $(DESTDIR)$(SYSCONFDIR)
|
||||||
|
install -m 644 sandbox.conf $(DESTDIR)$(SYSCONFDIR)/sandbox
|
||||||
|
+ (cd po && $(MAKE) $@)
|
||||||
|
|
||||||
|
test:
|
||||||
|
@$(PYTHON) test_sandbox.py -v
|
||||||
|
diff --git a/sandbox/po/Makefile b/sandbox/po/Makefile
|
||||||
|
new file mode 100644
|
||||||
|
index 000000000000..0556bbe953f0
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/sandbox/po/Makefile
|
||||||
|
@@ -0,0 +1,82 @@
|
||||||
|
+#
|
||||||
|
+# Makefile for the PO files (translation) catalog
|
||||||
|
+#
|
||||||
|
+
|
||||||
|
+PREFIX ?= /usr
|
||||||
|
+
|
||||||
|
+# What is this package?
|
||||||
|
+NLSPACKAGE = sandbox
|
||||||
|
+POTFILE = $(NLSPACKAGE).pot
|
||||||
|
+INSTALL = /usr/bin/install -c -p
|
||||||
|
+INSTALL_DATA = $(INSTALL) -m 644
|
||||||
|
+INSTALL_DIR = /usr/bin/install -d
|
||||||
|
+
|
||||||
|
+# destination directory
|
||||||
|
+INSTALL_NLS_DIR = $(PREFIX)/share/locale
|
||||||
|
+
|
||||||
|
+# PO catalog handling
|
||||||
|
+MSGMERGE = msgmerge
|
||||||
|
+MSGMERGE_FLAGS = -q
|
||||||
|
+XGETTEXT = xgettext -L Python --default-domain=$(NLSPACKAGE)
|
||||||
|
+MSGFMT = msgfmt
|
||||||
|
+
|
||||||
|
+# All possible linguas
|
||||||
|
+PO_LINGUAS := $(sort $(patsubst %.po,%,$(wildcard *.po)))
|
||||||
|
+
|
||||||
|
+# Only the files matching what the user has set in LINGUAS
|
||||||
|
+USER_LINGUAS := $(filter $(patsubst %,%%,$(LINGUAS)),$(PO_LINGUAS))
|
||||||
|
+
|
||||||
|
+# if no valid LINGUAS, build all languages
|
||||||
|
+USE_LINGUAS := $(if $(USER_LINGUAS),$(USER_LINGUAS),$(PO_LINGUAS))
|
||||||
|
+
|
||||||
|
+POFILES = $(patsubst %,%.po,$(USE_LINGUAS))
|
||||||
|
+MOFILES = $(patsubst %.po,%.mo,$(POFILES))
|
||||||
|
+POTFILES = $(shell cat POTFILES)
|
||||||
|
+
|
||||||
|
+#default:: clean
|
||||||
|
+
|
||||||
|
+all:: $(POTFILE) $(MOFILES)
|
||||||
|
+
|
||||||
|
+$(POTFILE): $(POTFILES)
|
||||||
|
+ $(XGETTEXT) --keyword=_ --keyword=N_ $(POTFILES)
|
||||||
|
+ @if cmp -s $(NLSPACKAGE).po $(POTFILE); then \
|
||||||
|
+ rm -f $(NLSPACKAGE).po; \
|
||||||
|
+ else \
|
||||||
|
+ mv -f $(NLSPACKAGE).po $(POTFILE); \
|
||||||
|
+ fi; \
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+refresh-po: Makefile
|
||||||
|
+ for cat in $(POFILES); do \
|
||||||
|
+ lang=`basename $$cat .po`; \
|
||||||
|
+ if $(MSGMERGE) $(MSGMERGE_FLAGS) $$lang.po $(POTFILE) > $$lang.pot ; then \
|
||||||
|
+ mv -f $$lang.pot $$lang.po ; \
|
||||||
|
+ echo "$(MSGMERGE) of $$lang succeeded" ; \
|
||||||
|
+ else \
|
||||||
|
+ echo "$(MSGMERGE) of $$lang failed" ; \
|
||||||
|
+ rm -f $$lang.pot ; \
|
||||||
|
+ fi \
|
||||||
|
+ done
|
||||||
|
+
|
||||||
|
+clean:
|
||||||
|
+ @rm -fv *mo *~ .depend
|
||||||
|
+ @rm -rf tmp
|
||||||
|
+
|
||||||
|
+install: $(MOFILES)
|
||||||
|
+ @for n in $(MOFILES); do \
|
||||||
|
+ l=`basename $$n .mo`; \
|
||||||
|
+ $(INSTALL_DIR) $(DESTDIR)$(INSTALL_NLS_DIR)/$$l/LC_MESSAGES; \
|
||||||
|
+ $(INSTALL_DATA) --verbose $$n $(DESTDIR)$(INSTALL_NLS_DIR)/$$l/LC_MESSAGES/selinux-$(NLSPACKAGE).mo; \
|
||||||
|
+ done
|
||||||
|
+
|
||||||
|
+%.mo: %.po
|
||||||
|
+ $(MSGFMT) -o $@ $<
|
||||||
|
+report:
|
||||||
|
+ @for cat in $(wildcard *.po); do \
|
||||||
|
+ echo -n "$$cat: "; \
|
||||||
|
+ msgfmt -v --statistics -o /dev/null $$cat; \
|
||||||
|
+ done
|
||||||
|
+
|
||||||
|
+.PHONY: missing depend
|
||||||
|
+
|
||||||
|
+relabel:
|
||||||
|
diff --git a/sandbox/po/POTFILES b/sandbox/po/POTFILES
|
||||||
|
new file mode 100644
|
||||||
|
index 000000000000..deff3f2f4656
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/sandbox/po/POTFILES
|
||||||
|
@@ -0,0 +1 @@
|
||||||
|
+../sandbox
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
306
0017-Use-correct-gettext-domains-in-python-gui-sandbox.patch
Normal file
306
0017-Use-correct-gettext-domains-in-python-gui-sandbox.patch
Normal file
@ -0,0 +1,306 @@
|
|||||||
|
From eab0fc05a38ab2cd47b3e0ff69981850cc7cd538 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
Date: Mon, 6 Aug 2018 13:37:07 +0200
|
||||||
|
Subject: [PATCH] Use correct gettext domains in python/ gui/ sandbox/
|
||||||
|
|
||||||
|
https://github.com/fedora-selinux/selinux/issues/43
|
||||||
|
---
|
||||||
|
gui/booleansPage.py | 2 +-
|
||||||
|
gui/domainsPage.py | 2 +-
|
||||||
|
gui/fcontextPage.py | 2 +-
|
||||||
|
gui/loginsPage.py | 2 +-
|
||||||
|
gui/modulesPage.py | 2 +-
|
||||||
|
gui/polgengui.py | 2 +-
|
||||||
|
gui/portsPage.py | 2 +-
|
||||||
|
gui/semanagePage.py | 2 +-
|
||||||
|
gui/statusPage.py | 2 +-
|
||||||
|
gui/system-config-selinux.py | 2 +-
|
||||||
|
gui/usersPage.py | 2 +-
|
||||||
|
python/chcat/chcat | 2 +-
|
||||||
|
python/semanage/semanage | 2 +-
|
||||||
|
python/semanage/seobject.py | 2 +-
|
||||||
|
python/sepolgen/src/sepolgen/sepolgeni18n.py | 2 +-
|
||||||
|
python/sepolicy/sepolicy.py | 2 +-
|
||||||
|
python/sepolicy/sepolicy/__init__.py | 2 +-
|
||||||
|
python/sepolicy/sepolicy/generate.py | 2 +-
|
||||||
|
python/sepolicy/sepolicy/gui.py | 2 +-
|
||||||
|
python/sepolicy/sepolicy/interface.py | 2 +-
|
||||||
|
sandbox/sandbox | 2 +-
|
||||||
|
21 files changed, 21 insertions(+), 21 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/gui/booleansPage.py b/gui/booleansPage.py
|
||||||
|
index 7849bea26a06..dd12b6d6ab86 100644
|
||||||
|
--- a/gui/booleansPage.py
|
||||||
|
+++ b/gui/booleansPage.py
|
||||||
|
@@ -38,7 +38,7 @@ DISABLED = 2
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/domainsPage.py b/gui/domainsPage.py
|
||||||
|
index bad5140d8c59..6bbe4de5884f 100644
|
||||||
|
--- a/gui/domainsPage.py
|
||||||
|
+++ b/gui/domainsPage.py
|
||||||
|
@@ -30,7 +30,7 @@ from semanagePage import *
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/fcontextPage.py b/gui/fcontextPage.py
|
||||||
|
index 370bbee40786..e424366da26f 100644
|
||||||
|
--- a/gui/fcontextPage.py
|
||||||
|
+++ b/gui/fcontextPage.py
|
||||||
|
@@ -47,7 +47,7 @@ class context:
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/loginsPage.py b/gui/loginsPage.py
|
||||||
|
index b67eb8bc42af..cbfb0cc23f65 100644
|
||||||
|
--- a/gui/loginsPage.py
|
||||||
|
+++ b/gui/loginsPage.py
|
||||||
|
@@ -29,7 +29,7 @@ from semanagePage import *
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/modulesPage.py b/gui/modulesPage.py
|
||||||
|
index 0584acf9b3a4..35a0129bab9c 100644
|
||||||
|
--- a/gui/modulesPage.py
|
||||||
|
+++ b/gui/modulesPage.py
|
||||||
|
@@ -30,7 +30,7 @@ from semanagePage import *
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/polgengui.py b/gui/polgengui.py
|
||||||
|
index d284ded65279..01f541bafae8 100644
|
||||||
|
--- a/gui/polgengui.py
|
||||||
|
+++ b/gui/polgengui.py
|
||||||
|
@@ -63,7 +63,7 @@ def get_all_modules():
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/portsPage.py b/gui/portsPage.py
|
||||||
|
index 30f58383bc1d..a537ecc8c0a1 100644
|
||||||
|
--- a/gui/portsPage.py
|
||||||
|
+++ b/gui/portsPage.py
|
||||||
|
@@ -35,7 +35,7 @@ from semanagePage import *
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/semanagePage.py b/gui/semanagePage.py
|
||||||
|
index 4127804fbbee..5361d69c1313 100644
|
||||||
|
--- a/gui/semanagePage.py
|
||||||
|
+++ b/gui/semanagePage.py
|
||||||
|
@@ -22,7 +22,7 @@ from gi.repository import Gdk, Gtk
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/statusPage.py b/gui/statusPage.py
|
||||||
|
index 766854b19cba..a8f079b9b163 100644
|
||||||
|
--- a/gui/statusPage.py
|
||||||
|
+++ b/gui/statusPage.py
|
||||||
|
@@ -35,7 +35,7 @@ RELABELFILE = "/.autorelabel"
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/system-config-selinux.py b/gui/system-config-selinux.py
|
||||||
|
index 3f70122b87e8..8c46c987b974 100644
|
||||||
|
--- a/gui/system-config-selinux.py
|
||||||
|
+++ b/gui/system-config-selinux.py
|
||||||
|
@@ -45,7 +45,7 @@ import selinux
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/gui/usersPage.py b/gui/usersPage.py
|
||||||
|
index 26794ed5c3f3..d15d4c5a71dd 100644
|
||||||
|
--- a/gui/usersPage.py
|
||||||
|
+++ b/gui/usersPage.py
|
||||||
|
@@ -29,7 +29,7 @@ from semanagePage import *
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-gui"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/python/chcat/chcat b/python/chcat/chcat
|
||||||
|
index fdd2e46ee3f9..839ddd3b54b6 100755
|
||||||
|
--- a/python/chcat/chcat
|
||||||
|
+++ b/python/chcat/chcat
|
||||||
|
@@ -30,7 +30,7 @@ import getopt
|
||||||
|
import selinux
|
||||||
|
import seobject
|
||||||
|
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-python"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/python/semanage/semanage b/python/semanage/semanage
|
||||||
|
index b2fabea67a87..3cc30a160a74 100644
|
||||||
|
--- a/python/semanage/semanage
|
||||||
|
+++ b/python/semanage/semanage
|
||||||
|
@@ -27,7 +27,7 @@ import traceback
|
||||||
|
import argparse
|
||||||
|
import seobject
|
||||||
|
import sys
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-python"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/python/semanage/seobject.py b/python/semanage/seobject.py
|
||||||
|
index 6a14f7b47dd5..b51a7e3e7ca3 100644
|
||||||
|
--- a/python/semanage/seobject.py
|
||||||
|
+++ b/python/semanage/seobject.py
|
||||||
|
@@ -29,7 +29,7 @@ import sys
|
||||||
|
import stat
|
||||||
|
import socket
|
||||||
|
from semanage import *
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-python"
|
||||||
|
import sepolicy
|
||||||
|
import setools
|
||||||
|
import ipaddress
|
||||||
|
diff --git a/python/sepolgen/src/sepolgen/sepolgeni18n.py b/python/sepolgen/src/sepolgen/sepolgeni18n.py
|
||||||
|
index 998c4356415c..56ebd807c69c 100644
|
||||||
|
--- a/python/sepolgen/src/sepolgen/sepolgeni18n.py
|
||||||
|
+++ b/python/sepolgen/src/sepolgen/sepolgeni18n.py
|
||||||
|
@@ -19,7 +19,7 @@
|
||||||
|
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
- t = gettext.translation( 'yumex' )
|
||||||
|
+ t = gettext.translation( 'selinux-python' )
|
||||||
|
_ = t.gettext
|
||||||
|
except:
|
||||||
|
def _(str):
|
||||||
|
diff --git a/python/sepolicy/sepolicy.py b/python/sepolicy/sepolicy.py
|
||||||
|
index 7b2230651099..32956e58f52e 100755
|
||||||
|
--- a/python/sepolicy/sepolicy.py
|
||||||
|
+++ b/python/sepolicy/sepolicy.py
|
||||||
|
@@ -28,7 +28,7 @@ import sepolicy
|
||||||
|
from multiprocessing import Pool
|
||||||
|
from sepolicy import get_os_version, get_conditionals, get_conditionals_format_text
|
||||||
|
import argparse
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-python"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/python/sepolicy/sepolicy/__init__.py b/python/sepolicy/sepolicy/__init__.py
|
||||||
|
index ea05d892bf3b..9a9c2ae9f237 100644
|
||||||
|
--- a/python/sepolicy/sepolicy/__init__.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/__init__.py
|
||||||
|
@@ -13,7 +13,7 @@ import os
|
||||||
|
import re
|
||||||
|
import gzip
|
||||||
|
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-python"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/python/sepolicy/sepolicy/generate.py b/python/sepolicy/sepolicy/generate.py
|
||||||
|
index 4e1ed4e9dc31..43180ca6fda4 100644
|
||||||
|
--- a/python/sepolicy/sepolicy/generate.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/generate.py
|
||||||
|
@@ -48,7 +48,7 @@ import sepolgen.defaults as defaults
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-python"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/python/sepolicy/sepolicy/gui.py b/python/sepolicy/sepolicy/gui.py
|
||||||
|
index 1e86422b864a..c9ca158ddd09 100644
|
||||||
|
--- a/python/sepolicy/sepolicy/gui.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/gui.py
|
||||||
|
@@ -41,7 +41,7 @@ import os
|
||||||
|
import re
|
||||||
|
import unicodedata
|
||||||
|
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-python"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/python/sepolicy/sepolicy/interface.py b/python/sepolicy/sepolicy/interface.py
|
||||||
|
index bdffb770f364..9d40aea1498d 100644
|
||||||
|
--- a/python/sepolicy/sepolicy/interface.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/interface.py
|
||||||
|
@@ -30,7 +30,7 @@ __all__ = ['get_all_interfaces', 'get_interfaces_from_xml', 'get_admin', 'get_us
|
||||||
|
##
|
||||||
|
## I18N
|
||||||
|
##
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-python"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
diff --git a/sandbox/sandbox b/sandbox/sandbox
|
||||||
|
index ca5f1e030a51..16c43b51eaaa 100644
|
||||||
|
--- a/sandbox/sandbox
|
||||||
|
+++ b/sandbox/sandbox
|
||||||
|
@@ -37,7 +37,7 @@ import sepolicy
|
||||||
|
|
||||||
|
SEUNSHARE = "/usr/sbin/seunshare"
|
||||||
|
SANDBOXSH = "/usr/share/sandbox/sandboxX.sh"
|
||||||
|
-PROGNAME = "policycoreutils"
|
||||||
|
+PROGNAME = "selinux-sandbox"
|
||||||
|
try:
|
||||||
|
import gettext
|
||||||
|
kwargs = {}
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
4532
0018-Initial-.pot-files-for-gui-python-sandbox.patch
Normal file
4532
0018-Initial-.pot-files-for-gui-python-sandbox.patch
Normal file
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,30 @@
|
|||||||
|
From 4277ef04de699e1939c95c4813de6a78d1ea1656 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Vit Mojzis <vmojzis@redhat.com>
|
||||||
|
Date: Wed, 21 Mar 2018 08:51:31 +0100
|
||||||
|
Subject: [PATCH] policycoreutils/setfiles: Improve description of -d switch
|
||||||
|
|
||||||
|
The "-q" switch is becoming obsolete (completely unused in fedora) and
|
||||||
|
debug output ("-d" switch) makes sense in any scenario. Therefore both
|
||||||
|
options can be specified at once.
|
||||||
|
|
||||||
|
Resolves: rhbz#1271327
|
||||||
|
---
|
||||||
|
policycoreutils/setfiles/setfiles.8 | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/policycoreutils/setfiles/setfiles.8 b/policycoreutils/setfiles/setfiles.8
|
||||||
|
index e328a5628682..02e0960289d3 100644
|
||||||
|
--- a/policycoreutils/setfiles/setfiles.8
|
||||||
|
+++ b/policycoreutils/setfiles/setfiles.8
|
||||||
|
@@ -58,7 +58,7 @@ check the validity of the contexts against the specified binary policy.
|
||||||
|
.TP
|
||||||
|
.B \-d
|
||||||
|
show what specification matched each file (do not abort validation
|
||||||
|
-after ABORT_ON_ERRORS errors).
|
||||||
|
+after ABORT_ON_ERRORS errors). Not affected by "\-q"
|
||||||
|
.TP
|
||||||
|
.BI \-e \ directory
|
||||||
|
directory to exclude (repeat option for more than one directory).
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
71
0020-sepolicy-generate-Handle-more-reserved-port-types.patch
Normal file
71
0020-sepolicy-generate-Handle-more-reserved-port-types.patch
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
From fa94b0faf12a79158d971f363e8ec65227d67de3 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Masatake YAMATO <yamato@redhat.com>
|
||||||
|
Date: Thu, 14 Dec 2017 15:57:58 +0900
|
||||||
|
Subject: [PATCH] sepolicy-generate: Handle more reserved port types
|
||||||
|
|
||||||
|
Currently only reserved_port_t, port_t and hi_reserved_port_t are
|
||||||
|
handled as special when making a ports-dictionary. However, as fas as
|
||||||
|
corenetwork.te.in of serefpolicy, unreserved_port_t and
|
||||||
|
ephemeral_port_t should be handled in the same way, too.
|
||||||
|
|
||||||
|
(Details) I found the need of this change when I was using
|
||||||
|
selinux-polgengui. Though tcp port 12345, which my application may
|
||||||
|
use, was given to the gui, selinux-polgengui generates expected te
|
||||||
|
file and sh file which didn't utilize the tcp port.
|
||||||
|
|
||||||
|
selinux-polgengui checks whether a port given via gui is already typed
|
||||||
|
or not.
|
||||||
|
|
||||||
|
If it is already typed, selinux-polgengui generates a te file having
|
||||||
|
rules to allow the application to use the port. (A)
|
||||||
|
|
||||||
|
If not, it seems for me that selinux-polgengui is designed to generate
|
||||||
|
a te file having rules to allow the application to own(?) the port;
|
||||||
|
and a sh file having a command line to assign the application own type
|
||||||
|
to the port. (B)
|
||||||
|
|
||||||
|
As we can see the output of `semanage port -l' some of ports for
|
||||||
|
specified purpose have types already. The important point is that the
|
||||||
|
rest of ports also have types already:
|
||||||
|
|
||||||
|
hi_reserved_port_t tcp 512-1023
|
||||||
|
hi_reserved_port_t udp 512-1023
|
||||||
|
unreserved_port_t tcp 1024-32767, 61001-65535
|
||||||
|
unreserved_port_t udp 1024-32767, 61001-65535
|
||||||
|
ephemeral_port_t tcp 32768-61000
|
||||||
|
ephemeral_port_t udp 32768-61000
|
||||||
|
|
||||||
|
As my patch shows, the original selinux-polgengui ignored
|
||||||
|
hi_reserved_port_t; though hi_reserved_port_t is assigned,
|
||||||
|
selinux-polgengui considered ports 512-1023 are not used. As the
|
||||||
|
result selinux-polgengui generates file sets of (B).
|
||||||
|
|
||||||
|
For the purpose of selinux-polgengui, I think unreserved_port_t and
|
||||||
|
ephemeral_port_t are treated as the same as hi_reserved_port_t.
|
||||||
|
|
||||||
|
Signed-off-by: Masatake YAMATO <yamato@redhat.com>
|
||||||
|
|
||||||
|
Fedora only patch:
|
||||||
|
https://lore.kernel.org/selinux/20150610.190635.1866127952891120915.yamato@redhat.com/
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/generate.py | 4 +++-
|
||||||
|
1 file changed, 3 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/generate.py b/python/sepolicy/sepolicy/generate.py
|
||||||
|
index 43180ca6fda4..d60a08e1d72c 100644
|
||||||
|
--- a/python/sepolicy/sepolicy/generate.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/generate.py
|
||||||
|
@@ -99,7 +99,9 @@ def get_all_ports():
|
||||||
|
for p in sepolicy.info(sepolicy.PORT):
|
||||||
|
if p['type'] == "reserved_port_t" or \
|
||||||
|
p['type'] == "port_t" or \
|
||||||
|
- p['type'] == "hi_reserved_port_t":
|
||||||
|
+ p['type'] == "hi_reserved_port_t" or \
|
||||||
|
+ p['type'] == "ephemeral_port_t" or \
|
||||||
|
+ p['type'] == "unreserved_port_t":
|
||||||
|
continue
|
||||||
|
dict[(p['low'], p['high'], p['protocol'])] = (p['type'], p.get('range'))
|
||||||
|
return dict
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
@ -0,0 +1,24 @@
|
|||||||
|
From 122e35c4d11b5b623e8bc463f81c6792385523cb Mon Sep 17 00:00:00 2001
|
||||||
|
From: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
Date: Thu, 8 Nov 2018 09:20:58 +0100
|
||||||
|
Subject: [PATCH] semodule-utils: Fix RESOURCE_LEAK coverity scan defects
|
||||||
|
|
||||||
|
---
|
||||||
|
semodule-utils/semodule_package/semodule_package.c | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/semodule-utils/semodule_package/semodule_package.c b/semodule-utils/semodule_package/semodule_package.c
|
||||||
|
index 3515234e36de..7b75b3fd9bb4 100644
|
||||||
|
--- a/semodule-utils/semodule_package/semodule_package.c
|
||||||
|
+++ b/semodule-utils/semodule_package/semodule_package.c
|
||||||
|
@@ -74,6 +74,7 @@ static int file_to_data(const char *path, char **data, size_t * len)
|
||||||
|
}
|
||||||
|
if (!sb.st_size) {
|
||||||
|
*len = 0;
|
||||||
|
+ close(fd);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
@ -0,0 +1,74 @@
|
|||||||
|
From e63814eb18bdbb48a7e6bf79b17d79d6a9ca56d6 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
Date: Wed, 18 Jul 2018 09:09:35 +0200
|
||||||
|
Subject: [PATCH] sandbox: Use matchbox-window-manager instead of openbox
|
||||||
|
|
||||||
|
---
|
||||||
|
sandbox/sandbox | 4 ++--
|
||||||
|
sandbox/sandbox.8 | 2 +-
|
||||||
|
sandbox/sandboxX.sh | 14 --------------
|
||||||
|
3 files changed, 3 insertions(+), 17 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/sandbox/sandbox b/sandbox/sandbox
|
||||||
|
index 16c43b51eaaa..7709a6585665 100644
|
||||||
|
--- a/sandbox/sandbox
|
||||||
|
+++ b/sandbox/sandbox
|
||||||
|
@@ -268,7 +268,7 @@ class Sandbox:
|
||||||
|
copyfile(f, "/tmp", self.__tmpdir)
|
||||||
|
copyfile(f, "/var/tmp", self.__tmpdir)
|
||||||
|
|
||||||
|
- def __setup_sandboxrc(self, wm="/usr/bin/openbox"):
|
||||||
|
+ def __setup_sandboxrc(self, wm="/usr/bin/matchbox-window-manager"):
|
||||||
|
execfile = self.__homedir + "/.sandboxrc"
|
||||||
|
fd = open(execfile, "w+")
|
||||||
|
if self.__options.session:
|
||||||
|
@@ -362,7 +362,7 @@ sandbox [-h] [-l level ] [-[X|M] [-H homedir] [-T tempdir]] [-I includefile ] [-
|
||||||
|
|
||||||
|
parser.add_option("-W", "--windowmanager", dest="wm",
|
||||||
|
type="string",
|
||||||
|
- default="/usr/bin/openbox",
|
||||||
|
+ default="/usr/bin/matchbox-window-manager",
|
||||||
|
help=_("alternate window manager"))
|
||||||
|
|
||||||
|
parser.add_option("-l", "--level", dest="level",
|
||||||
|
diff --git a/sandbox/sandbox.8 b/sandbox/sandbox.8
|
||||||
|
index d83fee76f335..90ef4951c8c2 100644
|
||||||
|
--- a/sandbox/sandbox.8
|
||||||
|
+++ b/sandbox/sandbox.8
|
||||||
|
@@ -77,7 +77,7 @@ Specifies the windowsize when creating an X based Sandbox. The default windowsiz
|
||||||
|
\fB\-W\fR \fB\-\-windowmanager\fR
|
||||||
|
Select alternative window manager to run within
|
||||||
|
.B sandbox \-X.
|
||||||
|
-Default to /usr/bin/openbox.
|
||||||
|
+Default to /usr/bin/matchbox-window-manager.
|
||||||
|
.TP
|
||||||
|
\fB\-X\fR
|
||||||
|
Create an X based Sandbox for gui apps, temporary files for
|
||||||
|
diff --git a/sandbox/sandboxX.sh b/sandbox/sandboxX.sh
|
||||||
|
index 4774528027ef..c211ebc14549 100644
|
||||||
|
--- a/sandbox/sandboxX.sh
|
||||||
|
+++ b/sandbox/sandboxX.sh
|
||||||
|
@@ -6,20 +6,6 @@ export TITLE="Sandbox $context -- `grep ^#TITLE: ~/.sandboxrc | /usr/bin/cut -b8
|
||||||
|
[ -z $2 ] && export DPI="96" || export DPI="$2"
|
||||||
|
trap "exit 0" HUP
|
||||||
|
|
||||||
|
-mkdir -p ~/.config/openbox
|
||||||
|
-cat > ~/.config/openbox/rc.xml << EOF
|
||||||
|
-<openbox_config xmlns="http://openbox.org/3.4/rc"
|
||||||
|
- xmlns:xi="http://www.w3.org/2001/XInclude">
|
||||||
|
-<applications>
|
||||||
|
- <application class="*">
|
||||||
|
- <decor>no</decor>
|
||||||
|
- <desktop>all</desktop>
|
||||||
|
- <maximized>yes</maximized>
|
||||||
|
- </application>
|
||||||
|
-</applications>
|
||||||
|
-</openbox_config>
|
||||||
|
-EOF
|
||||||
|
-
|
||||||
|
(/usr/bin/Xephyr -resizeable -title "$TITLE" -terminate -reset -screen $SCREENSIZE -dpi $DPI -nolisten tcp -displayfd 5 5>&1 2>/dev/null) | while read D; do
|
||||||
|
export DISPLAY=:$D
|
||||||
|
cat > ~/seremote << __EOF
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
46
0023-sepolicy-Fix-flake8-warnings-in-Fedora-only-code.patch
Normal file
46
0023-sepolicy-Fix-flake8-warnings-in-Fedora-only-code.patch
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
From b1f380c75f8a4ea7a4062d3735d190a1dcbc3aaa Mon Sep 17 00:00:00 2001
|
||||||
|
From: Ondrej Mosnacek <omosnace@redhat.com>
|
||||||
|
Date: Tue, 28 Jul 2020 14:37:13 +0200
|
||||||
|
Subject: [PATCH] sepolicy: Fix flake8 warnings in Fedora-only code
|
||||||
|
|
||||||
|
Fixes:
|
||||||
|
$ PATH="$VIRTUAL_ENV/bin:$PATH" ./scripts/run-flake8
|
||||||
|
Analyzing 187 Python scripts
|
||||||
|
./installdir/usr/lib/python3.8/site-packages/sepolicy/manpage.py:720:20: E713 test for membership should be 'not in'
|
||||||
|
./installdir/usr/lib/python3.8/site-packages/sepolicy/manpage.py:774:17: E117 over-indented
|
||||||
|
./python/sepolicy/build/lib/sepolicy/manpage.py:720:20: E713 test for membership should be 'not in'
|
||||||
|
./python/sepolicy/build/lib/sepolicy/manpage.py:774:17: E117 over-indented
|
||||||
|
./python/sepolicy/sepolicy/manpage.py:720:20: E713 test for membership should be 'not in'
|
||||||
|
./python/sepolicy/sepolicy/manpage.py:774:17: E117 over-indented
|
||||||
|
The command "PATH="$VIRTUAL_ENV/bin:$PATH" ./scripts/run-flake8" exited with 1.
|
||||||
|
|
||||||
|
Signed-off-by: Ondrej Mosnacek <omosnace@redhat.com>
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/manpage.py | 4 ++--
|
||||||
|
1 file changed, 2 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
index f8584436960d..6a3e08fca58c 100755
|
||||||
|
--- a/python/sepolicy/sepolicy/manpage.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
@@ -717,7 +717,7 @@ Default Defined Ports:""")
|
||||||
|
for f in self.all_file_types:
|
||||||
|
if f.startswith(self.domainname):
|
||||||
|
flist.append(f)
|
||||||
|
- if not f in self.exec_types or not f in self.entry_types:
|
||||||
|
+ if f not in self.exec_types or f not in self.entry_types:
|
||||||
|
flist_non_exec.append(f)
|
||||||
|
if f in self.fcdict:
|
||||||
|
mpaths = mpaths + self.fcdict[f]["regex"]
|
||||||
|
@@ -771,7 +771,7 @@ SELinux %(domainname)s policy is very flexible allowing users to setup their %(d
|
||||||
|
""" % {'domainname': self.domainname, 'equiv': e, 'alt': e.split('/')[-1]})
|
||||||
|
|
||||||
|
if flist_non_exec:
|
||||||
|
- self.fd.write(r"""
|
||||||
|
+ self.fd.write(r"""
|
||||||
|
.PP
|
||||||
|
.B STANDARD FILE CONTEXT
|
||||||
|
|
||||||
|
--
|
||||||
|
2.29.0
|
||||||
|
|
@ -0,0 +1,29 @@
|
|||||||
|
From 99450e5c391f0e5b7da9234588123edca0993794 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Ondrej Mosnacek <omosnace@redhat.com>
|
||||||
|
Date: Wed, 11 Nov 2020 17:23:40 +0100
|
||||||
|
Subject: [PATCH] selinux_config(5): add a note that runtime disable is
|
||||||
|
deprecated
|
||||||
|
|
||||||
|
...and refer to selinux(8), which explains it further.
|
||||||
|
|
||||||
|
Signed-off-by: Ondrej Mosnacek <omosnace@redhat.com>
|
||||||
|
---
|
||||||
|
policycoreutils/man/man5/selinux_config.5 | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/policycoreutils/man/man5/selinux_config.5 b/policycoreutils/man/man5/selinux_config.5
|
||||||
|
index 1ffade150128..58b42a0e234d 100644
|
||||||
|
--- a/policycoreutils/man/man5/selinux_config.5
|
||||||
|
+++ b/policycoreutils/man/man5/selinux_config.5
|
||||||
|
@@ -48,7 +48,7 @@ SELinux security policy is enforced.
|
||||||
|
.IP \fIpermissive\fR 4
|
||||||
|
SELinux security policy is not enforced but logs the warnings (i.e. the action is allowed to proceed).
|
||||||
|
.IP \fIdisabled\fR
|
||||||
|
-SELinux is disabled and no policy is loaded.
|
||||||
|
+No SELinux policy is loaded. This option was used to disable SELinux completely, which is now deprecated. Use the \fBselinux=0\fR kernel boot option instead (see \fBselinux\fR(8)).
|
||||||
|
.RE
|
||||||
|
.sp
|
||||||
|
The entry can be determined using the \fBsestatus\fR(8) command or \fBselinux_getenforcemode\fR(3).
|
||||||
|
--
|
||||||
|
2.29.2
|
||||||
|
|
51
0025-python-sepolicy-allow-to-override-manpage-date.patch
Normal file
51
0025-python-sepolicy-allow-to-override-manpage-date.patch
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
From 794dbdb6b1336cae872f45b5adaa594796e4806b Mon Sep 17 00:00:00 2001
|
||||||
|
From: "Bernhard M. Wiedemann" <bwiedemann@suse.de>
|
||||||
|
Date: Fri, 30 Oct 2020 22:53:09 +0100
|
||||||
|
Subject: [PATCH] python/sepolicy: allow to override manpage date
|
||||||
|
|
||||||
|
in order to make builds reproducible.
|
||||||
|
See https://reproducible-builds.org/ for why this is good
|
||||||
|
and https://reproducible-builds.org/specs/source-date-epoch/
|
||||||
|
for the definition of this variable.
|
||||||
|
|
||||||
|
This patch was done while working on reproducible builds for openSUSE.
|
||||||
|
|
||||||
|
Signed-off-by: Bernhard M. Wiedemann <bwiedemann@suse.de>
|
||||||
|
---
|
||||||
|
python/sepolicy/sepolicy/manpage.py | 6 ++++--
|
||||||
|
1 file changed, 4 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
index 6a3e08fca58c..c013c0d48502 100755
|
||||||
|
--- a/python/sepolicy/sepolicy/manpage.py
|
||||||
|
+++ b/python/sepolicy/sepolicy/manpage.py
|
||||||
|
@@ -39,6 +39,8 @@ typealias_types = {
|
||||||
|
equiv_dict = {"smbd": ["samba"], "httpd": ["apache"], "virtd": ["virt", "libvirt"], "named": ["bind"], "fsdaemon": ["smartmon"], "mdadm": ["raid"]}
|
||||||
|
|
||||||
|
equiv_dirs = ["/var"]
|
||||||
|
+man_date = time.strftime("%y-%m-%d", time.gmtime(
|
||||||
|
+ int(os.environ.get('SOURCE_DATE_EPOCH', time.time()))))
|
||||||
|
modules_dict = None
|
||||||
|
|
||||||
|
|
||||||
|
@@ -546,7 +548,7 @@ class ManPage:
|
||||||
|
|
||||||
|
def _typealias(self,typealias):
|
||||||
|
self.fd.write('.TH "%(typealias)s_selinux" "8" "%(date)s" "%(typealias)s" "SELinux Policy %(typealias)s"'
|
||||||
|
- % {'typealias':typealias, 'date': time.strftime("%y-%m-%d")})
|
||||||
|
+ % {'typealias':typealias, 'date': man_date})
|
||||||
|
self.fd.write(r"""
|
||||||
|
.SH "NAME"
|
||||||
|
%(typealias)s_selinux \- Security Enhanced Linux Policy for the %(typealias)s processes
|
||||||
|
@@ -565,7 +567,7 @@ man page for more details.
|
||||||
|
|
||||||
|
def _header(self):
|
||||||
|
self.fd.write('.TH "%(domainname)s_selinux" "8" "%(date)s" "%(domainname)s" "SELinux Policy %(domainname)s"'
|
||||||
|
- % {'domainname': self.domainname, 'date': time.strftime("%y-%m-%d")})
|
||||||
|
+ % {'domainname': self.domainname, 'date': man_date})
|
||||||
|
self.fd.write(r"""
|
||||||
|
.SH "NAME"
|
||||||
|
%(domainname)s_selinux \- Security Enhanced Linux Policy for the %(domainname)s processes
|
||||||
|
--
|
||||||
|
2.29.2
|
||||||
|
|
6
Makefile
6
Makefile
@ -1,6 +0,0 @@
|
|||||||
# Makefile for source rpm: policycoreutils
|
|
||||||
# $Id$
|
|
||||||
NAME := policycoreutils
|
|
||||||
SPECFILE = $(firstword $(wildcard *.spec))
|
|
||||||
|
|
||||||
include ../common/Makefile.common
|
|
41
README.translations
Normal file
41
README.translations
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
policycoreutils translations currently live in the following locations:
|
||||||
|
|
||||||
|
- https://fedora.zanata.org/project/view/selinux
|
||||||
|
- contains translations for both stable (Red Hat Enterprise Linux) and master (Fedora) branches
|
||||||
|
- maintains large number of languages (several of which do not actually contain any translated strings)
|
||||||
|
- updated by community and partially by RH localization effort
|
||||||
|
|
||||||
|
- selinux source repository (https://github.com/fedora-selinux/selinux)
|
||||||
|
- is kept up-to-date with fedora.zanata
|
||||||
|
|
||||||
|
How to update source files on fedora.zanata:
|
||||||
|
$ git clone git@github.com:fedora-selinux/selinux.git
|
||||||
|
$ cd selinux
|
||||||
|
|
||||||
|
# generate new potfile
|
||||||
|
$ for p in policycoreutils python gui sandbox; do
|
||||||
|
cd $p/po
|
||||||
|
make $p.pot
|
||||||
|
cd -
|
||||||
|
done
|
||||||
|
|
||||||
|
# Push potfiles to zanata
|
||||||
|
$ zanata-cli push --push-type source
|
||||||
|
|
||||||
|
How to pull new translations from zanata
|
||||||
|
$ git clone git@github.com:fedora-selinux/selinux.git
|
||||||
|
$ cd selinux
|
||||||
|
# Make sure "zanata.xml" file pointing to corresponding translations branch is present
|
||||||
|
# Optionally update source files on zanata
|
||||||
|
# Pull new translations from zanata
|
||||||
|
$ zanata-cli -e pull --pull-type trans
|
||||||
|
|
||||||
|
How to update translations *-po.tgz files
|
||||||
|
$ mkdir zanata
|
||||||
|
$ cd zanata
|
||||||
|
$ zanata-cli -e pull --project-config ../zanata.xml --pull-type both
|
||||||
|
$ for p in policycoreutils python gui sandbox; do
|
||||||
|
cd $p
|
||||||
|
tar -c -f ../../$p-po.tgz -z .
|
||||||
|
cd -
|
||||||
|
done
|
16
gating.yaml
Normal file
16
gating.yaml
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
--- !Policy
|
||||||
|
product_versions:
|
||||||
|
- fedora-*
|
||||||
|
decision_context: bodhi_update_push_testing
|
||||||
|
subject_type: koji_build
|
||||||
|
rules:
|
||||||
|
- !PassingTestCaseRule {test_case_name: fedora-ci.koji-build.tier0.functional}
|
||||||
|
|
||||||
|
--- !Policy
|
||||||
|
product_versions:
|
||||||
|
- fedora-*
|
||||||
|
decision_context: bodhi_update_push_stable
|
||||||
|
subject_type: koji_build
|
||||||
|
rules:
|
||||||
|
- !PassingTestCaseRule {test_case_name: fedora-ci.koji-build.tier0.functional}
|
||||||
|
|
40
make-rhat-patches.sh
Executable file
40
make-rhat-patches.sh
Executable file
@ -0,0 +1,40 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
POLICYCOREUTILS_VERSION=2.4
|
||||||
|
SEPOLGEN_VERSION=1.2.2
|
||||||
|
BRANCH=master
|
||||||
|
|
||||||
|
REBASEDIR=`mktemp -d rebase.XXXXXX`
|
||||||
|
pushd $REBASEDIR
|
||||||
|
|
||||||
|
git clone git@github.com:fedora-selinux/selinux.git
|
||||||
|
pushd selinux; git checkout $BRANCH; COMMIT=`git rev-parse --verify HEAD`; popd
|
||||||
|
|
||||||
|
# prepare policycoreutils-rhat.patch
|
||||||
|
tar xfz ../policycoreutils-$POLICYCOREUTILS_VERSION.tar.gz
|
||||||
|
pushd policycoreutils-$POLICYCOREUTILS_VERSION
|
||||||
|
|
||||||
|
git init; git add .; git commit -m "init"
|
||||||
|
cp -r ../selinux/policycoreutils/* .
|
||||||
|
git add -A .
|
||||||
|
|
||||||
|
git diff --cached --src-prefix=a/policycoreutils-$POLICYCOREUTILS_VERSION/ --dst-prefix=b/policycoreutils-$POLICYCOREUTILS_VERSION/ > ../../policycoreutils-rhat.patch
|
||||||
|
|
||||||
|
popd
|
||||||
|
|
||||||
|
#prepare sepolgen-rhat.patch
|
||||||
|
tar xfz ../sepolgen-$SEPOLGEN_VERSION.tar.gz
|
||||||
|
pushd sepolgen-$SEPOLGEN_VERSION
|
||||||
|
|
||||||
|
git init; git add .; git commit -m "init"
|
||||||
|
cp -r ../selinux/sepolgen/* .
|
||||||
|
git add -A .
|
||||||
|
|
||||||
|
git diff --cached --src-prefix=a/sepolgen-$SEPOLGEN_VERSION/ --dst-prefix=b/sepolgen-$SEPOLGEN_VERSION/ > ../../sepolgen-rhat.patch
|
||||||
|
|
||||||
|
popd
|
||||||
|
|
||||||
|
popd
|
||||||
|
# echo rm -rf $REBASEDIR
|
||||||
|
|
||||||
|
echo policycoreutils-rhat.patch and sepolgen-rhat.patch created from https://github.com/fedora-selinux/selinux/commit/$COMMIT
|
@ -1,61 +0,0 @@
|
|||||||
--- policycoreutils-1.13/scripts/fixfiles.rhat 2004-05-21 14:26:51.000000000 -0400
|
|
||||||
+++ policycoreutils-1.13/scripts/fixfiles 2004-05-21 15:00:08.069273944 -0400
|
|
||||||
@@ -22,21 +22,38 @@
|
|
||||||
|
|
||||||
FC=/etc/security/selinux/file_contexts
|
|
||||||
LOGFILE=`mktemp /var/tmp/fixfiles.XXXXXXXXXX` || exit 1
|
|
||||||
-echo "logging to $LOGFILE"
|
|
||||||
SETFILES=/usr/sbin/setfiles
|
|
||||||
FILESYSTEMS=`mount | grep -v "context=" | egrep -v '\((|.*,)bind(,.*|)\)' | awk '/(ext[23]| xfs).*rw/{print $3}';`
|
|
||||||
checkLabels () {
|
|
||||||
+echo "logging to $LOGFILE"
|
|
||||||
${SETFILES} -v -n ${FC} ${FILESYSTEMS} 2>&1 | tee $LOGFILE
|
|
||||||
}
|
|
||||||
|
|
||||||
restoreLabels () {
|
|
||||||
+echo "logging to $LOGFILE"
|
|
||||||
${SETFILES} -v ${FC} ${FILESYSTEMS} 2>&1 | tee $LOGFILE
|
|
||||||
}
|
|
||||||
|
|
||||||
relabel() {
|
|
||||||
+echo "logging to $LOGFILE"
|
|
||||||
echo "Cleaning out /tmp"
|
|
||||||
rm -rf /tmp/.??* /tmp/*
|
|
||||||
-${SETFILES} ${FC} ${FILESYSTEMS} 2>&1 | tee $LOGFILE
|
|
||||||
+${SETFILES} -v ${FC} ${FILESYSTEMS} 2>&1 | tee $LOGFILE
|
|
||||||
+}
|
|
||||||
+relabelCheck() {
|
|
||||||
+echo -n "
|
|
||||||
+Files in the /tmp directory may be labeled incorrectly, this command
|
|
||||||
+can remove all files in /tmp. If you choose to remove files from /tmp,
|
|
||||||
+a reboot will be required after completion.
|
|
||||||
+
|
|
||||||
+Do you wish to clean out the /tmp directory [N]? "
|
|
||||||
+read answer
|
|
||||||
+if [ "$answer" = y -o "$answer" = Y ]; then
|
|
||||||
+ relabel
|
|
||||||
+else
|
|
||||||
+ restoreLabels
|
|
||||||
+fi
|
|
||||||
+
|
|
||||||
}
|
|
||||||
|
|
||||||
# See how we were called.
|
|
||||||
@@ -48,10 +65,15 @@
|
|
||||||
restoreLabels
|
|
||||||
;;
|
|
||||||
relabel)
|
|
||||||
- relabel
|
|
||||||
+ relabelCheck
|
|
||||||
;;
|
|
||||||
+ -F)
|
|
||||||
+ if "$1" = "relabel"; then
|
|
||||||
+ relabel
|
|
||||||
+ fi
|
|
||||||
+ ;;
|
|
||||||
*)
|
|
||||||
- echo $"Usage: $0 {check|restore|relabel}"
|
|
||||||
+ echo $"Usage: $0 {check|restore|[-F] relabel}"
|
|
||||||
exit 1
|
|
||||||
esac
|
|
||||||
exit $?
|
|
5388
policycoreutils.spec
5388
policycoreutils.spec
File diff suppressed because it is too large
Load Diff
73
selinux-autorelabel
Executable file
73
selinux-autorelabel
Executable file
@ -0,0 +1,73 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# Do automatic relabelling
|
||||||
|
#
|
||||||
|
|
||||||
|
# . /etc/init.d/functions
|
||||||
|
|
||||||
|
# If the user has this (or similar) UEFI boot order:
|
||||||
|
#
|
||||||
|
# Windows | grub | Linux
|
||||||
|
#
|
||||||
|
# And decides to boot into grub/Linux, then the reboot at the end of autorelabel
|
||||||
|
# would cause the system to boot into Windows again, if the autorelabel was run.
|
||||||
|
#
|
||||||
|
# This function restores the UEFI boot order, so the user will boot into the
|
||||||
|
# previously set (and expected) partition.
|
||||||
|
efi_set_boot_next() {
|
||||||
|
# NOTE: The [ -x /usr/sbin/efibootmgr ] test is not sufficent -- it could
|
||||||
|
# succeed even on system which is not EFI-enabled...
|
||||||
|
if ! efibootmgr > /dev/null 2>&1; then
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
# NOTE: It it possible that some other services might be setting the
|
||||||
|
# 'BootNext' item for any reasons, and we shouldn't override it if so.
|
||||||
|
if ! efibootmgr | grep --quiet -e 'BootNext'; then
|
||||||
|
CURRENT_BOOT="$(efibootmgr | grep -e 'BootCurrent' | sed -re 's/(^.+:[[:space:]]*)([[:xdigit:]]+)/\2/')"
|
||||||
|
efibootmgr -n "${CURRENT_BOOT}" > /dev/null 2>&1
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
relabel_selinux() {
|
||||||
|
# if /sbin/init is not labeled correctly this process is running in the
|
||||||
|
# wrong context, so a reboot will be required after relabel
|
||||||
|
AUTORELABEL=
|
||||||
|
. /etc/selinux/config
|
||||||
|
echo "0" > /sys/fs/selinux/enforce
|
||||||
|
[ -x /bin/plymouth ] && plymouth --quit
|
||||||
|
|
||||||
|
if [ "$AUTORELABEL" = "0" ]; then
|
||||||
|
echo
|
||||||
|
echo $"*** Warning -- SELinux ${SELINUXTYPE} policy relabel is required. "
|
||||||
|
echo $"*** /etc/selinux/config indicates you want to manually fix labeling"
|
||||||
|
echo $"*** problems. Dropping you to a shell; the system will reboot"
|
||||||
|
echo $"*** when you leave the shell."
|
||||||
|
sulogin
|
||||||
|
|
||||||
|
else
|
||||||
|
echo
|
||||||
|
echo $"*** Warning -- SELinux ${SELINUXTYPE} policy relabel is required."
|
||||||
|
echo $"*** Relabeling could take a very long time, depending on file"
|
||||||
|
echo $"*** system size and speed of hard drives."
|
||||||
|
|
||||||
|
FORCE=`cat /.autorelabel`
|
||||||
|
[ -x "/usr/sbin/quotaoff" ] && /usr/sbin/quotaoff -aug
|
||||||
|
/sbin/fixfiles $FORCE restore
|
||||||
|
fi
|
||||||
|
|
||||||
|
rm -f /.autorelabel
|
||||||
|
/usr/lib/dracut/dracut-initramfs-restore
|
||||||
|
efi_set_boot_next
|
||||||
|
if [ -x /usr/bin/grub2-editenv ]; then
|
||||||
|
grub2-editenv - incr boot_indeterminate >/dev/null 2>&1
|
||||||
|
fi
|
||||||
|
sync
|
||||||
|
systemctl --force reboot
|
||||||
|
}
|
||||||
|
|
||||||
|
# Check to see if a full relabel is needed
|
||||||
|
if [ "$READONLY" != "yes" ]; then
|
||||||
|
restorecon $(awk '!/^#/ && $4 !~ /noauto/ && $2 ~ /^\// { print $2 }' /etc/fstab) >/dev/null 2>&1
|
||||||
|
relabel_selinux
|
||||||
|
fi
|
29
selinux-autorelabel-generator.sh
Normal file
29
selinux-autorelabel-generator.sh
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
# This systemd.generator(7) detects if SELinux is running and if the
|
||||||
|
# user requested an autorelabel, and if so sets the default target to
|
||||||
|
# selinux-autorelabel.target, which will cause the filesystem to be
|
||||||
|
# relabelled and then the system will reboot again and boot into the
|
||||||
|
# real default target.
|
||||||
|
|
||||||
|
PATH=/usr/sbin:$PATH
|
||||||
|
unitdir=/usr/lib/systemd/system
|
||||||
|
|
||||||
|
# If invoked with no arguments (for testing) write to /tmp.
|
||||||
|
earlydir="/tmp"
|
||||||
|
if [ -n "$2" ]; then
|
||||||
|
earlydir="$2"
|
||||||
|
fi
|
||||||
|
|
||||||
|
set_target ()
|
||||||
|
{
|
||||||
|
ln -sf "$unitdir/selinux-autorelabel.target" "$earlydir/default.target"
|
||||||
|
}
|
||||||
|
|
||||||
|
if selinuxenabled; then
|
||||||
|
if test -f /.autorelabel; then
|
||||||
|
set_target
|
||||||
|
elif grep -sqE "\bautorelabel\b" /proc/cmdline; then
|
||||||
|
set_target
|
||||||
|
fi
|
||||||
|
fi
|
18
selinux-autorelabel-mark.service
Normal file
18
selinux-autorelabel-mark.service
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Mark the need to relabel after reboot
|
||||||
|
DefaultDependencies=no
|
||||||
|
Requires=local-fs.target
|
||||||
|
Conflicts=shutdown.target
|
||||||
|
After=local-fs.target
|
||||||
|
Before=sysinit.target shutdown.target
|
||||||
|
ConditionSecurity=!selinux
|
||||||
|
ConditionPathIsDirectory=/etc/selinux
|
||||||
|
ConditionPathExists=!/.autorelabel
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
ExecStart=-/bin/touch /.autorelabel
|
||||||
|
Type=oneshot
|
||||||
|
RemainAfterExit=yes
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=sysinit.target
|
14
selinux-autorelabel.service
Normal file
14
selinux-autorelabel.service
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Relabel all filesystems
|
||||||
|
DefaultDependencies=no
|
||||||
|
Conflicts=shutdown.target
|
||||||
|
After=sysinit.target
|
||||||
|
Before=shutdown.target
|
||||||
|
ConditionSecurity=selinux
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
ExecStart=/usr/libexec/selinux/selinux-autorelabel
|
||||||
|
Type=oneshot
|
||||||
|
TimeoutSec=0
|
||||||
|
RemainAfterExit=yes
|
||||||
|
StandardOutput=journal+console
|
7
selinux-autorelabel.target
Normal file
7
selinux-autorelabel.target
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Relabel all filesystems and reboot
|
||||||
|
DefaultDependencies=no
|
||||||
|
Requires=sysinit.target selinux-autorelabel.service
|
||||||
|
Conflicts=shutdown.target
|
||||||
|
After=sysinit.target selinux-autorelabel.service
|
||||||
|
ConditionSecurity=selinux
|
BIN
sepolicy-help.tgz
Normal file
BIN
sepolicy-help.tgz
Normal file
Binary file not shown.
BIN
sepolicy-icons.tgz
Normal file
BIN
sepolicy-icons.tgz
Normal file
Binary file not shown.
12
sources
12
sources
@ -1 +1,11 @@
|
|||||||
69324b20d6fc1ddb7ad3c504ef7dc2a3 policycoreutils-1.13.tgz
|
SHA512 (policycoreutils-3.1.tar.gz) = 0592f218563a99ba95d2cfd07fdc3761b61c1cc3c01a17ab89ad840169e1a7d4083521d5cacc72d1b76911d516bf592db7a3f90d9ef0cc11ceed007e4580e140
|
||||||
|
SHA512 (restorecond-3.1.tar.gz) = cdcf299f48b89a7c641ded9507b9b966bf648497394f8e988a9cb1ceb3224c86369706027f3416a4f9750836f7a8f4580a4b3df76673e03f897b383d7ed0e2c8
|
||||||
|
SHA512 (selinux-dbus-3.1.tar.gz) = d5e1715539ec9aeef2285fc141617b7c25f39ddacc3968d2d19722553b97b873632545a2c7002faef44b671604b2cfca52e9624c57cedbae64d616a080cc955f
|
||||||
|
SHA512 (selinux-gui-3.1.tar.gz) = c8bd618da3bd1dcc8aeb470e8410765ea7d38e861b0be78aaddaa5384ec3de12d364de1b63e2d9e3262e1179463f0ee78cb60f11ab72c996899bd72af137ae7c
|
||||||
|
SHA512 (selinux-python-3.1.tar.gz) = 5dd98f77ae8ea8bac6a89ec7def76e12496b9a9f8c9612c4cc1dac7a8e8c60380a00c857426bfefbcb4273706addd2594e9b467f69408ef284f082a09d45bd49
|
||||||
|
SHA512 (selinux-sandbox-3.1.tar.gz) = e9a772c720704de3fc33a70316780d5995442a1e25ba7df6dc68dd7b7a4eb59dfd2b68e4576051053fe81fbea207fcb1648baad3ea2d56d5b3005e9ca4b8ceb7
|
||||||
|
SHA512 (semodule-utils-3.1.tar.gz) = b92794bbfbce5834ee7f62fddb40b5506e9291e8fa7c5d669b2e281089b8f8dc40c4522ea287ac5deffdaee751442ba8e691e2ac45fdd378b60d5d6b2527d157
|
||||||
|
SHA512 (gui-po.tgz) = 8e0855256b825eea422b8e2b82cc0decf66b902c9930840905c5ad5dda7bef3679943a22db62709907d48f8a331d67edc5efed3e2638b53e379959b14077b4ea
|
||||||
|
SHA512 (policycoreutils-po.tgz) = 66b908f7a167225bebded46f9cf92f42eb194daa2a083d48de43c2a5d33fa42724c5add0a9d029ac9d62c500f6f1c8d3bc138dd598b1fd97e609d7cc7160be72
|
||||||
|
SHA512 (python-po.tgz) = 7f2a082b77c7b4417d5d3dac35d86dd635635a9c05a80e5f9284d03604e2f2a06ec879fb29b056d1a46d3fc448cd76e6fd25196834c18a161fd6677f2e11b2be
|
||||||
|
SHA512 (sandbox-po.tgz) = 3d4b389b56bab1a6dddce9884dcebdefbefd1017fec6d987ac22a0705f409ed56722387aaca8fe7d9c468862136387bc703062e2b6de8fd102e13fed04ce811b
|
||||||
|
BIN
system-config-selinux.png
Normal file
BIN
system-config-selinux.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 1.4 KiB |
64
tests/CIL-modules-without-compilation/Makefile
Normal file
64
tests/CIL-modules-without-compilation/Makefile
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Sanity/CIL-modules-without-compilation
|
||||||
|
# Description: What the test does
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016 Red Hat, Inc.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Sanity/CIL-modules-without-compilation
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
test -x runtest.sh || chmod a+x runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: What the test does" >> $(METADATA)
|
||||||
|
@echo "Type: Sanity" >> $(METADATA)
|
||||||
|
@echo "TestTime: 5m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4 -RHEL6 -RHELClient5 -RHELServer5" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
5
tests/CIL-modules-without-compilation/PURPOSE
Normal file
5
tests/CIL-modules-without-compilation/PURPOSE
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Sanity/CIL-modules-without-compilation
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
||||||
|
Is it possible to manage policy modules written in CIL without any compilation? Does semanage and semodule understand them?
|
||||||
|
|
73
tests/CIL-modules-without-compilation/runtest.sh
Executable file
73
tests/CIL-modules-without-compilation/runtest.sh
Executable file
@ -0,0 +1,73 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Sanity/CIL-modules-without-compilation
|
||||||
|
# Description: What the test does
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016 Red Hat, Inc.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include Beaker environment
|
||||||
|
. /usr/bin/rhts-environment.sh || exit 1
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm $PACKAGE
|
||||||
|
rlRun "echo '()' > empty.cil"
|
||||||
|
rlRun "echo '(())' > invalid.cil"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest "empty CIL module"
|
||||||
|
rlRun "semodule -lfull | grep '400.*empty.*cil'" 1
|
||||||
|
rlRun "semodule -i empty.cil"
|
||||||
|
rlRun "semodule -lfull | grep '400.*empty.*cil'"
|
||||||
|
rlRun "semodule -r empty"
|
||||||
|
rlRun "semodule -lfull | grep '400.*empty.*cil'" 1
|
||||||
|
rlRun "semanage module -l | grep 'empty.*400.*cil'" 1
|
||||||
|
rlRun "semanage module -a empty.cil"
|
||||||
|
rlRun "semanage module -l | grep 'empty.*400.*cil'"
|
||||||
|
rlRun "semanage module -r empty"
|
||||||
|
rlRun "semanage module -l | grep 'empty.*400.*cil'" 1
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest "invalid CIL module"
|
||||||
|
rlRun "semodule -lfull | grep '400.*invalid.*cil'" 1
|
||||||
|
rlRun "semodule -i invalid.cil" 1
|
||||||
|
rlRun "semodule -lfull | grep '400.*invalid.*cil'" 1
|
||||||
|
rlRun "semodule -r invalid" 1
|
||||||
|
rlRun "semodule -lfull | grep '400.*invalid.*cil'" 1
|
||||||
|
rlRun "semanage module -l | grep 'invalid.*400.*cil'" 1
|
||||||
|
rlRun "semanage module -a invalid.cil" 1
|
||||||
|
rlRun "semanage module -l | grep 'invalid.*400.*cil'" 1
|
||||||
|
rlRun "semanage module -r invalid" 1
|
||||||
|
rlRun "semanage module -l | grep 'invalid.*400.*cil'" 1
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlRun "rm -f empty.cil invalid.cil"
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
63
tests/linux-system-roles.selinux-tests/Makefile
Normal file
63
tests/linux-system-roles.selinux-tests/Makefile
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of selinux-ansible-playbook
|
||||||
|
# Description: Run linux-system-roles.selinux (https://github.com/linux-system-roles/selinux.git) Ansible role tests
|
||||||
|
# Author: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2018 Red Hat, Inc.
|
||||||
|
#
|
||||||
|
# This program is free software: you can redistribute it and/or
|
||||||
|
# modify it under the terms of the GNU General Public License as
|
||||||
|
# published by the Free Software Foundation, either version 2 of
|
||||||
|
# the License, or (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this program. If not, see http://www.gnu.org/licenses/.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=linux-system-roles.selinux-tests
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
test -x runtest.sh || chmod a+x runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Petr Lautrbach <plautrba@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: Run linux-system-roles.selinux (https://github.com/linux-system-roles/selinux.git) Ansible role tests" >> $(METADATA)
|
||||||
|
@echo "Type: Sanity" >> $(METADATA)
|
||||||
|
@echo "TestTime: 10m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils ansible git" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2+" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
4
tests/linux-system-roles.selinux-tests/PURPOSE
Normal file
4
tests/linux-system-roles.selinux-tests/PURPOSE
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
PURPOSE of selinux-ansible-playbook
|
||||||
|
Author: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
|
||||||
|
Run linux-system-roles.selinux (https://github.com/linux-system-roles/selinux.git) Ansible role tests
|
57
tests/linux-system-roles.selinux-tests/runtest.sh
Executable file
57
tests/linux-system-roles.selinux-tests/runtest.sh
Executable file
@ -0,0 +1,57 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Description: Run linux-system-roles.selinux (https://github.com/linux-system-roles/selinux.git) Ansible role tests
|
||||||
|
# Author: Petr Lautrbach <plautrba@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2018 Red Hat, Inc.
|
||||||
|
#
|
||||||
|
# This program is free software: you can redistribute it and/or
|
||||||
|
# modify it under the terms of the GNU General Public License as
|
||||||
|
# published by the Free Software Foundation, either version 2 of
|
||||||
|
# the License, or (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this program. If not, see http://www.gnu.org/licenses/.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include Beaker environment
|
||||||
|
. /usr/bin/rhts-environment.sh || exit 1
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm $PACKAGE
|
||||||
|
rlAssertRpm "git"
|
||||||
|
rlAssertRpm "ansible"
|
||||||
|
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "git clone https://github.com/linux-system-roles/selinux.git"
|
||||||
|
rlRun "cd selinux/test"
|
||||||
|
|
||||||
|
for ansible_test in test_*.yml; do
|
||||||
|
rlRun "ansible-playbook -i localhost, -c local -v $ansible_test"
|
||||||
|
done
|
||||||
|
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlRun "cd ../../"
|
||||||
|
rlRun "rm -rf selinux"
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
64
tests/load_policy/Makefile
Normal file
64
tests/load_policy/Makefile
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Sanity/load_policy
|
||||||
|
# Description: Does load_policy work as expected? Does it produce correct audit messages?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016 Red Hat, Inc.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Sanity/load_policy
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
test -x runtest.sh || chmod a+x runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: Does load_policy work as expected? Does it produce correct audit messages?" >> $(METADATA)
|
||||||
|
@echo "Type: Sanity" >> $(METADATA)
|
||||||
|
@echo "TestTime: 5m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: audit policycoreutils selinux-policy-targeted" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
5
tests/load_policy/PURPOSE
Normal file
5
tests/load_policy/PURPOSE
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Sanity/load_policy
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
||||||
|
Does load_policy work as expected? Does it produce correct audit messages?
|
||||||
|
|
79
tests/load_policy/runtest.sh
Executable file
79
tests/load_policy/runtest.sh
Executable file
@ -0,0 +1,79 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Sanity/load_policy
|
||||||
|
# Description: Does load_policy work as expected? Does it produce correct audit messages?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016 Red Hat, Inc.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include Beaker environment
|
||||||
|
. /usr/bin/rhts-environment.sh || exit 1
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
if rlIsRHEL 6 ; then
|
||||||
|
SELINUX_FS_MOUNT="/selinux"
|
||||||
|
else # RHEL-7 and above
|
||||||
|
SELINUX_FS_MOUNT="/sys/fs/selinux"
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm ${PACKAGE}
|
||||||
|
rlRun "ls -l `which load_policy`"
|
||||||
|
BINARY_POLICY=`find /etc/selinux/targeted -type f -name policy.?? | sort -n | tail -n 1`
|
||||||
|
rlRun "ls -l ${BINARY_POLICY}"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "load_policy --xyz 2>&1 | grep \"invalid option\""
|
||||||
|
rlRun "dmesg | grep -i selinux" 0,1
|
||||||
|
rlRun "grep -i selinux /proc/mounts"
|
||||||
|
START_DATE_TIME=`date "+%m/%d/%Y %T"`
|
||||||
|
sleep 1
|
||||||
|
rlRun "load_policy -q"
|
||||||
|
rlRun "grep -i selinux /proc/mounts"
|
||||||
|
sleep 1
|
||||||
|
if rlIsRHEL ; then
|
||||||
|
rlRun "ausearch -m MAC_POLICY_LOAD -i -ts ${START_DATE_TIME} | grep load_policy"
|
||||||
|
fi
|
||||||
|
rlRun "ausearch -m MAC_POLICY_LOAD -i -ts ${START_DATE_TIME} | grep 'policy loaded'"
|
||||||
|
rlRun "umount ${SELINUX_FS_MOUNT}"
|
||||||
|
rlRun "grep -i selinux /proc/mounts" 1
|
||||||
|
START_DATE_TIME=`date "+%m/%d/%Y %T"`
|
||||||
|
sleep 1
|
||||||
|
rlRun "load_policy -i ${BINARY_POLICY}"
|
||||||
|
rlRun "grep -i selinux /proc/mounts"
|
||||||
|
sleep 1
|
||||||
|
if rlIsRHEL ; then
|
||||||
|
rlRun "ausearch -m MAC_POLICY_LOAD -i -ts ${START_DATE_TIME} | grep load_policy"
|
||||||
|
fi
|
||||||
|
rlRun "ausearch -m MAC_POLICY_LOAD -i -ts ${START_DATE_TIME} | grep 'policy loaded'"
|
||||||
|
rlRun "dmesg | grep -i selinux"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
70
tests/restorecon/Makefile
Normal file
70
tests/restorecon/Makefile
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Sanity/restorecon
|
||||||
|
# Description: does restorecon work correctly ?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2011 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Sanity/restorecon
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE testpolicy.te testpolicy.fc
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
chmod a+x runtest.sh
|
||||||
|
chcon -t bin_t runtest.sh;:
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: does restorecon work correctly ?" >> $(METADATA)
|
||||||
|
@echo "Type: Sanity" >> $(METADATA)
|
||||||
|
@echo "TestTime: 15m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: grep" >> $(METADATA)
|
||||||
|
@echo "Requires: e2fsprogs" >> $(METADATA)
|
||||||
|
@echo "Requires: libselinux" >> $(METADATA)
|
||||||
|
@echo "Requires: selinux-policy-devel" >> $(METADATA)
|
||||||
|
@echo "Requires: libselinux-utils" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
5
tests/restorecon/PURPOSE
Normal file
5
tests/restorecon/PURPOSE
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Sanity/restorecon
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
||||||
|
Does restorecon work correctly?
|
||||||
|
|
367
tests/restorecon/runtest.sh
Executable file
367
tests/restorecon/runtest.sh
Executable file
@ -0,0 +1,367 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Sanity/restorecon
|
||||||
|
# Description: does restorecon work correctly ?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2011 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include rhts environment
|
||||||
|
. /usr/bin/rhts-environment.sh
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm ${PACKAGE}
|
||||||
|
rlServiceStop mcstrans mcstransd
|
||||||
|
rlRun "rpm -qf `which restorecon` | grep ${PACKAGE}"
|
||||||
|
rlRun "setenforce 1"
|
||||||
|
rlRun "sestatus"
|
||||||
|
rlRun "setsebool allow_domain_fd_use on"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest "Functional test"
|
||||||
|
|
||||||
|
TESTDIR="/opt/restorecon_testdir"
|
||||||
|
DIRS="correct.dir incorrect1.dir incorrect2.dir customizable.dir"
|
||||||
|
FILES="correct.file incorrect.file customizable.file"
|
||||||
|
|
||||||
|
rlRun "make -f /usr/share/selinux/devel/Makefile"
|
||||||
|
rlRun "semodule -i testpolicy.pp"
|
||||||
|
|
||||||
|
rlFileBackup /etc/selinux/targeted/contexts/customizable_types
|
||||||
|
rlRun "echo 'customizable_t' >> /etc/selinux/targeted/contexts/customizable_types"
|
||||||
|
|
||||||
|
# Here is the testing dirs and files structure
|
||||||
|
# all the files have initial context corresponding to their names
|
||||||
|
|
||||||
|
# ./
|
||||||
|
# correct.file
|
||||||
|
# incorrect.file
|
||||||
|
# customizable.file
|
||||||
|
|
||||||
|
# correct.dir/
|
||||||
|
# correct.file
|
||||||
|
# incorrect.file
|
||||||
|
# customizable.file
|
||||||
|
|
||||||
|
# incorrect1.dir/
|
||||||
|
# correct.file
|
||||||
|
# incorrect.file
|
||||||
|
# customizable.file
|
||||||
|
|
||||||
|
# incorrect2.dir/
|
||||||
|
# correct.file
|
||||||
|
# incorrect.file
|
||||||
|
# customizable.file
|
||||||
|
|
||||||
|
# customizable.dir/
|
||||||
|
# correct.file
|
||||||
|
# incorrect.file
|
||||||
|
# customizable.file
|
||||||
|
|
||||||
|
# Function to set initial contexts
|
||||||
|
function set_contexts {
|
||||||
|
# Set the intended contexts
|
||||||
|
rlLog "Setting initial contexts of testing dirs..."
|
||||||
|
restorecon -R $TESTDIR
|
||||||
|
for ITEM in `find . -name 'incorrect*'`; do
|
||||||
|
chcon -t incorrect_t $ITEM
|
||||||
|
done
|
||||||
|
for ITEM in `find . -name 'customizable*'`; do
|
||||||
|
chcon -t customizable_t $ITEM
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
# Check that files in dir $1 have the initial contexts
|
||||||
|
function check_initial_contexts {
|
||||||
|
if echo $1 | grep -q 'incorrect.dir'; then
|
||||||
|
rlRun "ls -ladZ $1 | grep :incorrect_t"
|
||||||
|
elif echo $1 | grep -q 'correct.dir'; then
|
||||||
|
rlRun "ls -ladZ $1 | grep :correct_t"
|
||||||
|
elif echo $1 | grep -q 'customizable.dir'; then
|
||||||
|
rlRun "ls -ladZ $1 | grep :customizable_t"
|
||||||
|
fi
|
||||||
|
rlRun "ls -ladZ $1/* | grep '\<correct.file' | grep ':correct_t'"
|
||||||
|
rlRun "ls -ladZ $1/* | grep '\<incorrect.file' | grep ':incorrect_t'"
|
||||||
|
rlRun "ls -ladZ $1/* | grep '\<customizable.file' | grep ':customizable_t'"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Check that files matching with $2 in dir $1 have context $3
|
||||||
|
function check_contexts {
|
||||||
|
COMMAND="find $1 -name '$2'"
|
||||||
|
for ITEM in `eval $COMMAND`; do
|
||||||
|
rlRun "ls -ladZ $ITEM | grep :$3";
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
# Create the testing dirs and files
|
||||||
|
rlRun "mkdir -p $TESTDIR"
|
||||||
|
rlRun "pushd $TESTDIR"
|
||||||
|
rlRun "mkdir $DIRS"
|
||||||
|
rlRun "touch $FILES"
|
||||||
|
for DIR in $DIRS; do
|
||||||
|
rlRun "pushd $DIR"
|
||||||
|
rlRun "touch $FILES"
|
||||||
|
rlRun "popd"
|
||||||
|
done
|
||||||
|
|
||||||
|
set_contexts
|
||||||
|
|
||||||
|
echo
|
||||||
|
rlLog "Checking initial contexts of testing dirs..."
|
||||||
|
# Check the contexts are set properly
|
||||||
|
check_initial_contexts '.'
|
||||||
|
check_initial_contexts 'incorrect1.dir'
|
||||||
|
check_initial_contexts 'incorrect2.dir'
|
||||||
|
check_initial_contexts 'correct.dir'
|
||||||
|
check_initial_contexts 'customizable.dir'
|
||||||
|
check_contexts '.' 'incorrect*' 'incorrect_t'
|
||||||
|
check_contexts '.' 'correct*' 'correct_t'
|
||||||
|
check_contexts '.' 'customizable*' 'customizable_t'
|
||||||
|
|
||||||
|
# -e directory
|
||||||
|
# exclude a directory (repeat the option to exclude more than one directory).
|
||||||
|
|
||||||
|
echo
|
||||||
|
rlLog "-e directory"
|
||||||
|
set_contexts
|
||||||
|
rlRun "restorecon -RF -e $TESTDIR/incorrect2.dir $TESTDIR"
|
||||||
|
for ITEM in `ls *.file`; do rlRun "ls -ladZ $ITEM | grep correct_t"; done
|
||||||
|
check_contexts 'incorrect1.dir' '*' 'correct_t'
|
||||||
|
check_contexts 'customizable.dir' '*' 'correct_t'
|
||||||
|
check_initial_contexts 'incorrect2.dir'
|
||||||
|
rlRun "ls -ladZ incorrect2.dir | grep incorrect_t"
|
||||||
|
|
||||||
|
# -f infilename
|
||||||
|
# infilename contains a list of files to be processed. Use - for stdin.
|
||||||
|
|
||||||
|
echo
|
||||||
|
rlLog "-f filename"
|
||||||
|
set_contexts
|
||||||
|
rlRun "cat > ../file_list <<EOF
|
||||||
|
./customizable.file
|
||||||
|
./customizable.dir
|
||||||
|
./correct.dir/customizable.file
|
||||||
|
./incorrect1.dir/customizable.file
|
||||||
|
./incorrect2.dir/customizable.file
|
||||||
|
./customizable.dir/customizable.file
|
||||||
|
EOF"
|
||||||
|
if rlIsRHEL 5; then chcon -t file_t ../file_list ;fi
|
||||||
|
rlRun "restorecon -F -f ../file_list"
|
||||||
|
check_contexts '.' 'incorrect*' 'incorrect_t'
|
||||||
|
check_contexts '.' 'correct*' 'correct_t'
|
||||||
|
check_contexts '.' 'customizable*' 'correct_t'
|
||||||
|
rlRun "rm -f ../file_list"
|
||||||
|
|
||||||
|
|
||||||
|
echo
|
||||||
|
rlLog "-f - Input from stdin"
|
||||||
|
set_contexts
|
||||||
|
rlRun "echo -e 'incorrect2.dir\ncustomizable.file\nincorrect.file' | restorecon -f -"
|
||||||
|
check_initial_contexts 'incorrect1.dir'
|
||||||
|
check_initial_contexts 'correct.dir'
|
||||||
|
check_initial_contexts 'customizable.dir'
|
||||||
|
check_contexts 'incorrect2' '*' 'correct_t'
|
||||||
|
rlRun "ls -ladZ customizable.file | grep customizable_t"
|
||||||
|
rlRun "ls -ladZ incorrect.file | grep :correct_t"
|
||||||
|
|
||||||
|
# -F Force reset of context to match file_context for customizable files, and
|
||||||
|
# the default file context, changing the user, role, range portion as well
|
||||||
|
# as the type.
|
||||||
|
|
||||||
|
echo
|
||||||
|
rlLog "-F Force reset of customizable types"
|
||||||
|
set_contexts
|
||||||
|
rlRun "restorecon -RF $TESTDIR"
|
||||||
|
check_contexts '.' '*' 'correct_t'
|
||||||
|
|
||||||
|
# This feature is from RHEL6 further
|
||||||
|
if ! rlIsRHEL; then
|
||||||
|
echo
|
||||||
|
rlLog "-F Force reset of the whole context"
|
||||||
|
set_contexts
|
||||||
|
chcon -u staff_u *.file
|
||||||
|
rlRun "ls -laZ correct.file | grep staff_u"
|
||||||
|
rlRun "ls -laZ incorrect.file | grep staff_u"
|
||||||
|
rlRun "ls -laZ customizable.file | grep staff_u"
|
||||||
|
rlRun "restorecon -R $TESTDIR"
|
||||||
|
rlRun "ls -laZ correct.file | grep staff_u"
|
||||||
|
rlRun "ls -laZ incorrect.file | grep staff_u"
|
||||||
|
rlRun "ls -laZ customizable.file | grep staff_u"
|
||||||
|
rlRun "restorecon -RF $TESTDIR"
|
||||||
|
rlRun "ls -laZ correct.file | grep system_u"
|
||||||
|
rlRun "ls -laZ incorrect.file | grep system_u"
|
||||||
|
rlRun "ls -laZ customizable.file | grep system_u"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# -i ignore files that do not exist.
|
||||||
|
|
||||||
|
rlRun "restorecon non-existent-file" 1-255
|
||||||
|
rlRun "restorecon -i non-existent-file"
|
||||||
|
|
||||||
|
# -n don't change any file labels (passive check).
|
||||||
|
|
||||||
|
echo
|
||||||
|
rlLog "-n dry-run"
|
||||||
|
set_contexts
|
||||||
|
rlRun "restorecon -RF -n $TESTDIR"
|
||||||
|
check_contexts '.' 'incorrect*' 'incorrect_t'
|
||||||
|
check_contexts '.' 'correct*' 'correct_t'
|
||||||
|
check_contexts '.' 'customizable*' 'customizable_t'
|
||||||
|
|
||||||
|
# -o outfilename
|
||||||
|
# Deprecated, SELinux policy will probably block this access. Use shell
|
||||||
|
# redirection to save list of files with incorrect context in filename.
|
||||||
|
|
||||||
|
# ----not tested yet
|
||||||
|
|
||||||
|
# -R, -r change files and directories file labels recursively (descend directo‐
|
||||||
|
# ries).
|
||||||
|
# Note: restorecon reports warnings on paths without default labels only
|
||||||
|
# if called non-recursively or in verbose mode.
|
||||||
|
|
||||||
|
set_contexts
|
||||||
|
rlRun "restorecon -R $TESTDIR"
|
||||||
|
check_contexts '.' '*corr*' 'correct_t'
|
||||||
|
check_contexts '.' 'customizable*' 'customizable_t'
|
||||||
|
|
||||||
|
# ...by default it does not operate recursively on directories
|
||||||
|
|
||||||
|
set_contexts
|
||||||
|
rlRun "restorecon $TESTDIR"
|
||||||
|
check_initial_contexts 'incorrect1.dir'
|
||||||
|
check_initial_contexts 'incorrect2.dir'
|
||||||
|
check_initial_contexts 'correct.dir'
|
||||||
|
check_initial_contexts 'customizable.dir'
|
||||||
|
rlRun "ls -ladZ customizable.file | grep customizable_t"
|
||||||
|
rlRun "ls -ladZ incorrect.file | grep :incorrect_t"
|
||||||
|
rlRun "ls -ladZ correct.file | grep :correct_t"
|
||||||
|
|
||||||
|
# -v show changes in file labels, if type or role are going to be changed.
|
||||||
|
|
||||||
|
# ----not tested yet
|
||||||
|
|
||||||
|
# -0 option is not present in RHEL5
|
||||||
|
if ! rlIsRHEL 5; then
|
||||||
|
# -0 the separator for the input items is assumed to be the null character
|
||||||
|
# (instead of the white space). The quotes and the backslash characters
|
||||||
|
# are also treated as normal characters that can form valid input. This
|
||||||
|
# option finally also disables the end of file string, which is treated
|
||||||
|
# like any other argument. Useful when input items might contain white
|
||||||
|
# space, quote marks or backslashes. The -print0 option of GNU find pro‐
|
||||||
|
# duces input suitable for this mode.
|
||||||
|
|
||||||
|
echo
|
||||||
|
rlLog "-0"
|
||||||
|
set_contexts
|
||||||
|
rlRun "find . -print0 | restorecon -f - -0"
|
||||||
|
check_contexts '.' '*corr*' 'correct_t'
|
||||||
|
check_contexts '.' 'customizable*' 'customizable_t'
|
||||||
|
|
||||||
|
echo
|
||||||
|
rlLog "-0 with -F"
|
||||||
|
set_contexts
|
||||||
|
rlRun "find . -print0 | restorecon -F -f - -0"
|
||||||
|
check_contexts '.' '*' 'correct_t'
|
||||||
|
|
||||||
|
fi
|
||||||
|
|
||||||
|
# If a file object does not have a context, restorecon will write the default
|
||||||
|
# context to the file object's extended attributes.
|
||||||
|
|
||||||
|
# ----not tested yet
|
||||||
|
|
||||||
|
|
||||||
|
# Cleanup
|
||||||
|
|
||||||
|
rlRun "popd"
|
||||||
|
rlRun "rm -rf /opt/restorecon_testdir"
|
||||||
|
rlFileRestore
|
||||||
|
rlRun "semodule -r testpolicy"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
# This is RFE from RHEL6 and further versions
|
||||||
|
if ! rlIsRHEL 5;then
|
||||||
|
rlPhaseStartTest
|
||||||
|
# META-Fixed-In: policycoreutils-2.0.83-19.14.el6
|
||||||
|
rlRun "pushd /root"
|
||||||
|
rlRun "touch test-file"
|
||||||
|
rlRun "mkdir test-dir"
|
||||||
|
for ITEM in "test-file" "test-dir" ; do
|
||||||
|
rlRun "chcon -u staff_u -t shadow_t -l s0:c1 ${ITEM}"
|
||||||
|
rlRun "ls -dZ ${ITEM} | grep staff_u:object_r:shadow_t:s0:c1"
|
||||||
|
rlRun "restorecon -v ${ITEM}" 0,1
|
||||||
|
rlRun "ls -dZ ${ITEM} | grep staff_u:object_r:admin_home_t:s0:c1"
|
||||||
|
rlRun "restorecon -F -v ${ITEM}" 0,1
|
||||||
|
rlRun "ls -dZ ${ITEM} | grep system_u:object_r:admin_home_t:s0"
|
||||||
|
done
|
||||||
|
rlRun "rm -rf test-dir"
|
||||||
|
rlRun "rm -f test-file"
|
||||||
|
rlRun "popd"
|
||||||
|
rlPhaseEnd
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
# META-Fixed-In: policycoreutils-2.0.83-19.16.el6
|
||||||
|
rlRun "pushd /root"
|
||||||
|
rlRun "touch test-file"
|
||||||
|
rlRun "mkdir test-dir"
|
||||||
|
for ITEM in "test-file" "test-dir" ; do
|
||||||
|
rlRun "chcon -t tmp_t ${ITEM}"
|
||||||
|
rlRun "ls -dZ ${ITEM}"
|
||||||
|
rlRun "chattr +i ${ITEM}"
|
||||||
|
rlRun "restorecon -v ${ITEM}" 1-255
|
||||||
|
rlRun "chattr -i ${ITEM}"
|
||||||
|
rlRun "ls -dZ ${ITEM}"
|
||||||
|
rlRun "restorecon -v ${ITEM}"
|
||||||
|
rlRun "ls -dZ ${ITEM}"
|
||||||
|
done
|
||||||
|
rlRun "rm -rf test-dir"
|
||||||
|
rlRun "rm -f test-file"
|
||||||
|
rlRun "popd"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
# The bug was closed as NEXTRELEASE for RHEL5
|
||||||
|
if ! rlIsRHEL 5; then
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "touch ~/test-file"
|
||||||
|
rlRun "restorecon -vF ~/test-file"
|
||||||
|
rlRun "restorecon -vF ~/test-file | grep \"reset.*context\"" 1
|
||||||
|
rlRun "rm -f ~/test-file"
|
||||||
|
|
||||||
|
rlRun "mkdir ~/test-dir"
|
||||||
|
rlRun "restorecon -vF ~/test-dir"
|
||||||
|
rlRun "restorecon -vF ~/test-dir | grep \"reset.*context\"" 1
|
||||||
|
rlRun "rm -rf ~/test-dir"
|
||||||
|
rlPhaseEnd
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlServiceRestore mcstrans mcstransd
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
2
tests/restorecon/testpolicy.fc
Normal file
2
tests/restorecon/testpolicy.fc
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
/opt/restorecon_testdir(/.*)? system_u:object_r:correct_t:s0
|
||||||
|
|
19
tests/restorecon/testpolicy.te
Normal file
19
tests/restorecon/testpolicy.te
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
policy_module(testpolicy, 1.0)
|
||||||
|
|
||||||
|
require {
|
||||||
|
attribute domain;
|
||||||
|
type fs_t;
|
||||||
|
}
|
||||||
|
|
||||||
|
type correct_t;
|
||||||
|
files_type(correct_t)
|
||||||
|
type incorrect_t;
|
||||||
|
files_type(incorrect_t)
|
||||||
|
type customizable_t;
|
||||||
|
files_type(customizable_t)
|
||||||
|
|
||||||
|
|
||||||
|
#allow domain correct_t:dir relabelto;
|
||||||
|
#allow correct_t fs_t:filesystem associate;
|
||||||
|
|
||||||
|
|
65
tests/semanage-interface/Makefile
Normal file
65
tests/semanage-interface/Makefile
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Regression/semanage-interface
|
||||||
|
# Description: Does semanage interface ... work correctly?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Regression/semanage-interface
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
test -x runtest.sh || chmod a+x runtest.sh
|
||||||
|
test -x runtest.sh || chcon -t bin_t runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: Does semanage interface ... work correctly?" >> $(METADATA)
|
||||||
|
@echo "Type: Regression" >> $(METADATA)
|
||||||
|
@echo "TestTime: 20m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils policycoreutils-python-utils grep selinux-policy-minimum selinux-policy-mls selinux-policy-targeted" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
4
tests/semanage-interface/PURPOSE
Normal file
4
tests/semanage-interface/PURPOSE
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Regression/semanage-interface
|
||||||
|
Description: Does semanage interface ... work correctly?
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
69
tests/semanage-interface/runtest.sh
Executable file
69
tests/semanage-interface/runtest.sh
Executable file
@ -0,0 +1,69 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Regression/semanage-interface
|
||||||
|
# Description: Does semanage interface ... work correctly?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include Beaker environment
|
||||||
|
. /usr/bin/rhts-environment.sh || exit 1
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm ${PACKAGE}
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "semanage interface --help" 0,1
|
||||||
|
for POLICY_TYPE in minimum mls targeted ; do
|
||||||
|
if [ ! -d /etc/selinux/${POLICY_TYPE} ] ; then
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
rlRun "semanage interface -l -S ${POLICY_TYPE}"
|
||||||
|
done
|
||||||
|
if ! rlIsRHEL 5; then
|
||||||
|
rlRun "semanage interface -l -S unknown 2>&1 | grep \"store cannot be accessed\""
|
||||||
|
fi
|
||||||
|
rlRun "semanage interface -a -t xyz_t xyz 2>&1 | grep -i -e 'not defined' -e 'error' -e 'could not'"
|
||||||
|
rlRun "semanage interface -m xyz" 1,2
|
||||||
|
rlRun "semanage interface -d xyz" 1
|
||||||
|
rlRun "semanage interface -a -t netif_t xyz"
|
||||||
|
if rlIsRHEL 5 6; then
|
||||||
|
rlRun "semanage interface -m -r s0 xyz"
|
||||||
|
else
|
||||||
|
rlRun "semanage interface -m -t netif_t -r s0 xyz"
|
||||||
|
fi
|
||||||
|
rlRun "semanage interface -l | grep \"xyz.*:netif_t:s0\""
|
||||||
|
rlRun "semanage interface -d xyz"
|
||||||
|
rlRun "semanage interface -l | grep xyz" 1
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
65
tests/semanage-login/Makefile
Normal file
65
tests/semanage-login/Makefile
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Regression/semanage-login
|
||||||
|
# Description: Does semanage login ... work correctly?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Regression/semanage-login
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
test -x runtest.sh || chmod a+x runtest.sh
|
||||||
|
test -x runtest.sh || chcon -t bin_t runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: Does semanage login ... work correctly?" >> $(METADATA)
|
||||||
|
@echo "Type: Regression" >> $(METADATA)
|
||||||
|
@echo "TestTime: 10m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils policycoreutils-python-utils grep shadow-utils selinux-policy-minimum selinux-policy-mls selinux-policy-targeted" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
4
tests/semanage-login/PURPOSE
Normal file
4
tests/semanage-login/PURPOSE
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Regression/semanage-login
|
||||||
|
Description: Does semanage login ... work correctly?
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
67
tests/semanage-login/runtest.sh
Executable file
67
tests/semanage-login/runtest.sh
Executable file
@ -0,0 +1,67 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Regression/semanage-login
|
||||||
|
# Description: Does semanage login ... work correctly?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include Beaker environment
|
||||||
|
. /usr/bin/rhts-environment.sh || exit 1
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm ${PACKAGE}
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "semanage login --help" 0,1
|
||||||
|
for POLICY_TYPE in minimum mls targeted ; do
|
||||||
|
if [ ! -d /etc/selinux/${POLICY_TYPE} ] ; then
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
rlRun "semanage login -l -S ${POLICY_TYPE}"
|
||||||
|
done
|
||||||
|
if ! rlIsRHEL 5; then
|
||||||
|
rlRun "semanage login -l -S unknown 2>&1 | grep \"store cannot be accessed\""
|
||||||
|
fi
|
||||||
|
rlRun "semanage login -a -s xyz_u xyz 2>&1 | grep -i -e 'does not exist' -e 'mapping.*invalid' -e 'could not query'"
|
||||||
|
rlRun "semanage login -m xyz" 1
|
||||||
|
rlRun "semanage login -d xyz" 1
|
||||||
|
rlRun "useradd xyz"
|
||||||
|
rlRun "semanage login -a -s user_u xyz"
|
||||||
|
rlRun "semanage login -m -r s0 xyz"
|
||||||
|
rlRun "semanage login -l | grep \"xyz.*user_u.*s0\""
|
||||||
|
rlRun "semanage login -d xyz"
|
||||||
|
rlRun "semanage login -l | grep xyz" 1
|
||||||
|
rlRun "userdel -rf xyz"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
70
tests/semanage-permissive-d-problems/Makefile
Normal file
70
tests/semanage-permissive-d-problems/Makefile
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Regression/semanage-permissive-d-problems
|
||||||
|
# Description: semanage permissive -d accepts more than domain types, its behavior is not reliable
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2011 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Regression/semanage-permissive-d-problems
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
chmod a+x runtest.sh
|
||||||
|
chcon -t bin_t runtest.sh; :
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: semanage permissive -d accepts more than domain types, its behavior is not reliable" >> $(METADATA)
|
||||||
|
@echo "Type: Regression" >> $(METADATA)
|
||||||
|
@echo "TestTime: 20m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils-python-utils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils-devel" >> $(METADATA)
|
||||||
|
@echo "Requires: selinux-policy-devel" >> $(METADATA)
|
||||||
|
@echo "Requires: grep" >> $(METADATA)
|
||||||
|
@echo "Requires: coreutils" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4 -RHELServer5 -RHELClient5" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
5
tests/semanage-permissive-d-problems/PURPOSE
Normal file
5
tests/semanage-permissive-d-problems/PURPOSE
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Regression/semanage-permissive-d-problems
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
||||||
|
Does semanage permissive work correctly?
|
||||||
|
|
93
tests/semanage-permissive-d-problems/runtest.sh
Executable file
93
tests/semanage-permissive-d-problems/runtest.sh
Executable file
@ -0,0 +1,93 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Regression/semanage-permissive-d-problems
|
||||||
|
# Description: semanage permissive -d accepts more than domain types, its behavior is not reliable
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2011 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include rhts environment
|
||||||
|
. /usr/bin/rhts-environment.sh
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm ${PACKAGE}
|
||||||
|
rlRun "rpm -qf /usr/sbin/semanage"
|
||||||
|
OUTPUT_FILE=`mktemp`
|
||||||
|
rlRun "sestatus"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
if selinuxenabled ; then
|
||||||
|
rlPhaseStartTest
|
||||||
|
if rlIsRHEL 7 ; then
|
||||||
|
rlFileBackup /usr/share/selinux/default/Makefile
|
||||||
|
rlRun "rm -rf /usr/share/selinux/default/Makefile"
|
||||||
|
fi
|
||||||
|
rlRun "semanage permissive -l | grep fenced" 1
|
||||||
|
rlRun "semanage permissive -a fenced_t"
|
||||||
|
rlRun "semanage permissive -l | grep fenced"
|
||||||
|
rlRun "semanage permissive -d fenced_t"
|
||||||
|
rlRun "semanage permissive -l | grep fenced" 1
|
||||||
|
if rlIsRHEL 7 ; then
|
||||||
|
rlFileRestore
|
||||||
|
fi
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "semanage permissive -l 2>&1 | grep -e ypserv_t -e ypbind_t | tee ${OUTPUT_FILE}"
|
||||||
|
rlRun "wc -l < ${OUTPUT_FILE} | grep ^0$"
|
||||||
|
rlRun "semanage permissive -a ypbind_t"
|
||||||
|
rlRun "semanage permissive -a ypserv_t"
|
||||||
|
rlRun "semanage permissive -l 2>&1 | grep -e ypserv_t -e ypbind_t | tee ${OUTPUT_FILE}"
|
||||||
|
rlRun "wc -l < ${OUTPUT_FILE} | grep ^2$"
|
||||||
|
rlRun "semanage permissive -d yp" 1-255
|
||||||
|
rlRun "semanage permissive -l 2>&1 | grep -e ypserv_t -e ypbind_t | tee ${OUTPUT_FILE}"
|
||||||
|
rlRun "wc -l < ${OUTPUT_FILE} | grep ^2$"
|
||||||
|
rlRun "semanage permissive -d ypbind_t"
|
||||||
|
rlRun "semanage permissive -d ypserv_t"
|
||||||
|
rlRun "semanage permissive -l 2>&1 | grep -e ypserv_t -e ypbind_t | tee ${OUTPUT_FILE}"
|
||||||
|
rlRun "wc -l < ${OUTPUT_FILE} | grep ^0$"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun -s "semanage permissive -d" 1
|
||||||
|
rlAssertNotGrep 'traceback' $rlRun_LOG -iEq
|
||||||
|
rlAssertGrep 'error: the following argument is required: type' $rlRun_LOG -iEq
|
||||||
|
rm -f $rlRun_LOG
|
||||||
|
rlPhaseEnd
|
||||||
|
else
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "semanage permissive -l >& ${OUTPUT_FILE}" 0,1
|
||||||
|
rlRun "grep -C 32 -i -e exception -e traceback -e error ${OUTPUT_FILE}" 1
|
||||||
|
rlPhaseEnd
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rm -f ${OUTPUT_FILE}
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
71
tests/semanage-port-add-delete-problems/Makefile
Normal file
71
tests/semanage-port-add-delete-problems/Makefile
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Regression/semanage-port-add-delete-problems
|
||||||
|
# Description: semanage accepts invalid port numbers and then cannot delete them
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2009 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Regression/semanage-port-add-delete-problems
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
chmod a+x runtest.sh
|
||||||
|
chcon -t bin_t runtest.sh;:
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: semanage accepts invalid port numbers and then cannot delete them" >> $(METADATA)
|
||||||
|
@echo "Type: Regression" >> $(METADATA)
|
||||||
|
@echo "TestTime: 15m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils-python-utils" >> $(METADATA)
|
||||||
|
@echo "Requires: setools-console" >> $(METADATA)
|
||||||
|
@echo "Requires: libselinux" >> $(METADATA)
|
||||||
|
@echo "Requires: libselinux-utils" >> $(METADATA)
|
||||||
|
@echo "Requires: coreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: grep" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
5
tests/semanage-port-add-delete-problems/PURPOSE
Normal file
5
tests/semanage-port-add-delete-problems/PURPOSE
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Regression/semanage-port-add-delete-problems
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
||||||
|
semanage accepts invalid port numbers and then cannot delete them
|
||||||
|
|
137
tests/semanage-port-add-delete-problems/runtest.sh
Executable file
137
tests/semanage-port-add-delete-problems/runtest.sh
Executable file
@ -0,0 +1,137 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/rhts-library/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Regression/semanage-port-add-delete-problems
|
||||||
|
# Description: semanage accepts invalid port numbers and then cannot delete them
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2009 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
. /usr/bin/rhts-environment.sh || exit 1
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
PORT_NAME="ldap_port_t"
|
||||||
|
BAD_PORT_NUMBER="123456"
|
||||||
|
GOOD_PORT_NUMBER="1389"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm ${PACKAGE}
|
||||||
|
rlRun "rpm -qf /usr/sbin/semanage"
|
||||||
|
rlRun "rpm -qf /usr/bin/seinfo"
|
||||||
|
OUTPUT_FILE=`mktemp`
|
||||||
|
rlRun "setenforce 1"
|
||||||
|
rlRun "sestatus"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "semanage port -l | grep ${PORT_NAME}"
|
||||||
|
|
||||||
|
rlRun "semanage port -l | grep ${PORT_NAME} | tee -a ${OUTPUT_FILE}"
|
||||||
|
rlRun "semanage port -a -t ${PORT_NAME} -p tcp ${BAD_PORT_NUMBER}" 1
|
||||||
|
rlRun "semanage port -l | grep ${PORT_NAME} | tee -a ${OUTPUT_FILE}"
|
||||||
|
rlRun "semanage port -d -t ${PORT_NAME} -p tcp ${BAD_PORT_NUMBER}" 1
|
||||||
|
rlRun "semanage port -l | grep ${PORT_NAME} | tee -a ${OUTPUT_FILE}"
|
||||||
|
#rlRun "sort ${OUTPUT_FILE} | uniq | wc -l | grep '^2$'"
|
||||||
|
|
||||||
|
rlRun "semanage port -l | grep ${PORT_NAME} | grep ${GOOD_PORT_NUMBER}" 1
|
||||||
|
rlRun "semanage port -a -t ${PORT_NAME} -p tcp ${GOOD_PORT_NUMBER}"
|
||||||
|
rlRun "semanage port -l | grep ${PORT_NAME} | grep ${GOOD_PORT_NUMBER}"
|
||||||
|
rlRun "semanage port -d -t ${PORT_NAME} -p tcp ${GOOD_PORT_NUMBER}"
|
||||||
|
rlRun "semanage port -l | grep ${PORT_NAME} | grep ${GOOD_PORT_NUMBER}" 1
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "semanage port -a -t syslogd_port_t -p tcp 60514-60516 2>&1 | grep -i traceback" 1
|
||||||
|
rlRun "semanage port -l | grep syslogd_port_t"
|
||||||
|
rlRun "semanage port -d -t syslogd_port_t -p tcp 60514-60516 2>&1 | grep -i traceback" 1
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
if rlIsRHEL ; then
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "ps -efZ | grep -v grep | grep \"auditd_t.*auditd\""
|
||||||
|
if rlIsRHEL 5 6; then
|
||||||
|
PORT_TYPE="syslogd_port_t"
|
||||||
|
else
|
||||||
|
PORT_TYPE="commplex_link_port_t"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# adding a port number to a type
|
||||||
|
START_DATE_TIME=`date "+%m/%d/%Y %T"`
|
||||||
|
sleep 1
|
||||||
|
rlRun "semanage port -a -p tcp -t $PORT_TYPE 5005"
|
||||||
|
sleep 2
|
||||||
|
|
||||||
|
# Check for user_avc
|
||||||
|
rlRun "ausearch -m user_avc -ts ${START_DATE_TIME} > ${OUTPUT_FILE}" 0,1
|
||||||
|
LINE_COUNT=`wc -l < ${OUTPUT_FILE}`
|
||||||
|
rlRun "cat ${OUTPUT_FILE}"
|
||||||
|
rlAssert0 "number of lines in ${OUTPUT_FILE} should be 0" ${LINE_COUNT}
|
||||||
|
|
||||||
|
# deleting a port number from a type
|
||||||
|
START_DATE_TIME=`date "+%m/%d/%Y %T"`
|
||||||
|
sleep 1
|
||||||
|
rlRun "semanage port -d -p tcp -t $PORT_TYPE 5005"
|
||||||
|
sleep 2
|
||||||
|
|
||||||
|
# Check for user_avc
|
||||||
|
rlRun "ausearch -m user_avc -ts ${START_DATE_TIME} > ${OUTPUT_FILE}" 0,1
|
||||||
|
LINE_COUNT=`wc -l < ${OUTPUT_FILE}`
|
||||||
|
rlRun "cat ${OUTPUT_FILE}"
|
||||||
|
rlAssert0 "number of lines in ${OUTPUT_FILE} should be 0" ${LINE_COUNT}
|
||||||
|
rlPhaseEnd
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! rlIsRHEL 5 ; then
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "seinfo --portcon | grep :hi_reserved_port_t:"
|
||||||
|
rlRun "seinfo --portcon | grep :reserved_port_t:"
|
||||||
|
rlRun "semanage port -l | grep ^hi_reserved_port_t"
|
||||||
|
rlRun "semanage port -l | grep ^reserved_port_t"
|
||||||
|
if ! rlIsRHEL 6 ; then
|
||||||
|
rlRun "seinfo --portcon | grep :unreserved_port_t:"
|
||||||
|
rlRun "semanage port -l | grep ^unreserved_port_t"
|
||||||
|
fi
|
||||||
|
rlPhaseEnd
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlPhaseStartTest "manipulation with hard-wired ports"
|
||||||
|
rlRun "semanage port -l | grep 'smtp_port_t.*tcp.*25'"
|
||||||
|
rlRun "semanage port -a -t smtp_port_t -p tcp 25 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "port .* already defined" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "semanage port -a -t smtp_port_t -p tcp 25 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "port .* already defined" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "semanage port -l | grep 'smtp_port_t.*tcp.*25'"
|
||||||
|
rlRun "semanage port -d -t smtp_port_t -p tcp 25 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "port .* is defined in policy.*cannot be deleted" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "semanage port -d -t smtp_port_t -p tcp 25 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "port .* is defined in policy.*cannot be deleted" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "semanage port -l | grep 'smtp_port_t.*tcp.*25'"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rm -f ${OUTPUT_FILE}
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
65
tests/semanage-user/Makefile
Normal file
65
tests/semanage-user/Makefile
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Regression/semanage-user
|
||||||
|
# Description: Does semanage user ... work correctly?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Regression/semanage-user
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE testpolicy.te
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
test -x runtest.sh || chmod a+x runtest.sh
|
||||||
|
test -x runtest.sh || chcon -t bin_t runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: Does semanage user ... work correctly?" >> $(METADATA)
|
||||||
|
@echo "Type: Regression" >> $(METADATA)
|
||||||
|
@echo "TestTime: 20m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils policycoreutils-python-utils grep selinux-policy-devel selinux-policy-minimum selinux-policy-mls selinux-policy-targeted selinux-policy-devel" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
4
tests/semanage-user/PURPOSE
Normal file
4
tests/semanage-user/PURPOSE
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Regression/semanage-user
|
||||||
|
Description: Does semanage user ... work correctly?
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
76
tests/semanage-user/runtest.sh
Executable file
76
tests/semanage-user/runtest.sh
Executable file
@ -0,0 +1,76 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Regression/semanage-user
|
||||||
|
# Description: Does semanage user ... work correctly?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include Beaker environment
|
||||||
|
. /usr/bin/rhts-environment.sh || exit 1
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm ${PACKAGE}
|
||||||
|
rlRun "make -f /usr/share/selinux/devel/Makefile"
|
||||||
|
rlRun "ls -l testpolicy.pp"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
if rlIsRHEL 5 6; then
|
||||||
|
rlRun "semanage user --help" 1
|
||||||
|
else
|
||||||
|
rlRun "semanage user --help" 0
|
||||||
|
# semanage: list option can not be used with --level ("semanage user -l")
|
||||||
|
rlRun "semanage user --help | grep fcontext" 1
|
||||||
|
fi
|
||||||
|
for POLICY_TYPE in minimum mls targeted ; do
|
||||||
|
if [ ! -d /etc/selinux/${POLICY_TYPE} ] ; then
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
rlRun "semanage user -l -S ${POLICY_TYPE}"
|
||||||
|
done
|
||||||
|
if ! rlIsRHEL 5; then
|
||||||
|
rlRun "semanage user -l -S unknown 2>&1 | grep \"store cannot be accessed\""
|
||||||
|
fi
|
||||||
|
rlRun "semanage user -a -P user -R xyz_r xyz_u 2>&1 | grep -i -e 'undefined' -e 'error' -e 'could not'"
|
||||||
|
rlRun "semanage user -m xyz_u" 1
|
||||||
|
rlRun "semanage user -d xyz_u" 1
|
||||||
|
rlRun "semodule -i testpolicy.pp"
|
||||||
|
rlRun "semanage user -a -P user -R xyz_r xyz_u"
|
||||||
|
rlRun "semanage user -m -r s0 xyz_u"
|
||||||
|
rlRun "semanage user -l | grep \"xyz_u.*s0.*s0.*xyz_r\""
|
||||||
|
rlRun "semanage user -d xyz_u"
|
||||||
|
rlRun "semanage user -l | grep xyz_u" 1
|
||||||
|
rlRun "semodule -r testpolicy"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlRun "rm -rf tmp testpolicy.{fc,if,pp}"
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
11
tests/semanage-user/testpolicy.te
Normal file
11
tests/semanage-user/testpolicy.te
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
module testpolicy 1.0;
|
||||||
|
|
||||||
|
type xyz_t;
|
||||||
|
role xyz_r;
|
||||||
|
|
||||||
|
require {
|
||||||
|
type xyz_t;
|
||||||
|
}
|
||||||
|
|
||||||
|
role xyz_r types xyz_t;
|
||||||
|
|
64
tests/sepolicy-generate/Makefile
Normal file
64
tests/sepolicy-generate/Makefile
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Sanity/sepolicy-generate
|
||||||
|
# Description: sepolicy generate sanity test
|
||||||
|
# Author: Michal Trunecka <mtruneck@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Sanity/sepolicy-generate
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
test -x runtest.sh || chmod a+x runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Michal Trunecka <mtruneck@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: sepolicy generate sanity test" >> $(METADATA)
|
||||||
|
@echo "Type: Sanity" >> $(METADATA)
|
||||||
|
@echo "TestTime: 115m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils policycoreutils-devel rpm-build" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4 -RHEL5 -RHEL6" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
3
tests/sepolicy-generate/PURPOSE
Normal file
3
tests/sepolicy-generate/PURPOSE
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Sanity/sepolicy-generate
|
||||||
|
Description: sepolicy generate sanity test
|
||||||
|
Author: Michal Trunecka <mtruneck@redhat.com>
|
115
tests/sepolicy-generate/runtest.sh
Executable file
115
tests/sepolicy-generate/runtest.sh
Executable file
@ -0,0 +1,115 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Sanity/sepolicy-generate
|
||||||
|
# Description: sepolicy generate sanity test
|
||||||
|
# Author: Michal Trunecka <mtruneck@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include Beaker environment
|
||||||
|
. /usr/bin/rhts-environment.sh || exit 1
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlRun "rlCheckRequirements ${PACKAGES[*]}" || rlDie "cannot continue"
|
||||||
|
rlRun "TmpDir=\$(mktemp -d)" 0 "Creating tmp directory"
|
||||||
|
rlRun "pushd $TmpDir"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "mkdir mypolicy"
|
||||||
|
rlRun "sepolicy generate --customize -p mypolicy -n testpolicy -d httpd_sys_script_t -w /home"
|
||||||
|
rlRun "grep 'manage_dirs_pattern(httpd_sys_script_t' mypolicy/testpolicy.te"
|
||||||
|
rlRun "rm -rf mypolicy"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "mkdir mypolicy"
|
||||||
|
rlRun "touch /usr/bin/testpolicy"
|
||||||
|
for VARIANT in " -n testpolicy --admin_user -r webadm_r" \
|
||||||
|
" --application /usr/bin/testpolicy " \
|
||||||
|
" -n testpolicy --confined_admin -a firewalld " \
|
||||||
|
" -n testpolicy --confined_admin " \
|
||||||
|
" -n testpolicy --customize -d httpd_t -a firewalld " \
|
||||||
|
" -n testpolicy --customize -d httpd_t" \
|
||||||
|
" --dbus /usr/bin/testpolicy " \
|
||||||
|
" -n testpolicy --desktop_user " \
|
||||||
|
" --inetd /usr/bin/testpolicy " \
|
||||||
|
" --init /usr/bin/testpolicy " \
|
||||||
|
" -n testpolicy --newtype -t newtype_var_log_t " \
|
||||||
|
" -n testpolicy --newtype -t newtype_unit_file_t " \
|
||||||
|
" -n testpolicy --newtype -t newtype_var_run_t " \
|
||||||
|
" -n testpolicy --newtype -t newtype_var_cache_t " \
|
||||||
|
" -n testpolicy --newtype -t newtype_tmp_t " \
|
||||||
|
" -n testpolicy --newtype -t newtype_port_t " \
|
||||||
|
" -n testpolicy --newtype -t newtype_var_spool_t " \
|
||||||
|
" -n testpolicy --newtype -t newtype_var_lib_t " \
|
||||||
|
" -n testpolicy --sandbox " \
|
||||||
|
" -n testpolicy --term_user " \
|
||||||
|
" -n testpolicy --x_user "
|
||||||
|
# " --cgi /usr/bin/testpolicy "
|
||||||
|
do
|
||||||
|
rlRun "sepolicy generate -p mypolicy $VARIANT"
|
||||||
|
rlRun "cat mypolicy/testpolicy.te"
|
||||||
|
rlRun "cat mypolicy/testpolicy.if"
|
||||||
|
rlRun "cat mypolicy/testpolicy.fc"
|
||||||
|
if echo "$VARIANT" | grep -q newtype; then
|
||||||
|
rlAssertNotExists "mypolicy/testpolicy.sh"
|
||||||
|
rlAssertNotExists "mypolicy/testpolicy.spec"
|
||||||
|
else
|
||||||
|
rlRun "mypolicy/testpolicy.sh"
|
||||||
|
rlRun "semodule -l | grep testpolicy"
|
||||||
|
rlRun "semanage user -d testpolicy_u" 0-255
|
||||||
|
rlRun "semodule -r testpolicy"
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlRun "rm -rf mypolicy/*"
|
||||||
|
rlRun "sleep 1"
|
||||||
|
|
||||||
|
if ! echo "$VARIANT" | grep -q newtype; then
|
||||||
|
rlRun "sepolicy generate -p mypolicy -w /home $VARIANT"
|
||||||
|
rlRun "cat mypolicy/testpolicy.te"
|
||||||
|
rlRun "cat mypolicy/testpolicy.if"
|
||||||
|
rlRun "cat mypolicy/testpolicy.fc"
|
||||||
|
|
||||||
|
rlRun "mypolicy/testpolicy.sh"
|
||||||
|
rlRun "semodule -l | grep testpolicy"
|
||||||
|
rlRun "semanage user -d testpolicy_u" 0-255
|
||||||
|
rlRun "semodule -r testpolicy"
|
||||||
|
|
||||||
|
rlRun "rm -rf mypolicy/*"
|
||||||
|
rlRun "sleep 1"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
rlRun "rm -rf mypolicy"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlRun "popd"
|
||||||
|
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
67
tests/sestatus/Makefile
Normal file
67
tests/sestatus/Makefile
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Sanity/sestatus
|
||||||
|
# Description: tests everything about sestatus
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2011 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Sanity/sestatus
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
chmod a+x runtest.sh
|
||||||
|
chcon -t bin_t runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: tests everything about sestatus" >> $(METADATA)
|
||||||
|
@echo "Type: Sanity" >> $(METADATA)
|
||||||
|
@echo "TestTime: 5m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: grep" >> $(METADATA)
|
||||||
|
@echo "Requires: man" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
4
tests/sestatus/PURPOSE
Normal file
4
tests/sestatus/PURPOSE
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Sanity/sestatus
|
||||||
|
Description: tests everything about sestatus
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
114
tests/sestatus/runtest.sh
Normal file
114
tests/sestatus/runtest.sh
Normal file
@ -0,0 +1,114 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Sanity/sestatus
|
||||||
|
# Description: tests everything about sestatus
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2011 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include rhts environment
|
||||||
|
. /usr/bin/rhts-environment.sh
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
if rlIsRHEL 5 6 ; then
|
||||||
|
SELINUX_FS_MOUNT="/selinux"
|
||||||
|
else # RHEL-7 and above
|
||||||
|
SELINUX_FS_MOUNT="/sys/fs/selinux"
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm ${PACKAGE}
|
||||||
|
rlFileBackup /etc/sestatus.conf
|
||||||
|
rlRun "mount | grep -i selinux" 0,1
|
||||||
|
OUTPUT_FILE=`mktemp`
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest "basic use"
|
||||||
|
rlRun "sestatus"
|
||||||
|
rlRun "sestatus -b 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "policy booleans" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "sestatus -v 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "process contexts" ${OUTPUT_FILE} -i
|
||||||
|
rlAssertGrep "file contexts" ${OUTPUT_FILE} -i
|
||||||
|
rlAssertGrep "current context" ${OUTPUT_FILE} -i
|
||||||
|
rlAssertGrep "init context" ${OUTPUT_FILE} -i
|
||||||
|
rlAssertGrep "controlling term" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "sestatus --xyz 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "invalid option" ${OUTPUT_FILE} -i
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest "extreme cases"
|
||||||
|
# pretend that the config file contains an invalid section
|
||||||
|
rlRun "sed -i 's/files/xyz/' /etc/sestatus.conf"
|
||||||
|
rlRun "sestatus -v 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "line not in a section" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "rm -f /etc/sestatus.conf"
|
||||||
|
rlRun "mkdir /etc/sestatus.conf" # intentionally replaced a file with a directory
|
||||||
|
rlRun "sestatus -v"
|
||||||
|
# pretend that the config file is missing
|
||||||
|
rlRun "rm -rf /etc/sestatus.conf"
|
||||||
|
for OPTION in "-bv" "-v" ; do
|
||||||
|
rlRun "sestatus ${OPTION} 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "unable to open /etc/sestatus.conf" ${OUTPUT_FILE} -i
|
||||||
|
done
|
||||||
|
rlFileRestore
|
||||||
|
# pretend that SELinux is disabled
|
||||||
|
rlRun "umount ${SELINUX_FS_MOUNT}"
|
||||||
|
for OPTION in "" "-b" "-v" "-bv" ; do
|
||||||
|
rlRun "sestatus ${OPTION} 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "selinux status.*disabled" ${OUTPUT_FILE} -i
|
||||||
|
done
|
||||||
|
rlRun "mount -t selinuxfs none ${SELINUX_FS_MOUNT}"
|
||||||
|
# pretend that no booleans are defined
|
||||||
|
rlRun "mkdir ./booleans"
|
||||||
|
rlRun "mount --bind ./booleans ${SELINUX_FS_MOUNT}/booleans"
|
||||||
|
rlRun "sestatus -b 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlRun "umount ${SELINUX_FS_MOUNT}/booleans"
|
||||||
|
rlAssertNotGrep "booleans" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "rmdir ./booleans"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
# This bug is not worth fixing in RHEL-5
|
||||||
|
if ! rlIsRHEL 5 ; then
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "rpm -ql ${PACKAGE} | grep /usr/sbin/sestatus"
|
||||||
|
rlRun "rpm -ql ${PACKAGE} | grep /usr/share/man/man8/sestatus.8"
|
||||||
|
for OPTION in b v ; do
|
||||||
|
rlRun "sestatus --help 2>&1 | grep -- -${OPTION}"
|
||||||
|
rlRun "man sestatus | col -b | grep -- -${OPTION}"
|
||||||
|
done
|
||||||
|
if ! rlIsRHEL 6 ; then
|
||||||
|
rlRun "man -w sestatus.conf"
|
||||||
|
fi
|
||||||
|
rlPhaseEnd
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlFileRestore
|
||||||
|
rm -f ${OUTPUT_FILE}
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
65
tests/setsebool/Makefile
Normal file
65
tests/setsebool/Makefile
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/policycoreutils/Sanity/setsebool
|
||||||
|
# Description: does setsebool work correctly ?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2011 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/policycoreutils/Sanity/setsebool
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
chmod a+x runtest.sh
|
||||||
|
chcon -t bin_t runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Milos Malik <mmalik@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: does setsebool work correctly ?" >> $(METADATA)
|
||||||
|
@echo "Type: Sanity" >> $(METADATA)
|
||||||
|
@echo "TestTime: 45m" >> $(METADATA)
|
||||||
|
@echo "RunFor: policycoreutils" >> $(METADATA)
|
||||||
|
@echo "Requires: audit policycoreutils libselinux-utils shadow-utils grep" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
@echo "Releases: -RHEL4" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
||||||
|
|
5
tests/setsebool/PURPOSE
Normal file
5
tests/setsebool/PURPOSE
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
PURPOSE of /CoreOS/policycoreutils/Sanity/setsebool
|
||||||
|
Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
|
||||||
|
Does setsebool work as expected? Does it produce correct audit messages?
|
||||||
|
|
151
tests/setsebool/runtest.sh
Executable file
151
tests/setsebool/runtest.sh
Executable file
@ -0,0 +1,151 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/policycoreutils/Sanity/setsebool
|
||||||
|
# Description: does setsebool work correctly ?
|
||||||
|
# Author: Milos Malik <mmalik@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2011 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include rhts environment
|
||||||
|
. /usr/bin/rhts-environment.sh
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh
|
||||||
|
|
||||||
|
PACKAGE="policycoreutils"
|
||||||
|
USER_NAME="user${RANDOM}"
|
||||||
|
USER_SECRET="s3kr3t${RANDOM}"
|
||||||
|
BOOLEAN="ftpd_connect_db"
|
||||||
|
if rlIsRHEL 5 6 ; then
|
||||||
|
SELINUX_FS_MOUNT="/selinux"
|
||||||
|
else # RHEL-7 and above
|
||||||
|
SELINUX_FS_MOUNT="/sys/fs/selinux"
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm ${PACKAGE}
|
||||||
|
OUTPUT_FILE=`mktemp`
|
||||||
|
chcon -t tmp_t ${OUTPUT_FILE}
|
||||||
|
|
||||||
|
rlRun "useradd ${USER_NAME}"
|
||||||
|
rlRun "echo ${USER_SECRET} | passwd --stdin ${USER_NAME}"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
for OPTION in "" "-P" ; do
|
||||||
|
for OPERATOR in " " "=" ; do
|
||||||
|
for VALUE in 0 1 false true off on ; do
|
||||||
|
rlRun "setsebool ${OPTION} ${BOOLEAN}${OPERATOR}${VALUE} | grep -i -e illegal -e usage -e invalid" 1
|
||||||
|
if [ ${VALUE} == "0" -o ${VALUE} == "false" ] ; then
|
||||||
|
SHOWN_VALUE="off"
|
||||||
|
elif [ ${VALUE} == "1" -o ${VALUE} == "true" ] ; then
|
||||||
|
SHOWN_VALUE="on"
|
||||||
|
else
|
||||||
|
SHOWN_VALUE=${VALUE}
|
||||||
|
fi
|
||||||
|
rlRun "getsebool -a | grep \"^${BOOLEAN}.*${SHOWN_VALUE}\""
|
||||||
|
done
|
||||||
|
done
|
||||||
|
done
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "setsebool" 1
|
||||||
|
rlRun "setsebool xyz=1 2>&1 | tee /dev/stderr | grep -i -e \"invalid boolean\" -e \"not found\" -e \"not defined\""
|
||||||
|
rlRun "setsebool xyz=-1 2>&1 | tee /dev/stderr | grep -i \"illegal value\""
|
||||||
|
rlRun "setsebool xyz=2 2>&1 | tee /dev/stderr | grep -i \"illegal value\""
|
||||||
|
if ! rlIsRHEL 5 6 ; then
|
||||||
|
rlRun "setsebool -N 2>&1 | tee /dev/stderr | grep -i \"boolean.*required\""
|
||||||
|
rlRun "setsebool -P 2>&1 | tee /dev/stderr | grep -i \"boolean.*required\""
|
||||||
|
fi
|
||||||
|
rlRun "setsebool -P xyz=1 2>&1 | tee /dev/stderr | grep -i -e \"invalid boolean\" -e \"not found\" -e \"not defined\""
|
||||||
|
rlRun "setsebool -P xyz=-1 2>&1 | tee /dev/stderr | grep -i \"illegal value\""
|
||||||
|
rlRun "setsebool -P xyz=2 2>&1 | tee /dev/stderr | grep -i \"illegal value\""
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
if ! rlIsRHEL 5 6 ; then
|
||||||
|
rlPhaseStartTest
|
||||||
|
rlRun "su -l -c '/usr/sbin/setsebool allow_ypbind 0' ${USER_NAME} 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "try as root" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "su -l -c '/usr/sbin/setsebool allow_ypbind 1' ${USER_NAME} 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "try as root" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "su -l -c '/usr/sbin/setsebool -P allow_ypbind 0' ${USER_NAME} 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "try as root" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "su -l -c '/usr/sbin/setsebool -P allow_ypbind 1' ${USER_NAME} 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "try as root" ${OUTPUT_FILE} -i
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
for OPTION in "" "-P" ; do
|
||||||
|
rlRun "getsebool allow_ypbind | grep nis_enabled"
|
||||||
|
rlRun "setsebool ${OPTION} allow_ypbind on"
|
||||||
|
rlRun "getsebool allow_ypbind | grep \"nis_enabled.*on\""
|
||||||
|
rlRun "setsebool ${OPTION} allow_ypbind off"
|
||||||
|
rlRun "getsebool allow_ypbind | grep \"nis_enabled.*off\""
|
||||||
|
done
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest
|
||||||
|
# https://fedoraproject.org/wiki/Features/SELinuxBooleansRename
|
||||||
|
for LINE in `cat /etc/selinux/*/booleans.subs_dist | sort | uniq | tr -s ' ' | tr ' ' ':'` ; do
|
||||||
|
OLD_BOOLEAN_NAME=`echo ${LINE} | cut -d : -f 1`
|
||||||
|
NEW_BOOLEAN_NAME=`echo ${LINE} | cut -d : -f 2`
|
||||||
|
rlRun "getsebool ${OLD_BOOLEAN_NAME} 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlRun "getsebool ${NEW_BOOLEAN_NAME} 2>&1 | tee -a ${OUTPUT_FILE}"
|
||||||
|
rlRun "uniq -c ${OUTPUT_FILE} | grep '2 '"
|
||||||
|
done
|
||||||
|
rlPhaseEnd
|
||||||
|
fi
|
||||||
|
|
||||||
|
rlPhaseStartTest "audit messages"
|
||||||
|
START_DATE_TIME=`date "+%m/%d/%Y %T"`
|
||||||
|
sleep 1
|
||||||
|
rlRun "setsebool ${BOOLEAN} on"
|
||||||
|
rlRun "setsebool ${BOOLEAN} off"
|
||||||
|
rlRun "setsebool ${BOOLEAN} on"
|
||||||
|
sleep 1
|
||||||
|
rlRun "ausearch -m MAC_CONFIG_CHANGE -i -ts ${START_DATE_TIME} | grep \"type=MAC_CONFIG_CHANGE.*bool=${BOOLEAN} val=1 old_val=0\""
|
||||||
|
rlRun "ausearch -m MAC_CONFIG_CHANGE -i -ts ${START_DATE_TIME} | grep \"type=MAC_CONFIG_CHANGE.*bool=${BOOLEAN} val=0 old_val=1\""
|
||||||
|
if rlIsRHEL ; then
|
||||||
|
rlRun "ausearch -m MAC_CONFIG_CHANGE -i -ts ${START_DATE_TIME} | grep \"type=SYSCALL.*comm=setsebool\""
|
||||||
|
fi
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest "extreme cases"
|
||||||
|
# pretend that no booleans are defined
|
||||||
|
rlRun "mkdir ./booleans"
|
||||||
|
rlRun "mount --bind ./booleans ${SELINUX_FS_MOUNT}/booleans"
|
||||||
|
rlRun "setsebool ${BOOLEAN} on 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "could not change active booleans" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "setsebool ${BOOLEAN} off 2>&1 | tee ${OUTPUT_FILE}"
|
||||||
|
rlAssertGrep "could not change active booleans" ${OUTPUT_FILE} -i
|
||||||
|
rlRun "umount ${SELINUX_FS_MOUNT}/booleans"
|
||||||
|
rlRun "rmdir ./booleans"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlRun "userdel -rf ${USER_NAME}"
|
||||||
|
rm -f ${OUTPUT_FILE}
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
||||||
|
|
23
tests/tests.yml
Normal file
23
tests/tests.yml
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
---
|
||||||
|
# Tests to run in a classic environment
|
||||||
|
- hosts: localhost
|
||||||
|
roles:
|
||||||
|
- role: standard-test-beakerlib
|
||||||
|
tags:
|
||||||
|
- classic
|
||||||
|
repositories:
|
||||||
|
- repo: "https://src.fedoraproject.org/tests/selinux.git"
|
||||||
|
dest: "selinux"
|
||||||
|
fmf_filter: "tier: 1 | component: policycoreutils & tags: generic, fedora"
|
||||||
|
|
||||||
|
# Tests for atomic host
|
||||||
|
- hosts: localhost
|
||||||
|
tags:
|
||||||
|
- atomic
|
||||||
|
# no compatible tests
|
||||||
|
|
||||||
|
# Tests for docker container
|
||||||
|
- hosts: localhost
|
||||||
|
tags:
|
||||||
|
- container
|
||||||
|
# no compatible tests
|
8
zanata.xml
Normal file
8
zanata.xml
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
|
||||||
|
<config xmlns="http://zanata.org/namespace/config/">
|
||||||
|
<url>https://fedora.zanata.org/</url>
|
||||||
|
<project>selinux</project>
|
||||||
|
<project-version>master</project-version>
|
||||||
|
<project-type>gettext</project-type>
|
||||||
|
|
||||||
|
</config>
|
Loading…
Reference in New Issue
Block a user