Go to file
Vit Mojzis 10bb459add libsemanage: do not change file mode of seusers and users_extra
Commit 8702a865e0 causes file mode of
seusers and users_extra to change based on the value defined in config
file whenever direct_commit is called and policy is not rebuilt.
(e.g. when setting a boolean).

Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1512639

$ ll /var/lib/selinux/targeted/active/users_extra
-rw-------. 1 root root 101 11. dub 17.31 /var/lib/selinux/targeted/active/users_extra
$ ll /var/lib/selinux/targeted/active/seusers
-rw-------. 1 root root 73 11. dub 17.31 /var/lib/selinux/targeted/active/seusers
$ semanage boolean -m --on httpd_can_network_connect
$ ll /var/lib/selinux/targeted/active/seusers
-rw-r--r--. 1 root root 73 23. bře 16.59 /var/lib/selinux/targeted/active/seusers
$ ll /var/lib/selinux/targeted/active/users_extra
-rw-r--r--. 1 root root 101 23. bře 16.59 /var/lib/selinux/targeted/active/users_extra
$ rpm -Vq selinux-policy-targeted
.M.....T.    /var/lib/selinux/targeted/active/seusers
.M.....T.    /var/lib/selinux/targeted/active/users_extra

Signed-off-by: Vit Mojzis <vmojzis@redhat.com>
2018-04-13 16:21:26 -04:00
checkpolicy Resolve conflicts in expandattribute. 2018-03-26 12:29:37 -07:00
dbus dbus: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 20:02:03 +01:00
gui gui/fcontextPage: Set default object class in addDialog 2018-03-01 09:42:18 -05:00
libselinux libselinux: echo line number of bad label in selabel_fini() 2018-04-04 11:09:11 -05:00
libsemanage libsemanage: do not change file mode of seusers and users_extra 2018-04-13 16:21:26 -04:00
libsepol libsepol/cil: Improve processing of context rules 2018-03-29 15:53:18 -04:00
mcstrans mcstrans: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 15:59:38 +01:00
policycoreutils policycoreutils/semodule: Allow enabling/disabling multiple modules at once 2018-03-26 10:19:51 -04:00
python python/sepolgen: Try to translate SELinux contexts to raw 2018-04-13 13:41:46 -04:00
restorecond restorecond: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 20:02:02 +01:00
sandbox sandbox: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 20:02:02 +01:00
scripts Fix release script 2016-11-16 11:19:51 -05:00
secilc selinux: Add support for the SCTP portcon keyword 2018-03-19 12:34:29 -04:00
semodule-utils semodule-utils/semodule_package: fix semodule_unpackage man page 2018-02-26 09:52:02 -05:00
.gitignore restorecond: Add gitignore 2016-11-16 11:20:05 -05:00
.travis.yml libselinux,libsemanage: Replace PYSITEDIR with PYTHONLIBDIR 2018-03-17 09:03:33 +01:00
CleanSpec.mk Add empty top level Android.mk / CleanSpec.mk files 2015-04-16 07:54:09 -04:00
Makefile build: setup buildpaths if DESTDIR is specified 2018-02-14 20:02:03 +01:00
README libsepol: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 15:59:36 +01:00

README

Please submit all bug reports and patches to selinux@tycho.nsa.gov.
Subscribe via selinux-join@tycho.nsa.gov.

Build dependencies on Fedora:
yum install audit-libs-devel bison bzip2-devel dbus-devel dbus-glib-devel flex flex-devel flex-static glib2-devel libcap-devel libcap-ng-devel pam-devel pcre-devel python-devel setools-devel swig xmlto redhat-rpm-config

To build and install everything under a private directory, run:
make DESTDIR=~/obj install install-pywrap

To install as the default system libraries and binaries
(overwriting any previously installed ones - dangerous!),
on x86_64, run:
make LIBDIR=/usr/lib64 SHLIBDIR=/lib64 install install-pywrap relabel
or on x86 (32-bit), run:
make install install-pywrap relabel

This may render your system unusable if the upstream SELinux userspace
lacks library functions or other dependencies relied upon by your
distribution.  If it breaks, you get to keep both pieces.

To install libsepol on macOS (mainly for policy analysis):
cd libsepol; make PREFIX=/usr/local install

This requires GNU coreutils (brew install coreutils).