Commit Graph

1801 Commits

Author SHA1 Message Date
Chris PeBenito
0a0d071937 Module version bump for ports update from Dominick Grift. 2012-09-17 10:30:26 -04:00
Dominick Grift
53c8224fc4 Declare port types for ports used by Fedora but use /etc/services for port names rather than using fedora port names. If /etc/services does not have a port name for a port used by Fedora, skip for now.
Signed-off-by: Dominick Grift <dominick.grift@gmail.com>
2012-09-17 10:06:29 -04:00
Chris PeBenito
140cd7bb6d Module version bump for various changes from Sven Vermeulen. 2012-09-17 10:00:10 -04:00
Sven Vermeulen
bd4af49996 Allow init scripts to read courier configuration
The courier-imap and courier-pop3 daemons are started by sourcing their
configuration files, and then invoking the daemons using the proper options. If
this is done through a specialized script, then init only needs to call this
script (where a proper transition occurs) but if the init script itself does
this, it needs to be able to read the configuration files.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-09-17 09:31:44 -04:00
Sven Vermeulen
a3ac9f6054 Gentoo's openrc does not require initrc_exec_t for runscripts anymore
The Gentoo-specific runscripts in /sbin should not be marked as initrc_exec_t
anymore (just bin_t).

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-09-17 09:31:40 -04:00
Sven Vermeulen
074cfbeb5b Allow syslogd to create /var/lib/syslog and /var/lib/misc/syslog-ng.persist
If the /var/lib/syslog directory does not exist, then syslog-ng (running in
syslogd_t) will attempt to create the directory.

Allow the syslogd_t domain to create the directory, and use an automatic file
transition towards syslogd_var_lib_t.

Also, the syslog-ng daemon uses a persistence file in
/var/lib/misc/syslog-ng.persist (and .persist- if it suspects a collision). As
/var/lib/misc is still a generic var_lib_t, we have the syslogd_t daemon write
its files as syslogd_var_lib_t therein.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-09-17 09:31:35 -04:00
Sven Vermeulen
9176e86474 Puppet uses mount output for verification
Puppet calls mount to obtain the list of mounted file systems, redirecting its
output to a temporary file (labeled puppet_tmp_t). This allows the mount domain
to write to this resource.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-09-17 09:31:32 -04:00
Chris PeBenito
6a6325a852 Turn off all tunables by default, from Guido Trentalancia. 2012-09-06 09:23:30 -04:00
Chris PeBenito
49a65c0e6f Module version bump for loop-control patch. 2012-09-05 13:45:48 -04:00
Dominick Grift
d204c4cd07 Declare a loop control device node type and label /dev/loop-control accordingly
Signed-off-by: Dominick Grift <dominick.grift@gmail.com>
2012-09-05 13:42:18 -04:00
Chris PeBenito
4a865b3830 Module version bump for lost+found labeling in /var/log from Guido Trentalancia. 2012-08-29 10:49:23 -04:00
Guido Trentalancia
06e2744b23 add lost+found filesystem labels to support NSA security guidelines
Add lost+found filesystem label to /var/log and /var/log/audit.

Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
2012-08-29 10:41:32 -04:00
Chris PeBenito
d38855ea95 Module version bump for init_daemon_run_dirs usage from Sven Vermeulen. 2012-08-29 08:50:56 -04:00
Sven Vermeulen
258449bf2c Allow initrc_t to create run dirs for core modules
Use the init_daemon_run_dir interface in order to allow initrc_t to create the
run dirs of the postgresql service.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-08-29 08:45:26 -04:00
Sven Vermeulen
7857ccdf21 Use the init_daemon_run_dir interface for udev
Use the init_daemon_run_dir interface in order to allow initrc_t to create the
run dirs of the udev daemon with the proper file transition.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-08-29 08:45:21 -04:00
Sven Vermeulen
dc663fe40a Introduce init_daemon_run_dir transformation
Due to the introduction of /run, many init scripts need to create the daemon run
dirs (such as /run/udev for the udev init script). To simplify this, we
introduce the "daemonrundir" attribute to which initrc_t has the necessary
create_dirs_perms granted. Because it often needs to change the attributes or
ownership of the directories as well, we also grant the setattr rights on the
directory.

Then, when needed, the modules can call this interface while adding the name of
the directory. This will trigger a named file transition when initrc_t creates
this directory:
  init_daemon_run_dir(udev_var_run_t, "udev")
will trigger
  files_pid_filetrans(initrc_t, udev_var_run_t, dir, "udev")

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-08-29 08:45:17 -04:00
Chris PeBenito
c1880113bc Module version bump for /dev/mei type and label from Dominick Grift. 2012-08-23 09:39:13 -04:00
Dominick Grift
e541dcc668 Intel® Active Management Technology
Intel® AMT Linux support includes two components that allow interaction
between the Intel® AMT FW and the Linux OS: Intel® MEI (Intel® Management Engine Interface)
driver and LMS (Local Management Service) driver. Intel® MEI driver
allows application to communicate with the FW using host interface,
and LMS driver allows applications to access the Intel® AMT FW via the
local Intel® Management Engine Interface (Intel® MEI).

In addition, Intel has validated a kernel patch to enable
IDE-redirection. This is a community maintained patch, but Intel is
distributing the version used in the validation of the other Intel® AMT
components released here:

http://software.intel.com/en-us/articles/download-the-latest-intel-amt-open-source-drivers/

Declare a mei_device_t device node tyoe and label /dev/mei accordingly.

Signed-off-by: Dominick Grift <dominick.grift@gmail.com>
2012-08-23 09:30:00 -04:00
Chris PeBenito
aea38e0c90 Update contrib. 2012-08-22 11:04:24 -04:00
Chris PeBenito
e42f429719 Module version bump for fc fixes in devices module from Dominick Grift. 2012-08-21 15:32:40 -04:00
Dominick Grift
f933f286cb Fix a suspected typo
Signed-off-by: Dominick Grift <dominick.grift@gmail.com>
2012-08-21 15:28:33 -04:00
Dominick Grift
66d2ca265f There can be more than a single watchdog interface
Signed-off-by: Dominick Grift <dominick.grift@gmail.com>
2012-08-21 15:28:33 -04:00
Chris PeBenito
0a6013cd4f Module version bump for /run/dhcpc directory creation by dhcp from Sven Vermeulen. 2012-08-21 15:25:13 -04:00
Sven Vermeulen
452942ca99 DHCP client's hooks create /run/dhcpc directory
This directory contains the working files for updating network-related files
(like resolv.conf for name servers) before they are copied to the fixed
location. Although already in use previously, this location (/var/run/dhcpc or
/var/run/dhcpcd) was statically defined on the system.

With the introduction of /run and systems having /var/run -> /run, this is now a
dynamically created directory by dhcpc_t. Hence, the policy is enhanced allowing
dhcpc_t to create dhcpc_var_run_t directories, and include a file transition for
directories created in the var_run_t location(s).

Changes since v1
----------------
- Use create_dirs_pattern instead of manage_dirs_pattern

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-08-21 15:07:47 -04:00
Chris PeBenito
9a783cb659 Update contrib. 2012-08-15 11:01:01 -04:00
Chris PeBenito
2b70efd2f6 Module version bump for fc substitutions optimizations from Sven Vermeulen. 2012-08-15 11:00:55 -04:00
Sven Vermeulen
8e678aa594 Use substititions for /usr/local/lib and /etc/init.d
Introduce the substitutions for the /usr/local/lib* locations (towards /usr/lib)
and /etc/init.d (towards /etc/rc.d/init.d).

Update the file contexts of the translated locations.

Rebased (collided with Guido's patch for commenting within the
file_contexts.subs_dist file) since v3.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-08-15 10:30:25 -04:00
Chris PeBenito
695500bfec Update contrib. 2012-08-14 09:41:26 -04:00
Chris PeBenito
66452a8ed7 Module version bump for udev binary location update from Sven Vermeulen. 2012-08-08 09:30:36 -04:00
Chris PeBenito
3fa8477732 Minor whitespace fix in udev.fc 2012-08-08 09:30:09 -04:00
Sven Vermeulen
31f772cb7a New location for udevd binary
Recent udev installs its main binary in /usr/lib/systemd (called systemd-udevd).
Update file contexts to support this.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-08-08 09:29:27 -04:00
Chris PeBenito
8c9a1703a7 Add bird contrib module from Dominick Grift. 2012-08-08 09:27:26 -04:00
Chris PeBenito
b70d528401 Mcelog update from Guido Trentalancia. 2012-08-08 08:44:07 -04:00
Chris PeBenito
3516535aa6 Bump module versions for release. 2012-07-25 14:33:06 -04:00
Chris PeBenito
e3c57d3156 Rename epollwakeup capability2 permission to block_suspend to match the
corresponding kernel capability rename.
2012-07-25 09:01:55 -04:00
Chris PeBenito
81761270b1 Update contrib. 2012-07-24 09:21:46 -04:00
Chris PeBenito
36d6797363 Module version bump and changelog for udev and init changes to support /run, from Sven Vermeulen. 2012-07-24 09:11:14 -04:00
Chris PeBenito
61c65fe602 Rearrange interfaces in files.if and udev.if. 2012-07-24 08:55:52 -04:00
Chris PeBenito
bd4ea4cdc0 Whitespace fixes in udev.if. 2012-07-24 08:52:21 -04:00
Sven Vermeulen
dfccb1658f Allow init scripts to create and manage (udev) /run location
With udev now using /run for its data, the init script responsible for preparing
the environment to start up udev needs to be able to setup this location as
well.

We here allow init scripts to create the /run/udev location (transitioning to
udev_var_run_t) and manage this content (creating the /run/udev subdirectories).

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-07-24 08:42:36 -04:00
Sven Vermeulen
486e700352 Prepare udev interfaces for /run usage
Recent udev implementations now use /run (actually, /run/udev) for storing
database files, rules and more. Hence, we need to extend existing interfaces to
support searching through the udev_var_run_t location (as most of that was
previously only in device_t and/or etc_t or udev_etc_t)

Next to enhancing the interfaces, we provide additional ones that will be used
by the init script (for udev) which needs to create and support the new
/run/udev locations.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-07-24 08:42:31 -04:00
Sven Vermeulen
b2207b335f Allow init scripts to populate /run location
At boot up, the /run location is empty, and init scripts are responsible for
creating the necessary structure within to support their services. This means,
adding entries like for the lock folder (/run/lock).

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-07-24 08:42:28 -04:00
Sven Vermeulen
765e7b71ee Supporting interfaces for the /run changes
Since most distributions now support /run (which, thanks the the
file context substitutions, is marked as var_run_t), we need to update the
SELinux policies to support "dynamically" building up /run. Unlike /var/run,
which is most likely statically defined during distribution installation, /run
is a tmpfs which is built up from scratch on each and every boot.

But not only that, many services also use this location for other purposes than
just PID files (which is to be expected as these "other reasons" is why /run
came to be in the first place), so we need to support other types within this
location easily.

For this reason, we introduce support to
- creating the /run/lock location
- supporting named file transitions when init scripts create stuff in /run

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-07-24 08:42:10 -04:00
Sven Vermeulen
ec3995c576 Support log location for init script logging
Recent init script packages allow for logging init script progress (service
start/stop state information, sometimes even duration, etc.) so we introduce an
initrc_var_log_t logtype and allow initrc_t to manage this.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-07-24 08:40:09 -04:00
Chris PeBenito
2728d43634 Module version bump, changelog, pull contrib 2012-07-10 08:58:37 -04:00
Chris PeBenito
b35c647481 nss_domain attribute patch 3, Miroslav Grepl 2012-07-10 08:43:38 -04:00
Chris PeBenito
330b13a4a2 nss_domain attribute patch 1, Miroslav Grepl 2012-07-10 08:43:31 -04:00
Chris PeBenito
b4cbbb1fd8 Allow mount to write to all of its runtime files, from Guido Trentalancia
Allow mount to write not only to /etc/mtab but also to the /etc/mtab~[0-9]\{0,20\}
lock files (the number corresponds to the PID). Such files are still mistakenly
being labelled as etc_t instead of etc_runtime_t (thus preventing the successful
completion of the write operation and the accumulation of unremovable stale lock
files over several operation attempts as in normal system reboots, for example).

Do the same with the standard mount temporary file /etc/mtab.tmp.

The above refers to mount from util-linux-2.21.2 from kernel.org. See mount -vvv
for the location of such files.
2012-06-26 09:51:57 -04:00
Sven Vermeulen
afeb8c4cb9 Refactoring code to support python3
This patch includes the necessary refactoring to support python 3.

Changes since v2
- Do not include contrib submodule (no relevant changes there)
- Update in pyplate to fix a failure with str/unicode in doc generation

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-06-26 09:08:48 -04:00
Chris PeBenito
425adc3b2d Update capability2 object class for new wake_alarm and epollwakeup capabilities. 2012-06-06 13:34:45 -04:00