selinux-refpolicy/policy/modules/admin
Sven Vermeulen 1fe3d0929e sudo with SELinux support requires key handling
When using sudo with SELinux integrated support, the sudo domains need to be able to create user keys. Without this
privilege, any command invoked like "sudo /etc/init.d/local status" will run within the sudo domain (sysadm_sudo_t)
instead of the sysadm_t domain (or whatever domain is mentioned in the sudoers file).

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2012-05-04 08:30:28 -04:00
..
bootloader.fc
bootloader.if Add role attributes to bootloader. 2011-09-21 08:27:40 -04:00
bootloader.te Bump module versions for release. 2012-02-15 14:32:45 -05:00
consoletype.fc
consoletype.if Admin layer xml fixes. 2010-08-05 08:46:44 -04:00
consoletype.te Bump module versions for release. 2010-12-13 09:12:22 -05:00
dmesg.fc
dmesg.if Admin layer xml fixes. 2010-08-05 08:46:44 -04:00
dmesg.te
metadata.xml
netutils.fc
netutils.if netutils: search parent. 2010-10-05 15:11:00 -04:00
netutils.te Bump module versions for release. 2010-12-13 09:12:22 -05:00
su.fc
su.if Add user application, tmp and tmpfs file interfaces. 2011-10-28 08:48:10 -04:00
su.te Bump module versions for release. 2012-02-15 14:32:45 -05:00
sudo.fc
sudo.if sudo with SELinux support requires key handling 2012-05-04 08:30:28 -04:00
sudo.te Module version bump and changelog for various dontaudits from Sven Vermenulen. 2012-04-20 16:06:54 -04:00
usermanage.fc
usermanage.if Add role attributes to usermanage. 2011-09-21 08:30:54 -04:00
usermanage.te Module version bump for make role attributes able to type their "own" types patch from Harry Ciao. 2012-02-27 10:25:08 -05:00