Package: refpolicy / 2:2.20190201-2

Metadata

Package Version Patches format
refpolicy 2:2.20190201-2 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
0008 Make default and root mcs seusers unconfined.patch | (download)

config/appconfig-mcs/seusers | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

 make default and root mcs/seusers unconfined


0010 chromium dri | (download)

policy/modules/apps/chromium.if | 12 12 + 0 - 0 !
policy/modules/apps/chromium.te | 57 51 + 6 - 0 !
policy/modules/kernel/kernel.if | 18 18 + 0 - 0 !
policy/modules/services/ssh.if | 18 18 + 0 - 0 !
policy/modules/services/xserver.if | 30 25 + 5 - 0 !
policy/modules/services/xserver.te | 7 7 + 0 - 0 !
6 files changed, 131 insertions(+), 11 deletions(-)

---
0011 pulseaudio | (download)

policy/modules/apps/pulseaudio.te | 12 11 + 1 - 0 !
1 file changed, 11 insertions(+), 1 deletion(-)

---
0013 strict | (download)

policy/modules/kernel/corecommands.te | 2 1 + 1 - 0 !
policy/modules/roles/sysadm.te | 7 7 + 0 - 0 !
policy/modules/services/dbus.if | 11 11 + 0 - 0 !
policy/modules/services/ssh.if | 1 1 + 0 - 0 !
policy/modules/services/xserver.if | 6 5 + 1 - 0 !
policy/modules/system/systemd.te | 4 0 + 4 - 0 !
policy/modules/system/userdomain.if | 38 38 + 0 - 0 !
7 files changed, 63 insertions(+), 6 deletions(-)

---
0014 misc | (download)

policy/modules/admin/apt.te | 2 1 + 1 - 0 !
policy/modules/admin/bootloader.te | 3 3 + 0 - 0 !
policy/modules/admin/netutils.te | 1 1 + 0 - 0 !
policy/modules/apps/mplayer.if | 2 1 + 1 - 0 !
policy/modules/apps/mplayer.te | 7 6 + 1 - 0 !
policy/modules/kernel/corecommands.fc | 1 0 + 1 - 0 !
policy/modules/kernel/corecommands.if | 1 1 + 0 - 0 !
policy/modules/kernel/kernel.if | 2 1 + 1 - 0 !
policy/modules/roles/staff.te | 13 13 + 0 - 0 !
policy/modules/roles/unprivuser.te | 21 21 + 0 - 0 !
policy/modules/services/apache.fc | 2 1 + 1 - 0 !
policy/modules/services/apache.if | 4 3 + 1 - 0 !
policy/modules/services/apache.te | 9 8 + 1 - 0 !
policy/modules/services/bind.te | 1 1 + 0 - 0 !
policy/modules/services/certbot.fc | 4 4 + 0 - 0 !
policy/modules/services/certbot.if | 46 46 + 0 - 0 !
policy/modules/services/certbot.te | 99 99 + 0 - 0 !
policy/modules/services/clamav.te | 2 2 + 0 - 0 !
policy/modules/services/cron.te | 2 2 + 0 - 0 !
policy/modules/services/dkim.te | 2 2 + 0 - 0 !
policy/modules/services/dovecot.te | 6 6 + 0 - 0 !
policy/modules/services/entropyd.te | 1 1 + 0 - 0 !
policy/modules/services/fail2ban.te | 6 6 + 0 - 0 !
policy/modules/services/jabber.te | 3 3 + 0 - 0 !
policy/modules/services/mailman.if | 1 1 + 0 - 0 !
policy/modules/services/mon.te | 5 5 + 0 - 0 !
policy/modules/services/mta.if | 3 3 + 0 - 0 !
policy/modules/services/mysql.if | 2 1 + 1 - 0 !
policy/modules/services/mysql.te | 3 3 + 0 - 0 !
policy/modules/services/postfix.te | 9 9 + 0 - 0 !
policy/modules/services/postgrey.te | 1 1 + 0 - 0 !
policy/modules/services/smartmon.te | 2 1 + 1 - 0 !
policy/modules/services/spamassassin.if | 19 19 + 0 - 0 !
policy/modules/services/spamassassin.te | 41 7 + 34 - 0 !
policy/modules/services/squid.te | 2 2 + 0 - 0 !
policy/modules/services/ssh.te | 1 1 + 0 - 0 !
policy/modules/services/tor.te | 1 1 + 0 - 0 !
policy/modules/services/xserver.if | 1 1 + 0 - 0 !
policy/modules/system/authlogin.te | 4 3 + 1 - 0 !
policy/modules/system/lvm.if | 18 18 + 0 - 0 !
policy/modules/system/lvm.te | 2 2 + 0 - 0 !
policy/modules/system/miscfiles.fc | 2 2 + 0 - 0 !
policy/modules/system/miscfiles.if | 20 20 + 0 - 0 !
policy/modules/system/modutils.te | 2 2 + 0 - 0 !
policy/modules/system/raid.fc | 2 2 + 0 - 0 !
policy/modules/system/raid.te | 2 2 + 0 - 0 !
policy/modules/system/sysnetwork.fc | 1 1 + 0 - 0 !
policy/modules/system/systemd.fc | 1 0 + 1 - 0 !
policy/modules/system/systemd.te | 6 5 + 1 - 0 !
policy/modules/system/unconfined.te | 5 5 + 0 - 0 !
policy/modules/system/xdg.if | 18 18 + 0 - 0 !
51 files changed, 367 insertions(+), 47 deletions(-)

---
0015 cron trivial | (download)

policy/modules/roles/staff.te | 2 1 + 1 - 0 !
policy/modules/roles/unprivuser.te | 2 1 + 1 - 0 !
policy/modules/services/cron.if | 68 44 + 24 - 0 !
policy/modules/services/cron.te | 10 10 + 0 - 0 !
policy/modules/services/mta.te | 5 5 + 0 - 0 !
policy/modules/system/init.if | 18 18 + 0 - 0 !
policy/modules/system/unconfined.te | 2 1 + 1 - 0 !
7 files changed, 80 insertions(+), 27 deletions(-)

---
0020 cron | (download)

policy/modules/services/cron.if | 80 45 + 35 - 0 !
policy/modules/services/cron.te | 37 17 + 20 - 0 !
2 files changed, 62 insertions(+), 55 deletions(-)

 cron patches
0110 gpg | (download)

policy/modules/apps/gpg.fc | 4 2 + 2 - 0 !
policy/modules/apps/gpg.if | 30 30 + 0 - 0 !
policy/modules/roles/staff.te | 4 0 + 4 - 0 !
policy/modules/roles/sysadm.te | 4 0 + 4 - 0 !
policy/modules/roles/unprivuser.te | 3 2 + 1 - 0 !
policy/modules/services/cron.if | 21 21 + 0 - 0 !
policy/modules/services/dbus.if | 9 6 + 3 - 0 !
policy/modules/services/ssh.if | 1 1 + 0 - 0 !
policy/modules/system/userdomain.if | 18 18 + 0 - 0 !
9 files changed, 80 insertions(+), 14 deletions(-)

 create user_gpg_t etc domains, remove gpg_helper_t & gpg_pinentry_t
 Only transition to gpg_t from user_t to solve problems with X sessions.
 Also remove gpg_helper_t and gpg_pinentry_t because they don't do any good.
 .
0190 net_admin | (download)

policy/modules/services/cron.te | 4 4 + 0 - 0 !
policy/modules/services/dbus.te | 4 4 + 0 - 0 !
policy/modules/services/policykit.te | 4 4 + 0 - 0 !
policy/modules/services/postfix.te | 4 4 + 0 - 0 !
4 files changed, 16 insertions(+)

---
0191 GetDynamicUsers | (download)

policy/modules/services/dictd.te | 4 4 + 0 - 0 !
policy/modules/services/postfix.te | 19 13 + 6 - 0 !
2 files changed, 17 insertions(+), 6 deletions(-)

---
1999 aliases | (download)

policy/modules/apps/chromium.te | 2 2 + 0 - 0 !
policy/modules/kernel/devices.te | 1 1 + 0 - 0 !
policy/modules/services/monit.te | 1 1 + 0 - 0 !
policy/modules/system/systemd.te | 1 1 + 0 - 0 !
4 files changed, 5 insertions(+)

---
2000 hacks | (download)

policy/modules/system/fstools.te | 5 5 + 0 - 0 !
policy/modules/system/init.if | 6 5 + 1 - 0 !
policy/modules/system/sysnetwork.te | 5 5 + 0 - 0 !
policy/modules/system/systemd.te | 4 4 + 0 - 0 !
policy/support/obj_perm_sets.spt | 5 0 + 5 - 0 !
5 files changed, 19 insertions(+), 6 deletions(-)

---