aboutgitcodebugslistschat
path: root/contrib/selinux/passt.te
diff options
context:
space:
mode:
authorStefano Brivio <sbrivio@redhat.com>2023-10-09 23:04:47 +0200
committerStefano Brivio <sbrivio@redhat.com>2023-11-07 09:52:55 +0100
commit3fb3f0f7a59498bdea1d199eecfdbae6c608f78f (patch)
treeb26b4764ad4daf834412467a175c52b76d4a975f /contrib/selinux/passt.te
parentf851084c96e0a932e51c15ad9551e2cd85362147 (diff)
downloadpasst-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar
passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.gz
passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.bz2
passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.lz
passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.xz
passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.tar.zst
passt-3fb3f0f7a59498bdea1d199eecfdbae6c608f78f.zip
selinux: Drop user_namespace class rules for Fedora 37
With current selinux-policy-37.22-1.fc37.noarch, and presumably any future update for Fedora 37, the user_namespace class is not available, so statements using it prevent the policy from being loaded. If a class is not defined in the base policy, any related permission is assumed to be enabled, so we can safely drop those. Link: https://bugzilla.redhat.com/show_bug.cgi?id=2237996 Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Diffstat (limited to 'contrib/selinux/passt.te')
-rw-r--r--contrib/selinux/passt.te2
1 files changed, 0 insertions, 2 deletions
diff --git a/contrib/selinux/passt.te b/contrib/selinux/passt.te
index facc2d1..ea768d9 100644
--- a/contrib/selinux/passt.te
+++ b/contrib/selinux/passt.te
@@ -53,7 +53,6 @@ require {
class capability { sys_tty_config setuid setgid };
class cap_userns { setpcap sys_admin sys_ptrace };
- class user_namespace create;
}
type passt_t;
@@ -93,7 +92,6 @@ allow syslogd_t self:cap_userns sys_ptrace;
allow passt_t self:process setcap;
allow passt_t self:capability { sys_tty_config setpcap net_bind_service setuid setgid};
allow passt_t self:cap_userns { setpcap sys_admin sys_ptrace };
-allow passt_t self:user_namespace create;
allow passt_t passwd_file_t:file read_file_perms;
sssd_search_lib(passt_t)