Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package selinux-policy for openSUSE:Factory 
checked in at 2023-03-22 22:29:18
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old)
 and      /work/SRC/openSUSE:Factory/.selinux-policy.new.31432 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "selinux-policy"

Wed Mar 22 22:29:18 2023 rev:44 rq:1073587 version:20230321

Changes:
--------
--- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes    
2023-03-07 16:48:31.977015764 +0100
+++ /work/SRC/openSUSE:Factory/.selinux-policy.new.31432/selinux-policy.changes 
2023-03-22 22:29:23.349814974 +0100
@@ -1,0 +2,28 @@
+Tue Mar 21 15:37:23 UTC 2023 - jseg...@suse.com
+
+- Update to version 20230321:
+  * make kernel_t unconfined again
+
+-------------------------------------------------------------------
+Thu Mar 16 15:43:19 UTC 2023 - jseg...@suse.com
+
+- Update to version 20230316:
+  * prevent labeling of overlayfs filesystems based on the /var/lib/overlay
+    path
+  * allow kernel_t to relabel etc_t files
+  * allow kernel_t to relabel sysnet config files
+  * allow kernel_t to relabel systemd hwdb etc files
+  * add systemd_hwdb_relabel_etc_files to allow labeling of hwdb files
+  * change sysnet_relabelto_net_conf and sysnet_relabelfrom_net_conf to apply
+    to files and lnk_files. lnk_files are commonly used in SUSE to allow easy
+    management of config files
+  * add files_relabel_etc_files_basic and files_relabel_etc_lnk_files_basic
+    interfaces to allow labeling on etc_t, not on the broader configfiles
+    attribute
+  * Allow systemd-timesyncd to bind to generic UDP ports (bsc#1207962). The
+    watch permissions reported are already fixed in a current policy.
+- Reinstate update.sh and remove container-selinux from the service.
+  Having both repos in there causes issues and update.sh makes the update
+  process easier in general. Updated README.Update
+
+-------------------------------------------------------------------
@@ -5,0 +34,131 @@
+
+-------------------------------------------------------------------
+Tue Feb 14 21:41:54 UTC 2023 - Hu <cathy...@suse.com>
+
+- Complete packaging rework: Move policy to git repository and
+  only use tar_scm obs service to refresh from there: 
+  https://gitlab.suse.de/selinux/selinux-policy
+
+  Please use `osc service manualrun` to update this OBS package to the 
+  newest git version.
+
+  * Added README.Update describing how to update this package
+  * Added _service file that pulls from selinux-policy and 
+    upstream container-selinux and tars them
+  * Adapted selinux-policy.spec to build selinux-policy with
+    container-selinux
+  * Removed update.sh as no longer needed
+  * Removed suse specific modules as they are now covered by git commits
+    * packagekit.te packagekit.if packagekit.fc
+    * rebootmgr.te rebootmgr.if rebootmgr.fc
+    * rtorrent.te rtorrent.if rtorrent.fc
+    * wicked.te wicked.if wicked.fc
+  * Removed *.patch as they are now covered by git commits:
+    * distro_suse_to_distro_redhat.patch
+    * dontaudit_interface_kmod_tmpfs.patch
+    * fix_accountsd.patch
+    * fix_alsa.patch
+    * fix_apache.patch
+    * fix_auditd.patch
+    * fix_authlogin.patch
+    * fix_automount.patch
+    * fix_bitlbee.patch
+    * fix_chronyd.patch
+    * fix_cloudform.patch
+    * fix_colord.patch
+    * fix_corecommand.patch
+    * fix_cron.patch
+    * fix_dbus.patch
+    * fix_djbdns.patch
+    * fix_dnsmasq.patch
+    * fix_dovecot.patch
+    * fix_entropyd.patch
+    * fix_firewalld.patch
+    * fix_fwupd.patch
+    * fix_geoclue.patch
+    * fix_hypervkvp.patch
+    * fix_init.patch
+    * fix_ipsec.patch
+    * fix_iptables.patch
+    * fix_irqbalance.patch
+    * fix_java.patch
+    * fix_kernel.patch
+    * fix_kernel_sysctl.patch
+    * fix_libraries.patch
+    * fix_locallogin.patch
+    * fix_logging.patch
+    * fix_logrotate.patch
+    * fix_mcelog.patch
+    * fix_miscfiles.patch
+    * fix_nagios.patch
+    * fix_networkmanager.patch
+    * fix_nis.patch
+    * fix_nscd.patch
+    * fix_ntp.patch
+    * fix_openvpn.patch
+    * fix_postfix.patch
+    * fix_rpm.patch
+    * fix_rtkit.patch
+    * fix_screen.patch
+    * fix_selinuxutil.patch
+    * fix_sendmail.patch
+    * fix_smartmon.patch
+    * fix_snapper.patch
+    * fix_sslh.patch
+    * fix_sysnetwork.patch
+    * fix_systemd.patch
+    * fix_systemd_watch.patch
+    * fix_thunderbird.patch
+    * fix_unconfined.patch
+    * fix_unconfineduser.patch
+    * fix_unprivuser.patch
+    * fix_userdomain.patch
+    * fix_usermanage.patch
+    * fix_wine.patch
+    * fix_xserver.patch
+    * sedoctool.patch
+    * systemd_domain_dyntrans_type.patch
+
+-------------------------------------------------------------------
+Mon Feb  6 08:36:32 UTC 2023 - Johannes Segitz <jseg...@suse.com>
+
+- Update to version 20230206. Refreshed:
+  * fix_entropyd.patch
+  * fix_networkmanager.patch
+  * fix_systemd_watch.patch
+  * fix_unconfineduser.patch
+- Updated fix_kernel.patch to allow kernel_t access to xdm state. This is
+  necessary as plymouth doesn't run in it's own domain in early boot
+
+-------------------------------------------------------------------
+Mon Jan 16 08:42:09 UTC 2023 - Johannes Segitz <jseg...@suse.com>
+
+- Update to version 20230125. Refreshed:
+  * distro_suse_to_distro_redhat.patch
+  * fix_dnsmasq.patch
+  * fix_init.patch
+  * fix_ipsec.patch
+  * fix_kernel_sysctl.patch
+  * fix_logging.patch
+  * fix_rpm.patch
+  * fix_selinuxutil.patch
+  * fix_systemd_watch.patch
+  * fix_userdomain.patch
+- More flexible lib(exec) matching in fix_fwupd.patch
+- Removed sys_admin for systemd_gpt_generator_t in fix_systemd.patch
+- Dropped fix_container.patch, is now upstream
+- Added fix_entropyd.patch
+  * Added new interface entropyd_semaphore_filetrans to properly transfer
+    semaphore created during early boot. That doesn't work yet, so work
+    around with next item
+  * Allow reading tempfs files
+- Added fix_kernel.patch. Added modutils_execute_kmod_tmpfs_files interace
+  to allow kmod_tmpfs_t files to be executed. Necessary for firewalld
+- Added fix_rtkit.patch to fix labeling of binary
+- Modified fix_ntp.patch:
+  * Proper labeling for start-ntpd
+  * Fixed label rules for chroot path
+  * Temporarily allow dac_override for ntpd_t (bsc#1207577)
+  * Add interface ntp_manage_pid_files to allow management of pid
+    files
+- Updated fix_networkmanager.patch to allow managing ntp pid files

Old:
----
  distro_suse_to_distro_redhat.patch
  dontaudit_interface_kmod_tmpfs.patch
  fedora-policy-20221019.tar.bz2
  fix_accountsd.patch
  fix_alsa.patch
  fix_apache.patch
  fix_auditd.patch
  fix_authlogin.patch
  fix_automount.patch
  fix_bitlbee.patch
  fix_chronyd.patch
  fix_cloudform.patch
  fix_colord.patch
  fix_container.patch
  fix_corecommand.patch
  fix_cron.patch
  fix_dbus.patch
  fix_djbdns.patch
  fix_dnsmasq.patch
  fix_dovecot.patch
  fix_firewalld.patch
  fix_fwupd.patch
  fix_geoclue.patch
  fix_hypervkvp.patch
  fix_init.patch
  fix_ipsec.patch
  fix_iptables.patch
  fix_irqbalance.patch
  fix_java.patch
  fix_kernel_sysctl.patch
  fix_libraries.patch
  fix_locallogin.patch
  fix_logging.patch
  fix_logrotate.patch
  fix_mcelog.patch
  fix_miscfiles.patch
  fix_nagios.patch
  fix_networkmanager.patch
  fix_nis.patch
  fix_nscd.patch
  fix_ntp.patch
  fix_openvpn.patch
  fix_postfix.patch
  fix_rpm.patch
  fix_screen.patch
  fix_selinuxutil.patch
  fix_sendmail.patch
  fix_smartmon.patch
  fix_snapper.patch
  fix_sslh.patch
  fix_sysnetwork.patch
  fix_systemd.patch
  fix_systemd_watch.patch
  fix_thunderbird.patch
  fix_unconfined.patch
  fix_unconfineduser.patch
  fix_unprivuser.patch
  fix_userdomain.patch
  fix_usermanage.patch
  fix_wine.patch
  fix_xserver.patch
  packagekit.fc
  packagekit.if
  packagekit.te
  rebootmgr.fc
  rebootmgr.if
  rebootmgr.te
  rtorrent.fc
  rtorrent.if
  rtorrent.te
  sedoctool.patch
  systemd_domain_dyntrans_type.patch
  wicked.fc
  wicked.if
  wicked.te

New:
----
  README.Update
  _service
  _servicedata
  container.fc
  container.if
  container.te
  selinux-policy-20230321.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ selinux-policy.spec ++++++
--- /var/tmp/diff_new_pack.pBseQs/_old  2023-03-22 22:29:24.313819825 +0100
+++ /var/tmp/diff_new_pack.pBseQs/_new  2023-03-22 22:29:24.317819845 +0100
@@ -33,10 +33,15 @@
 License:        GPL-2.0-or-later
 Group:          System/Management
 Name:           selinux-policy
-Version:        20221019
+Version:        20230321
 Release:        0
-Source:         fedora-policy-%{version}.tar.bz2
-Source1:        selinux-policy-rpmlintrc
+Source0:        %{name}-%{version}.tar.xz
+Source1:        container.fc
+Source2:        container.te
+Source3:        container.if
+Source4:        selinux-policy-rpmlintrc
+Source5:        README.Update
+Source6:        update.sh
 
 Source10:       modules-targeted-base.conf
 Source11:       modules-targeted-contrib.conf
@@ -70,88 +75,6 @@
 #Source93:       config.tgz
 Source94:       file_contexts.subs_dist
 Source95:       macros.selinux-policy
-Source96:       update.sh
-
-Source120:      packagekit.te
-Source121:      packagekit.if
-Source122:      packagekit.fc
-Source123:      rtorrent.te
-Source124:      rtorrent.if
-Source125:      rtorrent.fc
-Source126:      wicked.te
-Source127:      wicked.if
-Source128:      wicked.fc
-Source129:      rebootmgr.te
-Source130:      rebootmgr.if
-Source131:      rebootmgr.fc
-
-Patch000:       distro_suse_to_distro_redhat.patch
-Patch001:       fix_djbdns.patch
-Patch002:       fix_dbus.patch
-Patch004:       fix_java.patch
-Patch006:       fix_thunderbird.patch
-Patch007:       fix_postfix.patch
-Patch008:       fix_nscd.patch
-Patch009:       fix_sysnetwork.patch
-Patch010:       fix_logging.patch
-Patch011:       fix_xserver.patch
-Patch012:       fix_miscfiles.patch
-Patch013:       fix_init.patch
-Patch014:       fix_locallogin.patch
-Patch016:       fix_iptables.patch
-Patch017:       fix_irqbalance.patch
-Patch018:       fix_ntp.patch
-Patch019:       fix_fwupd.patch
-Patch020:       fix_firewalld.patch
-Patch021:       fix_logrotate.patch
-Patch022:       fix_selinuxutil.patch
-Patch024:       fix_corecommand.patch
-Patch025:       fix_snapper.patch
-Patch026:       fix_systemd.patch
-Patch027:       fix_unconfined.patch
-Patch028:       fix_unconfineduser.patch
-Patch029:       fix_chronyd.patch
-Patch030:       fix_networkmanager.patch
-Patch032:       fix_accountsd.patch
-Patch033:       fix_automount.patch
-Patch034:       fix_colord.patch
-Patch035:       fix_mcelog.patch
-Patch036:       fix_sslh.patch
-Patch037:       fix_nagios.patch
-Patch038:       fix_openvpn.patch
-Patch039:       fix_cron.patch
-Patch040:       fix_usermanage.patch
-Patch041:       fix_smartmon.patch
-Patch042:       fix_geoclue.patch
-Patch044:       fix_authlogin.patch
-Patch045:       fix_screen.patch
-Patch046:       fix_unprivuser.patch
-Patch047:       fix_rpm.patch
-Patch048:       fix_apache.patch
-Patch049:       fix_nis.patch
-Patch050:       fix_libraries.patch
-Patch051:       fix_dovecot.patch
-# https://github.com/cockpit-project/cockpit/pull/15758
-#Patch052:       fix_cockpit.patch
-Patch053:       fix_systemd_watch.patch
-# kernel specific sysctl.conf (boo#1184804)
-Patch054:       fix_kernel_sysctl.patch
-Patch055:       fix_auditd.patch
-Patch056:       fix_wine.patch
-Patch057:       fix_hypervkvp.patch
-Patch058:       fix_bitlbee.patch
-Patch059:       systemd_domain_dyntrans_type.patch
-Patch060:       fix_dnsmasq.patch
-Patch061:       fix_userdomain.patch
-Patch062:       fix_cloudform.patch
-Patch063:       fix_alsa.patch
-Patch064:       dontaudit_interface_kmod_tmpfs.patch
-Patch065:       fix_sendmail.patch
-Patch066:       fix_ipsec.patch
-# https://github.com/containers/container-selinux/pull/199, can be dropped 
once this is included
-Patch067:       fix_container.patch
-
-Patch100:       sedoctool.patch
 
 URL:            https://github.com/fedora-selinux/selinux-policy.git
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
@@ -412,7 +335,16 @@
 exit 0
 
 %prep
-%autosetup -n fedora-policy-%{version} -p1
+
+# set up selinux-policy
+%autosetup -n %{name}-%{version} -p1
+
+# dirty hack for container-selinux, because selinux-policy won't build without 
it
+# upstream does not want to include it in main policy tree:
+# see discussion in https://github.com/containers/container-selinux/issues/186
+for i in %{SOURCE1} %{SOURCE2} %{SOURCE3}; do
+  cp $i policy/modules/services/
+done
 
 %build
 
@@ -439,10 +371,6 @@
  cp $i selinux_config
 done
 
-for i in %{SOURCE120} %{SOURCE121} %{SOURCE122} %{SOURCE123} %{SOURCE124} 
%{SOURCE125} %{SOURCE126} %{SOURCE127} %{SOURCE128} %{SOURCE129} %{SOURCE130} 
%{SOURCE131}; do
- cp $i policy/modules/contrib
-done
-
 make clean
 %if %{BUILD_TARGETED}
 %makeCmds targeted mcs allow

++++++ README.Update ++++++
# How to update this project

This project is updated using obs services.
The obs services pull from git repositories, which are specified in the 
`_service` file.
Please contribute all changes to the upstream git repositories listed there.

To update this project to the upstream versions, please make sure you installed 
these obs services locally:
```
sudo zypper in obs-service-tar_scm obs-service-recompress 
obs-service-set_version obs-service-download_files
```

Then, generate new tarballs, changelog and version number for this repository 
by running this command:
```
sh update.sh
```

Afterwards, please check your local project state and remove old tarballs if 
necessary.
Then proceed as usual with check-in and build.


++++++ _service ++++++
<services>
  <service name="tar_scm" mode="manual">
    <param name="version">1</param>
    <param name="versionformat">%cd</param>
    <param name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param>
    <param name="scm">git</param>
    <param name="changesgenerate">enable</param>
    <param name="revision">factory</param>
  </service>
  <service name="recompress" mode="manual">
    <param name="compression">xz</param>
    <param name="file">*.tar</param>
  </service>
  <service name="set_version" mode="manual" >
    <param name="file">selinux-policy.spec</param>
  </service>
</services>


++++++ _servicedata ++++++
<servicedata>
<service name="tar_scm">
                <param 
name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param>
              <param 
name="changesrevision">0140f0a3f8dbf17ddbd0adb6c8fc7eb23511ba2f</param></service><service
 name="tar_scm">
                <param 
name="url">https://github.com/containers/container-selinux.git</param>
              <param 
name="changesrevision">07b3034f6d9625ab84508a2f46515d8ff79b4204</param></service></servicedata>
(No newline at EOF)

++++++ container.fc ++++++
/root/\.docker  gen_context(system_u:object_r:container_home_t,s0)

/usr/libexec/docker/.*  --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/libexec/docker/.*    --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/libexec/docker/docker.*    --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/libexec/docker/docker.*      --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/docker.*             --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/kubelet.*            --      
gen_context(system_u:object_r:kubelet_exec_t,s0)
/usr/local/s?bin/kubelet.*              --      
gen_context(system_u:object_r:kubelet_exec_t,s0)
/usr/s?bin/hyperkube.*          --      
gen_context(system_u:object_r:kubelet_exec_t,s0)
/usr/local/s?bin/hyperkube.*            --      
gen_context(system_u:object_r:kubelet_exec_t,s0)
/usr/local/s?bin/docker.*               --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/containerd.*         --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/s?bin/containerd.*           --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/buildkitd.*          --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/s?bin/buildkitd.*            --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)

/usr/s?bin/lxc-.*                       --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/lxd-.*                       --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/lxc                  --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/lxd                  --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/fuidshift            --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/libexec/lxc/.*             --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/libexec/lxd/.*             --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/bin/podman         --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/bin/podman           --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/bin/conmon         --      gen_context(system_u:object_r:conmon_exec_t,s0)
/usr/local/bin/conmon           --      
gen_context(system_u:object_r:conmon_exec_t,s0)
/usr/local/s?bin/runc           --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/runc                 --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/s?bin/buildkit-runc  --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/buildkit-runc        --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/s?bin/crun           --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/crun                 --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/s?bin/kata-agent     --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/kata-agent           --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/bin/container[^/]*plugin   --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/bin/rhel-push-plugin       --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/sbin/rhel-push-plugin      --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/docker-latest                --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/docker-current               --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/docker-novolume-plugin       --      
gen_context(system_u:object_r:container_auth_exec_t,s0)
/usr/s?bin/crio.*                       --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/s?bin/crio.*                 --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/s?bin/ocid.*                       --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/lib/docker/docker-novolume-plugin  --      
gen_context(system_u:object_r:container_auth_exec_t,s0)
/usr/lib/docker/[^/]*plugin     --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)
/usr/local/lib/docker/[^/]*plugin       --      
gen_context(system_u:object_r:container_runtime_exec_t,s0)

/usr/lib/systemd/system/docker.*                --      
gen_context(system_u:object_r:container_unit_file_t,s0)
/usr/lib/systemd/system/lxd.*           --      
gen_context(system_u:object_r:container_unit_file_t,s0)
/usr/lib/systemd/system/containerd.*            --      
gen_context(system_u:object_r:container_unit_file_t,s0)
/usr/lib/systemd/system/buildkit.*              --      
gen_context(system_u:object_r:container_unit_file_t,s0)

/etc/docker(/.*)?               
gen_context(system_u:object_r:container_config_t,s0)
/etc/docker-latest(/.*)?                
gen_context(system_u:object_r:container_config_t,s0)
/etc/containerd(/.*)?           
gen_context(system_u:object_r:container_config_t,s0)
/etc/buildkit(/.*)?             
gen_context(system_u:object_r:container_config_t,s0)
/etc/crio(/.*)?         gen_context(system_u:object_r:container_config_t,s0)
/exports(/.*)?          gen_context(system_u:object_r:container_var_lib_t,s0)

/var/lib/registry(/.*)? gen_context(system_u:object_r:container_var_lib_t,s0)
/var/lib/lxc(/.*)?      gen_context(system_u:object_r:container_var_lib_t,s0)
/var/lib/lxd(/.*)?      gen_context(system_u:object_r:container_var_lib_t,s0)
/var/lib/docker(/.*)?   gen_context(system_u:object_r:container_var_lib_t,s0)
/var/lib/docker/.*/config\.env  
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker/containers/.*/.*\.log           
gen_context(system_u:object_r:container_log_t,s0)
/var/lib/docker/containers/.*/hostname          
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker/containers/.*/hosts             
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker/init(/.*)?              
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker/overlay(/.*)?   
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker/overlay2(/.*)?  
gen_context(system_u:object_r:container_ro_file_t,s0)

/var/lib/containerd(/.*)?       
gen_context(system_u:object_r:container_var_lib_t,s0)
# The "snapshots" directory of containerd and BuildKit must be writable, as it 
is used as an upperdir as well as a lowerdir.
/var/lib/containerd/[^/]*/snapshots(/.*)?       
gen_context(system_u:object_r:container_file_t,s0)
/var/lib/containerd/[^/]*/sandboxes(/.*)?       
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/nerdctl(/.*)? gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/nerdctl/[^/]*/volumes(/.*)?    
gen_context(system_u:object_r:container_file_t,s0)

/var/lib/buildkit(/.*)? gen_context(system_u:object_r:container_var_lib_t,s0)
/var/lib/buildkit/[^/]*/snapshots(/.*)? 
gen_context(system_u:object_r:container_file_t,s0)
# "/var/lib/buildkit/runc-<SNAPSHOTTER>/executor" contains "resolv.conf" and 
"hosts.<RANDOM>", for OCI (runc) worker mode.
/var/lib/buildkit/runc-.*/executor(/.*?)        
gen_context(system_u:object_r:container_ro_file_t,s0)
# "/var/lib/buildkit/containerd-<SNAPSHOTTER>" contains resolv.conf and 
hosts.<RANDOM>, for containerd worker mode.
# Unlike the runc-<SNAPSHOTTER> directory, this directory does not contain the 
"executor" directory inside it.
/var/lib/buildkit/containerd-.*(/.*?)   
gen_context(system_u:object_r:container_ro_file_t,s0)

HOME_DIR/\.local/share/containers/storage/overlay(/.*)?  
gen_context(system_u:object_r:container_ro_file_t,s0)
HOME_DIR/\.local/share/containers/storage/overlay2(/.*)?         
gen_context(system_u:object_r:container_ro_file_t,s0)
HOME_DIR/\.local/share/containers/storage/overlay-layers(/.*)?   
gen_context(system_u:object_r:container_ro_file_t,s0)
HOME_DIR/\.local/share/containers/storage/overlay2-layers(/.*)?  
gen_context(system_u:object_r:container_ro_file_t,s0)
HOME_DIR/\.local/share/containers/storage/overlay-images(/.*)?   
gen_context(system_u:object_r:container_ro_file_t,s0)
HOME_DIR/\.local/share/containers/storage/overlay2-images(/.*)?  
gen_context(system_u:object_r:container_ro_file_t,s0)
HOME_DIR/\.local/share/containers/storage/volumes/[^/]*/.*      
gen_context(system_u:object_r:container_file_t,s0)

/var/lib/containers(/.*)?       
gen_context(system_u:object_r:container_var_lib_t,s0)
/var/lib/containers/overlay(/.*)?       
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/overlay2(/.*)?      
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/overlay-layers(/.*)?        
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/overlay2-layers(/.*)?       
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/overlay-images(/.*)?        
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/overlay2-images(/.*)?       
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/atomic(/.*)?        <<none>>
/var/lib/containers/storage/volumes/[^/]*/.*    
gen_context(system_u:object_r:container_file_t,s0)
/var/lib/containers/storage/overlay(/.*)?       
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/storage/overlay2(/.*)?      
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/storage/overlay-layers(/.*)?        
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/storage/overlay-images(/.*)?        
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/storage/overlay2-layers(/.*)?       
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/containers/storage/overlay2-images(/.*)?       
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/ocid(/.*)?     gen_context(system_u:object_r:container_var_lib_t,s0)
/var/lib/ocid/sandboxes(/.*)?   
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/cache/kata-containers(/.*)?        
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/kata-containers(/.*)?  
gen_context(system_u:object_r:container_ro_file_t,s0)

/var/run/kata-containers(/.*)?  
gen_context(system_u:object_r:container_kvm_var_run_t,s0)

/var/lib/origin(/.*)?   gen_context(system_u:object_r:container_file_t,s0)
/var/lib/kubernetes/pods(/.*)?  
gen_context(system_u:object_r:container_file_t,s0)

/var/lib/kubelet(/.*)?          
gen_context(system_u:object_r:container_var_lib_t,s0)
/var/lib/docker-latest(/.*)?            
gen_context(system_u:object_r:container_var_lib_t,s0)
/var/lib/docker-latest/.*/config\.env   
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker-latest/containers/.*/.*\.log    
gen_context(system_u:object_r:container_log_t,s0)
/var/lib/docker-latest/containers/.*/hostname           
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker-latest/containers/.*/hosts              
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker-latest/init(/.*)?               
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker-latest/overlay(/.*)?    
gen_context(system_u:object_r:container_ro_file_t,s0)
/var/lib/docker-latest/overlay2(/.*)?   
gen_context(system_u:object_r:container_ro_file_t,s0)

/var/lib/cni(/.*)?                                                              
gen_context(system_u:object_r:container_var_lib_t,s0)
/var/run/flannel(/.*)?                                                          
gen_context(system_u:object_r:container_var_run_t,s0)
/var/lib/kubelet/pods(/.*)?                                                     
gen_context(system_u:object_r:container_file_t,s0)
/var/log/containers(/.*)?                                                       
gen_context(system_u:object_r:container_log_t,s0)
/var/log/pods(/.*)?                                                             
gen_context(system_u:object_r:container_log_t,s0)

/var/run/containers(/.*)?               
gen_context(system_u:object_r:container_var_run_t,s0)
/var/run/crio(/.*)?             
gen_context(system_u:object_r:container_var_run_t,s0)
/var/run/docker(/.*)?           
gen_context(system_u:object_r:container_var_run_t,s0)
/var/run/containerd(/.*)?       
gen_context(system_u:object_r:container_var_run_t,s0)
/var/run/containerd/[^/]*/sandboxes/[^/]*/shm(/.*)?             
gen_context(system_u:object_r:container_runtime_tmpfs_t,s0)
/var/run/buildkit(/.*)? gen_context(system_u:object_r:container_var_run_t,s0)
/var/run/docker\.pid            --      
gen_context(system_u:object_r:container_var_run_t,s0)
/var/run/docker\.sock           -s      
gen_context(system_u:object_r:container_var_run_t,s0)
/var/run/docker-client(/.*)?            
gen_context(system_u:object_r:container_var_run_t,s0)
/var/run/docker/plugins(/.*)?           
gen_context(system_u:object_r:container_plugin_var_run_t,s0)

/srv/containers(/.*)?           
gen_context(system_u:object_r:container_file_t,s0)
/var/srv/containers(/.*)?       
gen_context(system_u:object_r:container_file_t,s0)

/var/lock/lxc(/.*)?             
gen_context(system_u:object_r:container_lock_t,s0)

/var/log/lxc(/.*)?              
gen_context(system_u:object_r:container_log_t,s0)
/var/log/lxd(/.*)?              
gen_context(system_u:object_r:container_log_t,s0)
/etc/kubernetes(/.*)?           
gen_context(system_u:object_r:kubernetes_file_t,s0)

++++++ container.te ++++++
++++ 1425 lines (skipped)

++++++ update.sh ++++++
--- /var/tmp/diff_new_pack.pBseQs/_old  2023-03-22 22:29:24.725821897 +0100
+++ /var/tmp/diff_new_pack.pBseQs/_new  2023-03-22 22:29:24.729821918 +0100
@@ -1,24 +1,28 @@
 #!/bin/sh
 
 date=$(date '+%Y%m%d')
+base_name_pattern='selinux-policy-*.tar.xz'
 
 echo Update to $date
 
-rm -rf fedora-policy container-selinux
+old_tar_file=$(ls -1 $base_name_pattern)
 
-git clone --depth 1 https://github.com/fedora-selinux/selinux-policy.git
-git clone --depth 1 https://github.com/containers/container-selinux.git
+osc service manualrun
 
-mv selinux-policy fedora-policy-$date
-rm -rf fedora-policy-$date/.git*
-mv container-selinux/container.* fedora-policy-$date/policy/modules/services/
-
-rm -f fedora-policy?$date.tar*
-tar cf fedora-policy-$date.tar fedora-policy-$date
-bzip2 fedora-policy-$date.tar
-rm -rf fedora-policy-$date container-selinux
+rm -rf container-selinux
+git clone --depth 1 https://github.com/containers/container-selinux.git
+rm -f container.*
+mv container-selinux/container.* .
+rm -rf container-selinux
+
+# delete old files. Might need a better sanity check
+tar_cnt=$(ls -1 $base_name_pattern  | wc -l)
+if [ $tar_cnt -gt 1 ]; then
+  echo delte old file $old_tar_file
+  rm "$old_tar_file"
+  osc addremove
+fi
 
-sed -i -e "s/^Version:.*/Version:        $date/" selinux-policy.spec
+osc status
 
-echo "remove old tar file, then osc addremove"
 

Reply via email to