Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package selinux-policy for openSUSE:Factory 
checked in at 2024-07-14 08:48:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old)
 and      /work/SRC/openSUSE:Factory/.selinux-policy.new.17339 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "selinux-policy"

Sun Jul 14 08:48:58 2024 rev:64 rq:1186820 version:20240710

Changes:
--------
--- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes    
2024-07-03 20:29:43.283793827 +0200
+++ /work/SRC/openSUSE:Factory/.selinux-policy.new.17339/selinux-policy.changes 
2024-07-14 08:49:37.966537312 +0200
@@ -1,0 +2,67 @@
+Wed Jul 10 07:45:13 UTC 2024 - cathy...@suse.com
+
+- Enable sap module
+- Add equivalency in file_contexts.subs_dist
+  * /bin /usr/bin
+  * /sbin /usr/bin
+  * /usr/sbin /usr/bin
+- Update to version 20240710:
+  * Change fc in rebootmgr module for /sbin -> /usr/bin
+  * Change fc in rpm module for /sbin -> /usr/bin
+  * Change fc in rsync module for /sbin -> /usr/bin
+  * Change fc in wicked module for /sbin -> /usr/bin
+  * Confine libvirt-dbus
+  * Allow virtqemud the kill capability in user namespace
+  * Allow rshim get options of the netlink class for KOBJECT_UEVENT family
+  * Allow dhcpcd the kill capability
+  * Allow systemd-networkd list /var/lib/systemd/network
+  * Allow sysadm_t run systemd-nsresourced bpf programs
+  * Update policy for systemd generators interactions
+  * Allow create memory.pressure files with cgroup_memory_pressure_t
+  * Add support for libvirt hooks
+  * Allow certmonger read and write tpm devices
+  * Allow all domains to connect to systemd-nsresourced over a unix socket
+  * Allow systemd-machined read the vsock device
+  * Update policy for systemd generators
+  * Allow ptp4l_t request that the kernel load a kernel module
+  * Allow sbd to trace processes in user namespace
+  * Allow request-key execute scripts
+  * Update policy for haproxyd
+  * Update policy for systemd-nsresourced
+  * Correct sbin-related file context entries
+  * Allow login_userdomain execute systemd-tmpfiles in the caller domain
+  * Allow virt_driver_domain read files labeled unconfined_t
+  * Allow virt_driver_domain dbus chat with policykit
+  * Allow virtqemud manage nfs files when virt_use_nfs boolean is on
+  * Add rules for interactions between generators
+  * Label memory.pressure files with cgroup_memory_pressure_t
+  * Revert "Allow some systemd services write to cgroup files"
+  * Update policy for systemd-nsresourced
+  * Label /usr/bin/ntfsck with fsadm_exec_t
+  * Allow systemd_fstab_generator_t read tmpfs files
+  * Update policy for systemd-nsresourced
+  * Alias /usr/sbin to /usr/bin and change all /usr/sbin paths to /usr/bin
+  * Remove a few lines duplicated between {dkim,milter}.fc
+  * Alias /bin → /usr/bin and remove redundant paths
+  * Drop duplicate line for /usr/sbin/unix_chkpwd
+  * Drop duplicate paths for /usr/sbin
+  * Update systemd-generator policy
+  * Remove permissive domain for bootupd_t
+  * Remove permissive domain for coreos_installer_t
+  * Remove permissive domain for afterburn_t
+  * Add the sap module to modules.conf
+  * Move unconfined_domain(sap_unconfined_t) to an optional block
+  * Create the sap module
+  * Allow systemd-coredumpd sys_admin and sys_resource capabilities
+  * Allow systemd-coredump read nsfs files
+  * Allow generators auto file transition only for plain files
+  * Allow systemd-hwdb write to the kernel messages device
+  * Escape "interface" as a file name in a virt filetrans pattern
+  * Allow gnome-software work for login_userdomain
+  * Allow systemd-machined manage runtime sockets
+  * Revert "Allow systemd-machined manage runtime sockets"
+  * Allow postfix_domain connect to postgresql over a unix socket
+  * Dontaudit systemd-coredump sys_admin capability
+- Update container-selinux
+
+-------------------------------------------------------------------

Old:
----
  selinux-policy-20240702.tar.xz

New:
----
  selinux-policy-20240710.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ selinux-policy.spec ++++++
--- /var/tmp/diff_new_pack.mfMWq0/_old  2024-07-14 08:49:40.238620319 +0200
+++ /var/tmp/diff_new_pack.mfMWq0/_new  2024-07-14 08:49:40.242620465 +0200
@@ -33,7 +33,7 @@
 License:        GPL-2.0-or-later
 Group:          System/Management
 Name:           selinux-policy
-Version:        20240702
+Version:        20240710
 Release:        0
 Source0:        %{name}-%{version}.tar.xz
 Source1:        container.fc

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.mfMWq0/_old  2024-07-14 08:49:40.314623096 +0200
+++ /var/tmp/diff_new_pack.mfMWq0/_new  2024-07-14 08:49:40.318623242 +0200
@@ -1,7 +1,7 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param>
-              <param 
name="changesrevision">174046c04175d806c0ea28d37f7b5ff8ac5afc8e</param></service><service
 name="tar_scm">
+              <param 
name="changesrevision">aa9c35290108fc65d5bf3d39813b1ce19e24ae4a</param></service><service
 name="tar_scm">
                 <param 
name="url">https://github.com/containers/container-selinux.git</param>
               <param 
name="changesrevision">07b3034f6d9625ab84508a2f46515d8ff79b4204</param></service><service
 name="tar_scm">
                 <param 
name="url">https://gitlab.suse.de/jsegitz/selinux-policy.git</param>


++++++ container.te ++++++
--- /var/tmp/diff_new_pack.mfMWq0/_old  2024-07-14 08:49:40.422627041 +0200
+++ /var/tmp/diff_new_pack.mfMWq0/_new  2024-07-14 08:49:40.426627188 +0200
@@ -1,4 +1,4 @@
-policy_module(container, 2.230.0)
+policy_module(container, 2.232.1)
 
 gen_require(`
        class passwd rootok;
@@ -40,6 +40,13 @@
 
 ## <desc>
 ##  <p>
+##  Allow containers to use any xserver device volume mounted into container, 
mostly used for GPU acceleration
+##  </p>
+## </desc>
+gen_tunable(container_use_xserver_devices, false)
+
+## <desc>
+##  <p>
 ##  Allow containers to use any dri device volume mounted into container
 ##  </p>
 ## </desc>
@@ -777,6 +784,8 @@
 optional_policy(`
        systemd_dbus_chat_machined(spc_t)
        systemd_dbus_chat_logind(spc_t)
+       systemd_dbus_chat_timedated(spc_t)
+       systemd_dbus_chat_localed(spc_t)
 ')
 
 domain_transition_all(spc_t)
@@ -1087,6 +1096,7 @@
 allow container_net_domain self:netlink_kobject_uevent_socket 
create_socket_perms;
 allow container_net_domain self:netlink_xfrm_socket 
create_netlink_socket_perms;
 
+allow container_domain spc_t:unix_stream_socket { read write };
 kernel_unlabeled_domtrans(container_runtime_domain, spc_t)
 kernel_unlabeled_entry_type(spc_t)
 allow container_runtime_domain unlabeled_t:key manage_key_perms;
@@ -1394,6 +1404,11 @@
        allow container_domain device_node:blk_file {rw_blk_file_perms map};
 ')
 
+tunable_policy(`container_use_xserver_devices',`
+       dev_getattr_xserver_misc_dev(container_t)
+       dev_rw_xserver_misc(container_t)
+')
+
 tunable_policy(`container_use_dri_devices',`
        dev_rw_dri(container_domain)
 ')
@@ -1432,6 +1447,23 @@
 allow container_engine_t proc_kcore_t:file mounton;
 allow container_engine_t proc_t:filesystem remount;
 allow container_engine_t sysctl_t:{dir file} mounton;
+allow container_engine_t fusefs_t:dir { relabelfrom relabelto };
+allow container_engine_t fusefs_t:file relabelto;
+allow container_engine_t kernel_t:system module_request;
+allow container_engine_t null_device_t:chr_file mounton;
+allow container_engine_t random_device_t:chr_file mounton;
+allow container_engine_t self:netlink_tcpdiag_socket nlmsg_read;
+allow container_engine_t urandom_device_t:chr_file mounton;
+allow container_engine_t zero_device_t:chr_file mounton;
+
+manage_chr_files_pattern(container_engine_t, fusefs_t, fusefs_t)
+
+optional_policy(`
+       gen_require(`
+               type devtty_t;
+       ')
+       allow container_engine_t devtty_t:chr_file mounton;
+')
 
 type kubelet_t, container_runtime_domain;
 domain_type(kubelet_t)
@@ -1444,6 +1476,7 @@
        unconfined_domain(kubelet_t)
 ')
 
+manage_chr_files_pattern(container_engine_t, fusefs_t, fusefs_t)
 
 type kubelet_exec_t;
 application_executable_file(kubelet_exec_t)

++++++ file_contexts.subs_dist ++++++
--- /var/tmp/diff_new_pack.mfMWq0/_old  2024-07-14 08:49:40.470628795 +0200
+++ /var/tmp/diff_new_pack.mfMWq0/_new  2024-07-14 08:49:40.474628942 +0200
@@ -17,4 +17,7 @@
 /var/adm/netconfig/md5/etc /etc
 /var/adm/netconfig/md5/var /var
 /usr/etc /etc
+/bin /usr/bin
+/sbin /usr/bin
+/usr/sbin /usr/bin
 

++++++ modules-targeted-contrib.conf ++++++
--- /var/tmp/diff_new_pack.mfMWq0/_old  2024-07-14 08:49:40.598633471 +0200
+++ /var/tmp/diff_new_pack.mfMWq0/_new  2024-07-14 08:49:40.602633618 +0200
@@ -2776,3 +2776,10 @@
 ##
 kiwi = module
 
+# Layer: contrib
+# Module: sap
+#
+# sap
+#
+sap = module
+

++++++ selinux-policy-20240702.tar.xz -> selinux-policy-20240710.tar.xz ++++++
++++ 6539 lines of diff (skipped)

Reply via email to