معرفی شرکت ها


selinux-policy-devel-38.1.22-1.el9.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux policy development files
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 10-stream
مخزن Centos AppStream noarch
نام بسته selinux-policy-devel
نام فایل بسته selinux-policy-devel-38.1.22-1.el9.noarch.rpm
نسخه بسته 38.1.22
انتشار بسته 1.el9
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Thu Aug 24 18
هاست سازنده x86-04.stream.rdu2.redhat.com
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPLv2+
حجم دانلود 1.2M
حجم نصب 22.367M
SELinux policy development package. This package contains: - interfaces, macros, and patterns for policy development - a policy example - the macro-expander utility and some additional files.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-devel-38.1.23-1.el9.noarch.rpm 38.1.23 noarch CentOS AppStream
selinux-policy-devel-38.1.24-1.el9.noarch.rpm 38.1.24 noarch CentOS AppStream
selinux-policy-devel-38.1.25-1.el9.noarch.rpm 38.1.25 noarch CentOS AppStream
selinux-policy-devel-38.1.26-1.el9.noarch.rpm 38.1.26 noarch CentOS AppStream
selinux-policy-devel-38.1.27-1.el9.noarch.rpm 38.1.27 noarch CentOS AppStream
selinux-policy-devel-38.1.29-1.el9.noarch.rpm 38.1.29 noarch CentOS AppStream
selinux-policy-devel-38.1.30-1.el9.noarch.rpm 38.1.30 noarch CentOS AppStream
selinux-policy-devel-38.1.31-1.el9.noarch.rpm 38.1.31 noarch CentOS AppStream
selinux-policy-devel-38.1.33-1.el9.noarch.rpm 38.1.33 noarch CentOS AppStream
selinux-policy-devel-38.1.48-1.el9.noarch.rpm 38.1.48 noarch CentOS AppStream
selinux-policy-devel-38.1.49-1.el9.noarch.rpm 38.1.49 noarch CentOS AppStream
selinux-policy-devel-38.1.50-1.el9.noarch.rpm 38.1.50 noarch CentOS AppStream
selinux-policy-devel-38.1.51-1.el9.noarch.rpm 38.1.51 noarch CentOS AppStream
selinux-policy-devel-38.1.53-1.el9.noarch.rpm 38.1.53 noarch CentOS AppStream
selinux-policy-devel-40.13.17-1.el10.noarch.rpm 40.13.17 noarch CentOS AppStream
selinux-policy-devel-40.13.19-1.el10.noarch.rpm 40.13.19 noarch CentOS AppStream
selinux-policy-devel-40.13.21-1.el10.noarch.rpm 40.13.21 noarch CentOS AppStream
selinux-policy-devel-40.13.22-1.el10.noarch.rpm 40.13.22 noarch CentOS AppStream
selinux-policy-devel-40.13.24-1.el10.noarch.rpm 40.13.24 noarch CentOS AppStream


نیازمندی

مقدار نام
- /bin/sh
- /usr/bin/bash
- /usr/bin/make
>= 3.2 checkpolicy
- m4
>= 3.4-1 policycoreutils-devel
= 38.1.22-1.el9 selinux-policy
= 38.1.22-1.el9 selinux-policy


ارائه دهنده

مقدار نام
= 38.1.22-1.el9 selinux-policy-devel


نحوه نصب


نصب پکیج rpm selinux-policy-devel:

    None


فایل ها

مسیرها
/usr/bin/macro-expander
/usr/share/selinux/devel
/usr/share/selinux/devel/Makefile
/usr/share/selinux/devel/example.fc
/usr/share/selinux/devel/example.if
/usr/share/selinux/devel/example.te
/usr/share/selinux/devel/html
/usr/share/selinux/devel/html/NetworkManager.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_chronyc.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_cloud.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_console.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_custom.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_ddclient.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_dhclient.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_dnssec.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_iscsid.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_sendmail.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_tlp.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_winbind.html
/usr/share/selinux/devel/html/NetworkManager_priv_helper.html
/usr/share/selinux/devel/html/NetworkManager_ssh.html
/usr/share/selinux/devel/html/abrt.html
/usr/share/selinux/devel/html/abrt_dump_oops.html
/usr/share/selinux/devel/html/abrt_handle_event.html
/usr/share/selinux/devel/html/abrt_helper.html
/usr/share/selinux/devel/html/abrt_retrace_coredump.html
/usr/share/selinux/devel/html/abrt_retrace_worker.html
/usr/share/selinux/devel/html/abrt_upload_watch.html
/usr/share/selinux/devel/html/abrt_watch_log.html
/usr/share/selinux/devel/html/accountsd.html
/usr/share/selinux/devel/html/acct.html
/usr/share/selinux/devel/html/admin_crontab.html
/usr/share/selinux/devel/html/afs.html
/usr/share/selinux/devel/html/afs_bosserver.html
/usr/share/selinux/devel/html/afs_fsserver.html
/usr/share/selinux/devel/html/afs_kaserver.html
/usr/share/selinux/devel/html/afs_ptserver.html
/usr/share/selinux/devel/html/afs_vlserver.html
/usr/share/selinux/devel/html/aiccu.html
/usr/share/selinux/devel/html/aide.html
/usr/share/selinux/devel/html/ajaxterm.html
/usr/share/selinux/devel/html/ajaxterm_ssh.html
/usr/share/selinux/devel/html/alsa.html
/usr/share/selinux/devel/html/amanda.html
/usr/share/selinux/devel/html/amanda_recover.html
/usr/share/selinux/devel/html/amtu.html
/usr/share/selinux/devel/html/anaconda.html
/usr/share/selinux/devel/html/anon_sftpd.html
/usr/share/selinux/devel/html/antivirus.html
... and 1360 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2023-08-24

Allow qatlib to modify hardware state information.
Update policy for fdo
Allow gpsd, oddjob and oddjob_mkhomedir_t write user_tty_device_t chr_file
Allow svirt to rw /dev/udmabuf
Allow keepalived watch var_run dirs

2023-08-17

Allow logrotate_t to map generic files in /etc
Allow insights-client manage user temporary files
Make insights_client_t an unconfined domain

2023-08-11

Allow user_u and staff_u get attributes of non-security dirs
Allow cloud_init create dhclient var files and init_t manage net_conf_t
Allow samba-dcerpc service manage samba tmp files
Update samba-dcerpc policy for printing
Allow sysadm_t run kernel bpf programs
allow mon_procd_t self:cap_userns sys_ptrace
Remove nsplugin_role from mozilla.if
Allow unconfined user filetrans chrome_sandbox_home_t
Allow pdns name_bind and name_connect all ports
Allow insights-client read and write cluster tmpfs files
Allow ipsec read nsfs files
Allow upsmon execute upsmon via a helper script
Fix labeling for no-stub-resolv.conf
Add use_nfs_home_dirs boolean for mozilla_plugin
Change wording in /etc/selinux/config

2023-08-03

Allow qatlib to read sssd public files
Fix location for /run/nsd
Allow samba-rpcd work with passwords
Allow rpcd_lsad setcap and use generic ptys
Allow gpsd,oddjob,oddjob_mkhomedir rw user domain pty
Allow keepalived to manage its tmp files
Allow nscd watch system db dirs

2023-07-21

Boolean: Allow virt_qemu_ga create ssh directory
Allow virt_qemu_ga_t create .ssh dir with correct label
Set default ports for keylime policy
594
Allow unconfined service inherit signal state from init
Allow sa-update connect to systemlog services
Allow sa-update manage spamc home files
Label only /usr/sbin/ripd and ripngd with zebra_exec_t
Add the files_getattr_non_auth_dirs() interface
Update policy for the sblim-sfcb service
Define equivalency for /run/systemd/generator.early

2023-06-29

Add the qatlib module
Add the fdo module
Add the booth module to modules.conf

2023-06-29

Remove permissive from fdo
Add the qatlib module
Add the fdo module
Add the booth module to modules.conf
Add policy for FIDO Device Onboard
Create policy for qatlib
Add policy for boothd
Add list_dir_perms to kerberos_read_keytab
Allow nsd_crond_t write nsd_var_run_t & connectto nsd_t
Allow collectd_t read network state symlinks
Revert "Allow collectd_t read proc_net link files"
Allow insights-client execmem
Label udf tools with fsadm_exec_t

2023-06-15

Add fs_delete_pstore_files() interface
Add fs_read_pstore_files() interface
Allow insights-client getsession process permission
Allow insights-client work with pipe and socket tmp files
Allow insights-client map generic log files
Allow insights-client read unconfined service semaphores
Allow insights-client get quotas of all filesystems
Allow haproxy read hardware state information
Allow cupsd dbus chat with xdm
Allow dovecot_deliver_t create/map dovecot_spool_t dir/file
Add none file context for polyinstantiated tmp dirs
Add support for the systemd-pstore service
Label /dev/userfaultfd with userfaultfd_t
Allow collectd_t read proc_net link files
Label smtpd with sendmail_exec_t
Label msmtp and msmtpd with sendmail_exec_t
Allow dovecot-deliver write to the main process runtime fifo files
Allow subscription-manager execute ip
Allow ftpd read network sysctls

2023-05-26

Allow firewalld rw ica_tmpfs_t files
Add chromium_sandbox_t setcap capability
Allow certmonger manage cluster library files
Allow wireguard to rw network sysctls
Allow plymouthd_t bpf capability to run bpf programs
Update pkcsslotd policy for sandboxing
Allow unconfined_service_t to create .gnupg labeled as gpg_secret_t

2023-05-18

Allow insights-client work with teamdctl
Allow virsh name_connect virt_port_t
Allow cupsd to create samba_var_t files
Allow dovecot to map files in /var/spool/dovecot
Add tunable to allow squid bind snmp port
Allow rhsmcert request the kernel to load a module
Allow snmpd read raw disk data

2023-04-14

Allow cloud-init domain transition to insights-client domain
Allow chronyd send a message to cloud-init over a datagram socket
Allow dmidecode write to cloud-init tmp files
Allow login_pgm setcap permission
Allow tshark the setsched capability
Allow chronyc read network sysctls
Allow systemd-timedated watch init runtime dir
Add journalctl the sys_resource capability
Allow system_cronjob_t transition to rpm_script_t
Revert "Allow system_cronjob_t domtrans to rpm_script_t"
Allow insights-client tcp connect to all ports
Allow insights-client work with su and lpstat
Allow insights-client manage fsadm pid files
Allow insights-client read all sysctls
Allow rabbitmq to read network sysctls

2023-03-28

rebuilt

2023-03-27

Allow passt manage qemu pid sock files
Exclude passt.if from selinux-policy-devel

2023-03-24

Add support for the passt_t domain
Allow virtd_t and svirt_t work with passt
Add new interfaces in the virt module
Add passt interfaces defined conditionally

2023-03-16

Boolean: allow qemu-ga manage ssh home directory
Allow wg load kernel modules, search debugfs dir

2023-02-16

Allow svirt to map svirt_image_t char files
Fix opencryptoki file names in /dev/shm