معرفی شرکت ها


selinux-policy-devel-39.6-1.fc39.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux policy development files
ویژگی مقدار
سیستم عامل Linux
توزیع Fedora 39
مخزن Fedora Everything noarch
نام بسته selinux-policy-devel
نام فایل بسته selinux-policy-devel-39.6-1.fc39.noarch.rpm
نسخه بسته 39.6
انتشار بسته 1.fc39
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Wed 24 Apr 2024 03
هاست سازنده buildvm-ppc64le-20.iad2.fedoraproject.org
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPL-2.0-or-later
حجم دانلود 913K
حجم نصب 13.909M
SELinux policy development package. This package contains: - interfaces, macros, and patterns for policy development - a policy example - the macro-expander utility and some additional files.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-devel-38.28-1.fc39.noarch.rpm 38.28 noarch Fedora Everything
selinux-policy-devel-39.2-1.fc39.noarch.rpm 39.2 noarch Fedora Everything
selinux-policy-devel-39.3-1.fc39.noarch.rpm 39.3 noarch Fedora Everything


نیازمندی

مقدار نام
- /bin/sh
- /usr/bin/bash
- /usr/bin/make
>= 3.2 checkpolicy
- m4
>= 3.4-1 policycoreutils-devel
= 39.6-1.fc39 selinux-policy
= 39.6-1.fc39 selinux-policy


ارائه دهنده

مقدار نام
= 39.6-1.fc39 selinux-policy-devel


نحوه نصب


نصب پکیج rpm selinux-policy-devel:

    dnf install selinux-policy-devel-39.6-1.fc39.noarch.rpm


فایل ها

مسیرها
/usr/bin/macro-expander
/usr/share/selinux/devel
/usr/share/selinux/devel/Makefile
/usr/share/selinux/devel/example.fc
/usr/share/selinux/devel/example.if
/usr/share/selinux/devel/example.te
/usr/share/selinux/devel/html
/usr/share/selinux/devel/html/index.html
/usr/share/selinux/devel/html/style.css
/usr/share/selinux/devel/include
/usr/share/selinux/devel/include/Makefile
/usr/share/selinux/devel/include/admin
/usr/share/selinux/devel/include/admin.xml
/usr/share/selinux/devel/include/admin/bootloader.if
/usr/share/selinux/devel/include/admin/consoletype.if
/usr/share/selinux/devel/include/admin/dmesg.if
/usr/share/selinux/devel/include/admin/netutils.if
/usr/share/selinux/devel/include/admin/su.if
/usr/share/selinux/devel/include/admin/sudo.if
/usr/share/selinux/devel/include/admin/usermanage.if
/usr/share/selinux/devel/include/apps
/usr/share/selinux/devel/include/apps.xml
/usr/share/selinux/devel/include/apps/seunshare.if
/usr/share/selinux/devel/include/build.conf
/usr/share/selinux/devel/include/contrib
/usr/share/selinux/devel/include/contrib.xml
/usr/share/selinux/devel/include/contrib/abrt.if
/usr/share/selinux/devel/include/contrib/accountsd.if
/usr/share/selinux/devel/include/contrib/acct.if
/usr/share/selinux/devel/include/contrib/afs.if
/usr/share/selinux/devel/include/contrib/aiccu.if
/usr/share/selinux/devel/include/contrib/aide.if
/usr/share/selinux/devel/include/contrib/aisexec.if
/usr/share/selinux/devel/include/contrib/ajaxterm.if
/usr/share/selinux/devel/include/contrib/alsa.if
/usr/share/selinux/devel/include/contrib/amanda.if
/usr/share/selinux/devel/include/contrib/amavis.if
/usr/share/selinux/devel/include/contrib/amtu.if
/usr/share/selinux/devel/include/contrib/anaconda.if
/usr/share/selinux/devel/include/contrib/antivirus.if
/usr/share/selinux/devel/include/contrib/apache.if
/usr/share/selinux/devel/include/contrib/apcupsd.if
/usr/share/selinux/devel/include/contrib/apm.if
/usr/share/selinux/devel/include/contrib/apt.if
/usr/share/selinux/devel/include/contrib/arpwatch.if
/usr/share/selinux/devel/include/contrib/asterisk.if
/usr/share/selinux/devel/include/contrib/authconfig.if
/usr/share/selinux/devel/include/contrib/automount.if
/usr/share/selinux/devel/include/contrib/avahi.if
/usr/share/selinux/devel/include/contrib/awstats.if
... and 503 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2024-04-23

Allow smbd_t to watch user_home_dir_t if samba_enable_home_dirs is on
Allow auditd read all domains process state
Allow keyutils-dns-resolver connect to the system log service
dontaudit execmem for modemmanager
Dontaudit systemd-hwdb dac_override capability
Allow plymouthd log during shutdown
Allow journalctl_t read filesystem sysctls
Replace init domtrans rule for confined users to allow exec init
Allow sulogin relabel tty1
Dontaudit sulogin the checkpoint_restore capability
Allow wireguard work with firewall-cmd

2024-02-27

Allow userdomain get attributes of files on an nsfs filesystem
Allow login_userdomain map files in /var
Update ssh_role_template() for user ssh-agent type
Dontaudit getty and plymouth the checkpoint_restore capability
Allow sendmail MTA connect to sendmail LDA
Allow system_mail_t manage exim spool files and dirs

2024-01-25

Allow collectd read raw fixed disk device
Allow collectd read udev pid files
Allow httpd work with PrivateTmp
Allow certmonger read network sysctls
Allow systemd-sleep set attributes of efivarfs files
Allow spamd_update_t the sys_ptrace capability in user namespace
Allow alsa get attributes filesystems with extended attributes
Allow systemd-sleep send a message to syslog over a unix dgram socket

2023-12-15

Allow init create and use vsock sockets
Allow ddclient send e-mail notifications
Allow postfix_master_t map postfix data files
Allow thumb_t append to init unix domain stream sockets
Allow spamd_update_t read hardware state information
Allow systemd-sleep create efivarfs files

2023-11-14

Allow graphical applications work in Wayland
Allow map xserver_tmpfs_t files when xserver_clients_write_xshm is on
Allow kdump work with PrivateTmp
Allow dovecot-auth work with PrivateTmp
Allow nfsd get attributes of all filesystems
Allow fido-device-onboard (FDO) read the crack database
Allow ntp to bind and connect to ntske port.
Allow apcupsd cgi scripts read /sys
Allow rpcbind read network sysctls

2023-11-02

Support using systemd containers
Allow kernel_t to manage and relabel all files
Add missing optional_policy() to files_relabel_all_files()
Improve default file context(None) of /var/lib/authselect/backups
Allow targetd write to the syslog pid sock_file
Add ipa_pki_retrieve_key_exec() interface
Allow kdumpctl_t to list all directories with a filesystem type
Allow udev additional permissions
Allow udev load kernel module
Allow sysadm_t to mmap modules_object_t files
Add the unconfined_read_files() and unconfined_list_dirs() interfaces
Allow kernel_generic_helper_t to execute mount(1)

2023-10-02

Allow sssd send SIGKILL to passkey_child running in ipa_otpd_t
Allow systemd-localed create Xserver config dirs
Allow sssd read symlinks in /etc/sssd
Label /dev/gnss[0-9] with gnss_device_t
Allow systemd-sleep read/write efivarfs variables
ci: Fix version number of packit generated srpms
Dontaudit rhsmcertd write memory device
Allow ssh_agent_type create a sockfile in /run/user/USERID
Set default file context of /var/lib/authselect/backups to <<none>>
Allow prosody read network sysctls
Allow cupsd_t to use bpf capability

2023-09-15

Allow sssd domain transition on passkey_child execution conditionally
Allow login_userdomain watch lnk_files in /usr
Allow login_userdomain watch video4linux devices
Change systemd-network-generator transition to include class file
Revert "Change file transition for systemd-network-generator"
Allow nm-dispatcher winbind plugin read/write samba var files
Allow systemd-networkd write to cgroup files
Allow kdump create and use its memfd: objects

2023-08-31

Allow fedora-third-party get generic filesystem attributes
Allow sssd use usb devices conditionally
Update policy for qatlib
Allow ssh_agent_type manage generic cache home files
Update make-rhat-patches.sh file to use the f39 dist-git branch in F39

2023-08-24

Change file transition for systemd-network-generator
Additional support for gnome-initial-setup
Update gnome-initial-setup policy for geoclue
Allow openconnect vpn open vhost net device
Allow cifs.upcall to connect to SSSD also through the /var/run socket
Grant cifs.upcall more required capabilities
Allow xenstored map xenfs files
Update policy for fdo
Allow keepalived watch var_run dirs
Allow svirt to rw /dev/udmabuf
Allow qatlib to modify hardware state information.
Allow key.dns_resolve connect to avahi over a unix stream socket
Allow key.dns_resolve create and use unix datagram socket
Use quay.io as the container image source for CI

2023-08-11

ci: Move srpm/rpm build to packit
.copr: Avoid subshell and changing directory
Allow gpsd, oddjob and oddjob_mkhomedir_t write user_tty_device_t chr_file
Label /usr/libexec/openssh/ssh-pkcs11-helper with ssh_agent_exec_t
Make insights_client_t an unconfined domain
Allow insights-client manage user temporary files
Allow insights-client create all rpm logs with a correct label
Allow insights-client manage generic logs
Allow cloud_init create dhclient var files and init_t manage net_conf_t
Allow insights-client read and write cluster tmpfs files
Allow ipsec read nsfs files
Make tuned work with mls policy
Remove nsplugin_role from mozilla.if
allow mon_procd_t self:cap_userns sys_ptrace
Allow pdns name_bind and name_connect all ports
Set the MLS range of fsdaemon_t to s0 - mls_systemhigh
ci: Move to actions/checkout@v3 version
.copr: Replace chown call with standard workflow safe.directory setting
.copr: Enable `set -u` for robustness
.copr: Simplify root directory variable

2023-08-04

Allow rhsmcertd dbus chat with policykit
Allow polkitd execute pkla-check-authorization with nnp transition
Allow user_u and staff_u get attributes of non-security dirs
Allow unconfined user filetrans chrome_sandbox_home_t
Allow svnserve execute postdrop with a transition
Do not make postfix_postdrop_t type an MTA executable file
Allow samba-dcerpc service manage samba tmp files
Add use_nfs_home_dirs boolean for mozilla_plugin
Fix labeling for no-stub-resolv.conf

2023-08-02

Revert "Allow winbind-rpcd use its private tmp files"
Allow upsmon execute upsmon via a helper script
Allow openconnect vpn read/write inherited vhost net device
Allow winbind-rpcd use its private tmp files
Update samba-dcerpc policy for printing
Allow gpsd,oddjob,oddjob_mkhomedir rw user domain pty
Allow nscd watch system db dirs
Allow qatlib to read sssd public files
Allow fedora-third-party read /sys and proc
Allow systemd-gpt-generator mount a tmpfs filesystem
Allow journald write to cgroup files
Allow rpc.mountd read network sysctls
Allow blueman read the contents of the sysfs filesystem
Allow logrotate_t to map generic files in /etc
Boolean: Allow virt_qemu_ga create ssh directory

2023-07-25

Allow systemd-network-generator send system log messages
Dontaudit the execute permission on sock_file globally
Allow fsadm_t the file mounton permission
Allow named and ndc the io_uring sqpoll permission
Allow sssd io_uring sqpoll permission
Fix location for /run/nsd
Allow qemu-ga get fixed disk devices attributes
Update bitlbee policy
Label /usr/sbin/sos with sosreport_exec_t
Update policy for the sblim-sfcb service
Add the files_getattr_non_auth_dirs() interface
Fix the CI to work with DNF5

2023-07-22

Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild

2023-07-13

Make systemd_tmpfiles_t MLS trusted for lowering the level of files
Revert "Allow insights client map cache_home_t"
Allow nfsidmapd connect to systemd-machined over a unix socket
Allow snapperd connect to kernel over a unix domain stream socket
Allow virt_qemu_ga_t create .ssh dir with correct label
Allow targetd read network sysctls
Set the abrt_handle_event boolean to on
Permit kernel_t to change the user identity in object contexts
Allow insights client map cache_home_t
Label /usr/sbin/mariadbd with mysqld_exec_t
Trim changelog so that it starts at F37 time
Define equivalency for /run/systemd/generator.early