Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package selinux-policy for openSUSE:Factory checked in at 2025-03-20 19:24:27 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old) and /work/SRC/openSUSE:Factory/.selinux-policy.new.2696 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "selinux-policy" Thu Mar 20 19:24:27 2025 rev:106 rq:1254134 version:20250318 Changes: -------- --- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes 2025-03-13 15:04:50.286784107 +0100 +++ /work/SRC/openSUSE:Factory/.selinux-policy.new.2696/selinux-policy.changes 2025-03-20 19:24:43.176962112 +0100 @@ -1,0 +2,16 @@ +Tue Mar 18 13:03:40 UTC 2025 - rfr...@suse.com + +- Update to version 20250318: + * rebootmgr: Handle config under /etc/rebootmgr (bsc#1239720) + +------------------------------------------------------------------- +Thu Mar 13 12:50:00 UTC 2025 - rfr...@suse.com + +- Update to version 20250313: + * health-checker-plugin: Move from dbus to varlink for rebootmgr communication (bsc#1237273) + * Introduce rebootmgr_var_run_t for files under run (bsc#1237273) + * Adjust to correct new binary path (bsc#1237273) + * health-checker: allow snapshot rollback (bsc#1235860) + * snapper: add interface to select the next boot snapshot + +------------------------------------------------------------------- Old: ---- selinux-policy-20250312.tar.xz New: ---- selinux-policy-20250318.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ selinux-policy.spec ++++++ --- /var/tmp/diff_new_pack.8cbHpa/_old 2025-03-20 19:24:43.900992036 +0100 +++ /var/tmp/diff_new_pack.8cbHpa/_new 2025-03-20 19:24:43.900992036 +0100 @@ -36,7 +36,7 @@ License: GPL-2.0-or-later Group: System/Management Name: selinux-policy -Version: 20250312 +Version: 20250318 Release: 0 Source0: %{name}-%{version}.tar.xz Source1: container.fc ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.8cbHpa/_old 2025-03-20 19:24:43.996996004 +0100 +++ /var/tmp/diff_new_pack.8cbHpa/_new 2025-03-20 19:24:44.000996169 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://gitlab.suse.de/selinux/selinux-policy.git</param> - <param name="changesrevision">99cf931c4d3c525d9c63784e4674b4058d1baaaa</param></service></servicedata> + <param name="changesrevision">ea5f57baf3149d2bc58fd87fbd73e9bc59956112</param></service></servicedata> (No newline at EOF) ++++++ selinux-policy-20250312.tar.xz -> selinux-policy-20250318.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250312/policy/modules/contrib/health-checker.te new/selinux-policy-20250318/policy/modules/contrib/health-checker.te --- old/selinux-policy-20250312/policy/modules/contrib/health-checker.te 2025-03-12 11:44:12.000000000 +0100 +++ new/selinux-policy-20250318/policy/modules/contrib/health-checker.te 2025-03-18 14:02:53.000000000 +0100 @@ -51,6 +51,23 @@ fs_getattr_xattr_fs(health_checker_t) +# permissions for health checker: rollback() +## to execute 'mount' +mount_exec(health_checker_t) +mount_manage_pid_files(health_checker_t) +## mount accessing block device information +storage_getattr_fixed_disk_dev(health_checker_t) +## mount able to remount +fs_remount_xattr_fs(health_checker_t) +## for 'systemctl reboot' +dbus_connect_system_bus(health_checker_t) +dbus_system_bus_client(health_checker_t) +systemd_dbus_chat_logind(health_checker_t) +## for 'btrfs subvolume set-default ${LAST_WORKING_BTRFS_ID} /.snapshots' +optional_policy(` + snapper_select_boot_snapshot(health_checker_t) +') + optional_policy(` # ignore #!/bin/bash reading passwd file auth_dontaudit_read_passwd_file(health_checker_t) @@ -85,11 +102,9 @@ bootloader_run(health_checker_plugin_t, health_checker_roles) ') -# Allow health-checker plugins to talk to rebootmgr over dbus +# Allow health-checker plugins to talk to rebootmgr over varlink optional_policy(` - dbus_connect_system_bus(health_checker_plugin_t) - dbus_system_bus_client(health_checker_plugin_t) - rebootmgr_dbus_chat(health_checker_plugin_t) + rebootmgr_varlink_chat(health_checker_plugin_t) ') manage_files_pattern(health_checker_plugin_t, health_checker_tmp_t, health_checker_tmp_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250312/policy/modules/contrib/rebootmgr.fc new/selinux-policy-20250318/policy/modules/contrib/rebootmgr.fc --- old/selinux-policy-20250312/policy/modules/contrib/rebootmgr.fc 2025-03-12 11:44:12.000000000 +0100 +++ new/selinux-policy-20250318/policy/modules/contrib/rebootmgr.fc 2025-03-18 14:02:53.000000000 +0100 @@ -1 +1,3 @@ -/usr/bin/rebootmgrd -- gen_context(system_u:object_r:rebootmgr_exec_t,s0) +/usr/libexec/rebootmgrd -- gen_context(system_u:object_r:rebootmgr_exec_t,s0) +/etc/rebootmgr(/.*)? gen_context(system_u:object_r:rebootmgr_conf_t,s0) +/run/rebootmgr(/.*)? gen_context(system_u:object_r:rebootmgr_var_run_t,s0) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250312/policy/modules/contrib/rebootmgr.if new/selinux-policy-20250318/policy/modules/contrib/rebootmgr.if --- old/selinux-policy-20250312/policy/modules/contrib/rebootmgr.if 2025-03-12 11:44:12.000000000 +0100 +++ new/selinux-policy-20250318/policy/modules/contrib/rebootmgr.if 2025-03-18 14:02:53.000000000 +0100 @@ -41,21 +41,20 @@ ######################################## ## <summary> -## Send and receive messages from -## rebootmgr over dbus. +## Use rebootmgr varlink socket to talk to the daemon. ## </summary> ## <param name="domain"> -## <summary> -## Domain allowed access. -## </summary> +## <summary> +## Domain allowed access. +## </summary> ## </param> # -interface(`rebootmgr_dbus_chat',` - gen_require(` - type rebootmgr_t; - class dbus send_msg; - ') +interface(`rebootmgr_varlink_chat',` + gen_require(` + type rebootmgr_var_run_t; + type rebootmgr_t; + ') - allow $1 rebootmgr_t:dbus send_msg; - allow rebootmgr_t $1:dbus send_msg; + allow $1 rebootmgr_var_run_t:sock_file write; + allow $1 rebootmgr_t:unix_stream_socket connectto; ') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250312/policy/modules/contrib/rebootmgr.te new/selinux-policy-20250318/policy/modules/contrib/rebootmgr.te --- old/selinux-policy-20250312/policy/modules/contrib/rebootmgr.te 2025-03-12 11:44:12.000000000 +0100 +++ new/selinux-policy-20250318/policy/modules/contrib/rebootmgr.te 2025-03-18 14:02:53.000000000 +0100 @@ -9,6 +9,12 @@ type rebootmgr_exec_t; init_daemon_domain(rebootmgr_t, rebootmgr_exec_t) +type rebootmgr_conf_t; +files_config_file(rebootmgr_conf_t) + +type rebootmgr_var_run_t; +files_pid_file(rebootmgr_var_run_t) + ######################################## # # rebootmgr local policy @@ -17,9 +23,13 @@ allow rebootmgr_t self:fifo_file rw_fifo_file_perms; allow rebootmgr_t self:unix_stream_socket create_stream_socket_perms; -domain_use_interactive_fds(rebootmgr_t) +# handling files/folders in /etc/rebootmgr +create_dirs_pattern(rebootmgr_t, rebootmgr_conf_t, rebootmgr_conf_t) +manage_files_pattern(rebootmgr_t, rebootmgr_conf_t, rebootmgr_conf_t) +read_lnk_files_pattern(rebootmgr_t, rebootmgr_conf_t, rebootmgr_conf_t) +files_etc_filetrans(rebootmgr_t, rebootmgr_conf_t, dir, "rebootmgr") -files_manage_etc_files(rebootmgr_t) +domain_use_interactive_fds(rebootmgr_t) logging_send_syslog_msg(rebootmgr_t) @@ -37,3 +47,12 @@ dbus_system_bus_client(rebootmgr_t) dbus_connect_system_bus(rebootmgr_t) ') + +# filetrans for /run/rebootmgr +files_pid_filetrans(rebootmgr_t, rebootmgr_var_run_t, dir, "rebootmgr") +# explicit for known files (i.e. sock_file, rest will inherit) +files_pid_filetrans(rebootmgr_t, rebootmgr_var_run_t, sock_file) +# allow the domain to manage rebootmgr_var_run_t +create_dirs_pattern(rebootmgr_t, rebootmgr_var_run_t, rebootmgr_var_run_t) +manage_files_pattern(rebootmgr_t, rebootmgr_var_run_t, rebootmgr_var_run_t) +manage_sock_files_pattern(rebootmgr_t, rebootmgr_var_run_t, rebootmgr_var_run_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/selinux-policy-20250312/policy/modules/contrib/snapper.if new/selinux-policy-20250318/policy/modules/contrib/snapper.if --- old/selinux-policy-20250312/policy/modules/contrib/snapper.if 2025-03-12 11:44:12.000000000 +0100 +++ new/selinux-policy-20250318/policy/modules/contrib/snapper.if 2025-03-18 14:02:53.000000000 +0100 @@ -97,6 +97,26 @@ ######################################## ## <summary> +## Allow a domain to select the boot snapshot +## +## Warning: should only be used for direct btrfs invocation +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`snapper_select_boot_snapshot',` + gen_require(` + type snapperd_data_t; + ') + + allow $1 snapperd_data_t:dir { ioctl read }; +') + +######################################## +## <summary> ## Allow a domain to relabel snapshots to snapperd_data_t ## </summary> ## <param name="domain">