From: Dave Tucker <[email protected]>

Submitted-at: https://github.com/ovn-org/ovn/pull/38
Signed-off-by: Dave Tucker <[email protected]>
Signed-off-by: Numan Siddique <[email protected]>
---
 .travis/linux-build.sh           |   2 -
 Makefile.am                      |   1 -
 selinux/.gitignore               |   5 --
 selinux/automake.mk              |  21 -----
 selinux/openvswitch-custom.fc.in |   1 -
 selinux/openvswitch-custom.te.in | 147 -------------------------------
 6 files changed, 177 deletions(-)
 delete mode 100644 selinux/.gitignore
 delete mode 100644 selinux/automake.mk
 delete mode 100644 selinux/openvswitch-custom.fc.in
 delete mode 100644 selinux/openvswitch-custom.te.in

diff --git a/.travis/linux-build.sh b/.travis/linux-build.sh
index 134b4cbca..a8a561dc4 100755
--- a/.travis/linux-build.sh
+++ b/.travis/linux-build.sh
@@ -49,8 +49,6 @@ if [ "$TESTSUITE" ]; then
     fi
 else
     configure_ovn $OPTS
-    make selinux-policy
-
     make -j4 || { cat config.log; exit 1; }
 fi
 
diff --git a/Makefile.am b/Makefile.am
index 57cd41a62..430fd9fd8 100644
--- a/Makefile.am
+++ b/Makefile.am
@@ -497,7 +497,6 @@ include debian/automake.mk
 include lib/ovsdb_automake.mk
 include rhel/automake.mk
 include tutorial/automake.mk
-include selinux/automake.mk
 include controller/automake.mk
 include controller-vtep/automake.mk
 include northd/automake.mk
diff --git a/selinux/.gitignore b/selinux/.gitignore
deleted file mode 100644
index 64e834cd1..000000000
--- a/selinux/.gitignore
+++ /dev/null
@@ -1,5 +0,0 @@
-openvswitch-custom.te
-openvswitch-custom.fc
-openvswitch-custom.pp
-openvswitch-custom.if
-tmp/
diff --git a/selinux/automake.mk b/selinux/automake.mk
deleted file mode 100644
index c7dfe6ed5..000000000
--- a/selinux/automake.mk
+++ /dev/null
@@ -1,21 +0,0 @@
-# Copyright (C) 2016 Nicira, Inc.
-#
-# Copying and distribution of this file, with or without modification,
-# are permitted in any medium without royalty provided the copyright
-# notice and this notice are preserved.  This file is offered as-is,
-# without warranty of any kind.
-
-EXTRA_DIST += \
-        selinux/openvswitch-custom.fc.in \
-        selinux/openvswitch-custom.te.in
-
-PHONY: selinux-policy
-
-selinux-policy: selinux/openvswitch-custom.te selinux/openvswitch-custom.fc
-       $(MAKE) -C selinux/ -f /usr/share/selinux/devel/Makefile
-
-CLEANFILES += \
-       selinux/openvswitch-custom.te \
-       selinux/openvswitch-custom.pp \
-       selinux/openvswitch-custom.fc \
-       selinux/openvswitch-custom.if
diff --git a/selinux/openvswitch-custom.fc.in b/selinux/openvswitch-custom.fc.in
deleted file mode 100644
index c2756d04b..000000000
--- a/selinux/openvswitch-custom.fc.in
+++ /dev/null
@@ -1 +0,0 @@
-@pkgdatadir@/scripts/ovs-kmod-ctl -- 
gen_context(system_u:object_r:openvswitch_load_module_exec_t,s0)
diff --git a/selinux/openvswitch-custom.te.in b/selinux/openvswitch-custom.te.in
deleted file mode 100644
index 2adaf231f..000000000
--- a/selinux/openvswitch-custom.te.in
+++ /dev/null
@@ -1,147 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
-
-module openvswitch-custom @VERSION@;
-
-require {
-        role system_r;
-        role object_r;
-
-        type openvswitch_t;
-        type openvswitch_rw_t;
-        type openvswitch_tmp_t;
-        type openvswitch_var_run_t;
-
-        type bin_t;
-        type ifconfig_exec_t;
-        type init_t;
-        type init_var_run_t;
-        type insmod_exec_t;
-        type kernel_t;
-        type hostname_exec_t;
-        type modules_conf_t;
-        type modules_object_t;
-        type passwd_file_t;
-        type plymouth_exec_t;
-        type proc_t;
-        type shell_exec_t;
-        type sssd_t;
-        type sssd_public_t;
-        type sssd_var_lib_t;
-        type sysfs_t;
-        type systemd_unit_file_t;
-        type tun_tap_device_t;
-
-@begin_dpdk@
-        type hugetlbfs_t;
-        type svirt_t;
-        type svirt_image_t;
-        type svirt_tmpfs_t;
-        type vfio_device_t;
-        type zero_device_t;
-@end_dpdk@
-
-        class capability { dac_override audit_write net_broadcast net_raw };
-        class chr_file { write getattr read open ioctl map };
-        class dir { write remove_name add_name lock read getattr search open };
-        class fd { use };
-        class file { map write getattr read open execute execute_no_trans 
create unlink map entrypoint lock ioctl };
-        class fifo_file { getattr read write append ioctl lock open };
-        class filesystem getattr;
-        class lnk_file { read open };
-        class netlink_audit_socket { create nlmsg_relay audit_write read write 
};
-        class netlink_netfilter_socket { create nlmsg_relay audit_write read 
write };
-@begin_dpdk@
-        class netlink_rdma_socket { setopt bind create };
-@end_dpdk@
-        class netlink_socket { setopt getopt create connect getattr write read 
};
-        class sock_file { write };
-        class system { module_load module_request };
-        class process { sigchld signull transition noatsecure siginh rlimitinh 
};
-        class unix_stream_socket { write getattr read connectto connect setopt 
getopt sendto accept bind recvfrom acceptfrom ioctl };
-
-@begin_dpdk@
-        class sock_file { read append getattr open };
-        class tun_socket { relabelfrom relabelto create };
-@end_dpdk@
-}
-
-#============= Set up the transition domain =============
-type openvswitch_load_module_exec_t;
-type openvswitch_load_module_t;
-
-domain_type(openvswitch_load_module_exec_t);
-domain_type(openvswitch_load_module_t);
-role object_r types openvswitch_load_module_exec_t;
-role system_r types openvswitch_load_module_t;
-domain_entry_file(openvswitch_load_module_t, openvswitch_load_module_exec_t);
-domtrans_pattern(openvswitch_t, openvswitch_load_module_exec_t, 
openvswitch_load_module_t);
-
-#============= openvswitch_t ==============
-allow openvswitch_t self:capability { dac_override audit_write net_broadcast 
net_raw };
-allow openvswitch_t self:netlink_audit_socket { create nlmsg_relay audit_write 
read write };
-allow openvswitch_t self:netlink_netfilter_socket { create nlmsg_relay 
audit_write read write };
-@begin_dpdk@
-allow openvswitch_t self:netlink_rdma_socket { setopt bind create };
-@end_dpdk@
-allow openvswitch_t self:netlink_socket { setopt getopt create connect getattr 
write read };
-
-allow openvswitch_t hostname_exec_t:file { read getattr open execute 
execute_no_trans };
-allow openvswitch_t ifconfig_exec_t:file { read getattr open execute 
execute_no_trans };
-
-allow openvswitch_t openvswitch_rw_t:dir { write remove_name add_name lock 
read getattr open search };
-allow openvswitch_t openvswitch_rw_t:file { write getattr read open execute 
execute_no_trans create unlink };
-allow openvswitch_t openvswitch_tmp_t:file { execute execute_no_trans };
-allow openvswitch_t openvswitch_tmp_t:unix_stream_socket { write getattr read 
connectto connect setopt getopt sendto accept bind recvfrom acceptfrom };
-allow openvswitch_t openvswitch_var_run_t:dir { getattr read open search write 
remove_name add_name lock };
-allow openvswitch_t openvswitch_var_run_t:file { map open read write getattr 
create unlink };
-allow openvswitch_t tun_tap_device_t:chr_file { read write getattr open ioctl 
};
-
-@begin_dpdk@
-allow openvswitch_t hugetlbfs_t:dir { write remove_name add_name lock read };
-allow openvswitch_t hugetlbfs_t:file { create unlink map };
-allow openvswitch_t kernel_t:unix_stream_socket { write getattr read connectto 
connect setopt getopt sendto accept bind recvfrom acceptfrom };
-allow openvswitch_t self:tun_socket { relabelfrom relabelto create };
-allow openvswitch_t svirt_image_t:file { getattr read write };
-allow openvswitch_t svirt_tmpfs_t:file { read write };
-allow openvswitch_t svirt_tmpfs_t:sock_file { read write append getattr open };
-allow openvswitch_t svirt_t:unix_stream_socket { connectto read write getattr 
sendto recvfrom setopt };
-allow openvswitch_t vfio_device_t:chr_file { read write open ioctl getattr };
-allow openvswitch_t zero_device_t:chr_file { read open getattr map };
-@end_dpdk@
-
-#============= Transition allows =============
-type_transition openvswitch_t openvswitch_load_module_exec_t:process 
openvswitch_load_module_t;
-allow openvswitch_t openvswitch_load_module_exec_t:file { execute read open 
getattr };
-allow openvswitch_t openvswitch_load_module_t:process transition;
-
-allow openvswitch_load_module_t bin_t:file { execute execute_no_trans map };
-allow openvswitch_load_module_t init_t:unix_stream_socket { getattr ioctl read 
write };
-allow openvswitch_load_module_t init_var_run_t:dir { getattr read open search 
};
-allow openvswitch_load_module_t insmod_exec_t:file { execute execute_no_trans 
getattr map open read };
-allow openvswitch_load_module_t kernel_t:system module_request;
-allow openvswitch_load_module_t modules_conf_t:dir { getattr open read search 
};
-allow openvswitch_load_module_t modules_conf_t:file { getattr open read };
-allow openvswitch_load_module_t modules_object_t:file { map getattr open read 
};
-allow openvswitch_load_module_t modules_object_t:dir { getattr open read 
search };
-allow openvswitch_load_module_t openvswitch_load_module_exec_t:file { 
entrypoint };
-allow openvswitch_load_module_t passwd_file_t:file { getattr open read };
-allow openvswitch_load_module_t plymouth_exec_t:file { getattr read open 
execute execute_no_trans map };
-allow openvswitch_load_module_t proc_t:file { getattr open read };
-allow openvswitch_load_module_t self:system module_load;
-allow openvswitch_load_module_t self:process { siginh noatsecure rlimitinh 
siginh };
-allow openvswitch_load_module_t shell_exec_t:file { map execute 
execute_no_trans read open getattr };
-allow openvswitch_load_module_t sssd_public_t:dir { getattr open read search };
-allow openvswitch_load_module_t sssd_public_t:file { getattr map open read };
-allow openvswitch_load_module_t sssd_t:unix_stream_socket connectto;
-allow openvswitch_load_module_t sssd_var_lib_t:dir { getattr open read search 
};
-allow openvswitch_load_module_t sssd_var_lib_t:sock_file write;
-allow openvswitch_load_module_t sysfs_t:dir { getattr open read search };
-allow openvswitch_load_module_t sysfs_t:file { open read };
-allow openvswitch_load_module_t sysfs_t:lnk_file { read open };
-allow openvswitch_load_module_t systemd_unit_file_t:dir getattr;
-
-# no need to grant search permissions for this - and no need to emit
-# an error, either.
-dontaudit openvswitch_load_module_t openvswitch_var_run_t:dir { search };
-
-kernel_load_module(openvswitch_load_module_t);
-- 
2.26.2

_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to