Commit graph

7 commits

Author SHA1 Message Date
Kevin Fenzi
8102d0ca43 base / selinux / rsyslog-audit: bump the version on this policy to get it to reload on all the f31+ machines
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-04-24 21:34:27 +02:00
Adam Williamson
1459a3fa5c Update rsyslog-audit SELinux policy with one more needed perm
This one was dontaudit. Grr.

Signed-off-by: Adam Williamson <awilliam@redhat.com>
2019-05-29 16:00:23 -07:00
Adam Williamson
f4156c3db7 rsyslog-audit policy: also allow 'open'
Signed-off-by: Adam Williamson <awilliam@redhat.com>
2019-05-29 10:21:10 -07:00
Adam Williamson
3eb406ccdb Update rsyslog-audit custom SELinux policy to allow dir reads
This now seems to be necessary. This is the cause of the flood
of SELinux denials on F29+ hosts with the rsyslog stuff.

Signed-off-by: Adam Williamson <awilliam@redhat.com>
2019-05-29 09:49:03 -07:00
Patrick Uiterwijk
c9817d2b47 Add selinux to allow map for pamdatabase from unix_chkpwd
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2017-12-12 15:42:02 +00:00
Patrick Uiterwijk
f4ae8df39d Fix up policy source and add EL6 compiled version
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2017-05-04 14:12:56 +00:00
Kevin Fenzi
fcf570d42e initial selinux module work for rsyslog to read audit 2017-05-04 14:02:02 +00:00