mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-17 18:06:59 +02:00
Merge pull request #1556 from flatcar-linux/krnowak/iputils-update
Changes for net-misc/iputils update
This commit is contained in:
commit
1cca5f4eeb
@ -12,7 +12,7 @@ dev-util/perf tui -doc
|
|||||||
dev-vcs/git webdav curl bash-completion
|
dev-vcs/git webdav curl bash-completion
|
||||||
# We don't want any driver/hw rendering on the host
|
# We don't want any driver/hw rendering on the host
|
||||||
net-misc/curl kerberos threads telnet
|
net-misc/curl kerberos threads telnet
|
||||||
net-misc/iputils arping tracepath traceroute
|
net-misc/iputils arping tracepath traceroute6
|
||||||
sys-devel/gettext -git
|
sys-devel/gettext -git
|
||||||
app-emulation/qemu aio caps curl -doc ncurses png python threads uuid vhost-net virtfs vnc -xkb -slirp -jpeg qemu_softmmu_targets_x86_64 qemu_softmmu_targets_aarch64
|
app-emulation/qemu aio caps curl -doc ncurses png python threads uuid vhost-net virtfs vnc -xkb -slirp -jpeg qemu_softmmu_targets_x86_64 qemu_softmmu_targets_aarch64
|
||||||
|
|
||||||
|
19
sdk_container/src/third_party/coreos-overlay/sec-policy/selinux-base-policy/files/ping.patch
vendored
Normal file
19
sdk_container/src/third_party/coreos-overlay/sec-policy/selinux-base-policy/files/ping.patch
vendored
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
diff -u -r refpolicy/policy/modules/admin/netutils.te refpolicy/policy/modules/admin/netutils.te
|
||||||
|
--- refpolicy/policy/modules/admin/netutils.te 2022-01-12 14:28:26.850809330 -0000
|
||||||
|
+++ refpolicy/policy/modules/admin/netutils.te 2022-01-12 14:29:50.323880882 -0000
|
||||||
|
@@ -117,6 +117,7 @@
|
||||||
|
corenet_raw_sendrecv_generic_node(ping_t)
|
||||||
|
corenet_tcp_sendrecv_generic_node(ping_t)
|
||||||
|
corenet_raw_bind_generic_node(ping_t)
|
||||||
|
+corenet_icmp_bind_generic_node(ping_t)
|
||||||
|
|
||||||
|
dev_read_urand(ping_t)
|
||||||
|
|
||||||
|
@@ -189,6 +190,7 @@
|
||||||
|
corenet_tcp_connect_all_ports(traceroute_t)
|
||||||
|
corenet_sendrecv_all_client_packets(traceroute_t)
|
||||||
|
corenet_sendrecv_traceroute_server_packets(traceroute_t)
|
||||||
|
+corenet_icmp_bind_generic_node(traceroute_t)
|
||||||
|
|
||||||
|
dev_read_rand(traceroute_t)
|
||||||
|
dev_read_urand(traceroute_t)
|
@ -43,6 +43,8 @@ PATCHES=(
|
|||||||
# to fail if SELinux is enforced in early boot.
|
# to fail if SELinux is enforced in early boot.
|
||||||
# It can be removed once we drop torcx support.
|
# It can be removed once we drop torcx support.
|
||||||
"${FILESDIR}/unlabeled.patch"
|
"${FILESDIR}/unlabeled.patch"
|
||||||
|
# This is to allow pings from some IP address.
|
||||||
|
"${FILESDIR}/ping.patch"
|
||||||
)
|
)
|
||||||
|
|
||||||
# Code entirely copied from selinux-eclass (cannot inherit due to dependency on
|
# Code entirely copied from selinux-eclass (cannot inherit due to dependency on
|
||||||
|
40
sdk_container/src/third_party/coreos-overlay/sec-policy/selinux-base/files/icmp-bind.patch
vendored
Normal file
40
sdk_container/src/third_party/coreos-overlay/sec-policy/selinux-base/files/icmp-bind.patch
vendored
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
diff -u -r refpolicy/policy/modules/kernel/corenetwork.if.in refpolicy2/policy/modules/kernel/corenetwork.if.in
|
||||||
|
--- refpolicy/policy/modules/kernel/corenetwork.if.in 2022-01-12 16:59:47.572670384 -0000
|
||||||
|
+++ refpolicy2/policy/modules/kernel/corenetwork.if.in 2022-01-12 17:01:54.974858982 -0000
|
||||||
|
@@ -879,6 +879,24 @@
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
+## Bind ICMP sockets to generic nodes.
|
||||||
|
+## </summary>
|
||||||
|
+## <param name="domain">
|
||||||
|
+## <summary>
|
||||||
|
+## Domain allowed access.
|
||||||
|
+## </summary>
|
||||||
|
+## </param>
|
||||||
|
+#
|
||||||
|
+interface(`corenet_icmp_bind_generic_node',`
|
||||||
|
+ gen_require(`
|
||||||
|
+ type node_t;
|
||||||
|
+ ')
|
||||||
|
+
|
||||||
|
+ allow $1 node_t:icmp_socket node_bind;
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+########################################
|
||||||
|
+## <summary>
|
||||||
|
## Bind TCP sockets to generic nodes.
|
||||||
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
diff -u -r refpolicy/policy/modules/kernel/corenetwork.te.in refpolicy2/policy/modules/kernel/corenetwork.te.in
|
||||||
|
--- refpolicy/policy/modules/kernel/corenetwork.te.in 2022-01-12 16:59:47.573670362 -0000
|
||||||
|
+++ refpolicy2/policy/modules/kernel/corenetwork.te.in 2022-01-12 17:03:12.754142616 -0000
|
||||||
|
@@ -373,7 +373,7 @@
|
||||||
|
|
||||||
|
# Bind to any network address.
|
||||||
|
allow corenet_unconfined_type port_type:{ tcp_socket udp_socket rawip_socket sctp_socket } name_bind;
|
||||||
|
-allow corenet_unconfined_type node_type:{ tcp_socket udp_socket rawip_socket sctp_socket } node_bind;
|
||||||
|
+allow corenet_unconfined_type node_type:{ icmp_socket tcp_socket udp_socket rawip_socket sctp_socket } node_bind;
|
||||||
|
|
||||||
|
# Infiniband
|
||||||
|
corenet_ib_access_all_pkeys(corenet_unconfined_type)
|
@ -43,6 +43,7 @@ BDEPEND="sys-devel/m4
|
|||||||
PATCHES=(
|
PATCHES=(
|
||||||
"${FILESDIR}"/0001-policy-modules-kernel-all-more-actions-for-kernel.patch
|
"${FILESDIR}"/0001-policy-modules-kernel-all-more-actions-for-kernel.patch
|
||||||
"${FILESDIR}"/0001-policy-ms-MCS-restricts-relabelfrom.patch
|
"${FILESDIR}"/0001-policy-ms-MCS-restricts-relabelfrom.patch
|
||||||
|
"${FILESDIR}"/icmp-bind.patch
|
||||||
)
|
)
|
||||||
|
|
||||||
S=${WORKDIR}/
|
S=${WORKDIR}/
|
||||||
|
Loading…
Reference in New Issue
Block a user