History log of /external/selinux/policycoreutils/semodule/semodule.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
65c6325271b54d3de9c17352a57d469dfbd12729 06-Aug-2015 Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com> policycoreutils/semodule: update semodule to allow extracting modules

Add --extract/-E, --cil/-c, and --hll/-H to extract modules. If -c/-H
are not provided, the module will be output as HLL by default. Only
--cil or --hll (which will use the lang_ext in the semodule store) are valid
options to use with -E. The module is written to the current working directory
as <module_name>.<lang_ext>.

If a module exists as HLL and is exported as CIL, it will first compile into
CIL and cache to the module store. Once compiled, exporting will
continue.

If no priority is provided when extracting a module, then extraction at
the default priority, 400, will be attempted. If the module does not
exist at the default priority, then it will be exported at the highest
existing priority.

Examples:

Extract the wireshark module in a .cil format. If the module only exists
as HLL on the system, the module will be compiled into CIL and placed
into the module store. This command will then write wireshark.cil to the CWD.

semodule --cil --extract wireshark

Extract the wireshark module in HLL format. Since the original HLL file
was a policy package, a wireshark.pp will be written to the CWD.

semodule -E wireshark

Extract the wireshark module as CIL and HLL and extract the puppet
module as CIL at priority 400.

semodule --hll -E wireshark --cil -E wireshark -X 400 --cil -E puppet

Signed-off-by: Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com>
Signed-off-by: James Carter <jwcart2@tycho.nsa.gov>
/external/selinux/policycoreutils/semodule/semodule.c
28efbfd4ed1b57932d8a485197ddd29879d82998 03-Apr-2014 Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com> policycoreutils: add semodule option to set store root path

Add a new -S option to semodule. This option overrides store_root
in semanage.conf and sets the SELinux store's root path. If neither -S,
nor store_root are specified in semanage.conf, then the default
location is used.

Signed-off-by: Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com>
/external/selinux/policycoreutils/semodule/semodule.c
241f9d2d03d0c0e218f1afd0a1ae11e2fa301b9f 27-Feb-2014 Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com> policycoreutils: add semodule flag for ignoring cached CIL

Providing --ignore-module-cache will cause the recompilating of all HLL
modules, and recaching of the resulting CIL files.

Signed-off-by: Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com>
/external/selinux/policycoreutils/semodule/semodule.c
e599a4318409b317b023bda2381034f80f4b6df5 16-May-2014 Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com> policycoreutils: deprecate base/upgrade/version in semodule

Providing --upgrade or --base will now just call --install, and display
a deprecation message to the user. Additionally, because CIL has no
concept of version numbers, this removes the version output from --list.

Signed-off-by: Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com>
/external/selinux/policycoreutils/semodule/semodule.c
6e085368f1707ba3d1222a4f0d94e6298b6dbfbc 22-Nov-2011 Steve Lawrence <slawrence@tresys.com> policycoreutils: semodule: add back support for alternative root paths

Removed in commits:
- Revert "policycoreutils: semodule: support for alternative root paths"

Signed-off-by: Steve Lawrence <slawrence@tresys.com>
/external/selinux/policycoreutils/semodule/semodule.c
031ee84821a22eebb6d8524e7dcd84b703ee41fc 24-Dec-2009 Caleb Case <ccase@tresys.com> semodule: add priority, enabled, and extended listing

This updates the semodule tool with the ability to set the priority for
commands, to enable/disable modules, and extended module listing options
for displaying extra module information (e.g., priority, enabled status,
and language extension).

[semodule priority]

-X --priority set the priority for following operations

Notes:

* This sets the priority for the following operations.

* It can be used any number of times with its effect continuing until
the next priority is specified.

* The default priority is used if no priority has yet been specified.

Impact on current operations:

* Install module

* Without priority - Install at default priority.

* With priority - Install at specified priority.

* New warning when overriding (issued by libsemanage).

* Upgrade module

* Without priority - Upgrade at default priority (current upgrade
semantics apply).

* With priority - Upgrade at specified priority (current upgrade
semantics apply).

* New warning when overriding (issued by libsemanage).

* Remove module

* Without priority - Remove a module at the default if exists.

* With priority - Remove at that priority.

* New info messages (issued by libsemanage):

* If no modules exist at the given priority but do exist at other
priorities, give an info message listing the modules and priority.

* If a new module at a lower priority will become active print a
message.

* If the last module with this name is being removed print a
message.

* Base

* The name of base module on install is fixed to "_base" (performed by
libsemanage).

* Without priority - Install at default priority.

* With priority - Install at specified priority.

* New warning when overriding (issued by libsemanage).

* List modules

* See listing changes below.

Examples:

semodule -i foo.pp

semodule -X 500 -i foo.pp

[semodule enable/disable]

Add enable/disable status:

-e --enable enable the module (at all priorities)
-d --disable disable the module (at all priorities)

Notes:

* Base modules are always enabled and cannot have their enabled/disabled
status changed.

* New error when disabling a base module (from libsemanage).

* New warning when enabling a base module (from libsemanage).

Impact on current operations:

* Install module

* If a module with that name is already installed, then the enabled
status will remain the same after installing the new module.

* New warning when installing a module which will be disabled by
existing enabled status (from libsemanage).

* Upgrade module

* If a module with that name is already installed, then the enabled
status will remain the same after installing the new module.

* New warning when installing a module which will be disabled by
existing enabled status (from libsemanage).

* Remove module

* When the last module with a given name is removed (no more exist at
other priorities) then the enabled status is forgotten.

* Base

* Base modules are always installed enabled and remain so (can't be
disabled).

* List modules

* See listing changes below.

Examples:

semodule -e foo

semodule -d foo

[semodule list]

-l --list list modules as if by -lstandard

-lstandard --list=standard list name and version of highest priority,
enabled, non-base modules sorted alphabetical
by name

-lfull --list=full list all fields of all modules columnated
sorted high priority to low, within priority
alphabetical by name

Impact on current operations:

* List modules

* Default listing stays the same.

* New long options for 'standard' and 'full'.

Examples:

semodule -l
semodule -lstandard
semodule --list=standard

alsa 1.7.1
apm 1.9.1
apt 1.5.2
authlogin 2.0.0
avahi 1.10.3
bluetooth 3.1.3
...

semodule -lfull
semodule --list=full

600 alsa 1.7.1 disabled pp
400 _base 1.0.0 pp
400 alsa 1.7.1 disabled pp
400 apm 1.9.1 pp
400 apt 1.5.2 pp
400 authlogin 2.0.0 pp
...
100 alsa 1.7.1 disabled pp

Signed-off-by: Chad Sellers <csellers@tresys.com>
/external/selinux/policycoreutils/semodule/semodule.c
5ac1e98ab239baee0b3c46cbba318369ca2a4fdd 27-Sep-2011 Steve Lawrence <slawrence@tresys.com> Revert "policycoreutils: semodule: support for alternative root paths"

This reverts commit 5e096d9ceb637a785d4537555799602a3de2b3dc.

Conflicts:

policycoreutils/semodule/semodule.c
/external/selinux/policycoreutils/semodule/semodule.c
30a2df81eb8a03f1414b30d7a9783d378d08c53d 27-Sep-2011 Steve Lawrence <slawrence@tresys.com> Revert "Last attempt at upstreaming semodule_disable patch."

This reverts commit 654dcb897e49908a958dae55cf29793412c4b390.

Conflicts:

policycoreutils/semodule/semodule.c
/external/selinux/policycoreutils/semodule/semodule.c
91d0de4adf5d9bfd57bf4188dab523811dc88e48 09-Oct-2013 Dan Walsh <dwalsh@redhat.com> genhomedircon is no longer a script, but a link to semodule
/external/selinux/policycoreutils/semodule/semodule.c
7ae7858a6bfc1203d1c7db79e14c562ce560a919 08-May-2012 Dan Walsh <dwalsh@redhat.com> policycoreutils: semodule: Add -N qualifier to no reload kernel policy

This makes semodule consistent with other commands to no reload the
policy into the kernel after the given change.

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Dan Walsh <dwalsh@redhat.com>
/external/selinux/policycoreutils/semodule/semodule.c
24b31a9da5a6f7f9d056ab13367ebdcb1fb3c585 04-Oct-2011 Dan Walsh <dwalsh@redhat.com> policycoreutils: semodule: Document semodule -p in man page

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Dan Walsh <dwalsh@redhat.com>
/external/selinux/policycoreutils/semodule/semodule.c
e4bc1b223debcc6747fef4d7a2a0a320c0208a88 01-Sep-2011 Harry Ciao <qingtao.cao@windriver.com> libsepol: libsemanage: policycoreutils: Create a new preserve_tunables flag in sepol_handle_t.

By default only the effective branch of a tunable conditional would be
expanded and written to raw policy, while all needless unused branches
would be discarded.

Add a new option '-P' or "--preserve_tunables" to the semodule program.
By default it is 0, if set to 1 then the above preserve_tunables flag
in the sepol_handle_t would be set to 1 accordingly.

Signed-off-by: Harry Ciao <qingtao.cao@windriver.com>
Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Dan Walsh <dwalsh@redhat.com>
/external/selinux/policycoreutils/semodule/semodule.c
5e096d9ceb637a785d4537555799602a3de2b3dc 07-Jul-2011 Eric Paris <eparis@redhat.com> policycoreutils: semodule: support for alternative root paths

Add a -p option to semodule which will allow it to operate on the
specified semanaged root instead of the default.

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Dan Walsh <dwalsh@redhat.com>
/external/selinux/policycoreutils/semodule/semodule.c
654dcb897e49908a958dae55cf29793412c4b390 24-Feb-2010 Daniel J Walsh <dwalsh@redhat.com> Last attempt at upstreaming semodule_disable patch.

This patch allows you to disable/Enable policy modules.

It never seems to get upstreamed. :^(

Signed-off-by: Joshua Brindle <method@manicmethod.com>
/external/selinux/policycoreutils/semodule/semodule.c
c282c4024de7321a2987e55c51f6b65c75344c83 11-Sep-2009 Daniel J Walsh <dwalsh@redhat.com> I think I sent this patch before, it is the upgrade patch.

Basically it makes semodule -u file.pp, install file.pp if it does not exist. This matches the rpm syntax, and allows us too update/install many packages with a transaction without know whether the package is updated or installed.

Currently we can only do a -i which could hammer a newwer version.

commit 3a5ed0fdf42200d0efd6cb1064eab91d2eb5ca52
Author: Dan Walsh <dwalsh@redhat.com>
Date: Mon Aug 24 11:36:41 2009 -0400

i Upgrade patch
/external/selinux/policycoreutils/semodule/semodule.c
2c91f6377de4f96a3a9ca5c80c3b433b6d717d6a 06-Jul-2009 Christopher Pardy <cpardy@redhat.com> semodule: maintain old functionality

Patch for semodule command
semodule -B
Will now turn on dontaudit rules
semodule -DB
Will turn off dontaudit rules.
With other patch all other semanage commands will maintain state.

Created by Dan Walsh

Signed-off-by: Christopher Pardy <cpardy@redhat.com>
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/selinux/policycoreutils/semodule/semodule.c
d8b1ea603b40c21b9ac3724d9d405fac8e45b112 16-Feb-2009 Joshua Brindle <method@manicmethod.com> Author: Daniel J Walsh
Email: dwalsh@redhat.com
Subject: Make removing of a module a warning rather then an error.
Date: Tue, 13 Jan 2009 08:57:17 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This way if I say a command line

semodule -r mypol -i newmypol

and mypol was not there the semodule command does not error out.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAklsnb0ACgkQrlYvE4MpobNwFACfTqc17wREKC2aAhLOIkfbqgeg
GxgAn2/ZBz5ljtyK1aiVkqoCBj98y9Ey
=I4uX
-----END PGP SIGNATURE-----

Signed-off-by: Joshua Brindle <method@manicmethod.com>
/external/selinux/policycoreutils/semodule/semodule.c
8c51c70d59e8c8c5726d4b18e1f8fbec3c28c251 05-Jan-2009 Joshua Brindle <method@manicmethod.com> Author: Daniel J Walsh
Email: dwalsh@redhat.com
Subject: semodule patch to use new semanage interfaces
Date: Fri, 07 Nov 2008 09:41:24 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Allows semodule to read bzip compressed policy packages directly.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkkUU5QACgkQrlYvE4MpobMHGQCdGwEl3h1ZwV92u1mfgrr3z7XT
NGYAoIwz76N7QFdEr8I0t3ncGhbo6heq
=raBi
-----END PGP SIGNATURE-----

Signed-off-by: Joshua Brindle <method@manicmethod.com>
/external/selinux/policycoreutils/semodule/semodule.c
13cd4c8960688af11ad23b4c946149015c80d549 19-Aug-2008 Joshua Brindle <method@manicmethod.com> initial import from svn trunk revision 2950
/external/selinux/policycoreutils/semodule/semodule.c