Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp371111pxu; Sun, 22 Nov 2020 11:06:04 -0800 (PST) X-Google-Smtp-Source: ABdhPJz8wcgCxQT06h9xMUVbgsDfq3vboAvvaU6nE4n3h5jO8wkGUzwG1kKZZ+6RhsW2Iw6LcBFZ X-Received: by 2002:a17:906:394:: with SMTP id b20mr2976940eja.143.1606071964659; Sun, 22 Nov 2020 11:06:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606071964; cv=none; d=google.com; s=arc-20160816; b=C2n4gj7hZiBNEZKjr04JlFDpz4Ca53vYE3oiyR4tCzluAS7aHe+RuUL6v7aBsNed0z 3gEzWuTYnRPPgwAxNsewYD/VWIxI8rkXlpjjvh2OHB1kOZyDguDr9C5fL48bW+Kihc0y LeRaD9xTZovpRYAHuVpYIjNCCfzQSWj86vxt0BTwyST/obfKoErdo03L8P26gc9549PN Cnb7UTN8yyz9f5lWdAnM5CRFxGzx/YVd8wVJNHmXBNVjCxVPKQOEBh4jmxDqtKvaWp1s Sdu43ZETdKQxUqVeX2TTHogTHLic0BvpMiSX7dJSMskMX/rqvYBFhJIRp1rfgmjbPO6L RgIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=poHttHFxu4CQfWB6vmjuJ0VvatedX6dd0I45t3MtBFQ=; b=KjI/wPL/fvuPcQ3peDG4TtWwrZYnVwT9v8zd5MS/9Uhh+vYD4JiPTq6SS+Xmwkc3AS APy2QLTkYjtKdBIbWB5ppy4Aromv3PVZFR1rad+oiRbs5sBUSPnyK6s3vevz75OTTlIS qwTROuY1uL21TNOaEOJqNKBx/e+i8Ssqy9nSYGoBIo3ReD5GincBw4nTV31FzONCkn4W sbo3MFba6oIszUKQOABHwzmK0mMeycNrt2jPnYBw3KgM454lyET4tAMh/eenmSnGgTvw x43RSScMSXM1m49WeTiW9pVvaNA7tUyIMZqSL0qiNWE2Igbc/RwkmUEcXk/TxweXEyD/ 4Dfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=ZGfg16vD; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bl7si5161722ejb.3.2020.11.22.11.06.00; Sun, 22 Nov 2020 11:06:04 -0800 (PST) Received-SPF: pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=ZGfg16vD; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728163AbgKVTFA (ORCPT + 16 others); Sun, 22 Nov 2020 14:05:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36776 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727795AbgKVTFA (ORCPT ); Sun, 22 Nov 2020 14:05:00 -0500 Received: from mail-qt1-x841.google.com (mail-qt1-x841.google.com [IPv6:2607:f8b0:4864:20::841]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A3788C0613CF for ; Sun, 22 Nov 2020 11:04:58 -0800 (PST) Received: by mail-qt1-x841.google.com with SMTP id e10so4000766qte.4 for ; Sun, 22 Nov 2020 11:04:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=poHttHFxu4CQfWB6vmjuJ0VvatedX6dd0I45t3MtBFQ=; b=ZGfg16vDoTeI4qcyeQqoI4MpvjDav05D23MrXTrQUYGiJqdH0KkrD9Foe6Yv+6D1Iv L+mVTvB0ixpOxXhNue3mQoO4TTnLQKFxWbu9bkvSOyOoHKil/kQfP/avHk4x2w7jCueS RfF8L6UQHnRg0IrW7LLQTJTOEnBaw+0OkhC18= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=poHttHFxu4CQfWB6vmjuJ0VvatedX6dd0I45t3MtBFQ=; b=Tiv5zRO/Yw1z3mVwufR6MNGwBg07/XspUT4gRqTO6IV+Sye/NQ7mZJg8BlUiz7eHqU wwGGNgSIyFXpPFImLYx0xZr8Lgy3nvs8czyqz1VGVBn82gJcRCqV8XImVeXTz7v+aeNe kc9uLkCEPa7VRFWztMTDn87Vjb96wcsquN6YDNl6+Xp1OehZpX1ckpLyo9gU71aoC7lL rITPR9O9eFLhoSgoJvqt9ey6aLZsn4QJlxVk6pc9NS8vyNrEzHJ2wqCAvu/VEEdIUSy0 zD7CpfMFU0WqM/k0a+6cVWiyRnQ+ALQ/Kh1QdBb2DYZjAkwJ40pwKWT+Q1oF+NwmRfb6 F74A== X-Gm-Message-State: AOAM532vuWCKYvLERzFrRAAeF330zLdvXrgget6JZAVlG98w9i74qaho BRMHXiNSQMfCkx+HgmtSXI9aVvRsIcknBA== X-Received: by 2002:ac8:488d:: with SMTP id i13mr26322243qtq.148.1606071897950; Sun, 22 Nov 2020 11:04:57 -0800 (PST) Received: from fedora.pebenito.net (pool-96-234-173-17.bltmmd.fios.verizon.net. [96.234.173.17]) by smtp.gmail.com with ESMTPSA id v204sm7441308qka.4.2020.11.22.11.04.57 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 22 Nov 2020 11:04:57 -0800 (PST) Subject: Re: [PATCH 8/8] systemd: make remaining dbus_* optional To: Jason Zaman , selinux-refpolicy@vger.kernel.org Cc: Jason Zaman References: <20201117034628.2461-1-jason@perfinion.com> <20201117034628.2461-8-jason@perfinion.com> From: Chris PeBenito Message-ID: <2aa748ed-9e4d-7a4a-891f-886f20bbb898@ieee.org> Date: Sun, 22 Nov 2020 14:04:41 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.4.0 MIME-Version: 1.0 In-Reply-To: <20201117034628.2461-8-jason@perfinion.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org On 11/16/20 10:46 PM, Jason Zaman wrote: > From: Jason Zaman > > Almost all calls to dbus_ interfaces were already optional, this makes > the remaining one optional_policy so that the modules can be installed / > upgraded easier. > > Signed-off-by: Jason Zaman > Signed-off-by: Jason Zaman > --- > policy/modules/system/systemd.te | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te > index 74f3fc55d..a08b83d51 100644 > --- a/policy/modules/system/systemd.te > +++ b/policy/modules/system/systemd.te > @@ -1450,4 +1450,6 @@ userdom_manage_user_runtime_dirs(systemd_user_runtime_dir_t) > userdom_mounton_user_runtime_dirs(systemd_user_runtime_dir_t) > userdom_relabelto_user_runtime_dirs(systemd_user_runtime_dir_t) > > -dbus_system_bus_client(systemd_user_runtime_dir_t) > +optional_policy(` > + dbus_system_bus_client(systemd_user_runtime_dir_t) > +') Merged. -- Chris PeBenito