From mboxrd@z Thu Jan 1 00:00:00 1970
Return-Path:
Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80])
by finch.gentoo.org (Postfix) with ESMTP id EE644138010
for ; Sat, 8 Sep 2012 17:31:47 +0000 (UTC)
Received: from pigeon.gentoo.org (localhost [127.0.0.1])
by pigeon.gentoo.org (Postfix) with SMTP id 7136321C003;
Sat, 8 Sep 2012 17:30:35 +0000 (UTC)
Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183])
by pigeon.gentoo.org (Postfix) with ESMTP id 33AC121C003
for ; Sat, 8 Sep 2012 17:30:35 +0000 (UTC)
Received: from hornbill.gentoo.org (hornbill.gentoo.org [94.100.119.163])
(using TLSv1 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by smtp.gentoo.org (Postfix) with ESMTPS id 5AC5533D738
for ; Sat, 8 Sep 2012 17:30:34 +0000 (UTC)
Received: from localhost.localdomain (localhost [127.0.0.1])
by hornbill.gentoo.org (Postfix) with ESMTP id 07380E5443
for ; Sat, 8 Sep 2012 17:30:33 +0000 (UTC)
From: "Sven Vermeulen"
To: gentoo-commits@lists.gentoo.org
Content-Transfer-Encoding: 8bit
Content-type: text/plain; charset=UTF-8
Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen"
Message-ID: <1347120225.d5279a76dc5dc81f060346992cacfae8b96ada36.SwifT@gentoo>
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/, policy/modules/contrib/
X-VCS-Repository: proj/hardened-refpolicy
X-VCS-Files: policy/modules/contrib/mcelog.te policy/modules/contrib/qemu.te policy/modules/contrib/rpc.te policy/modules/contrib/spamassassin.te policy/modules/contrib/virt.te policy/modules/contrib/xen.te policy/modules/contrib/xguest.te policy/modules/services/postgresql.te
X-VCS-Directories: policy/modules/services/ policy/modules/contrib/
X-VCS-Committer: SwifT
X-VCS-Committer-Name: Sven Vermeulen
X-VCS-Revision: d5279a76dc5dc81f060346992cacfae8b96ada36
X-VCS-Branch: master
Date: Sat, 8 Sep 2012 17:30:33 +0000 (UTC)
Precedence: bulk
List-Post:
List-Help:
List-Unsubscribe:
List-Subscribe:
List-Id: Gentoo Linux mail
X-BeenThere: gentoo-commits@lists.gentoo.org
X-Archives-Salt: 9a5d2610-d951-41c7-bcda-ba32e145f8f5
X-Archives-Hash: 8ee1dedf59b3a03f2bc542384f35da77
commit: d5279a76dc5dc81f060346992cacfae8b96ada36
Author: Sven Vermeulen siphos be>
AuthorDate: Sat Sep 8 16:03:45 2012 +0000
Commit: Sven Vermeulen siphos be>
CommitDate: Sat Sep 8 16:03:45 2012 +0000
URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=d5279a76
All booleans are by default off
---
policy/modules/contrib/mcelog.te | 6 +++---
policy/modules/contrib/qemu.te | 8 ++++----
policy/modules/contrib/rpc.te | 4 ++--
policy/modules/contrib/spamassassin.te | 4 ++--
policy/modules/contrib/virt.te | 4 ++--
policy/modules/contrib/xen.te | 6 +++---
policy/modules/contrib/xguest.te | 8 ++++----
policy/modules/services/postgresql.te | 6 +++---
8 files changed, 23 insertions(+), 23 deletions(-)
diff --git a/policy/modules/contrib/mcelog.te b/policy/modules/contrib/mcelog.te
index 6e44f91..bf526d7 100644
--- a/policy/modules/contrib/mcelog.te
+++ b/policy/modules/contrib/mcelog.te
@@ -21,7 +21,7 @@ gen_tunable(mcelog_client, false)
## and/or local scripts.
##
##
-gen_tunable(mcelog_exec_scripts, true)
+gen_tunable(mcelog_exec_scripts, false)
##
##
@@ -30,7 +30,7 @@ gen_tunable(mcelog_exec_scripts, true)
## print out usage and version information.
##
##
-gen_tunable(mcelog_foreground, true)
+gen_tunable(mcelog_foreground, false)
##
##
@@ -48,7 +48,7 @@ gen_tunable(mcelog_server, false)
## syslog option.
##
##
-gen_tunable(mcelog_syslog, true)
+gen_tunable(mcelog_syslog, false)
type mcelog_t;
type mcelog_exec_t;
diff --git a/policy/modules/contrib/qemu.te b/policy/modules/contrib/qemu.te
index d76e5ff..f554fc4 100644
--- a/policy/modules/contrib/qemu.te
+++ b/policy/modules/contrib/qemu.te
@@ -1,4 +1,4 @@
-policy_module(qemu, 1.7.0)
+policy_module(qemu, 1.7.1)
########################################
#
@@ -17,7 +17,7 @@ gen_tunable(qemu_full_network, false)
## Allow qemu to use cifs/Samba file systems
##
##
-gen_tunable(qemu_use_cifs, true)
+gen_tunable(qemu_use_cifs, false)
##
##
@@ -31,14 +31,14 @@ gen_tunable(qemu_use_comm, false)
## Allow qemu to use nfs file systems
##
##
-gen_tunable(qemu_use_nfs, true)
+gen_tunable(qemu_use_nfs, false)
##
##
## Allow qemu to use usb devices
##
##
-gen_tunable(qemu_use_usb, true)
+gen_tunable(qemu_use_usb, false)
type qemu_exec_t;
virt_domain_template(qemu)
diff --git a/policy/modules/contrib/rpc.te b/policy/modules/contrib/rpc.te
index e131ce3..0f246bb 100644
--- a/policy/modules/contrib/rpc.te
+++ b/policy/modules/contrib/rpc.te
@@ -1,4 +1,4 @@
-policy_module(rpc, 1.14.0)
+policy_module(rpc, 1.14.1)
########################################
#
@@ -10,7 +10,7 @@ policy_module(rpc, 1.14.0)
## Allow gssd to read temp directory. For access to kerberos tgt.
##
##
-gen_tunable(allow_gssd_read_tmp, true)
+gen_tunable(allow_gssd_read_tmp, false)
##
##
diff --git a/policy/modules/contrib/spamassassin.te b/policy/modules/contrib/spamassassin.te
index 1bbf73b..3515433 100644
--- a/policy/modules/contrib/spamassassin.te
+++ b/policy/modules/contrib/spamassassin.te
@@ -1,4 +1,4 @@
-policy_module(spamassassin, 2.5.0)
+policy_module(spamassassin, 2.5.1)
########################################
#
@@ -17,7 +17,7 @@ gen_tunable(spamassassin_can_network, false)
## Allow spamd to read/write user home directories.
##
##
-gen_tunable(spamd_enable_home_dirs, true)
+gen_tunable(spamd_enable_home_dirs, false)
type spamassassin_t;
type spamassassin_exec_t;
diff --git a/policy/modules/contrib/virt.te b/policy/modules/contrib/virt.te
index 947bbc6..e7158e7 100644
--- a/policy/modules/contrib/virt.te
+++ b/policy/modules/contrib/virt.te
@@ -1,4 +1,4 @@
-policy_module(virt, 1.5.0)
+policy_module(virt, 1.5.1)
########################################
#
@@ -45,7 +45,7 @@ gen_tunable(virt_use_sysfs, false)
## Allow virt to use usb devices
##
##
-gen_tunable(virt_use_usb, true)
+gen_tunable(virt_use_usb, false)
virt_domain_template(svirt)
role system_r types svirt_t;
diff --git a/policy/modules/contrib/xen.te b/policy/modules/contrib/xen.te
index 07033bb..9f1f160 100644
--- a/policy/modules/contrib/xen.te
+++ b/policy/modules/contrib/xen.te
@@ -1,4 +1,4 @@
-policy_module(xen, 1.12.0)
+policy_module(xen, 1.12.1)
########################################
#
@@ -11,7 +11,7 @@ policy_module(xen, 1.12.0)
## Not required if using dedicated logical volumes for disk images.
##
##
-gen_tunable(xend_run_blktap, true)
+gen_tunable(xend_run_blktap, false)
##
##
@@ -19,7 +19,7 @@ gen_tunable(xend_run_blktap, true)
## Not required if using paravirt and no vfb.
##
##
-gen_tunable(xend_run_qemu, true)
+gen_tunable(xend_run_qemu, false)
##
##
diff --git a/policy/modules/contrib/xguest.te b/policy/modules/contrib/xguest.te
index e88b95f..b885bfc 100644
--- a/policy/modules/contrib/xguest.te
+++ b/policy/modules/contrib/xguest.te
@@ -1,4 +1,4 @@
-policy_module(xguest, 1.1.0)
+policy_module(xguest, 1.1.1)
########################################
#
@@ -10,21 +10,21 @@ policy_module(xguest, 1.1.0)
## Allow xguest users to mount removable media
##
##
-gen_tunable(xguest_mount_media, true)
+gen_tunable(xguest_mount_media, false)
##
##
## Allow xguest to configure Network Manager
##
##
-gen_tunable(xguest_connect_network, true)
+gen_tunable(xguest_connect_network, false)
##
##
## Allow xguest to use blue tooth devices
##
##
-gen_tunable(xguest_use_bluetooth, true)
+gen_tunable(xguest_use_bluetooth, false)
role xguest_r;
diff --git a/policy/modules/services/postgresql.te b/policy/modules/services/postgresql.te
index b49c929..0617c72 100644
--- a/policy/modules/services/postgresql.te
+++ b/policy/modules/services/postgresql.te
@@ -1,4 +1,4 @@
-policy_module(postgresql, 1.15.0)
+policy_module(postgresql, 1.15.2)
gen_require(`
class db_database all_db_database_perms;
@@ -23,7 +23,7 @@ gen_require(`
## Allow unprived users to execute DDL statement
##
##
-gen_tunable(sepgsql_enable_users_ddl, true)
+gen_tunable(sepgsql_enable_users_ddl, false)
##
##
@@ -37,7 +37,7 @@ gen_tunable(sepgsql_transmit_client_label, false)
## Allow database admins to execute DML statement
##
##
-gen_tunable(sepgsql_unconfined_dbadm, true)
+gen_tunable(sepgsql_unconfined_dbadm, false)
type postgresql_t;
type postgresql_exec_t;