Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert "Remove the NoNewPrivileges because it breaks the ability to open socket" #113

Merged
merged 1 commit into from
Mar 6, 2025

Conversation

yixiangzhike
Copy link
Contributor

Selinux-policy has allowed init_t nnp domain transition to gssproxy_t in the commit 95d5f5e.
Now it is ok to enable NoNewPrivileges for gssproxy.service.

…pen socket"

Selinux-policy has allowed init_t nnp domain transition to gssproxy_t in the commit 95d5f5e.
Now it is ok to enable NoNewPrivileges for gssproxy.service.

Signed-off-by: yixiangzhike <yixiangzhike007@163.com>
@simo5
Copy link
Contributor

simo5 commented Feb 25, 2025

Selinux-policy has allowed init_t nnp domain transition to gssproxy_t in the commit 95d5f5e. Now it is ok to enable NoNewPrivileges for gssproxy.service.

What OS has done this?
Or is it across the board?

@yixiangzhike
Copy link
Contributor Author

Selinux-policy has allowed init_t nnp domain transition to gssproxy_t in the commit 95d5f5e. Now it is ok to enable NoNewPrivileges for gssproxy.service.

What OS has done this? Or is it across the board?

The OS is openEuler. It's upstream selinux-policy is https://github.com/fedora-selinux/selinux-policy. Others can backport the patch 95d5f5e to enable NoNewPrivileges also.

@simo5
Copy link
Contributor

simo5 commented Mar 6, 2025

Coll, @jrisc confirmed that Fedora is also compatible with this change, so I am going to merge it in.

@simo5 simo5 merged commit b8e3364 into gssapi:main Mar 6, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants