diff --git a/backport-Allow-dovecot-bind-to-smtp-ports.patch b/backport-Allow-dovecot-bind-to-smtp-ports.patch deleted file mode 100644 index 6ba675181376af123325a5968f15a5e4901da2fb..0000000000000000000000000000000000000000 --- a/backport-Allow-dovecot-bind-to-smtp-ports.patch +++ /dev/null @@ -1,29 +0,0 @@ -From f5c688321e04364bdfd030dd1412a7e5a4ecc6b6 Mon Sep 17 00:00:00 2001 -From: Zdenek Pytela -Date: Tue, 10 Nov 2020 18:04:49 +0100 -Subject: [PATCH] Allow dovecot bind to smtp ports - -When dovecot is configured to listen on submission ports -(tcp 465 or 587), it requires the name_bind permission to ports -labeled smtp_port_t. - -Resolves: rhbz#1881884 ---- - dovecot.te | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/policy/modules/contrib/dovecot.te b/policy/modules/contrib/dovecot.te -index 6cf4b72e9..0b140e932 100644 ---- a/policy/modules/contrib/dovecot.te -+++ b/policy/modules/contrib/dovecot.te -@@ -147,6 +147,7 @@ corenet_tcp_bind_mail_port(dovecot_t) - corenet_tcp_bind_pop_port(dovecot_t) - corenet_tcp_bind_lmtp_port(dovecot_t) - corenet_tcp_bind_sieve_port(dovecot_t) -+corenet_tcp_bind_smtp_port(dovecot_t) - corenet_tcp_connect_all_ports(dovecot_t) - corenet_tcp_connect_postgresql_port(dovecot_t) - corenet_sendrecv_pop_server_packets(dovecot_t) --- -2.23.0 - diff --git a/selinux-policy.spec b/selinux-policy.spec index cd58722663b5d86c19b119f4ab3fe58fe9bf377b..3c6046fb34404a407155d3cc2825902bb48a6780 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -64,9 +64,13 @@ Patch11: add-avc-for-systemd-hostnamed-and-systemd-logind.patch Patch12: add-avc-for-systemd.patch Patch13: allow-systemd-to-mount-unlabeled-filesystemd.patch Patch14: add_userman_access_run_dir.patch -Patch15: add-allow-systemd-timedated-to-unlink-etc-link.patch -Patch16: add-avc-for-openEuler-1.patch -Patch17: backport-Allow-dovecot-bind-to-smtp-ports.patch +Patch15: allow-systemd-machined-create-userdbd-runtime-sock-file.patch +Patch16: allow-systemd_machined_t-delete-userdbd-runtime-sock.patch +Patch17: add-firewalld-fc.patch +Patch18: allow-systemd-domain-read-security-file.patch +Patch19: allow-nsswitch_domain-to-connect-to-systemd-machined.patch +Patch20: allow-all-users-to-connect-to-systemd-userdbd.patch +Patch21: add-avc-for-openEuler-1.patch BuildArch: noarch BuildRequires: python3 gawk checkpolicy >= %{CHECKPOLICYVER} m4 policycoreutils-devel >= %{POLICYCOREUTILSVER} bzip2 gcc @@ -732,10 +736,7 @@ exit 0 %endif %changelog -* Tue Mar 2 2021 luhuaxin <1539327763@qq.com> - 3.14.2-65 -- add avc for allowing dovecot bind to smtp ports - -* Sun Dec 13 2020 luhuaxin <1539327763@qq.com> - 3.14.2-64 +* Sun Dec 13 2020 luhuaxin <1539327763@qq.com> - 3.14.2-66 - add avc for openEuler * Tue Dec 8 2020 openEuler Buildteam - 3.14.2-65