Michal Ruprich
a6947d365d
New version 10.2.1
2025-01-31 09:00:29 +01:00
Fedora Release Engineering
fd2546a2e0
Rebuilt for https://fedoraproject.org/wiki/Fedora_42_Mass_Rebuild
2025-01-16 18:54:24 +00:00
Benjamin A. Beasley
d6654e0df9
Drop i686 support (leaf package)
2025-01-04 10:25:59 -05:00
Michal Ruprich
a07c716d0b
Resolves: rhbz#2329643 - upgrading frr to 10.2 causes pimd crashes
2024-12-05 18:07:21 +01:00
Michal Ruprich
5afc216343
New version 10.2
2024-11-22 10:37:48 +01:00
Michal Ruprich
200b4b5d79
Resolves : #2311119 - Multiple AVCs for accessing lib_t in FRR-10.1
...
Resolves : #2311120 - AVCs for using a netlink socket in FRR
2024-09-10 14:40:58 +02:00
Benjamin A. Beasley
c9eb844b76
Rebuilt for abseil-cpp-20240722.0
2024-08-25 17:53:51 -04:00
Michal Ruprich
c34de6afce
libre soname bump
2024-08-15 09:04:28 +02:00
Michal Ruprich
c39d922dae
New version 10.1
2024-08-12 13:14:52 +02:00
Michal Ruprich
61519cccf4
New version 10.0.1
2024-07-31 12:50:07 +02:00
Fedora Release Engineering
81fa627af2
Rebuilt for https://fedoraproject.org/wiki/Fedora_41_Mass_Rebuild
2024-07-17 23:42:26 +00:00
Michal Ruprich
c09dc1bed5
Moving yang modules to frr specific dir to avoid conflicts
2024-04-17 08:38:00 +02:00
Paul Wouters
4c161409bf
- Rebuild for libre2.so.11 bump
2024-02-23 21:20:37 -05:00
Zdenek Pytela
7643df3757
Rename all /var/run file context entries to /run
...
With the 1f76e522a ("Rename all /var/run file context entries to /run")
selinux-policy commit, all /var/run file context entries moved to /run
and the equivalency was inverted. Subsequently, changes in frr.fc
need to be done, too, in a similar manner.
Together with that, the "/run/lock = /var/lock" equivalency was also
inverted and entries moved.
2024-02-06 21:27:03 +01:00
Benjamin A. Beasley
14d3b39746
Rebuilt for abseil-cpp-20240116.0
2024-02-04 11:26:57 -05:00
Michal Ruprich
f10270279b
New version 9.1
2024-01-25 14:43:24 +01:00
Vit Mojzis
9c91b908e1
SELinux: rename ifconfig_run interfaces to be more specific
...
The change has no functional impact on the policy. It is just to keep it
in sync with the interfaces shipped in selinux-policy-* packages.
Signed-off-by: Vit Mojzis <vmojzis@redhat.com >
2024-01-25 12:51:35 +00:00
Fedora Release Engineering
2228c29472
Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
2024-01-24 12:05:55 +00:00
Fedora Release Engineering
9bf8cfe430
Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
2024-01-19 19:51:00 +00:00
Michal Ruprich
30f4eb8e8e
New version 9.0.1
2023-10-16 09:44:02 +02:00
Michal Ruprich
ca06a43267
Adding a couple of SELinux rules, includes fix for rhbz#2149299
2023-09-01 13:15:04 +02:00
Benjamin A. Beasley
4405129034
Rebuilt for abseil-cpp 20230802.0
2023-08-30 07:50:46 -04:00
Zdenek Pytela
a302f6117d
Update SELinux rule to allow frr daemons create and use packet socket
...
The commit addresses the following AVC denial:
type=PROCTITLE msg=audit(07/27/2023 11:26:31.692:622) : proctitle=/usr/libexec/frr/bfdd -d -F traditional -A 127.0.0.1
type=SOCKADDR msg=audit(07/27/2023 11:26:31.692:622) : saddr={ saddr_fam=packet (unsupported) }
type=SYSCALL msg=audit(07/27/2023 11:26:31.692:622) : arch=x86_64 syscall=bind success=no exit=EACCES(Permission denied) a0=0xf a1=0x7ffeb8c5a000 a2=0x14 a3=0x7ffeb8c59ff0 items=0 ppid=7818 pid=7903 auid=unset uid=frr gid=frr euid=frr suid=frr fsuid=frr egid=frr sgid=frr fsgid=frr tty=(none) ses=unset comm=bfdd exe=/usr/libexec/frr/bfdd subj=system_u:system_r:frr_t:s0 key=(null)
type=AVC msg=audit(07/27/2023 11:26:31.692:622) : avc: denied { bind } for pid=7903 comm=bfdd scontext=system_u:system_r:frr_t:s0 tcontext=system_u:system_r:frr_t:s0 tclass=packet_socket permissive=0
Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=2216912
2023-08-01 09:40:29 +02:00
Fedora Release Engineering
73b57e75c1
Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
...
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org >
2023-07-19 20:19:19 +00:00
Michal Ruprich
b6998f1514
New version 8.5.2
2023-06-30 15:51:23 +02:00
Michal Ruprich
de8d85febb
frr-8.5.1-4
...
Selinux policy changes:
- Allow watch,read on /var/run/netns directory and its content
- Add sys_admin capability
It seems like sys_admin is needed because frr is using setns function to change the actual namespace. Full log here:
type=PROCTITLE msg=audit(06/29/2023 03:42:07.692:559) : proctitle=/usr/libexec/frr/zebra -d -F traditional -A 127.0.0.1 -s 90000000 -n
type=SYSCALL msg=audit(06/29/2023 03:42:07.692:559) : arch=x86_64 syscall=setns success=no exit=EPERM(Operation not permitted) a0=0x11 a1=CLONE_NEWNET a2=0x0 a3=0x0 items=0 ppid=3692 pid=3701 auid=unset uid=frr gid=frr euid=frr suid=frr fsuid=frr egid=frr sgid=frr fsgid=frr tty=(none) ses=unset comm=zebra exe=/usr/libexec/frr/zebra subj=system_u:system_r:frr_t:s0 key=(null)
type=AVC msg=audit(06/29/2023 03:42:07.692:559) : avc: denied { sys_admin } for pid=3701 comm=zebra capability=sys_admin scontext=system_u:system_r:frr_t:s0 tcontext=system_u:system_r:frr_t:s0 tclass=capability permissive=0
Resolves : #2216073 - SELinux is preventing FRR-Zebra to access to network namespaces
2023-06-29 15:54:02 +02:00
Yaakov Selkowitz
7f0775ec07
Disable grpc in RHEL builds
...
This is based on c9s:
bb27be6ef6
2023-06-05 19:29:36 -04:00
Petr Písař
eee04cae3d
Rebuild against rpm-4.19 ( https://fedoraproject.org/wiki/Changes/RPM-4.19 )
2023-05-19 15:11:46 +02:00
Michal Ruprich
58b91e7bdb
New version 8.5.1
2023-04-26 13:21:40 +02:00
Michal Ruprich
a5fc21e539
New version 8.5
2023-04-12 14:07:11 +02:00
Michal Ruprich
12b88485f2
Rebuilding for new abseil-cpp version
2023-03-23 13:33:53 +01:00
Michal Ruprich
f062556435
SPDX migration
2023-03-22 13:05:16 +01:00
Benjamin A. Beasley
28e257ed71
Build as C++17, required by abseil-cpp 20230125
2023-03-08 18:06:40 -05:00
Fedora Release Engineering
777829246b
Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
...
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org >
2023-01-19 03:57:19 +00:00
Michal Ruprich
a0c4fb9063
Adding an include for fips
2023-01-12 15:50:47 +01:00
Michal Ruprich
0d70491296
New version 8.4.2
2023-01-12 12:55:39 +01:00
Michal Ruprich
1787b2810b
New version 8.4.1
...
Fix for rhbz #2140705
2022-11-25 18:02:48 +01:00
Michal Ruprich
d506655fff
AVC when running the reload script for FRR
2022-11-23 09:13:27 +01:00
Michal Ruprich
5301cdd961
New version 8.4
2022-11-10 09:57:42 +01:00
Michal Ruprich
3905b5274d
Adding SELinux rule to enable zebra to write to sysctl_net_t
...
Adding SELinux rule to enable bgpd to call name_connect to bgp_port_t
2022-09-16 16:00:15 +02:00
Michal Ruprich
41a038e1d1
Fixing an error in post scriptlet
2022-09-09 19:14:38 +02:00
Michal Ruprich
a7b3783ddc
Resolves : #2124254 - frr can no longer update routes
2022-09-09 16:14:11 +02:00
Michal Ruprich
a2ffd90d49
Resolves : #2124253 - SELinux is preventing zebra from setattr access on the directory frr
...
Better handling FRR files during upgrade
2022-09-07 11:28:59 +02:00
Michal Ruprich
db09f8886c
Adding sources
2022-09-06 12:48:05 +02:00
Michal Ruprich
6e63bc125e
New version 8.3.1
2022-09-06 12:38:38 +02:00
Michal Ruprich
b2c9845f51
Rebuilding for new abseil-cpp and grpc updates
2022-08-22 14:09:39 +02:00
Zdenek Pytela
16d43cc08d
Allow frr daemons bind generic sockets to tcp ports
...
The vrrpd and pathd daemons need to bind to ports 2619/tcp and 2621/tcp.
This commit can be reverted if the inter-process communication changes
to using unix sockets in the future.
Addresses the following AVC denial:
type=PROCTITLE msg=audit(08/10/2022 05:32:53.905:257) : proctitle=/usr/libexec/frr/pathd -d -F traditional -A 127.0.0.1
type=AVC msg=audit(08/10/2022 05:32:53.905:257) : avc: denied { name_bind } for pid=8625 comm=pathd src=2621 scontext=system_u:system_r:frr_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket permissive=0
type=SYSCALL msg=audit(08/10/2022 05:32:53.905:257) : arch=x86_64 syscall=bind success=no exit=EACCES(Permission denied) a0=0xc a1=0x55e3ba44fdd0 a2=0x10 a3=0x7fff610c2bd4 items=0 ppid=8623 pid=8625 auid=unset uid=geoclue gid=flatpak euid=geoclue suid=geoclue fsuid=geoclue egid=flatpak sgid=flatpak fsgid=flatpak tty=(none) ses=unset comm=pathd exe=/usr/libexec/frr/pathd subj=system_u:system_r:frr_t:s0 key=(null)
type=SOCKADDR msg=audit(08/10/2022 05:32:53.905:257) : saddr={ saddr_fam=inet laddr=127.0.0.1 lport=2621 }
Resolves: rhbz#2117262
2022-08-19 10:30:23 +00:00
Michal Ruprich
d0157c4cbf
Adding vrrpd and pathd to the policy
2022-08-10 12:03:08 +02:00
Michal Ruprich
40f863faec
Finalizing SELinux policy
2022-08-10 10:36:08 +02:00
Zdenek Pytela
1e7608b86e
Allow frr_t create /root/.history_frr with a private type
...
The file can be created when the frr service starts, so
a file transition is needed to be defined in the policy.
2022-08-10 10:09:25 +02:00