Bump buildroot to 2020.11-rc1 (#985)
* Update buildroot-patches for 2020.11-rc1 buildroot * Update buildroot to 2020.11-rc1 Signed-off-by: Stefan Agner <stefan@agner.ch> * Don't rely on sfdisk --list-free output The --list-free (-F) argument does not allow machine readable mode. And it seems that the output format changes over time (different spacing, using size postfixes instead of raw blocks). Use sfdisk json output and calculate free partition space ourselfs. This works for 2.35 and 2.36 and is more robust since we rely on output which is meant for scripts to parse. * Migrate defconfigs for Buildroot 2020.11-rc1 In particular, rename BR2_TARGET_UBOOT_BOOT_SCRIPT(_SOURCE) to BR2_PACKAGE_HOST_UBOOT_TOOLS_BOOT_SCRIPT(_SOURCE). * Rebase/remove systemd patches for systemd 246 * Drop apparmor/libapparmor from buildroot-external * hassos-persists: use /run as directory for lockfiles The U-Boot tools use /var/lock by default which is not created any more by systemd by default (it is under tmpfiles legacy.conf, which we no longer install). * Disable systemd-update-done.service The service is not suited for pure read-only systems. In particular the service needs to be able to write a file in /etc and /var. Remove the service. Note: This is a static service and cannot be removed using systemd-preset. * Disable apparmor.service for now The service loads all default profiles. Some might actually cause problems. E.g. the profile for ping seems not to match our setup for /etc/resolv.conf: [85503.634653] audit: type=1400 audit(1605286002.684:236): apparmor="DENIED" operation="open" profile="ping" name="/run/resolv.conf" pid=27585 comm="ping" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
This commit is contained in:
@@ -28,6 +28,41 @@ config BR2_PACKAGE_REFPOLICY
|
||||
|
||||
if BR2_PACKAGE_REFPOLICY
|
||||
|
||||
choice
|
||||
prompt "Refpolicy version"
|
||||
default BR2_PACKAGE_REFPOLICY_UPSTREAM_VERSION
|
||||
|
||||
config BR2_PACKAGE_REFPOLICY_UPSTREAM_VERSION
|
||||
bool "Upstream version"
|
||||
help
|
||||
Use the refpolicy as provided by Buildroot.
|
||||
|
||||
config BR2_PACKAGE_REFPOLICY_CUSTOM_GIT
|
||||
bool "Custom git repository"
|
||||
help
|
||||
Allows to get the refpolicy from a custom git repository.
|
||||
|
||||
The custom refpolicy must define the full policy explicitly,
|
||||
and must be a fork of the original refpolicy, to have the
|
||||
same build system. When this is selected, only the custom
|
||||
policy definition are taken into account and all the modules
|
||||
of the policy are built into the binary policy.
|
||||
|
||||
endchoice
|
||||
|
||||
if BR2_PACKAGE_REFPOLICY_CUSTOM_GIT
|
||||
|
||||
config BR2_PACKAGE_REFPOLICY_CUSTOM_REPO_URL
|
||||
string "URL of custom repository"
|
||||
|
||||
config BR2_PACKAGE_REFPOLICY_CUSTOM_REPO_VERSION
|
||||
string "Custom repository version"
|
||||
help
|
||||
Revision to use in the typical format used by Git.
|
||||
E.g. a sha id, tag, branch...
|
||||
|
||||
endif
|
||||
|
||||
choice
|
||||
prompt "SELinux default state"
|
||||
default BR2_PACKAGE_REFPOLICY_POLICY_STATE_PERMISSIVE
|
||||
@@ -54,6 +89,28 @@ config BR2_PACKAGE_REFPOLICY_POLICY_STATE
|
||||
default "enforcing" if BR2_PACKAGE_REFPOLICY_POLICY_STATE_ENFORCING
|
||||
default "disabled" if BR2_PACKAGE_REFPOLICY_POLICY_STATE_DISABLED
|
||||
|
||||
if BR2_PACKAGE_REFPOLICY_UPSTREAM_VERSION
|
||||
|
||||
config BR2_REFPOLICY_EXTRA_MODULES_DIRS
|
||||
string "Extra modules directories"
|
||||
help
|
||||
Specify a space-separated list of directories containing
|
||||
SELinux modules that will be built into the SELinux
|
||||
policy. The modules will be automatically enabled in the
|
||||
policy.
|
||||
|
||||
Each of those directories must contain the SELinux policy
|
||||
.fc, .if and .te files directly at the top-level, with no
|
||||
sub-directories. Also, you cannot have several modules with
|
||||
the same name in different directories.
|
||||
|
||||
config BR2_REFPOLICY_EXTRA_MODULES
|
||||
string "Extra modules to enable"
|
||||
help
|
||||
List of extra SELinux modules to enable in the refpolicy.
|
||||
|
||||
endif
|
||||
|
||||
endif
|
||||
|
||||
comment "refpolicy needs a toolchain w/ threads"
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
# From https://github.com/SELinuxProject/refpolicy/releases
|
||||
sha256 67bd1213e9d014ada15512028bb7f35ef6610c2d209cc5117b8577474aa6147f refpolicy-2.20190609.tar.bz2
|
||||
sha256 dec854512ed00cd057408f330c2cea4de7a4405f7a147458f59c994bf578e4b0 refpolicy-2.20200229.tar.bz2
|
||||
|
||||
# Locally computed
|
||||
sha256 204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994 COPYING
|
||||
|
||||
@@ -4,9 +4,6 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
REFPOLICY_VERSION = 2.20190609
|
||||
REFPOLICY_SOURCE = refpolicy-$(REFPOLICY_VERSION).tar.bz2
|
||||
REFPOLICY_SITE = https://github.com/SELinuxProject/refpolicy/releases/download/RELEASE_2_20190609
|
||||
REFPOLICY_LICENSE = GPL-2.0
|
||||
REFPOLICY_LICENSE_FILES = COPYING
|
||||
REFPOLICY_INSTALL_STAGING = YES
|
||||
@@ -18,6 +15,17 @@ REFPOLICY_DEPENDENCIES = \
|
||||
host-setools \
|
||||
host-gawk
|
||||
|
||||
ifeq ($(BR2_PACKAGE_REFPOLICY_CUSTOM_GIT),y)
|
||||
REFPOLICY_VERSION = $(call qstrip,$(BR2_PACKAGE_REFPOLICY_CUSTOM_REPO_VERSION))
|
||||
REFPOLICY_SITE = $(call qstrip,$(BR2_PACKAGE_REFPOLICY_CUSTOM_REPO_URL))
|
||||
REFPOLICY_SITE_METHOD = git
|
||||
BR_NO_CHECK_HASH_FOR += $(REFPOLICY_SOURCE)
|
||||
else
|
||||
REFPOLICY_VERSION = 2.20200229
|
||||
REFPOLICY_SOURCE = refpolicy-$(REFPOLICY_VERSION).tar.bz2
|
||||
REFPOLICY_SITE = https://github.com/SELinuxProject/refpolicy/releases/download/RELEASE_2_20200229
|
||||
endif
|
||||
|
||||
# Cannot use multiple threads to build the reference policy
|
||||
REFPOLICY_MAKE = \
|
||||
PYTHON=$(HOST_DIR)/usr/bin/python3 \
|
||||
@@ -29,15 +37,82 @@ REFPOLICY_POLICY_VERSION = $(BR2_PACKAGE_LIBSEPOL_POLICY_VERSION)
|
||||
REFPOLICY_POLICY_STATE = \
|
||||
$(call qstrip,$(BR2_PACKAGE_REFPOLICY_POLICY_STATE))
|
||||
|
||||
ifeq ($(BR2_PACKAGE_REFPOLICY_UPSTREAM_VERSION),y)
|
||||
|
||||
# Allow to provide out-of-tree SELinux modules in addition to the ones
|
||||
# in the refpolicy.
|
||||
REFPOLICY_EXTRA_MODULES_DIRS = \
|
||||
$(strip \
|
||||
$(call qstrip,$(BR2_REFPOLICY_EXTRA_MODULES_DIRS)) \
|
||||
$(PACKAGES_SELINUX_EXTRA_MODULES_DIRS))
|
||||
$(foreach dir,$(REFPOLICY_EXTRA_MODULES_DIRS),\
|
||||
$(if $(wildcard $(dir)),,\
|
||||
$(error BR2_REFPOLICY_EXTRA_MODULES_DIRS contains nonexistent directory $(dir))))
|
||||
|
||||
REFPOLICY_MODULES = \
|
||||
application \
|
||||
authlogin \
|
||||
getty \
|
||||
init \
|
||||
libraries \
|
||||
locallogin \
|
||||
logging \
|
||||
miscfiles \
|
||||
modutils \
|
||||
mount \
|
||||
selinuxutil \
|
||||
storage \
|
||||
sysadm \
|
||||
sysnetwork \
|
||||
unconfined \
|
||||
userdomain \
|
||||
$(PACKAGES_SELINUX_MODULES) \
|
||||
$(call qstrip,$(BR2_REFPOLICY_EXTRA_MODULES)) \
|
||||
$(foreach d,$(REFPOLICY_EXTRA_MODULES_DIRS),\
|
||||
$(basename $(notdir $(wildcard $(d)/*.te))))
|
||||
|
||||
define REFPOLICY_COPY_EXTRA_MODULES
|
||||
mkdir -p $(@D)/policy/modules/buildroot
|
||||
rsync -au $(addsuffix /*,$(REFPOLICY_EXTRA_MODULES_DIRS)) \
|
||||
$(@D)/policy/modules/buildroot/
|
||||
if [ ! -f $(@D)/policy/modules/buildroot/metadata.xml ]; then \
|
||||
echo "<summary>Buildroot extra modules</summary>" > \
|
||||
$(@D)/policy/modules/buildroot/metadata.xml; \
|
||||
fi
|
||||
endef
|
||||
|
||||
# In the context of a monolithic policy enabling a piece of the policy as
|
||||
# 'base' or 'module' is equivalent, so we enable them as 'base'.
|
||||
define REFPOLICY_CONFIGURE_MODULES
|
||||
$(SED) "s/ = module/ = no/g" $(@D)/policy/modules.conf
|
||||
$(foreach m,$(sort $(REFPOLICY_MODULES)),
|
||||
$(SED) "/^$(m) =/c\$(m) = base" $(@D)/policy/modules.conf
|
||||
)
|
||||
endef
|
||||
|
||||
endif # BR2_PACKAGE_REFPOLICY_UPSTREAM_VERSION = y
|
||||
|
||||
ifeq ($(BR2_INIT_SYSTEMD),y)
|
||||
define REFPOLICY_CONFIGURE_SYSTEMD
|
||||
$(SED) "/SYSTEMD/c\SYSTEMD = y" $(@D)/build.conf
|
||||
endef
|
||||
endif
|
||||
|
||||
define REFPOLICY_CONFIGURE_CMDS
|
||||
$(SED) "/OUTPUT_POLICY/c\OUTPUT_POLICY = $(REFPOLICY_POLICY_VERSION)" \
|
||||
$(@D)/build.conf
|
||||
$(SED) "/MONOLITHIC/c\MONOLITHIC = y" $(@D)/build.conf
|
||||
$(SED) "/NAME/c\NAME = targeted" $(@D)/build.conf
|
||||
$(REFPOLICY_CONFIGURE_SYSTEMD)
|
||||
$(if $(REFPOLICY_EXTRA_MODULES_DIRS), \
|
||||
$(REFPOLICY_COPY_EXTRA_MODULES)
|
||||
)
|
||||
$(REFPOLICY_MAKE) -C $(@D) bare conf
|
||||
$(REFPOLICY_CONFIGURE_MODULES)
|
||||
endef
|
||||
|
||||
define REFPOLICY_BUILD_CMDS
|
||||
$(REFPOLICY_MAKE) -C $(@D) DESTDIR=$(STAGING_DIR) bare conf
|
||||
$(REFPOLICY_MAKE) -C $(@D) policy
|
||||
endef
|
||||
|
||||
define REFPOLICY_INSTALL_STAGING_CMDS
|
||||
|
||||
Reference in New Issue
Block a user