Re: SELinux testing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



James Morris (jmorris@xxxxxxxxxx) said: 
> This guideline would request that developers test their package with 
> SELinux enabled (and by this I mean in enforcing mode) and follow a simple 
> procedure:
> 
> 1. Ensure they have the latest SELiunx policy installed.
> 2. Boot with selinux=1 and in enforcing mode.
> 3. Perform the normal testing of their application.
> 4. Check syslog (or /var/log/audit/audit.log if audit is enabled) for AVC 
>    messages related to their package.
> 
> If there are any bugs or AVC messages:
> 
> 5. Obtain support from the SELinux team.  The best way to do this I
> believe is to file a bugzilla against the selinux-policy package.  They
> should note that they are a Fedora packager (and expect a high priority
> response).  If SELinux is running all or most of the time, issues will be
> caught and fixed eariler in their dev cycle.
> 
> 6. Don't release the package until the SELinux issue is resolved.

I'd suggest all of the following except #6 - make sure the issues are
known, give a reasonable amount of time for fixes, but not necessarily
hold until release. For example, fixes may not be backported to earlier
releases, or the SELinux changes might require kernel fixes that are
non-trivial to implement.

Bill

--
Fedora-packaging mailing list
Fedora-packaging@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-packaging

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite Forum]     [KDE Users]

  Powered by Linux