Граф коммитов

50 Коммитов

Автор SHA1 Сообщение Дата
Christopher Co 40b562a130
systemd: Add missing Requires on zstd-libs (#6661)
Signed-off-by: Chris Co <chrco@microsoft.com>
2023-11-03 08:41:13 -04:00
Dan Streetman 89a59542e5 systemd: enable zstd support in journald
Also for mariner 2, force journald to not use zstd compression, to
retain backwards compatibility.

Fixes: #6424
2023-10-23 14:39:52 -04:00
Dan Streetman 7a29ef4dc8 Add functionality to serve stale DNS records 2023-07-10 21:32:46 -04:00
Chris Gunn 5af4abf5a8
systemd: Enable audit integration. (#5716) 2023-06-22 15:55:44 -07:00
Dan Streetman 898844747a build with libtss to enable tpm2 support 2023-03-07 15:07:32 -05:00
Adit Jha 965e06ff6b
Disable systemd-oomd service & socket through 99-mariner.preset file (#4686) 2023-01-30 11:57:31 -08:00
CBL-Mariner-Bot 77e09d5292
[AUTOPATCHER-CORE] Patched systemd to address CVE-2022-4415 - (#4671)
* Patch systemd to address CVE-2022-4415

* manually format patch

* add additional patch to support needed macros

Co-authored-by: Cameron Baird <cam.thebaird@gmail.com>
2023-01-24 12:16:36 -08:00
SeanDougherty 7e81d545de
Revert "Disabling systemd-oomd by default in Mariner (#4580)" (#4600)
This reverts commit 1e8d4d920a.
2023-01-13 13:35:31 -08:00
Adit Jha 1e8d4d920a
Disabling systemd-oomd by default in Mariner (#4580) 2023-01-12 17:08:47 -08:00
CBL-Mariner-Bot 52cb0f9c6f
[AUTOPATCHER-CORE] systemd add patch to address CVE-2022-45873 - (#4451)
* systemd: add patch to address CVE-2022-45873

* Add prereq patch, also update bootstrap

* Add additional prereq patch

Co-authored-by: Daniel McIlvaney <damcilva@microsoft.com>
2022-12-14 14:40:24 -08:00
Daniel McIlvaney 855a2b52e2
Gate systemd's preset-all so it runs only on first install (#4249)
* Gate systemd's preset-all so it runs only on first install
2022-12-08 11:56:05 -08:00
Sam Meluch 66e5ee3893
Patched `systemd` to fix CVE-2022-3821 (#4256)
* Add patch for CVE-2022-3821

* Add patch to systemd-bootstrap.spec to mirror changes to systemd.spec

* update systemd-bootstrap version in manifests
2022-11-18 19:01:22 -06:00
Pawel Winogrodzki 96b35817fe
dracut, systemd, systemtap: fix log file paths. (#3922) 2022-10-06 16:23:10 -07:00
Avram Lubkin 301d64af52
systemd: gpt-auto fixes for backing device detection (#3864) 2022-10-05 17:12:35 -04:00
Avram Lubkin 760886bda1
systemd: sysusers fsync patch (#3547)
Patch to fix fsync issue for /etc/passwd in systemd-sysusers
https://github.com/systemd/systemd/pull/24324
2022-08-24 14:38:46 -04:00
jslobodzian cdc67c9fba
Update systemd to build in release mode (#2958)
* Fix systemd to build in release mode

* Fix date to two digits
2022-05-06 14:48:54 -07:00
Sriram Nambakam 31a5711f93
Create util-linux-libs RPM package with libraries (#2953)
Change systemd.spec to depend on util-linux-libs
Update toolchain and pkgcore manifests
2022-05-04 14:09:56 -07:00
Cameron E Baird cc262b7b57
[main] [bug] Address Constant Journald crash on Mariner 2.0 (#2731)
* manually backport fix commit for journald assertion bug

* bootstrap package, toolchain manifests

* swap out raw diff for the patch, including more information from upstream

* add newline to patch

* remove redundant comment in specs
2022-04-14 15:08:33 -07:00
Andrew Phelps ae82648a3d
Update systemd to requires(pre) audit-libs (#2586)
* update systemd to requires(pre) audit-libs

* linting systemd specs

* revert systemd-bootstrap changes

* add requires(post) for audit-libs pam and util-linux-devel

* update changelog
2022-03-24 21:39:04 -07:00
Andrew Phelps b6ddd31fdc
use lz4 compression in systemd instead of zstd (#2546) 2022-03-23 11:16:16 -07:00
Henry Beberman 1adf15efc5
[main] Update systemd to v250.3 (#1991) 2022-01-24 23:11:57 -08:00
Pawel Winogrodzki 77153f2702
[main] Removing redundant `%clean` stages from the spec files. (#1782) 2021-12-17 09:46:27 -08:00
Henry Beberman 404ea07fe4
Fix systemd dhcp and cgroups (#1734) 2021-12-08 13:58:33 -08:00
Henry Beberman 7837cec9a2
Update to systemd 249.7 and dracut 055 (#1732) 2021-12-07 19:23:43 -08:00
Pawel Winogrodzki 1479202868
[dev] `systemd`: removing incorrect `Provides` and changing `libinput` BR. (#1490) 2021-10-04 12:12:56 -07:00
Pawel Winogrodzki 2401ea067f
[dev]: Resolving package build issues. (#1488)
* Fixing 'bind', 'clang', 'systemd' provides, and 'openssh' configuration.

* Enhancing RPM resolution.
2021-10-04 00:46:55 -07:00
jslobodzian 17b0e93e71
Merge 1.0 to dev branch
This merge brings the latest SELinux and many packages and CVE fixes from the 1.0 branch.
2021-08-19 13:46:51 -07:00
Henry Li 50ce1565ab
[dev] Enable prometheus in Mariner (#1213)
* save changes for prometheus and systemd

* update manifests files

* resolve comments

Co-authored-by: Henry Li <lihl@microsoft.com>
2021-08-05 10:29:13 -07:00
Thomas Crain ce5d3b4c5f Fix manifest 2021-05-17 12:31:13 -07:00
Thomas Crain 7b6df997a5 Merge remote-tracking branch 'origin/dev' into thcrain/pain 2021-05-17 11:14:46 -07:00
Henry Li 396dc77c4a
[dev] Add provide for system-setup-keyboard in systemd (#906)
* save systemd changes

* update systemd

Co-authored-by: Henry Li <lihl@microsoft.com>
2021-04-30 13:52:02 -07:00
Thomas Crain 00ed1f883b second try fixes 2021-04-16 17:16:26 -05:00
Thomas Crain 4859da4e1b Merge branch '1.0' into thcrain/pain (March Update) 2021-04-13 15:40:16 -05:00
Thomas Crain eae5b4006f Merge branch '1.0' into thcrain/ever-given 2021-04-06 22:39:22 -05:00
Christopher Co 55e42f31c8
systemd: disallow unprivileged BPFs (#743)
Additional mitigation step for CVE-2021-20194. Our kernels are typically
hardened with CONFIG_HARDENED_USERCOPY=y so we are not exposed to this
vulnerability specifically. But if this ends up not being the case in
the future, we have this mitigation enabled as well.

Signed-off-by: Chris Co <chrco@microsoft.com>
2021-03-16 11:06:33 -07:00
Henry Beberman 84c823f7c1
Enable lz4 compression in systemd (#637)
Enable lz4 compression in systemd so that journalctl can read lz4 compressed journals
2021-02-16 14:42:40 -08:00
Joe Schmitt ef3343d9fd
[dev] Update lib macro and enable python byte compilation (#636) 2021-02-16 10:34:30 -08:00
rychenf1 d08950db43
[dev] Add additional provides and capabilities for several specs (#536) 2021-01-14 10:59:46 -08:00
Nicolas Ontiveros ea706b71aa
Fix systemd CVE-2019-6454 and CVE-2020-1712 patches (#374)
* Fix CVE-2019-6454 patch

* Update toolchain txt files

* Fix CVE-2020-1712 patch

* Update upstream patch info for CVE's 2019-6454/2020-1712

* Fix async_polkit_callback patch
2020-11-16 15:21:50 -08:00
rychenf1 7a714be4d0
[dev] Configure systemd to support merged /usr (#348)
* Configure systemd to support merged /usr

* Update clamav systemd dir

* Update chroot systemd-rpm-macros ver

* systemd changelog

* Lint, excluding systemd scriptlet changes

* Add systemd-rpm-macros in toolchain manifests

* arch correction

* Remove inline hash
2020-11-11 09:36:21 -08:00
Joe Schmitt 756b4bf68e
Fix units provide (#357) 2020-11-09 16:39:00 -08:00
Joe Schmitt c1d384b3ad
[dev] Add additional provides and macros (#355) 2020-11-09 15:26:36 -08:00
Andrew Phelps 498f926e43
merge 1.0 into dev (#299)
* Update trademark section of the readme

Signed-off-by: Jim Perrin <Jim.Perrin@microsoft.com>

* Update building.md (#104)

* add wants=sshd-keygen.service to sshd (#58)

* add wants=sshd-keygen.service to sshd

Signed-off-by: Jim Perrin <Jim.Perrin@microsoft.com>

* modify signatures.json and bump release for pr

Signed-off-by: Jim Perrin <Jim.Perrin@microsoft.com>

* Fix libffi normal package build (#116)

* Fix libffi normal package build

* Add comment explaining the purpose of the sed call

* Upgrade golang to 1.13.15 (#93)

* Adding a small build tip to the quick start instructions. (#123)

* Add cloud-init-vmware-guestinfo package (#124)

* Add cloud-init-vmware-guestinfo package

* Updating 'ca-certificates' nssckbi.h header and unifying changelog entries with package version (#125)

* Updating changelog to be consistent with package version.

* Fixing missed update to 'nssckbi.h'.

* Updating manifests.

* Updating signatures.

* Markdown lint-induced clean-up of doc files. (#122)

* Makrdownlint-induced clean-up.

* Removing redundant lines.

* Removing redundant lines 2.

* Add  IMA feature to the kernel, add config for it (#135)

* Add  IMA feature to the kernel, add config for it

- Add IMA measurement configs to the x86_64, and aarch64 kernel configs (IMA_APPRAISE currently disabled).
- Add KernelCommandLine config field to control IMA, and allow additional configs to be passed.

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>
Co-authored-by: Christopher Co <christopher.co@microsoft.com>

* Update tpm2 tools to 4.2, tss to 2.4.0 (#134)

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>

* Enable Mellanox kernel configs

* Update tpm2-abrmd to 2.3.3 (#144)

* Update tpm2-abrmd to 2.3.3

* Create quickstart.yml (#119)

This patch adds a GitHub Action to verify our Quickstart instructions

* Nopatch httpd CVE-1999-0236, CVE-1999-1412 (#148)

* Nopatch httpd CVE-1999-0236, CVE-1999-1412

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>

* Nopatch groff CVE-2000-0803 (#149)

* Nopatch groff CVE-2000-0803

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>

* Nopatch apparmor CVE-2016-1585 (#150)

* Nopatch apparmor CVE-2016-1585

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>

* Nopatch qemu CVE-2016-7161 (#152)

* Nopatch qemu CVE-2016-7161

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>

* Nopatch lua CVE-2020-15889 (#153)

* nopatch lua CVE-2020-15889

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>

* Nopatch unzip CVE-2008-0888 (#154)

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>

* full: Always install the default kernel (#132)

Currently, when installing CBL-Mariner via ISO, the ISO will
install the standard kernel package or the kernel-hyperv package
depending on if installing on HyperV VM or not.

The HyperV kernel is still under evaluation so use the standard kernel
package across the board.

* Support downloading preview SRPMs (#160)

Replace SRPM_URL* with SRPM_URL_LIST

* Patch CVE-2020-14342 in cifs-utils

* Replace mariner-repos's %post script as %posttrans

- After looking at here, it shows that %post script for a new version runs before the %preun script for an old version. Which means, after an upgrade, the keys would be removed by the older version: https://docs.fedoraproject.org/en-US/packaging-guidelines/Scriptlets/#ordering

* Update pkggen_core_aarch64.txt

* Update pkggen_core_x86_64.txt

* Update toolchain_aarch64.txt

* Update toolchain_x86_64.txt

* Add a more verbose changelog

* Remove chrony-wait as a boot service dependency (#166)

* Remove chrony-wait as a boot service dependency

* Add cgmanifest entry for chrony

* Address changelog and prep section comments

* initramfs: Regenerate initrd using host-only mode on file-based trigger (#170)

* initramfs: Always use host-only mode

kdump currently uses the host system's initrd when enrolling a crash kernel
and initrd. There is a limitation where the kdump initrd must be generated
with dracut in "host-only" mode.

The -k option forces a host-only initrd build.
The -q option suppresses verbose output

If mkinitrd is called without <image> and <kernel-version> parameters, it will
default to calling dracut in "host-mode" mode on every kernel version it can
find in /boot.

If mkinitrd is called with <image> and <kernel-version> parameters, it will
default to calling dracut in "generic host" mode for rebuilding the specific
initrd. Therefore we need to make sure to add the -k option when invoking
mkinitrd with an explicit <image> and <kernel version>

* Reword comment block

* Fix kernel specs' %postun scripts (#164)

* Fix `kernel.spec`'s `%postun` script

* Fix `kernel-signed-aarch64`'s `%postun` script

* Fix kernel-signed-x64.spec's %postun script

* Fix kernel-hyperv.spec's %postun script

* Adding new 'preview' repository. (#146)

* Adding new 'preview' repository.

* Addressing comments.

* Fix kernel aarch64 package build break due to missing CONFIG_IMA_KEXEC (#171)

* Fix kernel aarch64 package build break due to missing CONFIG_IMA_KEXEC (#171)

* Update fontconfig to 2.13.91 (#175)

* Extending 'strongswan' test timeout. (#173)

* Fix CVE-2020-14342 patch to not depend on PATH

* installutils: Supply blank /etc/machine-id file (#147)

From https://www.freedesktop.org/software/systemd/man/machine-id.html:
For operating system images which are created once and used on multiple
machines, for example for containers or in the cloud, /etc/machine-id
should be an empty file in the generic file system image. An ID will be
generated during boot and saved to this file if possible.

* installutils: Remove root password expiry when no root user is specified in imageconfig file (#161)

* Add SELinux packages to Mariner. (#100)

* Add SELinux packages to Mariner.

This commit add the following packages to Mariner to provide basic
SELinux support:

- checkpolicy
- libsemanage
- mcstrans
- policycoreutils
- secilc
- selinux-policy
- setools

The selinux-policy provided here is a generic base policy, which is not
specifically tuned for Mariner, therefore only permissive mode support
is enabled in this commit.  (Although users could load a custom policy
to run in enforcing mode).  Future phases have been discussed to add
SELinux enforcing mode support.

This commit does not enable SELinux by default.  In order to enable
SELinux support, one must first install necessary packages (libselinux,
policycoreutils, secilc, selinux-policy), and then append "lsm=selinux
selinux=1" to the kernel command line.  This will trigger an initial
boot to relabel the system, at which point the system will reboot, and
boot into an SELinux enabled system.  SELinux state can be queried with
the "getenforce" command line tool.  If SELinux has not been enabled, it
will report "Disabled" (the default).  If SELinux support has been
enabled as described in this paragraph, it will report "permissive".

This commit also modifies the following packages to enabled SELinux
functionality in existing packages:

- coreutils
- cronie
- dbus
- openssh
- pam
- rpm
- shadow-utils
- systemd
- util-linux

This enables them to build with SELinux support so that when SELinux is
enabled, they have SELinux related functionality available.

Because coreutils is a basic package and requires building with
libselinux-devel present in order to enable key SELinux functionality,
several dependencies in other packages that rely on coreutils (namely
python2, python3 and systemd-bootstrap) had to be removed in order to
avoid circular dependencies.  There does not appear to be a functional
impact from this change based on my testing.

* Remove "::set-env" commands in GitHub Actions (#178)

* Adding a .nopatch for CVE-2007-0086. (#176)

* Updating cert bundle paths. (#181)

* Updating cert bundle paths.

* Updating cgmanifest.json.

* Adding the `gflags` and `rocksdb` packages. (#183)

* Adding the 'rocksdb' package.

* Adding the 'gflags' package.

* Add missing %libsepolver definition in secilc.spec (#192)

* Removing 'TERMINAL_ISO_INSTALLER' from the docs. (#189)

* Add architecture at the end of toolkit archive (#182)

- Also add `version.txt` file in the toolkit archive as an easy way to verify toolkit version.

* Adding a missing '%{?dist}' tag. (#195)

* enable fetching RPMs from pacakges.microsoft.com for Docker based build (#198)

* Update README.md (#180)

* Update README.md (#180)

* Build Break Fix:  Rollback selinux checkins.   (#204)

* Revert "Add missing %libsepolver definition in secilc.spec (#192)"

This reverts commit 9cff088bec.

* Revert "Add SELinux packages to Mariner. (#100)"

This reverts commit b2d918efac.

* Natively support pulling from the preview repo (#199)

* Fix CVE-2020-26159 in oniguruma (#211)

* Fix CVE-2020-26159

* Increment release, fix autosetup.

* Adding the 'syslog-ng' package. (#205)

* Adding the 'tinyxml2' package. (#206)

* Adding the 'toml11' package. (#207)

* Adding the 'tracelogging' and 'zipper' packages. (#208)

* Add mm-common and libxml++ packages (#215)

* Add liblogging package (#214)

* Add nlohmann-json package (#217)

* Add msgpack package (#216)

* Adding the 'span-lite' and 'telegraf' packages. (#220)

* Remove toolchain-local-wget-list after use (#212)

* Remove toolchain-local-wget-list after use

- toolchain-local-wget-list has been left at the end of a toolchain build. It shows up on `git status` whene toolchain is built locally.
- Another solution would be adding it to `.gitignore`.

* Add temporary toolchain build files to toolkit/.gitignore

* Remove implicit git repository dependency from toolkit (#197)

* Remove implicit git repository dependency

* Remove the new GIT_REV variable

* Add jsonbuilder package (#223)

* update libffi to use https source0 (#227)

* Update libestr (#213)

* Add babeltrace2 and lttng-consume packages (#226)

* Add pugixml package (#222)

* Disable debug package for nlohmann-json (#228)

* Add rapidjson package (#225)

* Upgrade ruby to 2.6.6 to resolve CVE-2019-16255, CVE-2019-16201, CVE-2020-10933, CVE-2020-5247, CVE-2019-15845, CVE-2019-16254 (#224)

* Upgrade ruby to 2.6.6 to resolve CVEs

* Update cgmanifest

* Nopatch qemu CVE-2015-7504 CVE-2017-5931 CVE-2017-14167 (#162)

* Fix CVE-2020-26159 in oniguruma (#211)

* Fix CVE-2020-26159

* Increment release, fix autosetup.

* Enable QAT kernel configs in CBL-Mariner

* Nopatch kernel CVE-2020-10757, CVE-2020-12653, CVE-2020-12657, CVE-2010-3865, CVE-2020-11668, CVE-2020-12654, CVE-2020-24394, CVE-2020-8428 (#193)

* Address CVE-2020-10757, CVE-2020-12653, CVE-2020-12657, CVE-2010-3865, CVE-2020-11668, CVE-2020-12654, CVE-2020-24394, CVE-2020-8428

* Adding the `bond`, `fluent-bit`, and `ivykis` packages. (#234)

* Joslobo/add azure storage (#232)

* Add azure-storage spec file to mariner-core

* Register with legal and update map file

* Fixed #source0 link

* Updated per code review comments

* Fixed URL to use https

* Initial spec lint action commit (#172) (#191)

* Initial spec-cleaner commit for CBL-Mariner

* Add cgmanifest.json file for GitHub workflows folder

* Set continue-on-error to true for a trial period

* patch openssh (#238)

* Update pull_request_template.md (#236)

* Fix check tests for git, make, krb5 and libcap-ng (#241)

* fix check tests

* update toolchain manifests

* fix blank spaces and tabs in make.spec

* Fix CVE-2019-12735 in vim (#230)

* Fix CVE-2019-12735 in vim

* Update the changelog to address only one CVE.

* Switching to correct source for the Microsoft bundle. (#244)

* Fix check tests for brotli, gzip and python-certifi (#245)

* fix check test for brotli, gzip, python-cerifi

* update manifest release version for gzip

* skip check for vim

* Patch unbound CVE-2020-12662 and CVE-2020-12663 (#246)

* Portablectl patches for to support --now --enable and --no-block flags (#139)

* Portablectl patches for to support --now --enable and --no-block flags

* Portablectl patches for to support --now --enable and --no-block flags

* Patch lua CVE-2019-6706, CVE-2020-15888, nopatch CVE-2020-24342 (#169)

* Patch lua CVE-2019-6706, CVE-2020-15888, CVE-2020-15945, nopatch CVE-2020-24342

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>

* Roll back CVE-2020-15945, patch ineffective

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>

* Nopatch ed CVE-2015-2987 (#209)

ed CVE-2015-2987 applies to a different program named ed.

* Patch gnutls CVE-2020-24659 (#247)

Upstream CVE discussion: https://gitlab.com/gnutls/gnutls/-/issues/1071

* update ant verision

* fix changelog comment

* update cgmanifest

* Nopatch sqlite CVE-2015-3717 (#254)

* Added omi package

* Adding the `ccache` and `clamav` packages. (#251)

* Generate ant signatures (#260)

* Add auoms package (#258)

* add auoms package

* add auoms original source url comments

* fix changelog history

* fix auoms signatures

* fix changelog

* use %license

* update licenses-map

* add omi to LICENSES-MAP

* merge latest LICENSES-MAP

* Implement "distroless" containers (#252)

* Create distroless container without bash and surplus dependencies
* Remove RPM database for distroless
* Add busybox and uclibc. Add distroless-packages-debug
* Update cgmanifest

Co-authored-by: Jon Slobodzian <joslobo@microsoft.com>
Co-authored-by: MateuszMalisz <mamalisz@microsoft.com>

* Updated mariner-release package version (#262)

* fix setup (#263)

* fix missed merge file

* Fixed bad file merge

* Fixed poorly merged files

* Merge distroless container revert to 1.0 (#265)

* Revert "Implement "distroless" containers (#252)"

This reverts commit e41efdda19.

* Revert "Implement "distroless" containers (#252)" (#264)

This reverts commit e41efdda19.

* fix package manifest merge issues

* fix issues building input-srpms

* fix package manifest issues

* remove duplicate patch and sed cmd from lua spec

* revert package ignore list and graphoptimizer changes

* remove runc from LICENSES-MAP.md

* Update pkggen merge (#316)

* Clean up lua.spec 1.0 to dev merge (#318)

* update lua.spec and licenses-map.md per feedback

* revert gzip changes

* revert krb5 change

Co-authored-by: Jim Perrin <Jim.Perrin@microsoft.com>
Co-authored-by: Jason Goscinski <jasongos@users.noreply.github.com>
Co-authored-by: Mateusz Malisz <maliszmat@outlook.com>
Co-authored-by: Nicolas Ontiveros <54044510+niontive@users.noreply.github.com>
Co-authored-by: Pawel Winogrodzki <pawelwi@microsoft.com>
Co-authored-by: Daniel McIlvaney <damcilva@microsoft.com>
Co-authored-by: Christopher Co <christopher.co@microsoft.com>
Co-authored-by: chalamalasetty <chalamalasetty@live.com>
Co-authored-by: chalamalasetty <42326515+chalamalasetty@users.noreply.github.com>
Co-authored-by: Joe Schmitt <1146681+schmittjoseph@users.noreply.github.com>
Co-authored-by: Henry Beberman <henry.beberman@microsoft.com>
Co-authored-by: Emre Girgin <50592283+mrgirgin@users.noreply.github.com>
Co-authored-by: Thomas Crain <thcrain@microsoft.com>
Co-authored-by: Jon Slobodzian <joslobo@microsoft.com>
Co-authored-by: Emre Girgin <mrgirgin@microsoft.com>
Co-authored-by: Daniel Burgener <burgener.daniel@gmail.com>
Co-authored-by: nicolas guibourge <nicogbg@gmail.com>
Co-authored-by: Chirag Shah <chsha@microsoft.com>
Co-authored-by: Henry Li <lihl@microsoft.com>
Co-authored-by: Henry Li <69694695+henryli001@users.noreply.github.com>
Co-authored-by: rychenf1 <rychenf1@gmail.com>
Co-authored-by: Nick Samson <nick.samson@microsoft.com>
Co-authored-by: MateuszMalisz <mamalisz@microsoft.com>
2020-11-03 17:40:59 -08:00
Nicolas Ontiveros c98d311027
Patch systemd CVEs: 2019-3842, 2019-3843, 2019-3844, 2019-6454, 2019-20386, 2020-1712, 2020-13776 (#248)
* Patch CVE-2019-3842

* Patch CVE-2019-3843

* Fix URL in CVE-2019-3843.patch

* Patch CVE-2019-3844

* Patch CVE-2019-6454

* Update CVE-2019-6454 patch

* Patch CVE-2019-20386

* Patch CVE-2020-1712

* Patch CVE-2020-13776

* Update toolchain txt files

* Update systemd-bootstrap

* Fix toolchain aarch64

* Fix linting for systemd-bootstrap

* Address more systemd-bootstrap linting

* Addres systemd spec linting

* Add newline at end of systemd spec

* Fix systemd-bootstrap spec
2020-11-03 15:40:13 -08:00
chalamalasetty 1a31576601
Portablectl patches for to support --now --enable and --no-block flags (#139)
* Portablectl patches for to support --now --enable and --no-block flags

* Portablectl patches for to support --now --enable and --no-block flags
2020-10-21 13:25:26 -07:00
jslobodzian 791c4b9e19
Build Break Fix: Rollback selinux checkins. (#204)
* Revert "Add missing %libsepolver definition in secilc.spec (#192)"

This reverts commit 9cff088bec.

* Revert "Add SELinux packages to Mariner. (#100)"

This reverts commit b2d918efac.
2020-10-13 19:37:01 -07:00
Daniel Burgener b2d918efac
Add SELinux packages to Mariner. (#100)
* Add SELinux packages to Mariner.

This commit add the following packages to Mariner to provide basic
SELinux support:

- checkpolicy
- libsemanage
- mcstrans
- policycoreutils
- secilc
- selinux-policy
- setools

The selinux-policy provided here is a generic base policy, which is not
specifically tuned for Mariner, therefore only permissive mode support
is enabled in this commit.  (Although users could load a custom policy
to run in enforcing mode).  Future phases have been discussed to add
SELinux enforcing mode support.

This commit does not enable SELinux by default.  In order to enable
SELinux support, one must first install necessary packages (libselinux,
policycoreutils, secilc, selinux-policy), and then append "lsm=selinux
selinux=1" to the kernel command line.  This will trigger an initial
boot to relabel the system, at which point the system will reboot, and
boot into an SELinux enabled system.  SELinux state can be queried with
the "getenforce" command line tool.  If SELinux has not been enabled, it
will report "Disabled" (the default).  If SELinux support has been
enabled as described in this paragraph, it will report "permissive".

This commit also modifies the following packages to enabled SELinux
functionality in existing packages:

- coreutils
- cronie
- dbus
- openssh
- pam
- rpm
- shadow-utils
- systemd
- util-linux

This enables them to build with SELinux support so that when SELinux is
enabled, they have SELinux related functionality available.

Because coreutils is a basic package and requires building with
libselinux-devel present in order to enable key SELinux functionality,
several dependencies in other packages that rely on coreutils (namely
python2, python3 and systemd-bootstrap) had to be removed in order to
avoid circular dependencies.  There does not appear to be a functional
impact from this change based on my testing.
2020-10-07 09:13:55 -04:00
Leandro Pereira 41807e7118 Use time.windows.com for systemd-timesyncd by default 2020-08-24 15:14:32 -07:00
Mateusz Malisz e6e36fc1b2 Enable kdump support 2020-08-11 14:54:31 -07:00
Jon Slobodzian b877013b27 Initial CBL-Mariner commit to GitHub 2020-08-06 20:17:52 -07:00