Let dib fix selinux policy for us

New dib (see depends on) will fix selinux policy restoration and run it
at finalise level 90. Therefore we can stop doing it and move our
unbound stuff to level 89 and dib will do magical things for us.

Change-Id: I129297cfd85e2978631add99b7770e2839b459dc
Depends-On: Iae0afe850f52ec3b59c49507fa9bbcc1c8f8cfa1
This commit is contained in:
Clark Boylan 2016-04-20 14:30:31 -07:00
parent c96ea14e82
commit 1b4537a133

View File

@ -33,16 +33,6 @@ mv /tmp/forwarding.conf /etc/unbound/
chown root:root /etc/unbound/forwarding.conf
chmod a+r /etc/unbound/forwarding.conf
# If we have selinux install, restore default SELinux contents when ever
# possible. Currently this only seems relevant for RHEL based DIBs.
SETFILES=$(which setfiles || true)
if [ -e /etc/selinux/targeted/contexts/files/file_contexts -a -x "${SETFILES}" ]; then
# Without fixing selinux file labels, sshd will run in the kernel_t domain
# instead of the sshd_t domain, making ssh connections fail with
# "Unable to get valid context for <user>" error message
setfiles /etc/selinux/targeted/contexts/files/file_contexts /etc/unbound
fi
# Overwrite /etc/resolv.conf at boot
dd of=/etc/rc.local <<EOF