Let dib fix selinux policy for us
New dib (see depends on) will fix selinux policy restoration and run it at finalise level 90. Therefore we can stop doing it and move our unbound stuff to level 89 and dib will do magical things for us. Change-Id: I129297cfd85e2978631add99b7770e2839b459dc Depends-On: Iae0afe850f52ec3b59c49507fa9bbcc1c8f8cfa1
This commit is contained in:
parent
c96ea14e82
commit
1b4537a133
@ -33,16 +33,6 @@ mv /tmp/forwarding.conf /etc/unbound/
|
||||
chown root:root /etc/unbound/forwarding.conf
|
||||
chmod a+r /etc/unbound/forwarding.conf
|
||||
|
||||
# If we have selinux install, restore default SELinux contents when ever
|
||||
# possible. Currently this only seems relevant for RHEL based DIBs.
|
||||
SETFILES=$(which setfiles || true)
|
||||
if [ -e /etc/selinux/targeted/contexts/files/file_contexts -a -x "${SETFILES}" ]; then
|
||||
# Without fixing selinux file labels, sshd will run in the kernel_t domain
|
||||
# instead of the sshd_t domain, making ssh connections fail with
|
||||
# "Unable to get valid context for <user>" error message
|
||||
setfiles /etc/selinux/targeted/contexts/files/file_contexts /etc/unbound
|
||||
fi
|
||||
|
||||
# Overwrite /etc/resolv.conf at boot
|
||||
dd of=/etc/rc.local <<EOF
|
||||
|
Loading…
Reference in New Issue
Block a user