-
-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add basic SELinux policy #143
Conversation
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2024061618-4.3&flavor=pull-requests Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2024052808-4.3&flavor=update
Failed tests12 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/101100#dependencies 39 fixed
Unstable tests
|
This adds just enough for sys-gui-vnc to work, specifically to allow X server access to /run/qubes/shm.id.0. And make sure the X server is running as xserver_t type, even when it's started via X-wrapper-qubes. The actual GUI daemon remains unconfined at this time. QubesOS/qubes-issues#9276
This adds just enough for sys-gui-vnc to work, specifically to allow X
server access to /run/qubes/shm.id.0.
The actual GUI daemon remains unconfined at this time.
QubesOS/qubes-issues#9276