August 2016 Archives by subject
Starting: Mon Aug 1 17:47:34 UTC 2016
Ending: Wed Aug 31 17:52:35 UTC 2016
Messages: 98
- [apparmor] [00/38] Replace file rule handling with FileRule and FileRuleset classes
Christian Boltz
- [apparmor] [00/38] Replace file rule handling with FileRule and FileRuleset classes
Christian Boltz
- [apparmor] [Bug 1609439] [NEW] Firefox profile has too much access
Vincas Dargis
- [apparmor] [Bug 1609439] Re: Firefox profile has too much access
Vincas Dargis
- [apparmor] [Bug 1609439] Re: Firefox profile has too much access
Simon Déziel
- [apparmor] [Bug 1609439] Re: Firefox profile has too much access
Vincas Dargis
- [apparmor] [Bug 1609439] Re: Firefox profile has too much access
Vincas Dargis
- [apparmor] [Bug 1609439] Re: Firefox profile has too much access
Simon Déziel
- [apparmor] [Bug 1609439] Re: Firefox profile has too much access
Simon Déziel
- [apparmor] [Merge] lp:~intrigeri/apparmor/moved-gnome-mimeapps into lp:apparmor
intrigeri
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:debian-833184 into apparmor-profiles:master
Simon Déziel
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:debian-833184 into apparmor-profiles:master
noreply at launchpad.net
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:debian-833184 into apparmor-profiles:master
Steve Beattie
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:debian-833742 into apparmor-profiles:master
Simon Déziel
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:debian-833742 into apparmor-profiles:master
Seth Arnold
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:debian-833742 into apparmor-profiles:master
noreply at launchpad.net
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:master into apparmor-profiles:master
Simon Déziel
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:master into apparmor-profiles:master
Seth Arnold
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:master into apparmor-profiles:master
noreply at launchpad.net
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:thunderbird-45-refresh into apparmor-profiles:master
Simon Déziel
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:thunderbird-45-refresh into apparmor-profiles:master
noreply at launchpad.net
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:thunderbird-45-refresh into apparmor-profiles:master
Steve Beattie
- [apparmor] [Merge] ~sdeziel/apparmor-profiles/+git/apparmor-profiles:thunderbird-45-refresh into apparmor-profiles:master
Simon Déziel
- [apparmor] [PATCH/apparmor-profiles] Add profile for /usr/share/update-notifier/notify-reboot-required
Steve Beattie
- [apparmor] [patch] [01/38] Pass 'strict' flag from is_equal to is_equal_localvars
Christian Boltz
- [apparmor] [patch] [02/38] check_and_split_list: optionally allow empty list
Christian Boltz
- [apparmor] [patch] [03/38] check_and_split_list(): allow 'lst' parameter to be a set
Christian Boltz
- [apparmor] [patch] [04/38] Add detailed regex for file rules
Christian Boltz
- [apparmor] [patch] [05/38] Make sanity check in _is_covered_list() optional
Christian Boltz
- [apparmor] [patch] [06/38] Add FileRule and FileRuleset
Christian Boltz
- [apparmor] [patch] [07/38] Add tests for FileRule
Christian Boltz
- [apparmor] [patch] [08/38] Drop dead code in aa.py handle_children()
Christian Boltz
- [apparmor] [patch] [09/38] Drop contains() in aamode.py
Christian Boltz
- [apparmor] [patch] [10/38] RE_PATH: allow to match '/'
Christian Boltz
- [apparmor] [patch] [11/38] FileRule: Handle duplicated exec permissions
Christian Boltz
- [apparmor] [patch] [12/38] Change RE_PROFILE_BARE_FILE_ENTRY and RE_PROFILE_PATH_ENTRY imports in test-regex_matches.py
Christian Boltz
- [apparmor] [patch] [13/38] Add ANY_EXEC to FileRule
Christian Boltz
- [apparmor] [patch] [14/38] Use FileRule and FileRuleset
Christian Boltz
- [apparmor] [patch] [15/38] Change handle_children() and ask_the_questions() to FileRule
Christian Boltz
- [apparmor] [patch] [16/38] move glob_path() and glob_path_ext() to AARE
Christian Boltz
- [apparmor] [patch] [17/38] Implement globbing in FileRule
Christian Boltz
- [apparmor] [patch] [18/38] Re-add globbing support for file rules to aa-logprof
Christian Boltz
- [apparmor] [patch] [19/38] Add support for editing paths to FileRule
Christian Boltz
- [apparmor] [patch] [20/38] Re-add '(N)ew' to aa-logprof
Christian Boltz
- [apparmor] [patch] [21/38] Add severity support to FileRule
Christian Boltz
- [apparmor] [patch] [22/38] Add get_perms_for_path() and get_rules_for_path() to FileRuleset
Christian Boltz
- [apparmor] [patch] [23/38] Add get_file_perms to aa.py
Christian Boltz
- [apparmor] [patch] [24/38] Add propose_file_rules() to propose globbed etc. file rules in aa-logprof
Christian Boltz
- [apparmor] [patch] [25/38] Set audit mode for all options
Christian Boltz
- [apparmor] [patch] [26/38] Avoid crash in aa-logprof on events for non-existing profiles
Christian Boltz
- [apparmor] [patch] [27/38] Implement FileRule logprof_header()
Christian Boltz
- [apparmor] [patch] [28/38] AARE: let match() handle plain path regexes as non-regex
Christian Boltz
- [apparmor] [patch] [29/38] let _is_covered_aare() check against the AARE instead of the (str) regex
Christian Boltz
- [apparmor] [patch] [30/38] Re-enable clear_common() call in aa-mergeprof
Christian Boltz
- [apparmor] [patch] [31/38] FileRule: add get_exec_rules_for_path() and get_exec_conflict_rules()
Christian Boltz
- [apparmor] [patch] [32/38] Re-implement exec conflict handling in aa-mergeprof
Christian Boltz
- [apparmor] [patch] [33/38] Add cleanup flag to *Ruleset.add()
Christian Boltz
- [apparmor] [patch] [34/38] logprof, mergeprof: cleanup superfluous rules when user adds a new rule
Christian Boltz
- [apparmor] [patch] [35/38] Drop old path code from aa.py and aa-mergeprof
Christian Boltz
- [apparmor] [patch] [36/38] Drop several now unused functions and variables from aamode.py
Christian Boltz
- [apparmor] [patch] [37/38] Drop severity rank() dispatcher
Christian Boltz
- [apparmor] [patch] [38/38] Drop old path regexes
Christian Boltz
- [apparmor] [patch] [39/38] Ignore exec events for non-existing profiles
Christian Boltz
- [apparmor] [patch] delete_duplicates(): don't modify self.rules while looping over it
Christian Boltz
- [apparmor] [patch] delete_duplicates(): don't modify self.rules while looping over it
Seth Arnold
- [apparmor] [patch] deny capability net_admin in abstractions/samba
Christian Boltz
- [apparmor] [patch] Fix aa-logprof "add hat" endless loop
Christian Boltz
- [apparmor] [patch] Fix aa-logprof "add hat" endless loop
Steve Beattie
- [apparmor] [PATCH] libapparmor: Force libtoolize to replace existing files
Tyler Hicks
- [apparmor] [patch] Switch utils to python3
Christian Boltz
- [apparmor] [patch] Switch utils to python3
Seth Arnold
- [apparmor] [patch] Switch utils to python3
Tyler Hicks
- [apparmor] [patch] type_is_str(): make pyflakes3 happy
Christian Boltz
- [apparmor] [patch] type_is_str(): make pyflakes3 happy
Seth Arnold
- [apparmor] [patch] winbindd profile: allow dac_override
Christian Boltz
- [apparmor] [patch] winbindd profile: allow dac_override
Steve Beattie
- [apparmor] [patch] winbindd profile: allow dac_override
Seth Arnold
- [apparmor] Crashes when disabling profiles
Mark Wadham
- [apparmor] Crashes when disabling profiles
John Johansen
- [apparmor] dconf patches
William Hua
- [apparmor] dconf patches
John Johansen
- [apparmor] dconf patches
John Johansen
- [apparmor] PulseAudio profile: sys_ptrace, ptrace, 'rwcdmr' denied masks and example rules.
daniel curtis
- [apparmor] PulseAudio profile: sys_ptrace, ptrace, 'rwcdmr' denied masks and example rules.
Seth Arnold
- [apparmor] PulseAudio profile: sys_ptrace, ptrace, 'rwcdmr' denied masks and example rules.
daniel curtis
- [apparmor] PulseAudio profile: sys_ptrace, ptrace, 'rwcdmr' denied masks and example rules.
Simon Deziel
- [apparmor] PulseAudio profile: sys_ptrace, ptrace, 'rwcdmr' denied masks and example rules.
daniel curtis
- [apparmor] Support for owner specification
azurit at pobox.sk
- [apparmor] Support for owner specification
Seth Arnold
- [apparmor] Support for owner specification
azurit at pobox.sk
- [apparmor] Support for owner specification
Seth Arnold
- [apparmor] Support for owner specification
azurit at pobox.sk
- [apparmor] Support for owner specification
John Johansen
- [apparmor] Using AppArmor for system wide audit
Alex Maestretti
- [apparmor] Using AppArmor for system wide audit
John Johansen
- [apparmor] Using AppArmor for system wide audit
Seth Arnold
- [apparmor] Using AppArmor for system wide audit
Alex Maestretti
- [apparmor] Using AppArmor for system wide audit
John Johansen
Last message date:
Wed Aug 31 17:52:35 UTC 2016
Archived on: Wed Aug 31 17:52:51 UTC 2016
This archive was generated by
Pipermail 0.09 (Mailman edition).