Blame SOURCES/fapolicyd-readme.patch

0aabf8
From b4618d133f473b9bbc36f2a5e94b8b0f257ba3e0 Mon Sep 17 00:00:00 2001
0aabf8
From: Radovan Sroka <rsroka@redhat.com>
0aabf8
Date: Fri, 5 Aug 2022 14:49:30 +0200
0aabf8
Subject: [PATCH] Add mention that using of names requires name resolution
0aabf8
0aabf8
- using of user and group names as uid and gid attributes
0aabf8
  requires correct name resolution
0aabf8
0aabf8
Signed-off-by: Radovan Sroka <rsroka@redhat.com>
0aabf8
---
0aabf8
 README.md | 6 ++++++
0aabf8
 1 file changed, 6 insertions(+)
0aabf8
0aabf8
diff --git a/README.md b/README.md
0aabf8
index d932e00..abc5eee 100644
0aabf8
--- a/README.md
0aabf8
+++ b/README.md
0aabf8
@@ -131,6 +131,12 @@ You can similarly do this for trusted users that have to execute things in
0aabf8
 the home dir. You can create a trusted_user group, add them the group,
0aabf8
 and then write a rule allowing them to execute from their home dir.
0aabf8
 
0aabf8
+When you want to use user or group name (as a string). You have to guarantee
0aabf8
+that these names were correctly resolved. In case of systemd, you need to add
0aabf8
+a new after target 'After=nss-user-lookup.target'.
0aabf8
+To achieve that you can use `systemctl edit --full fapolicyd`,
0aabf8
+uncomment the respective line and save the change.
0aabf8
+
0aabf8
 ```
0aabf8
 allow perm=any gid=trusted_user : ftype=%languages dir=/home
0aabf8
 deny_audit perm=any all : ftype=%languages dir=/home