Blame SOURCES/fapolicyd-readme.patch

eb2dbd
From b4618d133f473b9bbc36f2a5e94b8b0f257ba3e0 Mon Sep 17 00:00:00 2001
eb2dbd
From: Radovan Sroka <rsroka@redhat.com>
eb2dbd
Date: Fri, 5 Aug 2022 14:49:30 +0200
eb2dbd
Subject: [PATCH] Add mention that using of names requires name resolution
eb2dbd
eb2dbd
- using of user and group names as uid and gid attributes
eb2dbd
  requires correct name resolution
eb2dbd
eb2dbd
Signed-off-by: Radovan Sroka <rsroka@redhat.com>
eb2dbd
---
eb2dbd
 README.md | 6 ++++++
eb2dbd
 1 file changed, 6 insertions(+)
eb2dbd
eb2dbd
diff --git a/README.md b/README.md
eb2dbd
index d932e00..abc5eee 100644
eb2dbd
--- a/README.md
eb2dbd
+++ b/README.md
eb2dbd
@@ -131,6 +131,12 @@ You can similarly do this for trusted users that have to execute things in
eb2dbd
 the home dir. You can create a trusted_user group, add them the group,
eb2dbd
 and then write a rule allowing them to execute from their home dir.
eb2dbd
 
eb2dbd
+When you want to use user or group name (as a string). You have to guarantee
eb2dbd
+that these names were correctly resolved. In case of systemd, you need to add
eb2dbd
+a new after target 'After=nss-user-lookup.target'.
eb2dbd
+To achieve that you can use `systemctl edit --full fapolicyd`,
eb2dbd
+uncomment the respective line and save the change.
eb2dbd
+
eb2dbd
 ```
eb2dbd
 allow perm=any gid=trusted_user : ftype=%languages dir=/home
eb2dbd
 deny_audit perm=any all : ftype=%languages dir=/home