aboutsummaryrefslogtreecommitdiffstats
path: root/untrusted_app.te
Commit message (Expand)AuthorAgeFilesLines
* Support forcing permissive domains to unconfined.Nick Kralevich2014-01-111-1/+1
* Allow untrusted apps to execute binaries from their sandbox directories.Stephen Smalley2013-12-111-0/+4
* Isolate untrusted app ptys from other domains.Stephen Smalley2013-09-271-1/+1
* Revert "Add the ability to write shell files to the untrusted_app domain."Nick Kralevich2013-09-041-4/+1
* Add the ability to write shell files to the untrusted_app domain.Geremy Condra2013-08-161-1/+4
* Permit apps to bind TCP/UDP sockets to a hostnameAlex Klyubin2013-07-161-0/+3
* Move isolated_app.te / untrusted_app.te into permissiveNick Kralevich2013-07-161-0/+1
* Allow apps to create listening portsNick Kralevich2013-07-161-2/+2
* Temporarily allow untrusted apps to read shell data files.Nick Kralevich2013-07-151-0/+7
* untrusted_app.te / isolated_app.te / app.te first passNick Kralevich2013-07-131-2/+22
* Move *_app into their own fileNick Kralevich2013-07-121-0/+17