Blame SOURCES/fapolicyd-readme.patch

abc874
From b4618d133f473b9bbc36f2a5e94b8b0f257ba3e0 Mon Sep 17 00:00:00 2001
abc874
From: Radovan Sroka <rsroka@redhat.com>
abc874
Date: Fri, 5 Aug 2022 14:49:30 +0200
abc874
Subject: [PATCH] Add mention that using of names requires name resolution
abc874
abc874
- using of user and group names as uid and gid attributes
abc874
  requires correct name resolution
abc874
abc874
Signed-off-by: Radovan Sroka <rsroka@redhat.com>
abc874
---
abc874
 README.md | 6 ++++++
abc874
 1 file changed, 6 insertions(+)
abc874
abc874
diff --git a/README.md b/README.md
abc874
index d932e00..abc5eee 100644
abc874
--- a/README.md
abc874
+++ b/README.md
abc874
@@ -131,6 +131,12 @@ You can similarly do this for trusted users that have to execute things in
abc874
 the home dir. You can create a trusted_user group, add them the group,
abc874
 and then write a rule allowing them to execute from their home dir.
abc874
 
abc874
+When you want to use user or group name (as a string). You have to guarantee
abc874
+that these names were correctly resolved. In case of systemd, you need to add
abc874
+a new after target 'After=nss-user-lookup.target'.
abc874
+To achieve that you can use `systemctl edit --full fapolicyd`,
abc874
+uncomment the respective line and save the change.
abc874
+
abc874
 ```
abc874
 allow perm=any gid=trusted_user : ftype=%languages dir=/home
abc874
 deny_audit perm=any all : ftype=%languages dir=/home