Blame SOURCES/fapolicyd-readme.patch

fa39dc
From b4618d133f473b9bbc36f2a5e94b8b0f257ba3e0 Mon Sep 17 00:00:00 2001
fa39dc
From: Radovan Sroka <rsroka@redhat.com>
fa39dc
Date: Fri, 5 Aug 2022 14:49:30 +0200
fa39dc
Subject: [PATCH] Add mention that using of names requires name resolution
fa39dc
fa39dc
- using of user and group names as uid and gid attributes
fa39dc
  requires correct name resolution
fa39dc
fa39dc
Signed-off-by: Radovan Sroka <rsroka@redhat.com>
fa39dc
---
fa39dc
 README.md | 6 ++++++
fa39dc
 1 file changed, 6 insertions(+)
fa39dc
fa39dc
diff --git a/README.md b/README.md
fa39dc
index d932e00..abc5eee 100644
fa39dc
--- a/README.md
fa39dc
+++ b/README.md
fa39dc
@@ -131,6 +131,12 @@ You can similarly do this for trusted users that have to execute things in
fa39dc
 the home dir. You can create a trusted_user group, add them the group,
fa39dc
 and then write a rule allowing them to execute from their home dir.
fa39dc
 
fa39dc
+When you want to use user or group name (as a string). You have to guarantee
fa39dc
+that these names were correctly resolved. In case of systemd, you need to add
fa39dc
+a new after target 'After=nss-user-lookup.target'.
fa39dc
+To achieve that you can use `systemctl edit --full fapolicyd`,
fa39dc
+uncomment the respective line and save the change.
fa39dc
+
fa39dc
 ```
fa39dc
 allow perm=any gid=trusted_user : ftype=%languages dir=/home
fa39dc
 deny_audit perm=any all : ftype=%languages dir=/home