@@ -40,10 +40,6 @@ allow test_key_t self:key { create write search read view link setattr };
# Set new context on a keyring:
type test_newcon_key_t;
-key_domain_type(test_newcon_key_t)
-unconfined_runs_test(test_newcon_key_t)
-typeattribute test_newcon_key_t testdomain;
-typeattribute test_newcon_key_t keydomain;
allow test_key_t test_newcon_key_t:key { create write search view };
@@ -67,7 +67,7 @@ ok( $result >> 8 eq 11 );
print "Change keyring context\n";
$result = system
-"runcon -t test_key_t $basedir/keyctl_relabel $v system_u:system_r:test_newcon_key_t:s0";
+"runcon -t test_key_t $basedir/keyctl_relabel $v system_u:object_r:test_newcon_key_t:s0";
ok( $result eq 0 );
print "Test permission checks between a keyring created by another process\n";
It's only used to test chaing the label of a key, so there is no need to declare it as a domain type. Signed-off-by: Ondrej Mosnacek <omosnace@redhat.com> --- policy/test_keys.te | 4 ---- tests/keys/test | 2 +- 2 files changed, 1 insertion(+), 5 deletions(-)