aboutsummaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* sysadm: make haproxy adminKenton Groombridge2024-09-211-0/+4
* SELinux policy for cockpitDave Sugar2024-03-011-0/+4
* sysadm: allow using networkctlKenton Groombridge2024-03-011-0/+3
* init, sysadm: allow sysadm to manage systemd runtime unitsKenton Groombridge2022-12-131-0/+6
* sysadm: allow running kubernetesKenton Groombridge2022-12-131-0/+4
* sysadm: allow opensm accessKenton Groombridge2022-11-021-0/+4
* fapolicyd: Initial SELinux policyDave Sugar2022-11-021-0/+4
* sysadm: allow admin access to zfsKenton Groombridge2022-11-021-0/+4
* sysadm: allow sysadm to rw ipmi devicesKenton Groombridge2022-11-021-0/+1
* sysadm: allow sysadm to watch journal directoriesKenton Groombridge2022-09-031-0/+3
* sysadm: allow container admin accessKenton Groombridge2022-01-291-0/+4
* Drop module versioning.Chris PeBenito2022-01-291-1/+1
* various: Module version bump.Chris PeBenito2021-11-201-1/+1
* cryfs, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* shutdown, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* hadoop, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* wm, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* wireshark, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* vmware, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* userhelper, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* uml, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* tvtime, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* thunderbird, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* su, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* spamassassin, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* rssh, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* razor, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* pyzor, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* openoffice, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* mta, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* mplayer, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* mozilla, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* lpd, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* libmtp, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* java, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* irc, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* gpg, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* gnome, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* games, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* evolution, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* dirmngr, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* cron, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* chromium, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* cdrecord, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* bluetooth, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* authlogin, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* xserver, roles, various: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* xscreensaver, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* sudo, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1
* ssh, roles: use user exec domain attributeKenton Groombridge2021-11-201-1/+1