Hello community, here is the log from the commit of package policycoreutils for openSUSE:Factory checked in at 2012-08-10 19:02:49 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/policycoreutils (Old) and /work/SRC/openSUSE:Factory/.policycoreutils.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "policycoreutils", Maintainer is "[email protected]" Changes: -------- --- /work/SRC/openSUSE:Factory/policycoreutils/policycoreutils.changes 2012-02-16 15:02:00.000000000 +0100 +++ /work/SRC/openSUSE:Factory/.policycoreutils.new/policycoreutils.changes 2012-08-10 19:02:51.000000000 +0200 @@ -1,0 +2,7 @@ +Tue Aug 7 15:30:58 UTC 2012 - [email protected] + +- updated policycoreutils to 2.1.10 + - adapated patches +- updated sepolgen to 1.1.5 + +------------------------------------------------------------------- Old: ---- policycoreutils-2.0.85.tar.bz2 policycoreutils-rhat.patch.bz2 policycoreutils-sepolgen.patch policycoreutils-setup_py-prefix.patch sepolgen-1.0.23.tar.bz2 New: ---- policycoreutils-2.1.10.tar.gz sepolgen-1.1.5.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ policycoreutils.spec ++++++ --- /var/tmp/diff_new_pack.n3y3mb/_old 2012-08-10 19:02:54.000000000 +0200 +++ /var/tmp/diff_new_pack.n3y3mb/_new 2012-08-10 19:02:54.000000000 +0200 @@ -17,20 +17,20 @@ %define libaudit_ver 1.4.2 -%define libsepol_ver 2.0.41 +%define libsepol_ver 2.1.4 %define libsemanage_ver 2.0.43 %define libselinux_ver 2.0.90 -%define sepolgen_ver 1.0.23 +%define sepolgen_ver 1.1.5 Name: policycoreutils -Version: 2.0.85 +Version: 2.1.10 Release: 0 -Url: http://www.nsa.gov/selinux/ +Url: http://userspace.selinuxproject.org/ Summary: SELinux policy core utilities License: GPL-2.0+ Group: Productivity/Security -Source: %{name}-%{version}.tar.bz2 -Source1: sepolgen-%{sepolgen_ver}.tar.bz2 +Source: http://userspace.selinuxproject.org/releases/20120216/%{name}-%{version}.tar.gz +Source1: http://userspace.selinuxproject.org/releases/20120216/sepolgen-%{sepolgen_ver}.tar.gz Source2: system-config-selinux.png Source3: system-config-selinux.desktop Source4: system-config-selinux.pam @@ -38,13 +38,10 @@ Source6: selinux-polgengui.desktop Source7: selinux-polgengui.console Source8: policycoreutils_man_ru2.tar.bz2 -Patch0: policycoreutils-rhat.patch.bz2 Patch1: policycoreutils-po.patch.bz2 Patch2: policycoreutils-gui.patch.bz2 -Patch3: policycoreutils-sepolgen.patch Patch4: policycoreutils-initscript.patch Patch5: policycoreutils-pam-common.patch -Patch6: policycoreutils-setup_py-prefix.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRequires: audit-devel >= %{libaudit_ver} BuildRequires: dbus-1-glib-devel @@ -60,12 +57,12 @@ BuildRequires: python-devel BuildRequires: update-desktop-files Requires(pre): %insserv_prereq %fillup_prereq permissions -Requires: util-linux -Requires: gawk -Requires: rpm +Requires: audit-libs-python Requires: checkpolicy +Requires: gawk Requires: python-selinux -Requires: audit-libs-python +Requires: rpm +Requires: util-linux Recommends: %{name}-lang %description @@ -89,13 +86,11 @@ %prep %setup -q -a 1 -%patch0 -p2 +#%patch0 -p2 %patch1 -p1 %patch2 -p1 -%patch3 -p1 %patch4 %patch5 -%patch6 # sleep 5 # touch po/policycoreutils.pot # sleep 5 @@ -139,10 +134,10 @@ %package python Summary: SELinux policy core python utilities Group: Productivity/Security +Requires: audit-libs-python >= %{libaudit_ver} Requires: policycoreutils = %{version} -Requires: python-semanage >= %{libsemanage_ver} Requires: python-selinux >= %{libselinux_ver} -Requires: audit-libs-python >= %{libaudit_ver} +Requires: python-semanage >= %{libsemanage_ver} Requires: python-setools %description python @@ -159,8 +154,8 @@ %{_bindir}/sepolgen-ifgen-attr-helper %{python_sitearch}/seobject.py* %{python_sitearch}/sepolgen -%{python_sitearch}/%{name} -%{python_sitearch}/%{name}*.egg-info +#%{python_sitearch}/%{name} +#%{python_sitearch}/%{name}*.egg-info %dir /var/lib/sepolgen %dir /var/lib/selinux /var/lib/sepolgen/perm_map @@ -170,6 +165,7 @@ %{_mandir}/man8/chcat.8* %{_mandir}/ru/man8/chcat.8* %{_mandir}/man8/sandbox.8* +%{_mandir}/man5/sandbox* %{_mandir}/man8/semanage.8* %{_mandir}/ru/man8/semanage.8* @@ -196,8 +192,7 @@ %{_datadir}/sandbox/sandboxX.sh %{_datadir}/sandbox/start /var/adm/fillup-templates/sysconfig.sandbox -%doc %{_mandir}/man5/sandbox.conf.5.gz -%doc %{_mandir}/man8/seunshare.8.gz +%doc %{_mandir}/man8/seunshare.8* %post sandbox %fillup_and_insserv sandbox @@ -244,9 +239,9 @@ Requires: python-gtk # Requires: gnome-python2-canvas # Requires: usermode-gtk -Requires: setools-console -Requires: selinux-policy Requires: python +Requires: selinux-policy +Requires: setools-console %description gui system-config-selinux is a utility for managing the SELinux environment @@ -255,16 +250,16 @@ %defattr(-,root,root) %{_bindir}/system-config-selinux %{_bindir}/selinux-polgengui -%{_bindir}/sepolgen +#%{_bindir}/sepolgen %{_datadir}/applications/selinux-polgengui.desktop %{_datadir}/applications/system-config-selinux.desktop %{_datadir}/pixmaps/system-config-selinux.png -%dir %{_datadir}/system-config-selinux -%dir %{_datadir}/system-config-selinux/templates -%{_datadir}/system-config-selinux/*.py* -%{_datadir}/system-config-selinux/selinux.tbl -%{_datadir}/system-config-selinux/*.glade -%{_datadir}/system-config-selinux/templates/*.py* +#%dir %{_datadir}/system-config-selinux +#%dir %{_datadir}/system-config-selinux/templates +#%{_datadir}/system-config-selinux/*.py* +#%{_datadir}/system-config-selinux/selinux.tbl +#%{_datadir}/system-config-selinux/*.glade +#%{_datadir}/system-config-selinux/templates/*.py* %config(noreplace) %{_sysconfdir}/pam.d/system-config-selinux %config(noreplace) %{_sysconfdir}/pam.d/selinux-polgengui %dir %{_sysconfdir}/security/console.apps @@ -293,6 +288,7 @@ %{_bindir}/semodule_expand %{_bindir}/semodule_link %{_bindir}/semodule_package +%{_bindir}/semodule_unpackage %config(noreplace) %{_sysconfdir}/pam.d/run_init %config(noreplace) %{_sysconfdir}/sestatus.conf %attr(755,root,root) %{_initddir}/restorecond @@ -305,6 +301,9 @@ %dir %{_mandir}/ru %dir %{_mandir}/ru/man1 %dir %{_mandir}/ru/man8 +%{_mandir}/man5/selinux_config.5* +%{_mandir}/man5/sestatus.conf.5* +%{_mandir}/man8/semodule_unpackage.8* %{_mandir}/man8/fixfiles.8* %{_mandir}/ru/man8/fixfiles.8* %{_mandir}/man8/load_policy.8* ++++++ policycoreutils-initscript.patch ++++++ --- /var/tmp/diff_new_pack.n3y3mb/_old 2012-08-10 19:02:54.000000000 +0200 +++ /var/tmp/diff_new_pack.n3y3mb/_new 2012-08-10 19:02:54.000000000 +0200 @@ -1,7 +1,7 @@ Index: restorecond/restorecond.init =================================================================== ---- restorecond/restorecond.init.orig 2012-02-14 10:27:52.948296762 +0100 -+++ restorecond/restorecond.init 2012-02-14 10:42:18.458874663 +0100 +--- restorecond/restorecond.init.orig ++++ restorecond/restorecond.init @@ -1,14 +1,23 @@ #!/bin/sh # @@ -118,7 +118,7 @@ { stop start -@@ -72,18 +100,20 @@ +@@ -72,18 +100,20 @@ case "$1" in stop ;; status) @@ -147,65 +147,58 @@ +rc_exit Index: sandbox/sandbox.init =================================================================== ---- sandbox/sandbox.init.orig 2012-02-14 10:27:53.001298574 +0100 -+++ sandbox/sandbox.init 2012-02-14 10:38:19.622717182 +0100 -@@ -1,31 +1,32 @@ +--- sandbox/sandbox.init.orig ++++ sandbox/sandbox.init +@@ -1,11 +1,22 @@ #!/bin/bash -## BEGIN INIT INFO -+ -+# /etc/init.d/sandbox -+ +### BEGIN INIT INFO # Provides: sandbox -# Default-Start: 3 4 5 -# Default-Stop: 0 1 2 3 4 6 -# Required-Start: --# --## END INIT INFO --# sandbox: Set up / mountpoint to be shared, /var/tmp, /tmp, /home/sandbox unshared --# --# chkconfig: 345 1 99 --# --# description: sandbox, xguest and other apps that want to use pam_namespace \ +# Required-Start: $remote_fs +# Should-Start: +# Required-Stop: $remote_fs +# Should-Stop: +# Default-Start: 3 5 +# Default-Stop: 0 1 2 3 6 -+# Short-Description: Script for sandbox and other apps using pam_namespace ++# Required-Start: Set up / mountpoint to be shared, /var/tmp, /tmp, /home/sandbox unshared ++# Short-Description: +# Description: sandbox, xguest and other apps that want to use pam_namespace \ - # require this script be run at boot. This service script does \ - # not actually run any service but sets up: \ - # /var/tmp, /tmp and home directories to be used by these tools.\ - # If you do not use sandbox, xguest or pam_namespace you can turn \ - # this service off.\ --# ++# require this script be run at boot. This service script does \ ++# not actually run any service but sets up: \ ++# / to be shared by any app that starts a separate namespace ++# If you do not use sandbox, xguest or pam_namespace you can turn \ ++# this service off.\ + # +-## END INIT INFO +### END INIT INFO + # sandbox: Set up / mountpoint to be shared, /var/tmp, /tmp, /home/sandbox unshared + # + # chkconfig: 345 1 99 +@@ -19,9 +30,9 @@ + # # Source function library. -. /etc/init.d/functions +. /etc/rc.status - HOMEDIRS="/home" - - . /etc/sysconfig/sandbox - -LOCKFILE=/var/lock/subsys/sandbox +LOCKFILE=/var/lock/sandbox base=${0##*/} -@@ -35,7 +36,7 @@ - [ -f "$LOCKFILE" ] && return 1 +@@ -31,7 +42,7 @@ start() { + [ -f "$LOCKFILE" ] && return 0 touch $LOCKFILE - mount --make-rshared / || return $? + mount --make-rshared / || return $? - mount --rbind /tmp /tmp || return $? - mount --rbind /var/tmp /var/tmp || return $? - mount --make-private /tmp || return $? -@@ -81,9 +82,13 @@ + return 0 + } + +@@ -68,9 +79,13 @@ case "$1" in status) status ;; @@ -222,8 +215,8 @@ esac Index: mcstrans/src/mcstrans.init =================================================================== ---- mcstrans/src/mcstrans.init.orig 2010-12-21 22:12:03.000000000 +0100 -+++ mcstrans/src/mcstrans.init 2012-02-14 10:33:15.198314694 +0100 +--- mcstrans/src/mcstrans.init.orig ++++ mcstrans/src/mcstrans.init @@ -20,7 +20,7 @@ PATH=/sbin:/bin:/usr/bin:/usr/sbin -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
