Hello community, here is the log from the commit of package policycoreutils for openSUSE:Factory checked in at 2013-04-17 23:15:45 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/policycoreutils (Old) and /work/SRC/openSUSE:Factory/.policycoreutils.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "policycoreutils", Maintainer is "[email protected]" Changes: -------- --- /work/SRC/openSUSE:Factory/policycoreutils/policycoreutils.changes 2013-03-08 09:38:49.000000000 +0100 +++ /work/SRC/openSUSE:Factory/.policycoreutils.new/policycoreutils.changes 2013-04-17 23:15:48.000000000 +0200 @@ -1,0 +2,49 @@ +Wed Apr 3 10:06:06 UTC 2013 - [email protected] + +- fixed source url +- removed old tarball + +------------------------------------------------------------------- +Fri Mar 29 13:13:19 UTC 2013 - [email protected] + +- update to 2.1.14 + * setfiles: estimate percent progress + * load_policy: make link at the destination directory + * Rebuild polgen.glade with glade-3 + * sepolicy: new command to unite small utilities + * sepolicy: Update Makefiles and po files + * sandbox: use sepolicy to look for sandbox_t + * gui: switch to use sepolicy + * gui: sepolgen: use sepolicy to generate + * semanage: use sepolicy for boolean dictionary + * add po file configuration information + * po: stop running update-po on all + * semanage: seobject verify policy types before allowing you to assign them. + * gui: Start using Popen, instead of os.spawnl + * sandbox: Copy /var/tmp to /tmp as they are the same inside + * qualifier to shred content + * semanage: Fix handling of boolean_sub names when using the -F flag + * semanage: man: roles instead of role + * gui: system-config-selinux: Catch no DISPLAY= error + * setfiles: print error if no default label found + * semanage: list logins file entries in semanage login -l + * semanage: good error message is sepolgen python module missing + * gui: system-config-selinux: do not use lokkit + * secon: add support for setrans color information in prompt output + * restorecond: remove /etc/mtab from default list + * gui: If you are not able to read enforcemode set it to False + * genhomedircon: regenerate genhomedircon more often + * restorecond: Add /etc/udpatedb.conf to restorecond.conf + * genhomedircon generation to allow spec file to pass in SEMODULE_PATH + * fixfiles: relabel only after specific date + * po: update translations + * sandbox: seunshare: do not reassign realloc value + * seunshare: do checking on setfsuid + * sestatus: rewrite to shut up coverity +- removed policycoreutils-glibc217.patch (upstream fix) +- added patches: + * policycoreutils-rhat.patch + * policycoreutils-sepolgen.patch + * loadpolicy_path.patch + +------------------------------------------------------------------- Old: ---- policycoreutils-2.1.13.tar.gz policycoreutils-glibc217.patch sepolgen-1.1.8.tar.gz New: ---- loadpolicy_path.patch policycoreutils-2.1.14.tgz policycoreutils-rhat.patch policycoreutils-sepolgen.patch sepolgen-1.1.9.tgz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ policycoreutils.spec ++++++ --- /var/tmp/diff_new_pack.PUj6L4/_old 2013-04-17 23:15:50.000000000 +0200 +++ /var/tmp/diff_new_pack.PUj6L4/_new 2013-04-17 23:15:50.000000000 +0200 @@ -17,20 +17,20 @@ %define libaudit_ver 1.4.2 -%define libsepol_ver 2.1.8 -%define libsemanage_ver 2.1.9 -%define libselinux_ver 2.1.12 -%define sepolgen_ver 1.1.8 +%define libsepol_ver 2.1.9 +%define libsemanage_ver 2.1.10 +%define libselinux_ver 2.1.13 +%define sepolgen_ver 1.1.9 Name: policycoreutils -Version: 2.1.13 +Version: 2.1.14 Release: 0 Url: http://userspace.selinuxproject.org/ Summary: SELinux policy core utilities License: GPL-2.0+ Group: Productivity/Security -Source: http://userspace.selinuxproject.org/releases/20120216/%{name}-%{version}.tar.gz -Source1: http://userspace.selinuxproject.org/releases/20120216/sepolgen-%{sepolgen_ver}.tar.gz +Source: http://pkgs.fedoraproject.org/lookaside/pkgs/policycoreutils/%{name}-%{version}.tgz/22cb999c28b40b59a9d6b11824480ab8/%{name}-%{version}.tgz +Source1: http://pkgs.fedoraproject.org/lookaside/pkgs/policycoreutils/sepolgen-%{sepolgen_ver}.tgz/960f29b498ba7efaa3aeb5e3796a1ba3/sepolgen-%{sepolgen_ver}.tgz Source2: system-config-selinux.png Source3: system-config-selinux.desktop Source4: system-config-selinux.pam @@ -41,7 +41,9 @@ Source9: restorecond.service Patch4: policycoreutils-initscript.patch Patch5: policycoreutils-pam-common.patch -Patch6: policycoreutils-glibc217.patch +Patch7: policycoreutils-rhat.patch +Patch8: policycoreutils-sepolgen.patch +Patch10: loadpolicy_path.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRequires: audit-devel >= %{libaudit_ver} BuildRequires: dbus-1-glib-devel @@ -55,6 +57,7 @@ BuildRequires: libsepol-devel-static >= %{libsepol_ver} BuildRequires: pam-devel BuildRequires: python-devel +BuildRequires: setools-devel BuildRequires: update-desktop-files %if 0%{?suse_version} > 1140 BuildRequires: systemd @@ -95,7 +98,9 @@ %setup -q -a 1 %patch4 %patch5 -%patch6 -p2 +%patch7 -p2 +%patch10 -p1 +%patch8 -p2 -d sepolgen-%{sepolgen_ver} # sleep 5 # touch po/policycoreutils.pot # sleep 5 @@ -159,11 +164,15 @@ %{_bindir}/audit2why %{_bindir}/chcat %{_bindir}/sandbox +%{_bindir}/sepolicy %{_bindir}/sepolgen-ifgen %{_bindir}/sepolgen-ifgen-attr-helper %{python_sitearch}/seobject.py* %{python_sitearch}/sepolgen -#%{python_sitearch}/%{name} +%{python_sitearch}/sepolicy +%{python_sitearch}/%{name} +%{python_sitearch}/%{name}*.egg-info +%{python_sitearch}/sepolicy*.egg-info #%{python_sitearch}/%{name}*.egg-info %dir /var/lib/sepolgen %dir /var/lib/selinux @@ -176,9 +185,12 @@ %{_mandir}/man8/sandbox.8* %{_mandir}/man5/sandbox* %{_mandir}/man8/semanage.8* +%{_mandir}/man8/sepolicy*.8* +%{_mandir}/man8/sepolgen.8* %{_mandir}/ru/man8/semanage.8* %dir %{_sysconfdir}/bash_completion.d %{_sysconfdir}/bash_completion.d/semanage-bash-completion.sh +%{_sysconfdir}/bash_completion.d/sepolicy-bash-completion.sh %{_sysconfdir}/bash_completion.d/setsebool-bash-completion.sh %post python @@ -245,16 +257,25 @@ %defattr(-,root,root) %{_bindir}/system-config-selinux %{_bindir}/selinux-polgengui +%{_datadir}/applications/system-config-selinux.desktop +%{_datadir}/system-config-selinux/system-config-selinux.desktop %{_bindir}/sepolgen %{_datadir}/applications/selinux-polgengui.desktop -%{_datadir}/applications/system-config-selinux.desktop +%{_datadir}/system-config-selinux/selinux-polgengui.desktop +%dir %{_datadir}/icons +%dir %{_datadir}/icons/hicolor +%dir %{_datadir}/icons/hicolor/24x24 +%dir %{_datadir}/icons/hicolor/24x24/apps +%{_datadir}/icons/hicolor/24x24/apps/system-config-selinux.png %{_datadir}/pixmaps/system-config-selinux.png +%{_datadir}/polkit-1/actions/org.fedoraproject.config.selinux.policy %dir %{_datadir}/system-config-selinux -%dir %{_datadir}/system-config-selinux/templates +#%dir %{_datadir}/system-config-selinux/templates +%{_datadir}/system-config-selinux/system-config-selinux.png %{_datadir}/system-config-selinux/*.py* #%{_datadir}/system-config-selinux/selinux.tbl %{_datadir}/system-config-selinux/*.glade -%{_datadir}/system-config-selinux/templates/*.py* +#%%{_datadir}/system-config-selinux/templates/*.py* %config(noreplace) %{_sysconfdir}/pam.d/system-config-selinux %config(noreplace) %{_sysconfdir}/pam.d/selinux-polgengui %dir %{_sysconfdir}/security/console.apps ++++++ loadpolicy_path.patch ++++++ Index: policycoreutils-2.1.14/load_policy/Makefile =================================================================== --- policycoreutils-2.1.14.orig/load_policy/Makefile 2013-02-07 18:21:11.000000000 +0100 +++ policycoreutils-2.1.14/load_policy/Makefile 2013-03-12 17:04:37.106823678 +0100 @@ -19,7 +19,7 @@ install: all test -d $(MANDIR)/man8 || install -m 755 -d $(MANDIR)/man8 install -m 644 load_policy.8 $(MANDIR)/man8/ -mkdir -p $(USRSBINDIR) - -ln -sf $(SBINDIR)/load_policy $(USRSBINDIR)/load_policy + -ln -sf /sbin/load_policy $(USRSBINDIR)/load_policy clean: -rm -f $(TARGETS) *.o ++++++ policycoreutils-pam-common.patch ++++++ --- /var/tmp/diff_new_pack.PUj6L4/_old 2013-04-17 23:15:50.000000000 +0200 +++ /var/tmp/diff_new_pack.PUj6L4/_new 2013-04-17 23:15:50.000000000 +0200 @@ -1,5 +1,7 @@ ---- newrole/newrole-lspp.pamd -+++ newrole/newrole-lspp.pamd +Index: newrole/newrole-lspp.pamd +=================================================================== +--- newrole/newrole-lspp.pamd.orig 2013-02-07 18:21:11.000000000 +0100 ++++ newrole/newrole-lspp.pamd 2013-03-11 15:39:40.060511756 +0100 @@ -1,5 +1,5 @@ #%PAM-1.0 -auth include system-auth @@ -9,8 +11,10 @@ +account include common-account +password include common-password session required pam_namespace.so unmnt_remnt no_unmount_on_close ---- newrole/newrole.pamd -+++ newrole/newrole.pamd +Index: newrole/newrole.pamd +=================================================================== +--- newrole/newrole.pamd.orig 2013-02-07 18:21:11.000000000 +0100 ++++ newrole/newrole.pamd 2013-03-11 15:39:45.137663594 +0100 @@ -1,6 +1,6 @@ #%PAM-1.0 -auth include system-auth @@ -22,8 +26,10 @@ +password include common-password +session include common-session session optional pam_xauth.so ---- run_init/run_init.pamd -+++ run_init/run_init.pamd +Index: run_init/run_init.pamd +=================================================================== +--- run_init/run_init.pamd.orig 2013-02-07 18:21:11.000000000 +0100 ++++ run_init/run_init.pamd 2013-03-11 15:39:45.140663684 +0100 @@ -1,6 +1,6 @@ #%PAM-1.0 -auth include system-auth ++++++ policycoreutils-rhat.patch ++++++ ++++ 3038 lines (skipped) ++++++ policycoreutils-sepolgen.patch ++++++ diff --git a/sepolgen/src/sepolgen/audit.py b/sepolgen/src/sepolgen/audit.py index d636091..9ca35a7 100644 --- a/sepolgen/src/sepolgen/audit.py +++ b/sepolgen/src/sepolgen/audit.py @@ -259,7 +259,7 @@ class AVCMessage(AuditMessage): raise ValueError("Error during access vector computation") if self.type == audit2why.CONSTRAINT: - self.data = [] + self.data = [ self.data ] if self.scontext.user != self.tcontext.user: self.data.append("user") if self.scontext.role != self.tcontext.role and self.tcontext.role != "object_r": -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
