Hello community,

here is the log from the commit of package policycoreutils for openSUSE:Factory 
checked in at 2013-04-17 23:15:45
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/policycoreutils (Old)
 and      /work/SRC/openSUSE:Factory/.policycoreutils.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "policycoreutils", Maintainer is "[email protected]"

Changes:
--------
--- /work/SRC/openSUSE:Factory/policycoreutils/policycoreutils.changes  
2013-03-08 09:38:49.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.policycoreutils.new/policycoreutils.changes     
2013-04-17 23:15:48.000000000 +0200
@@ -1,0 +2,49 @@
+Wed Apr  3 10:06:06 UTC 2013 - [email protected]
+
+- fixed source url
+- removed old tarball
+
+-------------------------------------------------------------------
+Fri Mar 29 13:13:19 UTC 2013 - [email protected]
+
+- update to 2.1.14
+   * setfiles: estimate percent progress
+   * load_policy: make link at the destination directory
+   * Rebuild polgen.glade with glade-3
+   * sepolicy: new command to unite small utilities
+   * sepolicy: Update Makefiles and po files
+   * sandbox: use sepolicy to look for sandbox_t
+   * gui: switch to use sepolicy
+   * gui: sepolgen: use sepolicy to generate
+   * semanage: use sepolicy for boolean dictionary
+   * add po file configuration information
+   * po: stop running update-po on all
+   * semanage: seobject verify policy types before allowing you to assign them.
+   * gui: Start using Popen, instead of os.spawnl
+   * sandbox: Copy /var/tmp to /tmp as they are the same inside
+   * qualifier to shred content
+   * semanage: Fix handling of boolean_sub names when using the -F flag
+   * semanage: man: roles instead of role
+   * gui: system-config-selinux: Catch no DISPLAY= error
+   * setfiles: print error if no default label found
+   * semanage: list logins file entries in semanage login -l
+   * semanage: good error message is sepolgen python module missing
+   * gui: system-config-selinux: do not use lokkit
+   * secon: add support for setrans color information in prompt output
+   * restorecond: remove /etc/mtab from default list
+   * gui: If you are not able to read enforcemode set it to False
+   * genhomedircon: regenerate genhomedircon more often
+   * restorecond: Add /etc/udpatedb.conf to restorecond.conf
+   * genhomedircon generation to allow spec file to pass in SEMODULE_PATH
+   * fixfiles: relabel only after specific date
+   * po: update translations
+   * sandbox: seunshare: do not reassign realloc value
+   * seunshare: do checking on setfsuid
+   * sestatus: rewrite to shut up coverity
+- removed policycoreutils-glibc217.patch (upstream fix)
+- added patches:
+   * policycoreutils-rhat.patch
+   * policycoreutils-sepolgen.patch
+   * loadpolicy_path.patch
+
+-------------------------------------------------------------------

Old:
----
  policycoreutils-2.1.13.tar.gz
  policycoreutils-glibc217.patch
  sepolgen-1.1.8.tar.gz

New:
----
  loadpolicy_path.patch
  policycoreutils-2.1.14.tgz
  policycoreutils-rhat.patch
  policycoreutils-sepolgen.patch
  sepolgen-1.1.9.tgz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ policycoreutils.spec ++++++
--- /var/tmp/diff_new_pack.PUj6L4/_old  2013-04-17 23:15:50.000000000 +0200
+++ /var/tmp/diff_new_pack.PUj6L4/_new  2013-04-17 23:15:50.000000000 +0200
@@ -17,20 +17,20 @@
 
 
 %define libaudit_ver     1.4.2
-%define libsepol_ver     2.1.8
-%define libsemanage_ver  2.1.9
-%define libselinux_ver   2.1.12
-%define sepolgen_ver     1.1.8
+%define libsepol_ver     2.1.9
+%define libsemanage_ver  2.1.10
+%define libselinux_ver   2.1.13
+%define sepolgen_ver     1.1.9
 
 Name:           policycoreutils
-Version:        2.1.13
+Version:        2.1.14
 Release:        0
 Url:            http://userspace.selinuxproject.org/
 Summary:        SELinux policy core utilities
 License:        GPL-2.0+
 Group:          Productivity/Security
-Source:         
http://userspace.selinuxproject.org/releases/20120216/%{name}-%{version}.tar.gz
-Source1:        
http://userspace.selinuxproject.org/releases/20120216/sepolgen-%{sepolgen_ver}.tar.gz
+Source:         
http://pkgs.fedoraproject.org/lookaside/pkgs/policycoreutils/%{name}-%{version}.tgz/22cb999c28b40b59a9d6b11824480ab8/%{name}-%{version}.tgz
+Source1:        
http://pkgs.fedoraproject.org/lookaside/pkgs/policycoreutils/sepolgen-%{sepolgen_ver}.tgz/960f29b498ba7efaa3aeb5e3796a1ba3/sepolgen-%{sepolgen_ver}.tgz
 Source2:        system-config-selinux.png
 Source3:        system-config-selinux.desktop
 Source4:        system-config-selinux.pam
@@ -41,7 +41,9 @@
 Source9:        restorecond.service
 Patch4:         policycoreutils-initscript.patch
 Patch5:         policycoreutils-pam-common.patch
-Patch6:         policycoreutils-glibc217.patch
+Patch7:         policycoreutils-rhat.patch
+Patch8:         policycoreutils-sepolgen.patch
+Patch10:        loadpolicy_path.patch
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 BuildRequires:  audit-devel >= %{libaudit_ver}
 BuildRequires:  dbus-1-glib-devel
@@ -55,6 +57,7 @@
 BuildRequires:  libsepol-devel-static >= %{libsepol_ver}
 BuildRequires:  pam-devel
 BuildRequires:  python-devel
+BuildRequires:  setools-devel
 BuildRequires:  update-desktop-files
 %if 0%{?suse_version} > 1140
 BuildRequires:  systemd
@@ -95,7 +98,9 @@
 %setup -q -a 1
 %patch4
 %patch5
-%patch6 -p2
+%patch7 -p2
+%patch10 -p1
+%patch8 -p2 -d sepolgen-%{sepolgen_ver}
 # sleep 5
 # touch po/policycoreutils.pot
 # sleep 5
@@ -159,11 +164,15 @@
 %{_bindir}/audit2why
 %{_bindir}/chcat
 %{_bindir}/sandbox
+%{_bindir}/sepolicy
 %{_bindir}/sepolgen-ifgen
 %{_bindir}/sepolgen-ifgen-attr-helper
 %{python_sitearch}/seobject.py*
 %{python_sitearch}/sepolgen
-#%{python_sitearch}/%{name}
+%{python_sitearch}/sepolicy
+%{python_sitearch}/%{name}
+%{python_sitearch}/%{name}*.egg-info
+%{python_sitearch}/sepolicy*.egg-info
 #%{python_sitearch}/%{name}*.egg-info
 %dir  /var/lib/sepolgen
 %dir  /var/lib/selinux
@@ -176,9 +185,12 @@
 %{_mandir}/man8/sandbox.8*
 %{_mandir}/man5/sandbox*
 %{_mandir}/man8/semanage.8*
+%{_mandir}/man8/sepolicy*.8*
+%{_mandir}/man8/sepolgen.8*
 %{_mandir}/ru/man8/semanage.8*
 %dir %{_sysconfdir}/bash_completion.d
 %{_sysconfdir}/bash_completion.d/semanage-bash-completion.sh
+%{_sysconfdir}/bash_completion.d/sepolicy-bash-completion.sh
 %{_sysconfdir}/bash_completion.d/setsebool-bash-completion.sh
 
 %post python
@@ -245,16 +257,25 @@
 %defattr(-,root,root)
 %{_bindir}/system-config-selinux
 %{_bindir}/selinux-polgengui
+%{_datadir}/applications/system-config-selinux.desktop
+%{_datadir}/system-config-selinux/system-config-selinux.desktop
 %{_bindir}/sepolgen
 %{_datadir}/applications/selinux-polgengui.desktop
-%{_datadir}/applications/system-config-selinux.desktop
+%{_datadir}/system-config-selinux/selinux-polgengui.desktop
+%dir %{_datadir}/icons
+%dir %{_datadir}/icons/hicolor
+%dir %{_datadir}/icons/hicolor/24x24
+%dir %{_datadir}/icons/hicolor/24x24/apps
+%{_datadir}/icons/hicolor/24x24/apps/system-config-selinux.png
 %{_datadir}/pixmaps/system-config-selinux.png
+%{_datadir}/polkit-1/actions/org.fedoraproject.config.selinux.policy
 %dir %{_datadir}/system-config-selinux
-%dir %{_datadir}/system-config-selinux/templates
+#%dir %{_datadir}/system-config-selinux/templates
+%{_datadir}/system-config-selinux/system-config-selinux.png
 %{_datadir}/system-config-selinux/*.py*
 #%{_datadir}/system-config-selinux/selinux.tbl
 %{_datadir}/system-config-selinux/*.glade
-%{_datadir}/system-config-selinux/templates/*.py*
+#%%{_datadir}/system-config-selinux/templates/*.py*
 %config(noreplace) %{_sysconfdir}/pam.d/system-config-selinux
 %config(noreplace) %{_sysconfdir}/pam.d/selinux-polgengui
 %dir %{_sysconfdir}/security/console.apps

++++++ loadpolicy_path.patch ++++++
Index: policycoreutils-2.1.14/load_policy/Makefile
===================================================================
--- policycoreutils-2.1.14.orig/load_policy/Makefile    2013-02-07 
18:21:11.000000000 +0100
+++ policycoreutils-2.1.14/load_policy/Makefile 2013-03-12 17:04:37.106823678 
+0100
@@ -19,7 +19,7 @@ install: all
        test -d $(MANDIR)/man8 || install -m 755 -d $(MANDIR)/man8
        install -m 644 load_policy.8 $(MANDIR)/man8/
        -mkdir -p $(USRSBINDIR)
-       -ln -sf $(SBINDIR)/load_policy $(USRSBINDIR)/load_policy 
+       -ln -sf /sbin/load_policy $(USRSBINDIR)/load_policy
 
 clean:
        -rm -f $(TARGETS) *.o 
++++++ policycoreutils-pam-common.patch ++++++
--- /var/tmp/diff_new_pack.PUj6L4/_old  2013-04-17 23:15:50.000000000 +0200
+++ /var/tmp/diff_new_pack.PUj6L4/_new  2013-04-17 23:15:50.000000000 +0200
@@ -1,5 +1,7 @@
---- newrole/newrole-lspp.pamd
-+++ newrole/newrole-lspp.pamd
+Index: newrole/newrole-lspp.pamd
+===================================================================
+--- newrole/newrole-lspp.pamd.orig     2013-02-07 18:21:11.000000000 +0100
++++ newrole/newrole-lspp.pamd  2013-03-11 15:39:40.060511756 +0100
 @@ -1,5 +1,5 @@
  #%PAM-1.0
 -auth       include    system-auth
@@ -9,8 +11,10 @@
 +account    include    common-account
 +password   include    common-password
  session    required   pam_namespace.so unmnt_remnt no_unmount_on_close
---- newrole/newrole.pamd
-+++ newrole/newrole.pamd
+Index: newrole/newrole.pamd
+===================================================================
+--- newrole/newrole.pamd.orig  2013-02-07 18:21:11.000000000 +0100
++++ newrole/newrole.pamd       2013-03-11 15:39:45.137663594 +0100
 @@ -1,6 +1,6 @@
  #%PAM-1.0
 -auth       include    system-auth
@@ -22,8 +26,10 @@
 +password   include    common-password
 +session    include    common-session
  session    optional   pam_xauth.so
---- run_init/run_init.pamd
-+++ run_init/run_init.pamd
+Index: run_init/run_init.pamd
+===================================================================
+--- run_init/run_init.pamd.orig        2013-02-07 18:21:11.000000000 +0100
++++ run_init/run_init.pamd     2013-03-11 15:39:45.140663684 +0100
 @@ -1,6 +1,6 @@
  #%PAM-1.0
 -auth       include    system-auth

++++++ policycoreutils-rhat.patch ++++++
++++ 3038 lines (skipped)

++++++ policycoreutils-sepolgen.patch ++++++
diff --git a/sepolgen/src/sepolgen/audit.py b/sepolgen/src/sepolgen/audit.py
index d636091..9ca35a7 100644
--- a/sepolgen/src/sepolgen/audit.py
+++ b/sepolgen/src/sepolgen/audit.py
@@ -259,7 +259,7 @@ class AVCMessage(AuditMessage):
                 raise ValueError("Error during access vector computation")
 
             if self.type == audit2why.CONSTRAINT:
-                self.data = []
+                self.data = [ self.data ]
                 if self.scontext.user != self.tcontext.user:
                     self.data.append("user")
                 if self.scontext.role != self.tcontext.role and 
self.tcontext.role != "object_r":

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to