Hello community,
here is the log from the commit of package libsemanage
checked in at Tue Sep 2 12:29:51 CEST 2008.
--------
--- libsemanage/libsemanage.changes 2008-08-01 17:32:23.000000000 +0200
+++ /mounts/work_src_done/STABLE/libsemanage/libsemanage.changes 2008-09-02 12:14:39.000000000 +0200
@@ -1,0 +2,11 @@
+Tue Sep 2 12:13:42 CEST 2008 - prusnak@suse.cz
+
+- updated to 2.0.27
+ * Modify genhomedircon to skip %groupname entries.
+ Ultimately we need to expand them to the list of users to support
+ per-role homedir labeling when using the %groupname syntax.
+- updated to 2.0.26
+ * Fix bug in genhomedircon fcontext matches logic from Dan Walsh.
+ Strip any trailing slash before appending /*$.
+
+-------------------------------------------------------------------
Old:
----
libsemanage-2.0.25-rhat.patch
libsemanage-2.0.25.tar.bz2
New:
----
libsemanage-2.0.27-rhat.patch
libsemanage-2.0.27.tar.bz2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ libsemanage.spec ++++++
--- /var/tmp/diff_new_pack.N14046/_old 2008-09-02 12:29:45.000000000 +0200
+++ /var/tmp/diff_new_pack.N14046/_new 2008-09-02 12:29:45.000000000 +0200
@@ -1,10 +1,17 @@
#
-# spec file for package libsemanage (Version 2.0.25)
+# spec file for package libsemanage (Version 2.0.27)
#
# Copyright (c) 2008 SUSE LINUX Products GmbH, Nuernberg, Germany.
-# This file and all modifications and additions to the pristine
-# package are under the same license as the package itself.
#
+# All modifications and additions to the file contributed by third parties
+# remain the property of their copyright owners, unless otherwise agreed
+# upon. The license for this file, and modifications and additions to the
+# file, is the same license as for the pristine package itself (unless the
+# license for the pristine package is not an Open Source License, in which
+# case the license is the MIT License). An "Open Source License" is a
+# license that conforms to the Open Source Definition (Version 1.9)
+# published by the Open Source Initiative.
+
# Please submit bugfixes or comments via http://bugs.opensuse.org/
#
@@ -17,8 +24,8 @@
BuildRequires: libsepol-devel >= %{libsepol_ver}
Name: libsemanage
-Version: 2.0.25
-Release: 2
+Version: 2.0.27
+Release: 1
Url: http://www.nsa.gov/selinux/
License: LGPL v2.1 only
Group: System/Libraries
@@ -29,14 +36,14 @@
%define debug_package_requires libsemanage1 = %{version}
%description
-Security-enhanced Linux is a feature of the Linux� kernel and a number
-of utilities with enhanced security functionality designed to add
-mandatory access controls to Linux. The Security-enhanced Linux kernel
-contains new architectural components originally developed to improve
-the security of the Flask operating system. These architectural
+Security-enhanced Linux is a feature of the Linux(R) kernel and a
+number of utilities with enhanced security functionality designed to
+add mandatory access controls to Linux. The Security-enhanced Linux
+kernel contains new architectural components originally developed to
+improve the security of the Flask operating system. These architectural
components provide general support for the enforcement of many kinds of
mandatory access control policies, including those based on the
-concepts of Type Enforcement�, Role-based Access Control, and
+concepts of Type Enforcement(R), Role-based Access Control, and
Multi-level Security.
libsemanage provides an API for the manipulation of SELinux binary
@@ -53,14 +60,14 @@
Summary: SELinux binary policy manipulation library
%description -n libsemanage1
-Security-enhanced Linux is a feature of the Linux� kernel and a number
-of utilities with enhanced security functionality designed to add
-mandatory access controls to Linux. The Security-enhanced Linux kernel
-contains new architectural components originally developed to improve
-the security of the Flask operating system. These architectural
+Security-enhanced Linux is a feature of the Linux(R) kernel and a
+number of utilities with enhanced security functionality designed to
+add mandatory access controls to Linux. The Security-enhanced Linux
+kernel contains new architectural components originally developed to
+improve the security of the Flask operating system. These architectural
components provide general support for the enforcement of many kinds of
mandatory access control policies, including those based on the
-concepts of Type Enforcement�, Role-based Access Control, and
+concepts of Type Enforcement(R), Role-based Access Control, and
Multi-level Security.
libsemanage provides an API for the manipulation of SELinux binary
@@ -78,14 +85,14 @@
Requires: libsemanage1 = %{version}-%{release} libustr-devel
%description devel
-Security-enhanced Linux is a feature of the Linux� kernel and a number
-of utilities with enhanced security functionality designed to add
-mandatory access controls to Linux. The Security-enhanced Linux kernel
-contains new architectural components originally developed to improve
-the security of the Flask operating system. These architectural
+Security-enhanced Linux is a feature of the Linux(R) kernel and a
+number of utilities with enhanced security functionality designed to
+add mandatory access controls to Linux. The Security-enhanced Linux
+kernel contains new architectural components originally developed to
+improve the security of the Flask operating system. These architectural
components provide general support for the enforcement of many kinds of
mandatory access control policies, including those based on the
-concepts of Type Enforcement�, Role-based Access Control, and
+concepts of Type Enforcement(R), Role-based Access Control, and
Multi-level Security.
libsemanage provides an API for the manipulation of SELinux binary
@@ -161,6 +168,14 @@
%{_libdir}/python*/site-packages/*
%changelog
+* Tue Sep 02 2008 prusnak@suse.cz
+- updated to 2.0.27
+ * Modify genhomedircon to skip %%groupname entries.
+ Ultimately we need to expand them to the list of users to support
+ per-role homedir labeling when using the %%groupname syntax.
+- updated to 2.0.26
+ * Fix bug in genhomedircon fcontext matches logic from Dan Walsh.
+ Strip any trailing slash before appending /*$.
* Fri Aug 01 2008 ro@suse.de
- fix requires for debuginfo package
* Tue Jul 15 2008 prusnak@suse.cz
++++++ libsemanage-2.0.25-rhat.patch -> libsemanage-2.0.27-rhat.patch ++++++
--- libsemanage/libsemanage-2.0.25-rhat.patch 2008-01-29 14:36:49.000000000 +0100
+++ /mounts/work_src_done/STABLE/libsemanage/libsemanage-2.0.27-rhat.patch 2008-08-29 20:57:16.000000000 +0200
@@ -1,7 +1,91 @@
-diff --exclude-from=exclude -N -u -r nsalibsemanage/src/genhomedircon.c libsemanage-2.0.15/src/genhomedircon.c
---- nsalibsemanage/src/genhomedircon.c 2008-01-28 16:52:22.000000000 -0500
-+++ libsemanage-2.0.15/src/genhomedircon.c 2008-01-25 10:28:39.000000000 -0500
-@@ -406,7 +406,6 @@
+diff --exclude-from=exclude -N -u -r nsalibsemanage/src/direct_api.c libsemanage-2.0.27/src/direct_api.c
+--- nsalibsemanage/src/direct_api.c 2008-06-12 23:25:16.000000000 -0400
++++ libsemanage-2.0.27/src/direct_api.c 2008-08-26 10:25:38.000000000 -0400
+@@ -489,12 +489,6 @@
+ modified |= ifaces->dtable->is_modified(ifaces->dbase);
+ modified |= nodes->dtable->is_modified(nodes->dbase);
+
+- /* FIXME: get rid of these, once we support loading the existing policy,
+- * instead of rebuilding it */
+- modified |= seusers_modified;
+- modified |= fcontexts_modified;
+- modified |= users_extra_modified;
+-
+ /* If there were policy changes, or explicitly requested, rebuild the policy */
+ if (sh->do_rebuild || modified) {
+
+@@ -667,11 +661,33 @@
+ retval = semanage_verify_kernel(sh);
+ if (retval < 0)
+ goto cleanup;
+- }
++ } else {
++ retval = sepol_policydb_create(&out);
++ if (retval < 0)
++ goto cleanup;
++
++ retval = semanage_read_policydb(sh, out);
++ if (retval < 0)
++ goto cleanup;
++
++ /* dbase_policydb_attach((dbase_policydb_t *) pusers_base->dbase,out);
++ dbase_policydb_attach((dbase_policydb_t *) pports->dbase, out);
++ dbase_policydb_attach((dbase_policydb_t *) pifaces->dbase, out);
++ dbase_policydb_attach((dbase_policydb_t *) pbools->dbase, out);
++ dbase_policydb_attach((dbase_policydb_t *) pnodes->dbase, out);
++ */
++ if (seusers_modified) {
++ retval = pseusers->dtable->clear(sh, pseusers->dbase);
++ if (retval < 0)
++ goto cleanup;
++ }
+
+- /* FIXME: else if !modified, but seusers_modified,
+- * load the existing policy instead of rebuilding */
++ retval = semanage_base_merge_components(sh);
++ if (retval < 0)
++ goto cleanup;
+
++ /* Seusers */
++ }
+ /* ======= Post-process: Validate non-policydb components ===== */
+
+ /* Validate local modifications to file contexts.
+@@ -724,7 +740,8 @@
+ sepol_policydb_free(out);
+ out = NULL;
+
+- if (sh->do_rebuild || modified) {
++ if (sh->do_rebuild || modified ||
++ seusers_modified || fcontexts_modified || users_extra_modified) {
+ retval = semanage_install_sandbox(sh);
+ }
+
+@@ -733,12 +750,14 @@
+ free(mod_filenames[i]);
+ }
+
+- /* Detach from policydb, so it can be freed */
+- dbase_policydb_detach((dbase_policydb_t *) pusers_base->dbase);
+- dbase_policydb_detach((dbase_policydb_t *) pports->dbase);
+- dbase_policydb_detach((dbase_policydb_t *) pifaces->dbase);
+- dbase_policydb_detach((dbase_policydb_t *) pnodes->dbase);
+- dbase_policydb_detach((dbase_policydb_t *) pbools->dbase);
++ if (modified) {
++ /* Detach from policydb, so it can be freed */
++ dbase_policydb_detach((dbase_policydb_t *) pusers_base->dbase);
++ dbase_policydb_detach((dbase_policydb_t *) pports->dbase);
++ dbase_policydb_detach((dbase_policydb_t *) pifaces->dbase);
++ dbase_policydb_detach((dbase_policydb_t *) pnodes->dbase);
++ dbase_policydb_detach((dbase_policydb_t *) pbools->dbase);
++ }
+
+ free(mod_filenames);
+ sepol_policydb_free(out);
+diff --exclude-from=exclude -N -u -r nsalibsemanage/src/genhomedircon.c libsemanage-2.0.27/src/genhomedircon.c
+--- nsalibsemanage/src/genhomedircon.c 2008-08-05 09:57:28.000000000 -0400
++++ libsemanage-2.0.27/src/genhomedircon.c 2008-08-26 10:30:30.000000000 -0400
+@@ -487,7 +487,6 @@
const char *role_prefix)
{
replacement_pair_t repl[] = {
@@ -9,7 +93,7 @@
{.search_for = TEMPLATE_HOME_DIR,.replace_with = home},
{.search_for = TEMPLATE_ROLE,.replace_with = role_prefix},
{NULL, NULL}
-@@ -466,7 +465,6 @@
+@@ -547,7 +546,6 @@
replacement_pair_t repl[] = {
{.search_for = TEMPLATE_USER,.replace_with = user},
{.search_for = TEMPLATE_ROLE,.replace_with = role_prefix},
@@ -17,12 +101,152 @@
{NULL, NULL}
};
Ustr *line = USTR_NULL;
-diff --exclude-from=exclude -N -u -r nsalibsemanage/src/semanage.conf libsemanage-2.0.15/src/semanage.conf
---- nsalibsemanage/src/semanage.conf 2007-07-16 14:20:38.000000000 -0400
-+++ libsemanage-2.0.15/src/semanage.conf 2008-01-25 10:28:39.000000000 -0500
+diff --exclude-from=exclude -N -u -r nsalibsemanage/src/semanage.conf libsemanage-2.0.27/src/semanage.conf
+--- nsalibsemanage/src/semanage.conf 2008-06-12 23:25:16.000000000 -0400
++++ libsemanage-2.0.27/src/semanage.conf 2008-08-14 14:53:32.000000000 -0400
@@ -35,4 +35,4 @@
# given in