Hello community,
here is the log from the commit of package policycoreutils
checked in at Thu Nov 6 00:53:52 CET 2008.
--------
--- policycoreutils/policycoreutils.changes 2008-10-31 15:58:06.000000000 +0100
+++ /mounts/work_src_done/STABLE/policycoreutils/policycoreutils.changes 2008-10-31 15:58:50.000000000 +0100
@@ -6,0 +7,12 @@
+Mon Oct 20 11:48:40 CEST 2008 - prusnak@suse.cz
+
+- updated to 2.0.57
+ * Update po files from Dan Walsh.
+- updated to 2.0.56
+ * fixfiles will now remove all files in /tmp and will check for
+ unlabeled_t in /tmp and /var/tmp from Dan Walsh.
+ * add glob support to restorecond from Dan Walsh.
+ * allow semanage to handle multi-line commands in a single transaction
+ from Dan Walsh.
+
+-------------------------------------------------------------------
calling whatdependson for head-i586
Old:
----
policycoreutils-2.0.55.tar.bz2
New:
----
policycoreutils-2.0.57.tar.bz2
policycoreutils-pam-common.patch
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ policycoreutils.spec ++++++
--- /var/tmp/diff_new_pack.C14814/_old 2008-11-06 00:53:19.000000000 +0100
+++ /var/tmp/diff_new_pack.C14814/_new 2008-11-06 00:53:19.000000000 +0100
@@ -1,5 +1,5 @@
#
-# spec file for package policycoreutils (Version 2.0.55)
+# spec file for package policycoreutils (Version 2.0.57)
#
# Copyright (c) 2008 SUSE LINUX Products GmbH, Nuernberg, Germany.
#
@@ -19,13 +19,13 @@
%define libaudit_ver 1.4.2
%define libsepol_ver 2.0.19
-%define libsemanage_ver 2.0.5
+%define libsemanage_ver 2.0.27
%define libselinux_ver 2.0.46
%define sepolgen_ver 1.0.13
Name: policycoreutils
-Version: 2.0.55
-Release: 5
+Version: 2.0.57
+Release: 1
Url: http://www.nsa.gov/selinux/
License: GPL v2 or later
Group: Productivity/Security
@@ -44,6 +44,7 @@
Patch2: policycoreutils-gui.patch.bz2
Patch3: policycoreutils-sepolgen.patch
Patch4: policycoreutils-initscript.patch
+Patch5: policycoreutils-pam-common.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildRequires: gettext libcap-devel pam-devel python-devel update-desktop-files
BuildRequires: libsepol-devel >= %{libsepol_ver}
@@ -107,6 +108,7 @@
%patch2 -p1
%patch3 -p1
%patch4
+%patch5
%build
make LSPP_PRIV=y LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS -fPIE" LDFLAGS="-pie -Wl,-z,relro" all
@@ -134,7 +136,6 @@
ln -sf ../../etc/init.d/restorecond $RPM_BUILD_ROOT%{_sbindir}/rcrestorecond
%suse_update_desktop_file -i system-config-selinux System Security Settings
%suse_update_desktop_file -i selinux-polgengui System Security Settings
-mv $RPM_BUILD_ROOT%{_datadir}/locale/no $RPM_BUILD_ROOT%{_datadir}/locale/nn_NO
mv $RPM_BUILD_ROOT%{_datadir}/locale/sr@latin $RPM_BUILD_ROOT%{_datadir}/locale/sr@Latn
%find_lang %{name}
@@ -225,6 +226,15 @@
%changelog
* Fri Oct 31 2008 prusnak@suse.cz
- use permissions for newrole
+* Mon Oct 20 2008 prusnak@suse.cz
+- updated to 2.0.57
+ * Update po files from Dan Walsh.
+- updated to 2.0.56
+ * fixfiles will now remove all files in /tmp and will check for
+ unlabeled_t in /tmp and /var/tmp from Dan Walsh.
+ * add glob support to restorecond from Dan Walsh.
+ * allow semanage to handle multi-line commands in a single transaction
+ from Dan Walsh.
* Mon Sep 08 2008 prusnak@suse.cz
- fix scriptlets
* Tue Sep 02 2008 prusnak@suse.cz
++++++ policycoreutils-2.0.55.tar.bz2 -> policycoreutils-2.0.57.tar.bz2 ++++++
++++ 313776 lines of diff (skipped)
++++++ policycoreutils-gui.patch.bz2 ++++++
--- /var/tmp/diff_new_pack.C14814/_old 2008-11-06 00:53:22.000000000 +0100
+++ /var/tmp/diff_new_pack.C14814/_new 2008-11-06 00:53:23.000000000 +0100
@@ -1,6 +1,6 @@
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/Makefile policycoreutils-2.0.54/gui/Makefile
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/Makefile policycoreutils-2.0.55/gui/Makefile
--- nsapolicycoreutils/gui/Makefile 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/Makefile 2008-08-11 12:20:26.000000000 -0400
++++ policycoreutils-2.0.55/gui/Makefile 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,37 @@
+# Installation directories.
+PREFIX ?= ${DESTDIR}/usr
@@ -39,9 +39,9 @@
+indent:
+
+relabel:
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/booleansPage.py policycoreutils-2.0.54/gui/booleansPage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/booleansPage.py policycoreutils-2.0.55/gui/booleansPage.py
--- nsapolicycoreutils/gui/booleansPage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/booleansPage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/booleansPage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,237 @@
+#
+# booleansPage.py - GUI for Booleans page in system-config-securitylevel
@@ -280,9 +280,9 @@
+ self.load(self.filter)
+ return True
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/fcontextPage.py policycoreutils-2.0.54/gui/fcontextPage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/fcontextPage.py policycoreutils-2.0.55/gui/fcontextPage.py
--- nsapolicycoreutils/gui/fcontextPage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/fcontextPage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/fcontextPage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,217 @@
+## fcontextPage.py - show selinux mappings
+## Copyright (C) 2006 Red Hat, Inc.
@@ -501,9 +501,9 @@
+ self.store.set_value(iter, SPEC_COL, fspec)
+ self.store.set_value(iter, FTYPE_COL, ftype)
+ self.store.set_value(iter, TYPE_COL, "%s:%s" % (type, mls))
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/html_util.py policycoreutils-2.0.54/gui/html_util.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/html_util.py policycoreutils-2.0.55/gui/html_util.py
--- nsapolicycoreutils/gui/html_util.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/html_util.py 2008-08-11 11:54:46.000000000 -0400
++++ policycoreutils-2.0.55/gui/html_util.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,164 @@
+# Authors: John Dennis
+#
@@ -669,9 +669,9 @@
+ doc += tail
+ return doc
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/lockdown.glade policycoreutils-2.0.54/gui/lockdown.glade
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/lockdown.glade policycoreutils-2.0.55/gui/lockdown.glade
--- nsapolicycoreutils/gui/lockdown.glade 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/lockdown.glade 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/lockdown.glade 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,771 @@
+<?xml version="1.0" standalone="no"?> <!--*- mode: xml -*-->
+<!DOCTYPE glade-interface SYSTEM "http://glade.gnome.org/glade-2.0.dtd">
@@ -1444,9 +1444,9 @@
+</widget>
+
+</glade-interface>
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/lockdown.gladep policycoreutils-2.0.54/gui/lockdown.gladep
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/lockdown.gladep policycoreutils-2.0.55/gui/lockdown.gladep
--- nsapolicycoreutils/gui/lockdown.gladep 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/lockdown.gladep 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/lockdown.gladep 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,7 @@
+<?xml version="1.0" standalone="no"?> <!--*- mode: xml -*-->
+<!DOCTYPE glade-project SYSTEM "http://glade.gnome.org/glade-project-2.0.dtd">
@@ -1455,9 +1455,9 @@
+ <name></name>
+
+</glade-project>
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/lockdown.py policycoreutils-2.0.54/gui/lockdown.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/lockdown.py policycoreutils-2.0.55/gui/lockdown.py
--- nsapolicycoreutils/gui/lockdown.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/lockdown.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/lockdown.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,382 @@
+#!/usr/bin/python
+#
@@ -1841,9 +1841,9 @@
+
+ app = booleanWindow()
+ app.stand_alone()
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/loginsPage.py policycoreutils-2.0.54/gui/loginsPage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/loginsPage.py policycoreutils-2.0.55/gui/loginsPage.py
--- nsapolicycoreutils/gui/loginsPage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/loginsPage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/loginsPage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,185 @@
+## loginsPage.py - show selinux mappings
+## Copyright (C) 2006 Red Hat, Inc.
@@ -2030,9 +2030,9 @@
+ self.store.set_value(iter, 1, seuser)
+ self.store.set_value(iter, 2, seobject.translate(serange))
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/mappingsPage.py policycoreutils-2.0.54/gui/mappingsPage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/mappingsPage.py policycoreutils-2.0.55/gui/mappingsPage.py
--- nsapolicycoreutils/gui/mappingsPage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/mappingsPage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/mappingsPage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,56 @@
+## mappingsPage.py - show selinux mappings
+## Copyright (C) 2006 Red Hat, Inc.
@@ -2090,9 +2090,9 @@
+ for k in keys:
+ print "%-25s %-25s %-25s" % (k, dict[k][0], translate(dict[k][1]))
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/modulesPage.py policycoreutils-2.0.54/gui/modulesPage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/modulesPage.py policycoreutils-2.0.55/gui/modulesPage.py
--- nsapolicycoreutils/gui/modulesPage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/modulesPage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/modulesPage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,195 @@
+## modulesPage.py - show selinux mappings
+## Copyright (C) 2006 Red Hat, Inc.
@@ -2289,9 +2289,9 @@
+
+
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/polgen.glade policycoreutils-2.0.54/gui/polgen.glade
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/polgen.glade policycoreutils-2.0.55/gui/polgen.glade
--- nsapolicycoreutils/gui/polgen.glade 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/polgen.glade 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/polgen.glade 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,3284 @@
+<?xml version="1.0" standalone="no"?> <!--*- mode: xml -*-->
+<!DOCTYPE glade-interface SYSTEM "http://glade.gnome.org/glade-2.0.dtd">
@@ -5577,9 +5577,9 @@
+</widget>
+
+</glade-interface>
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/polgen.py policycoreutils-2.0.54/gui/polgen.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/polgen.py policycoreutils-2.0.55/gui/polgen.py
--- nsapolicycoreutils/gui/polgen.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/polgen.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/polgen.py 2008-09-09 13:21:29.000000000 -0400
@@ -0,0 +1,925 @@
+#!/usr/bin/python
+#
@@ -5743,7 +5743,7 @@
+ temp.append(p)
+ return temp
+ except ValueError:
-+ raise ValueError(_("Ports must be be numbers or ranges of numbers from 1 to %d " % max_port ))
++ raise ValueError(_("Ports must be numbers or ranges of numbers from 1 to %d " % max_port ))
+
+class policy:
+
@@ -5895,7 +5895,7 @@
+
+ def set_use_tmp(self, val):
+ if self.type not in APPLICATIONS:
-+ raise ValueError(_("USER Types autoomatically get a tmp type"))
++ raise ValueError(_("USER Types automatically get a tmp type"))
+
+ if val:
+ self.DEFAULT_DIRS["tmp"][1].append("/tmp");
@@ -6506,9 +6506,9 @@
+ sys.exit(0)
+
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/polgengui.py policycoreutils-2.0.54/gui/polgengui.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/polgengui.py policycoreutils-2.0.55/gui/polgengui.py
--- nsapolicycoreutils/gui/polgengui.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/polgengui.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/polgengui.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,623 @@
+#!/usr/bin/python -E
+#
@@ -7133,9 +7133,9 @@
+
+ app = childWindow()
+ app.stand_alone()
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/portsPage.py policycoreutils-2.0.54/gui/portsPage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/portsPage.py policycoreutils-2.0.55/gui/portsPage.py
--- nsapolicycoreutils/gui/portsPage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/portsPage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/portsPage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,259 @@
+## portsPage.py - show selinux mappings
+## Copyright (C) 2006 Red Hat, Inc.
@@ -7396,9 +7396,9 @@
+
+ return True
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/selinux.tbl policycoreutils-2.0.54/gui/selinux.tbl
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/selinux.tbl policycoreutils-2.0.55/gui/selinux.tbl
--- nsapolicycoreutils/gui/selinux.tbl 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/selinux.tbl 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/selinux.tbl 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,234 @@
+acct_disable_trans _("SELinux Service Protection") _("Disable SELinux protection for acct daemon")
+allow_daemons_dump_core _("Admin") _("Allow all daemons to write corefiles to /")
@@ -7634,9 +7634,9 @@
+webadm_manage_user_files _("HTTPD Service") _("Allow SELinux webadm user to manage unprivileged users home directories")
+webadm_read_user_files _("HTTPD Service") _("Allow SELinux webadm user to read unprivileged users home directories")
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/semanagePage.py policycoreutils-2.0.54/gui/semanagePage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/semanagePage.py policycoreutils-2.0.55/gui/semanagePage.py
--- nsapolicycoreutils/gui/semanagePage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/semanagePage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/semanagePage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,169 @@
+## semanagePage.py - show selinux mappings
+## Copyright (C) 2006 Red Hat, Inc.
@@ -7807,9 +7807,9 @@
+ self.load(self.filter)
+ return True
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/statusPage.py policycoreutils-2.0.54/gui/statusPage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/statusPage.py policycoreutils-2.0.55/gui/statusPage.py
--- nsapolicycoreutils/gui/statusPage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/statusPage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/statusPage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,191 @@
+# statusPage.py - show selinux status
+## Copyright (C) 2006 Red Hat, Inc.
@@ -8002,9 +8002,9 @@
+ return self.types[self.selinuxTypeOptionMenu.get_active()]
+
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/system-config-selinux.glade policycoreutils-2.0.54/gui/system-config-selinux.glade
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/system-config-selinux.glade policycoreutils-2.0.55/gui/system-config-selinux.glade
--- nsapolicycoreutils/gui/system-config-selinux.glade 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/system-config-selinux.glade 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/system-config-selinux.glade 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,3221 @@
+<?xml version="1.0" standalone="no"?> <!--*- mode: xml -*-->
+<!DOCTYPE glade-interface SYSTEM "http://glade.gnome.org/glade-2.0.dtd">
@@ -11227,9 +11227,9 @@
+</widget>
+
+</glade-interface>
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/system-config-selinux.py policycoreutils-2.0.54/gui/system-config-selinux.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/system-config-selinux.py policycoreutils-2.0.55/gui/system-config-selinux.py
--- nsapolicycoreutils/gui/system-config-selinux.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/system-config-selinux.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/system-config-selinux.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,187 @@
+#!/usr/bin/python
+#
@@ -11418,9 +11418,9 @@
+
+ app = childWindow()
+ app.stand_alone()
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/__init__.py policycoreutils-2.0.54/gui/templates/__init__.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/__init__.py policycoreutils-2.0.55/gui/templates/__init__.py
--- nsapolicycoreutils/gui/templates/__init__.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/__init__.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/__init__.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,18 @@
+#
+# Copyright (C) 2007 Red Hat, Inc.
@@ -11440,9 +11440,9 @@
+# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+#
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/boolean.py policycoreutils-2.0.54/gui/templates/boolean.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/boolean.py policycoreutils-2.0.55/gui/templates/boolean.py
--- nsapolicycoreutils/gui/templates/boolean.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/boolean.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/boolean.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,40 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -11484,9 +11484,9 @@
+')
+"""
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/etc_rw.py policycoreutils-2.0.54/gui/templates/etc_rw.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/etc_rw.py policycoreutils-2.0.55/gui/templates/etc_rw.py
--- nsapolicycoreutils/gui/templates/etc_rw.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/etc_rw.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/etc_rw.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,129 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -11617,9 +11617,9 @@
+fc_dir="""\
+FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_etc_rw_t,s0)
+"""
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/executable.py policycoreutils-2.0.54/gui/templates/executable.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/executable.py policycoreutils-2.0.55/gui/templates/executable.py
--- nsapolicycoreutils/gui/templates/executable.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/executable.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/executable.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,327 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -11948,9 +11948,9 @@
+EXECUTABLE -- gen_context(system_u:object_r:TEMPLATETYPE_script_exec_t,s0)
+"""
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/network.py policycoreutils-2.0.54/gui/templates/network.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/network.py policycoreutils-2.0.55/gui/templates/network.py
--- nsapolicycoreutils/gui/templates/network.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/network.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/network.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,80 @@
+te_port_types="""
+type TEMPLATETYPE_port_t;
@@ -12032,9 +12032,9 @@
+corenet_udp_bind_all_unreserved_ports(TEMPLATETYPE_t)
+"""
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/rw.py policycoreutils-2.0.54/gui/templates/rw.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/rw.py policycoreutils-2.0.55/gui/templates/rw.py
--- nsapolicycoreutils/gui/templates/rw.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/rw.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/rw.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,128 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -12164,9 +12164,9 @@
+fc_dir="""
+FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_rw_t,s0)
+"""
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/script.py policycoreutils-2.0.54/gui/templates/script.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/script.py policycoreutils-2.0.55/gui/templates/script.py
--- nsapolicycoreutils/gui/templates/script.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/script.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/script.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,105 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -12273,9 +12273,9 @@
+# Adding roles to SELinux user USER
+/usr/sbin/semanage user -m -R +TEMPLATETYPE_r USER
+"""
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/semodule.py policycoreutils-2.0.54/gui/templates/semodule.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/semodule.py policycoreutils-2.0.55/gui/templates/semodule.py
--- nsapolicycoreutils/gui/templates/semodule.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/semodule.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/semodule.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,41 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -12318,9 +12318,9 @@
+semanage ports -a -t TEMPLATETYPE_port_t -p udp PORTNUM
+"""
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/tmp.py policycoreutils-2.0.54/gui/templates/tmp.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/tmp.py policycoreutils-2.0.55/gui/templates/tmp.py
--- nsapolicycoreutils/gui/templates/tmp.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/tmp.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/tmp.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,97 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -12419,9 +12419,9 @@
+ TEMPLATETYPE_manage_tmp($1)
+"""
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/user.py policycoreutils-2.0.54/gui/templates/user.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/user.py policycoreutils-2.0.55/gui/templates/user.py
--- nsapolicycoreutils/gui/templates/user.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/user.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/user.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,182 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -12605,9 +12605,9 @@
+te_newrole_rules="""
+seutil_run_newrole(TEMPLATETYPE_t,TEMPLATETYPE_r,{ TEMPLATETYPE_devpts_t TEMPLATETYPE_tty_device_t })
+"""
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/var_lib.py policycoreutils-2.0.54/gui/templates/var_lib.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/var_lib.py policycoreutils-2.0.55/gui/templates/var_lib.py
--- nsapolicycoreutils/gui/templates/var_lib.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/var_lib.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/var_lib.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,158 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -12767,9 +12767,9 @@
+fc_dir="""\
+FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_var_lib_t,s0)
+"""
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/var_log.py policycoreutils-2.0.54/gui/templates/var_log.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/var_log.py policycoreutils-2.0.55/gui/templates/var_log.py
--- nsapolicycoreutils/gui/templates/var_log.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/var_log.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/var_log.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,110 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -12881,9 +12881,9 @@
+fc_dir="""\
+FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_log_t,s0)
+"""
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/var_run.py policycoreutils-2.0.54/gui/templates/var_run.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/var_run.py policycoreutils-2.0.55/gui/templates/var_run.py
--- nsapolicycoreutils/gui/templates/var_run.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/var_run.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/var_run.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,118 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -13003,9 +13003,9 @@
+FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_var_run_t,s0)
+"""
+
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/var_spool.py policycoreutils-2.0.54/gui/templates/var_spool.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/var_spool.py policycoreutils-2.0.55/gui/templates/var_spool.py
--- nsapolicycoreutils/gui/templates/var_spool.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/templates/var_spool.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/templates/var_spool.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,129 @@
+# Copyright (C) 2007 Red Hat
+# see file 'COPYING' for use and warranty information
@@ -13136,9 +13136,9 @@
+fc_dir="""\
+FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_spool_t,s0)
+"""
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/translationsPage.py policycoreutils-2.0.54/gui/translationsPage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/translationsPage.py policycoreutils-2.0.55/gui/translationsPage.py
--- nsapolicycoreutils/gui/translationsPage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/translationsPage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/translationsPage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,118 @@
+## translationsPage.py - show selinux translations
+## Copyright (C) 2006 Red Hat, Inc.
@@ -13258,9 +13258,9 @@
+ store, iter = self.view.get_selection().get_selected()
+ self.store.set_value(iter, 0, level)
+ self.store.set_value(iter, 1, translation)
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/usersPage.py policycoreutils-2.0.54/gui/usersPage.py
+diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/usersPage.py policycoreutils-2.0.55/gui/usersPage.py
--- nsapolicycoreutils/gui/usersPage.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.54/gui/usersPage.py 2008-08-06 18:05:28.000000000 -0400
++++ policycoreutils-2.0.55/gui/usersPage.py 2008-08-29 14:34:59.000000000 -0400
@@ -0,0 +1,150 @@
+## usersPage.py - show selinux mappings
+## Copyright (C) 2006,2007,2008 Red Hat, Inc.
++++++ policycoreutils-initscript.patch ++++++
--- /var/tmp/diff_new_pack.C14814/_old 2008-11-06 00:53:23.000000000 +0100
+++ /var/tmp/diff_new_pack.C14814/_new 2008-11-06 00:53:23.000000000 +0100
@@ -1,21 +1,21 @@
--- restorecond/restorecond.init
+++ restorecond/restorecond.init
-@@ -1,11 +1,20 @@
+@@ -1,14 +1,23 @@
#!/bin/sh
#
-# restorecond: Daemon used to maintain path file context
-+# /etc/init.d/restoreconf
++# /etc/init.d/restorecond
#
-# chkconfig: - 12 87
-# description: restorecond uses inotify to look for creation of new files \
-# listed in the /etc/selinux/restorecond.conf file, and restores the \
-# correct security context.
+### BEGIN INIT INFO
-+# Provides: restoreconf
++# Provides: restorecond
+# Required-Start: $remote_fs
-+# Should-Start:
++# Should-Start:
+# Required-Stop: $remote_fs
-+# Should-Stop:
++# Should-Stop:
+# Default-Start: 3 5
+# Default-Stop: 0 1 2 6
+# Short-Description: Daemon used to maintain path file context
@@ -25,4 +25,139 @@
+### END INIT INFO
#
# processname: /usr/sbin/restorecond
- # config: /etc/selinux/restorecond.conf
+-# config: /etc/selinux/restorecond.conf
++# config: /etc/selinux/restorecond.conf
+ # pidfile: /var/run/restorecond.pid
+ #
+ # Return values according to LSB for all commands but status:
+@@ -22,42 +31,61 @@
+ # 7 - program is not running
+
+ PATH=/sbin:/bin:/usr/bin:/usr/sbin
++PROG_BIN=/usr/sbin/restorecond
++LOCK_FILE=/var/lock/subsys/restorecond
++PROG_CONF=/etc/selinux/restorecond.conf
+
+ # Source function library.
+-. /etc/rc.d/init.d/functions
++. /etc/rc.status
+
+-[ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled || exit 0
++# Check whether SELinux is enabled
++if [ ! -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled ; then
++ echo $"SELinux should be enabled to run this daemon"
++ rc_failed 1
++ rc_status -v
++ rc_exit
++fi
+
+ # Check that we are root ... so non-root users stop here
+-test $EUID = 0 || exit 4
++if [ $EUID -ne 0 ] ; then
++ echo $"Access denied. Only root can run this daemon"
++ rc_failed 4
++ rc_status -v
++ rc_exit
++fi
++
++# Check whether program binary exists
++if [ ! -x $PROG_BIN ] ; then
++ echo $"$PROG_BIN does not exist or has no executable permission"
++ rc_failed 5
++ rc_status -v
++ rc_exit
++fi
++
++# Check whether the required conf file exists
++if [ ! -f $PROG_CONF ] ; then
++ echo $"$PROG_CONF not found"
++ rc_failed 6
++ rc_status -v
++ rc_exit
++fi
+
+-test -x /usr/sbin/restorecond || exit 5
+-test -f /etc/selinux/restorecond.conf || exit 6
+-
+-RETVAL=0
+-
+-start()
++start()
+ {
+- echo -n $"Starting restorecond: "
+- unset HOME MAIL USER USERNAME
+- daemon /usr/sbin/restorecond
+- RETVAL=$?
+- touch /var/lock/subsys/restorecond
+- echo
+- return $RETVAL
++ echo -n $"Starting restorecond: "
++ unset HOME MAIL USER USERNAME
++ startproc -p $LOCK_FILE $PROG_BIN
++ rc_status -v
+ }
+
+-stop()
++stop()
+ {
+- echo -n $"Shutting down restorecond: "
+- killproc restorecond
+- RETVAL=$?
+- rm -f /var/lock/subsys/restorecond
+- echo
+- return $RETVAL
++ echo -n $"Shutting down restorecond: "
++ killproc -p $LOCK_FILE -TERM $PROG_BIN
++ rc_status -v
+ }
+
+-restart()
++restart()
+ {
+ stop
+ start
+@@ -65,26 +93,27 @@
+
+ # See how we were called.
+ case "$1" in
+- start)
+- start
++ start)
++ start
++ ;;
++ stop)
++ stop
+ ;;
+- stop)
+- stop
++ status)
++ echo -n $"Checking for restorecond: "
++ checkproc -p $LOCK_FILE $PROG_BIN
++ rc_status -v
++ ;;
++ restart|reload)
++ restart
++ ;;
++ condrestart)
++ [ -e $LOCK_FILE ] && restart || :
+ ;;
+- status)
+- status restorecond
+- RETVAL=$?
+- ;;
+- restart|reload)
+- restart
+- ;;
+- condrestart)
+- [ -e /var/lock/subsys/restorecond ] && restart || :
+- ;;
+ *)
+ echo $"Usage: $0 {start|stop|restart|reload|condrestart}"
+- RETVAL=3
++ rc_failed 3
++ rc_status -v
+ esac
+
+-exit $RETVAL
+-
++rc_exit
++++++ policycoreutils-pam-common.patch ++++++
--- newrole/newrole-lspp.pamd
+++ newrole/newrole-lspp.pamd
@@ -1,5 +1,5 @@
#%PAM-1.0
-auth include system-auth
-account include system-auth
-password include system-auth
+auth include common-auth
+account include common-account
+password include common-password
session required pam_namespace.so unmnt_remnt no_unmount_on_close
--- newrole/newrole.pamd
+++ newrole/newrole.pamd
@@ -1,6 +1,6 @@
#%PAM-1.0
-auth include system-auth
-account include system-auth
-password include system-auth
-session include system-auth
+auth include common-auth
+account include common-account
+password include common-password
+session include common-session
session optional pam_xauth.so
--- run_init/run_init.pamd
+++ run_init/run_init.pamd
@@ -1,6 +1,6 @@
#%PAM-1.0
-auth include system-auth
-account include system-auth
-password include system-auth
-session include system-auth
+auth include common-auth
+account include common-account
+password include common-password
+session include common-session
session optional pam_xauth.so
++++++ policycoreutils-po.patch.bz2 ++++++
++++ 335627 lines (skipped)
++++ between policycoreutils/policycoreutils-po.patch.bz2
++++ and /mounts/work_src_done/STABLE/policycoreutils/policycoreutils-po.patch.bz2
++++++ policycoreutils-rhat.patch ++++++
++++ 1830 lines (skipped)
++++ between policycoreutils/policycoreutils-rhat.patch
++++ and /mounts/work_src_done/STABLE/policycoreutils/policycoreutils-rhat.patch
++++++ policycoreutils-sepolgen.patch ++++++
--- /var/tmp/diff_new_pack.C14814/_old 2008-11-06 00:53:25.000000000 +0100
+++ /var/tmp/diff_new_pack.C14814/_new 2008-11-06 00:53:25.000000000 +0100
@@ -1,6 +1,39 @@
-diff --exclude-from=exclude -N -u -r nsasepolgen/src/sepolgen/refparser.py policycoreutils-2.0.52/sepolgen-1.0.13/src/sepolgen/refparser.py
---- nsasepolgen/src/sepolgen/refparser.py 2008-06-13 23:25:26.000000000 -0400
-+++ policycoreutils-2.0.52/sepolgen-1.0.13/src/sepolgen/refparser.py 2008-07-29 09:06:29.000000000 -0400
+diff --exclude-from=exclude -N -u -r nsasepolgen/src/sepolgen/policygen.py policycoreutils-2.0.55/sepolgen-1.0.13/src/sepolgen/policygen.py
+--- nsasepolgen/src/sepolgen/policygen.py 2008-08-28 09:34:24.000000000 -0400
++++ policycoreutils-2.0.55/sepolgen-1.0.13/src/sepolgen/policygen.py 2008-09-11 09:26:52.000000000 -0400
+@@ -134,6 +134,10 @@
+ m.refpolicy = False
+
+ def get_module(self):
++ # Generate the requires
++ if self.gen_requires:
++ gen_requires(self.module)
++
+ """Return the generated module"""
+ return self.module
+
+@@ -163,18 +167,10 @@
+ # Generate the raw allow rules from the filtered list
+ self.__add_allow_rules(raw_allow)
+
+- # Generate the requires
+- if self.gen_requires:
+- gen_requires(self.module)
+-
+ def add_role_types(self, role_type_set):
+ for role_type in role_type_set:
+ self.module.children.append(role_type)
+
+- # Generate the requires
+- if self.gen_requires:
+- gen_requires(self.module)
+-
+ def explain_access(av, ml=None, verbosity=SHORT_EXPLANATION):
+ """Explain why a policy statement was generated.
+
+diff --exclude-from=exclude -N -u -r nsasepolgen/src/sepolgen/refparser.py policycoreutils-2.0.55/sepolgen-1.0.13/src/sepolgen/refparser.py
+--- nsasepolgen/src/sepolgen/refparser.py 2008-08-28 09:34:24.000000000 -0400
++++ policycoreutils-2.0.55/sepolgen-1.0.13/src/sepolgen/refparser.py 2008-08-29 14:34:59.000000000 -0400
@@ -919,7 +919,7 @@
def list_headers(root):
modules = []
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Remember to have fun...
--
To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-commit+help@opensuse.org