Hello community,
here is the log from the commit of package policycoreutils for openSUSE:Factory checked in at 2012-02-16 15:00:36
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/policycoreutils (Old)
and /work/SRC/openSUSE:Factory/.policycoreutils.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "policycoreutils", Maintainer is "VCizek@suse.com"
Changes:
--------
--- /work/SRC/openSUSE:Factory/policycoreutils/policycoreutils.changes 2011-09-23 12:41:29.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.policycoreutils.new/policycoreutils.changes 2012-02-16 15:02:00.000000000 +0100
@@ -1,0 +2,27 @@
+Tue Feb 14 09:57:15 UTC 2012 - mvyskocil@suse.cz
+
+- fix seceral rpmlint errors and warnings
+ * use /var/adm/fillup-template for sandbox
+ * don't use /var/lock/subsys in any of init script
+ * use set_permissions macro and add correct Requires(pre)
+ * fix the languages to new -lang package
+ * fix policycoreutils-sandbox Group
+ * remove runlevel 4 from inint scripts
+
+-------------------------------------------------------------------
+Mon Feb 13 10:53:53 UTC 2012 - coolo@suse.com
+
+- patch license to follow spdx.org standard
+
+-------------------------------------------------------------------
+Mon Mar 14 15:16:51 UTC 2011 - prusnak@opensuse.org
+
+- updated to 2.0.85
+ * changes too numerous to list
+
+-------------------------------------------------------------------
+Fri Feb 4 00:09:42 UTC 2011 - toddrme2178@gmail.com
+
+- fix a typo in the package group
+
+-------------------------------------------------------------------
Old:
----
policycoreutils-2.0.79.tar.bz2
policycoreutils-gnusource.patch
sandbox.init
sepolgen-1.0.19.tar.bz2
New:
----
policycoreutils-2.0.85.tar.bz2
sepolgen-1.0.23.tar.bz2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ policycoreutils.spec ++++++
--- /var/tmp/diff_new_pack.kkWmZl/_old 2012-02-16 15:02:01.000000000 +0100
+++ /var/tmp/diff_new_pack.kkWmZl/_new 2012-02-16 15:02:01.000000000 +0100
@@ -1,7 +1,7 @@
#
-# spec file for package policycoreutils (Version 2.0.79)
+# spec file for package policycoreutils
#
-# Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2012 SUSE LINUX Products GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -15,21 +15,20 @@
# Please submit bugfixes or comments via http://bugs.opensuse.org/
#
-# norootforbuild
%define libaudit_ver 1.4.2
%define libsepol_ver 2.0.41
%define libsemanage_ver 2.0.43
%define libselinux_ver 2.0.90
-%define sepolgen_ver 1.0.19
+%define sepolgen_ver 1.0.23
Name: policycoreutils
-Version: 2.0.79
-Release: 4
+Version: 2.0.85
+Release: 0
Url: http://www.nsa.gov/selinux/
-License: GPLv2+
-Group: Productivity/Security
Summary: SELinux policy core utilities
+License: GPL-2.0+
+Group: Productivity/Security
Source: %{name}-%{version}.tar.bz2
Source1: sepolgen-%{sepolgen_ver}.tar.bz2
Source2: system-config-selinux.png
@@ -39,7 +38,6 @@
Source6: selinux-polgengui.desktop
Source7: selinux-polgengui.console
Source8: policycoreutils_man_ru2.tar.bz2
-Source9: sandbox.init
Patch0: policycoreutils-rhat.patch.bz2
Patch1: policycoreutils-po.patch.bz2
Patch2: policycoreutils-gui.patch.bz2
@@ -47,17 +45,28 @@
Patch4: policycoreutils-initscript.patch
Patch5: policycoreutils-pam-common.patch
Patch6: policycoreutils-setup_py-prefix.patch
-Patch7: policycoreutils-gnusource.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
-BuildRequires: gettext libcap-devel pam-devel python-devel update-desktop-files
-BuildRequires: libsepol-devel-static >= %{libsepol_ver}
-BuildRequires: libsemanage-devel >= %{libsemanage_ver}
-BuildRequires: libselinux-devel >= %{libselinux_ver}
BuildRequires: audit-devel >= %{libaudit_ver}
-BuildRequires: libcap-ng-devel
BuildRequires: dbus-1-glib-devel
-PreReq: %insserv_prereq %fillup_prereq permissions
-Requires: util-linux gawk rpm checkpolicy python-selinux audit-libs-python
+BuildRequires: fdupes
+BuildRequires: gettext
+BuildRequires: libcap-devel
+BuildRequires: libcap-ng-devel
+BuildRequires: libcgroup-devel
+BuildRequires: libselinux-devel >= %{libselinux_ver}
+BuildRequires: libsemanage-devel >= %{libsemanage_ver}
+BuildRequires: libsepol-devel-static >= %{libsepol_ver}
+BuildRequires: pam-devel
+BuildRequires: python-devel
+BuildRequires: update-desktop-files
+Requires(pre): %insserv_prereq %fillup_prereq permissions
+Requires: util-linux
+Requires: gawk
+Requires: rpm
+Requires: checkpolicy
+Requires: python-selinux
+Requires: audit-libs-python
+Recommends: %{name}-lang
%description
Security-enhanced Linux is a feature of the Linux(R) kernel and a number
@@ -76,19 +85,20 @@
to switch roles, and run_init to run /etc/init.d scripts in the proper
context.
+%lang_package
+
%prep
%setup -q -a 1
-%patch0 -p1
+%patch0 -p2
%patch1 -p1
%patch2 -p1
%patch3 -p1
%patch4
%patch5
%patch6
-%patch7
-sleep 1
-touch po/policycoreutils.pot
-sleep 1
+# sleep 5
+# touch po/policycoreutils.pot
+# sleep 5
%build
export SUSE_ASNEEDED=0
@@ -96,6 +106,7 @@
make -C sepolgen-%{sepolgen_ver} LSPP_PRIV=y LIBDIR="%{_libdir}" CFLAGS="%{optflags} -fPIE" LDFLAGS="-pie -Wl,-z,relro" all
%install
+mkdir -p {buildroot}%{_initddir}
mkdir -p %{buildroot}/var/lib/selinux
mkdir -p %{buildroot}%{_bindir}
mkdir -p %{buildroot}%{_sbindir}
@@ -104,7 +115,6 @@
mkdir -p %{buildroot}%{_mandir}/man8
mkdir -p %{buildroot}%{_sysconfdir}/pam.d
mkdir -p %{buildroot}%{_sysconfdir}/security/console.apps
-install -D -m 0755 %{SOURCE9} %{buildroot}/%{_initddir}/sandbox
make LSPP_PRIV=y DESTDIR="%{buildroot}" LIBDIR="%{buildroot}%{_libdir}" INITDIR="%{buildroot}%{_initddir}" install
make -C sepolgen-%{sepolgen_ver} DESTDIR="%{buildroot}" LIBDIR="%{buildroot}%{_libdir}" install
install -D -m 644 %{SOURCE2} %{buildroot}%{_datadir}/pixmaps/system-config-selinux.png
@@ -118,12 +128,15 @@
ln -sf consolehelper %{buildroot}%{_bindir}/selinux-polgengui
ln -sf %{_initddir}/restorecond %{buildroot}%{_sbindir}/rcrestorecond
ln -sf %{_initddir}/sandbox %{buildroot}%{_sbindir}/rcsandbox
+mkdir -p %{buildroot}/var/adm/fillup-templates/
+mv %{buildroot}/%{_sysconfdir}/sysconfig/sandbox %{buildroot}/var/adm/fillup-templates/sysconfig.sandbox
+rmdir %{buildroot}/%{_sysconfdir}/sysconfig
%suse_update_desktop_file -i system-config-selinux System Security Settings
%suse_update_desktop_file -i selinux-polgengui System Security Settings
%find_lang %{name}
+%fdupes -s %{buildroot}/%{_datadir}
%package python
-License: GPLv2+
Summary: SELinux policy core python utilities
Group: Productivity/Security
Requires: policycoreutils = %{version}
@@ -143,6 +156,7 @@
%{_bindir}/chcat
%{_bindir}/sandbox
%{_bindir}/sepolgen-ifgen
+%{_bindir}/sepolgen-ifgen-attr-helper
%{python_sitearch}/seobject.py*
%{python_sitearch}/sepolgen
%{python_sitearch}/%{name}
@@ -160,15 +174,14 @@
%{_mandir}/ru/man8/semanage.8*
%post python
-[ -f %{_datadir}/selinux/devel/include/build.conf ] && %{_bindir}/sepolgen-ifgen > /dev/null
+selinuxenabled && [ -f %{_datadir}/selinux/devel/include/build.conf ] && %{_bindir}/sepolgen-ifgen 2>/dev/null
exit 0
%package sandbox
-License: GPLv2+
Summary: SELinux sandbox utilities
-Group: System Environment/Base
+Group: Productivity/Security
Requires: policycoreutils-python = %{version}
-# Requires: xorg-x11-server-Xephyr
+Requires: xorg-x11-server-extra
# Requires: matchbox-window-manager
%description sandbox
@@ -181,6 +194,10 @@
%attr(0755,root,root) %{_sbindir}/seunshare
%dir %{_datadir}/sandbox
%{_datadir}/sandbox/sandboxX.sh
+%{_datadir}/sandbox/start
+/var/adm/fillup-templates/sysconfig.sandbox
+%doc %{_mandir}/man5/sandbox.conf.5.gz
+%doc %{_mandir}/man8/seunshare.8.gz
%post sandbox
%fillup_and_insserv sandbox
@@ -198,10 +215,10 @@
fi
%package newrole
-License: GPLv2+
Summary: The newrole application for RBAC/MLS
-Group: Producitvity/Security
+Group: Productivity/Security
Requires: policycoreutils = %{version}
+Requires(pre): permissions
%description newrole
RBAC/MLS policy machines require newrole as a way of changing the role
@@ -211,17 +228,17 @@
%defattr(-,root,root)
%verify(not mode) %attr(0755,root,root) %{_bindir}/newrole
%{_mandir}/man1/newrole.1.gz
+%config(noreplace) %{_sysconfdir}/pam.d/newrole
%post newrole
-%run_permissions
+%set_permissions %{_bindir}/newrole
%verifyscript
%verify_permissions -e %{_bindir}/newrole
%package gui
-License: GPLv2+
Summary: SELinux configuration GUI
-Group: Producitvity/Security
+Group: Productivity/Security
Requires: policycoreutils-python = %{version}
Requires: python-gnome
Requires: python-gtk
@@ -239,6 +256,9 @@
%{_bindir}/system-config-selinux
%{_bindir}/selinux-polgengui
%{_bindir}/sepolgen
+%{_datadir}/applications/selinux-polgengui.desktop
+%{_datadir}/applications/system-config-selinux.desktop
+%{_datadir}/pixmaps/system-config-selinux.png
%dir %{_datadir}/system-config-selinux
%dir %{_datadir}/system-config-selinux/templates
%{_datadir}/system-config-selinux/*.py*
@@ -248,16 +268,13 @@
%config(noreplace) %{_sysconfdir}/pam.d/system-config-selinux
%config(noreplace) %{_sysconfdir}/pam.d/selinux-polgengui
%dir %{_sysconfdir}/security/console.apps
-%config(noreplace) %{_sysconfdir}/security/console.apps/system-config-selinux
%config(noreplace) %{_sysconfdir}/security/console.apps/selinux-polgengui
-%{_datadir}/applications/selinux-polgengui.desktop
-%{_datadir}/applications/system-config-selinux.desktop
-%{_datadir}/pixmaps/system-config-selinux.png
+%config(noreplace) %{_sysconfdir}/security/console.apps/system-config-selinux
%clean
rm -rf %{buildroot}
-%files -f %{name}.lang
+%files
%defattr(-,root,root)
/sbin/restorecon
/sbin/fixfiles
@@ -276,7 +293,6 @@
%{_bindir}/semodule_expand
%{_bindir}/semodule_link
%{_bindir}/semodule_package
-%config(noreplace) %{_sysconfdir}/pam.d/newrole
%config(noreplace) %{_sysconfdir}/pam.d/run_init
%config(noreplace) %{_sysconfdir}/sestatus.conf
%attr(755,root,root) %{_initddir}/restorecond
@@ -319,6 +335,9 @@
%{_mandir}/ru/man8/setsebool.8*
%{_mandir}/man1/secon.1*
%{_mandir}/ru/man1/secon.1*
+%{_mandir}/man8/genhomedircon.8*
+
+%files lang -f %{name}.lang
%post
%fillup_and_insserv restorecond
++++++ policycoreutils-2.0.79.tar.bz2 -> policycoreutils-2.0.85.tar.bz2 ++++++
++++ 7800 lines of diff (skipped)
++++++ policycoreutils-gui.patch.bz2 ++++++
++++ 6489 lines (skipped)
++++ between /work/SRC/openSUSE:Factory/policycoreutils/policycoreutils-gui.patch.bz2
++++ and /work/SRC/openSUSE:Factory/.policycoreutils.new/policycoreutils-gui.patch.bz2
++++++ policycoreutils-initscript.patch ++++++
--- /var/tmp/diff_new_pack.kkWmZl/_old 2012-02-16 15:02:02.000000000 +0100
+++ /var/tmp/diff_new_pack.kkWmZl/_new 2012-02-16 15:02:02.000000000 +0100
@@ -1,7 +1,7 @@
Index: restorecond/restorecond.init
===================================================================
---- restorecond/restorecond.init.orig
-+++ restorecond/restorecond.init
+--- restorecond/restorecond.init.orig 2012-02-14 10:27:52.948296762 +0100
++++ restorecond/restorecond.init 2012-02-14 10:42:18.458874663 +0100
@@ -1,14 +1,23 @@
#!/bin/sh
#
@@ -18,8 +18,8 @@
+# Should-Start:
+# Required-Stop: $remote_fs
+# Should-Stop:
-+# Default-Start: 3 5
-+# Default-Stop: 0 1 2 6
++# Default-Start: 3 4 5
++# Default-Stop: 0 1 2 3 4 6
+# Short-Description: Daemon used to maintain path file context
+# Description: Restorecond uses inotify to look for creation of new files
+# listed in the /etc/selinux/restorecond.conf file, and restores the correct
@@ -37,14 +37,14 @@
PATH=/sbin:/bin:/usr/bin:/usr/sbin
+PROG_BIN=/usr/sbin/restorecond
-+LOCK_FILE=/var/lock/subsys/restorecond
++LOCK_FILE=/var/lock/restorecond
+PROG_CONF=/etc/selinux/restorecond.conf
# Source function library.
-. /etc/rc.d/init.d/functions
+. /etc/rc.status
--[ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled || exit 0
+-[ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled || exit 7
+# Check whether SELinux is enabled
+if [ ! -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled ; then
+ echo $"SELinux should be enabled to run this daemon"
@@ -118,7 +118,7 @@
{
stop
start
-@@ -72,18 +100,20 @@ case "$1" in
+@@ -72,18 +100,20 @@
stop
;;
status)
@@ -136,11 +136,100 @@
+ [ -e $LOCK_FILE ] && restart || :
;;
*)
- echo $"Usage: $0 {start|stop|restart|force-reload|status|condrestart}"
+- echo $"Usage: $0 {start|stop|restart|force-reload|status|condrestart}"
- RETVAL=3
++ echo $"Usage: $0 {start|stop|restart|reload|force-reload|status|condrestart}"
+ rc_failed 3
+ rc_status -v
esac
-exit $RETVAL
+rc_exit
+Index: sandbox/sandbox.init
+===================================================================
+--- sandbox/sandbox.init.orig 2012-02-14 10:27:53.001298574 +0100
++++ sandbox/sandbox.init 2012-02-14 10:38:19.622717182 +0100
+@@ -1,31 +1,32 @@
+ #!/bin/bash
+-## BEGIN INIT INFO
++
++# /etc/init.d/sandbox
++
++### BEGIN INIT INFO
+ # Provides: sandbox
+-# Default-Start: 3 4 5
+-# Default-Stop: 0 1 2 3 4 6
+-# Required-Start:
+-#
+-## END INIT INFO
+-# sandbox: Set up / mountpoint to be shared, /var/tmp, /tmp, /home/sandbox unshared
+-#
+-# chkconfig: 345 1 99
+-#
+-# description: sandbox, xguest and other apps that want to use pam_namespace \
++# Required-Start: $remote_fs
++# Should-Start:
++# Required-Stop: $remote_fs
++# Should-Stop:
++# Default-Start: 3 5
++# Default-Stop: 0 1 2 3 6
++# Short-Description: Script for sandbox and other apps using pam_namespace
++# Description: sandbox, xguest and other apps that want to use pam_namespace \
+ # require this script be run at boot. This service script does \
+ # not actually run any service but sets up: \
+ # /var/tmp, /tmp and home directories to be used by these tools.\
+ # If you do not use sandbox, xguest or pam_namespace you can turn \
+ # this service off.\
+-#
++### END INIT INFO
+
+ # Source function library.
+-. /etc/init.d/functions
++. /etc/rc.status
+
+ HOMEDIRS="/home"
+
+ . /etc/sysconfig/sandbox
+
+-LOCKFILE=/var/lock/subsys/sandbox
++LOCKFILE=/var/lock/sandbox
+
+ base=${0##*/}
+
+@@ -35,7 +36,7 @@
+ [ -f "$LOCKFILE" ] && return 1
+
+ touch $LOCKFILE
+- mount --make-rshared / || return $?
++ mount --make-rshared / || return $?
+ mount --rbind /tmp /tmp || return $?
+ mount --rbind /var/tmp /var/tmp || return $?
+ mount --make-private /tmp || return $?
+@@ -81,9 +82,13 @@
+ status)
+ status
+ ;;
++ reload)
++ # unused
++ exit 3
++ ;;
+
+ *)
+- echo $"Usage: $0 {start|stop|status|restart}"
++ echo $"Usage: $0 {start|stop|status|restart|reload}"
+ exit 3
+ ;;
+ esac
+Index: mcstrans/src/mcstrans.init
+===================================================================
+--- mcstrans/src/mcstrans.init.orig 2010-12-21 22:12:03.000000000 +0100
++++ mcstrans/src/mcstrans.init 2012-02-14 10:33:15.198314694 +0100
+@@ -20,7 +20,7 @@
+
+ PATH=/sbin:/bin:/usr/bin:/usr/sbin
+ prog="mcstransd"
+-lockfile=/var/lock/subsys/$prog
++lockfile=/var/lock/$prog
+
+ # Source function library.
+ . /etc/init.d/functions
++++++ policycoreutils-po.patch.bz2 ++++++
++++ 271857 lines (skipped)
++++ between /work/SRC/openSUSE:Factory/policycoreutils/policycoreutils-po.patch.bz2
++++ and /work/SRC/openSUSE:Factory/.policycoreutils.new/policycoreutils-po.patch.bz2
++++++ policycoreutils-rhat.patch.bz2 ++++++
++++ 5284 lines (skipped)
++++ between /work/SRC/openSUSE:Factory/policycoreutils/policycoreutils-rhat.patch.bz2
++++ and /work/SRC/openSUSE:Factory/.policycoreutils.new/policycoreutils-rhat.patch.bz2
++++++ policycoreutils-sepolgen.patch ++++++
++++ 620 lines (skipped)
++++ between /work/SRC/openSUSE:Factory/policycoreutils/policycoreutils-sepolgen.patch
++++ and /work/SRC/openSUSE:Factory/.policycoreutils.new/policycoreutils-sepolgen.patch
++++++ selinux-polgengui.desktop ++++++
--- /var/tmp/diff_new_pack.kkWmZl/_old 2012-02-16 15:02:03.000000000 +0100
+++ /var/tmp/diff_new_pack.kkWmZl/_new 2012-02-16 15:02:03.000000000 +0100
@@ -1,7 +1,61 @@
[Desktop Entry]
Name=SELinux Policy Generation Tool
+Name[bn_IN]=SELinux Policy নির্মাণের সামগ্রী
+Name[ca]=Eina de generació de polítiques del SELinux
+Name[de]=Tool zur Erstellung von SELinux-Richtlinien
+Name[es]=Generador de Políticas de SELinux
+Name[fi]=SELinux-käytäntöjen generointityökalu
+Name[fr]=Outil de génération de stratégies SELinux
+Name[gu]=SELinux પોલિસી બનાવટ સાધન
+Name[hi]=SELinux पॉलिसी जनन औजार
+Name[it]=Tool di generazione della policy di SELinux
+Name[ja]=SELinux ポリシー生成ツール
+Name[kn]=SELinux ಪಾಲಿಸಿ ಉತ್ಪಾದನಾ ಉಪಕರಣ
+Name[ko]=SELinux 정책 생성 도구
+Name[ml]=SELinux പോളിസി ഉത്പാദന പ്രയോഗം
+Name[mr]=SELinux करार निर्माण साधन
+Name[nl]=SELinux tactiek generatie gereedschap
+Name[or]=SELinux ନୀତି ସୃଷ୍ଟି ଉପକରଣ
+Name[pa]=SELinux ਪਾਲਿਸੀ ਨਿਰਮਾਣ ਜੰਤਰ
+Name[pl]=Narzędzie tworzenia polityki SELinuksa
+Name[pt]=Ferramenta de Geração de Políticas SELinux
+Name[pt_BR]=Ferramenta de criação de políticas do SELinux
+Name[ru]=Средство создания политики SELinux
+Name[sv]=Genereringsverktyg för SELinuxpolicy
+Name[ta]=SELinux பாலிசி உற்பத்தி கருவி
+Name[te]=SELinux నిర్వహణ
+Name[uk]=Утиліта генерації політики SELinux
+Name[zh_CN]=SELinux 策略生成工具
+Name[zh_TW]=SELinux 政策產生工具(SELinux Policy Generation Tool)
GenericName=SELinux
Comment=Generate SELinux policy modules
+Comment[bn_IN]=SELinux নিয়মনীতির মডিউল নির্মাণ করুন
+Comment[ca]=Genera els mòduls de les polítiques de SELinux
+Comment[de]=Tool zur Erstellung von SELinux-Richtlinien
+Comment[es]=Generar módulos de política de SELinux
+Comment[fi]=Generoi SELinuxin käytäntömoduuleja
+Comment[fr]=Génére des modules de stratégie SELinux
+Comment[gu]=SELinux પોલિસી મોડ્યુલોને ઉત્પન્ન કરો
+Comment[hi]=नया पॉलिसी मॉड्यूल उत्पन्न करें
+Comment[it]=Genera moduli della politica di SELinux
+Comment[ja]=新しいポリシーモジュールの作成
+Comment[kn]=SELinux ಪಾಲಿಸಿ ಘಟಕಗಳನ್ನು ಉತ್ಪಾದಿಸು
+Comment[ko]=SELinux 정책 모듈 생성
+Comment[ml]=SELinux യ പോളിസി ഘങ്ങള് തയ്യാറാക്കുക
+Comment[mr]=SELinux करार घटके निर्माण करा
+Comment[nl]=Maak een SELinux tactiek module aan
+Comment[or]=SELinux ନୀତି ଏକକାଂଶ ସୃଷ୍ଟିକରନ୍ତୁ
+Comment[pa]=SELinux ਪਾਲਿਸੀ ਮੈਡਿਊਲ ਬਣਾਓ
+Comment[pl]=Tworzenie nowych modułów polityki SELinuksa
+Comment[pt]=Gerar módulos de políticas SELinux
+Comment[pt_BR]=Gerar módulos de política do SELinux
+Comment[ru]=Генерация модулей политики SELinux
+Comment[sv]=Generera SELinux-policymoduler
+Comment[ta]=SELinux கொள்கை தொகுதியை உருவாக்கவும்
+Comment[te]=SELinux పాలసీ మాడ్యూళ్ళను వుద్భవింపచేయుము
+Comment[uk]=Створення модулів контролю доступу SELinux
+Comment[zh_CN]=生成 SELinux 策略模块
+Comment[zh_TW]=產生 SELinux 政策模組
StartupNotify=true
Icon=system-config-selinux
Exec=selinux-polgengui
++++++ sepolgen-1.0.19.tar.bz2 -> sepolgen-1.0.23.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sepolgen-1.0.19/ChangeLog new/sepolgen-1.0.23/ChangeLog
--- old/sepolgen-1.0.19/ChangeLog 2009-12-01 21:49:11.000000000 +0100
+++ new/sepolgen-1.0.23/ChangeLog 2010-03-24 20:57:19.000000000 +0100
@@ -1,3 +1,17 @@
+1.0.23 2010-03-24
+ * Fix unit tests from Dan Walsh.
+
+1.0.22 2010-03-23
+ * improve parser error recovery from Karl MacMillan.
+
+1.0.21 2010-03-18
+ * Add since-last-boot option to audit2allow from Dan Walsh.
+ * Fix sepolgen output to match what Chris expects for upstream
+ refpolicy from Dan Walsh.
+
+1.0.20 2010-03-12
+ * Add dontaudit flag to audit2allow from Dan Walsh.
+
1.0.19 2009-11-27
* fix sepolgen to read a "type 1403" msg as a policy load by Stephen
Smalley