rpms/policycoreutils/devel .cvsignore, 1.116, 1.117 policycoreutils-rhat.patch, 1.217, 1.218 policycoreutils.spec, 1.299, 1.300 sources, 1.120, 1.121
fedora-cvs-commits at redhat.com
fedora-cvs-commits at redhat.com
Sun Aug 6 00:18:23 UTC 2006
- Previous message (by thread): rpms/audit/devel audit-setroubleshoot.patch, 1.4, 1.5 audit.spec, 1.104, 1.105
- Next message (by thread): rpms/setroubleshoot/devel .cvsignore, 1.12, 1.13 setroubleshoot.init, 1.3, 1.4 setroubleshoot.spec, 1.16, 1.17 sources, 1.14, 1.15
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: dwalsh
Update of /cvs/dist/rpms/policycoreutils/devel
In directory cvs.devel.redhat.com:/tmp/cvs-serv23874
Modified Files:
.cvsignore policycoreutils-rhat.patch policycoreutils.spec
sources
Log Message:
* Thu Aug 3 2006 Dan Walsh <dwalsh at redhat.com> 1.30.25-1
- Update to upstream
* Merged patch from Dan Walsh with:
* audit2allow: process MAC_POLICY_LOAD events
* newrole: run shell with - prefix to start a login shell
* po: po file updates
* restorecond: bail if SELinux not enabled
* fixfiles: omit -q
* genhomedircon: fix exit code if non-root
* semodule_deps: install man page
* Merged secon Makefile fix from Joshua Brindle.
* Merged netfilter contexts support patch from Chris PeBenito.
Index: .cvsignore
===================================================================
RCS file: /cvs/dist/rpms/policycoreutils/devel/.cvsignore,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -r1.116 -r1.117
--- .cvsignore 1 Aug 2006 13:56:38 -0000 1.116
+++ .cvsignore 6 Aug 2006 00:18:19 -0000 1.117
@@ -108,3 +108,4 @@
policycoreutils-1.30.14.tgz
policycoreutils-1.30.17.tgz
policycoreutils-1.30.22.tgz
+policycoreutils-1.30.25.tgz
policycoreutils-rhat.patch:
po/fr.po | 54 ++++++---
po/sv.po | 252 +++++++++++++++++++++++++++----------------
po/ta.po | 34 ++---
restorecond/restorecond.c | 7 +
restorecond/restorecond.init | 2
scripts/fixfiles | 2
scripts/genhomedircon | 2
semodule_deps/Makefile | 1
8 files changed, 225 insertions(+), 129 deletions(-)
Index: policycoreutils-rhat.patch
===================================================================
RCS file: /cvs/dist/rpms/policycoreutils/devel/policycoreutils-rhat.patch,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -r1.217 -r1.218
--- policycoreutils-rhat.patch 2 Aug 2006 20:53:36 -0000 1.217
+++ policycoreutils-rhat.patch 6 Aug 2006 00:18:19 -0000 1.218
@@ -1,60 +1,3 @@
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/audit2allow/audit2allow policycoreutils-1.30.22/audit2allow/audit2allow
---- nsapolicycoreutils/audit2allow/audit2allow 2006-08-01 09:47:23.000000000 -0400
-+++ policycoreutils-1.30.22/audit2allow/audit2allow 2006-08-02 16:50:29.000000000 -0400
-@@ -176,7 +176,7 @@
- sys.exit(0)
-
- if auditlogs and os.path.exists("/var/log/audit/audit.log"):
-- inputfd = os.popen("ausearch -m avc")
-+ inputfd = os.popen("ausearch -m avc,MAC_POLICY_LOAD")
- serules.load(inputfd)
-
- if buildPP:
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/audit2allow/avc.py policycoreutils-1.30.22/audit2allow/avc.py
---- nsapolicycoreutils/audit2allow/avc.py 2006-07-03 07:52:43.000000000 -0400
-+++ policycoreutils-1.30.22/audit2allow/avc.py 2006-08-02 16:50:50.000000000 -0400
-@@ -352,6 +352,9 @@
- if i == "security_compute_sid:":
- self.security_compute_sid(rec)
- found = 1
-+ elif i == "type=MAC_POLICY_LOAD" and self.last_reload:
-+ self.initialize()
-+ break
- else:
- dict.append(i)
- if found:
-diff --exclude-from=exclude -N -u -r nsapolicycoreutils/newrole/newrole.c policycoreutils-1.30.22/newrole/newrole.c
---- nsapolicycoreutils/newrole/newrole.c 2006-07-03 07:52:43.000000000 -0400
-+++ policycoreutils-1.30.22/newrole/newrole.c 2006-08-02 14:22:10.000000000 -0400
-@@ -47,6 +47,7 @@
- *
- *************************************************************************/
-
-+#define _GNU_SOURCE
- #include <stdio.h>
- #include <stdlib.h> /* for malloc(), realloc(), free() */
- #include <pwd.h> /* for getpwuid() */
-@@ -855,7 +856,10 @@
-
- if (optind < 1)
- optind = 1;
-- argv[optind - 1] = pw->pw_shell;
-+ if (asprintf(&argv[optind - 1], "-%s", pw->pw_shell) < 0) {
-+ fprintf(stderr, _("Error allocating shell.\n"));
-+ }
-+
- #ifdef CANTSPELLGDB
- {
- int i;
-@@ -897,7 +901,7 @@
- }
- #endif
- freecon(old_context);
-- execv(argv[optind - 1], argv + optind - 1);
-+ execv(pw->pw_shell, argv + optind - 1);
-
- /* If we reach here, then we failed to exec the new shell. */
- perror(_("failed to exec shell\n"));
diff --exclude-from=exclude -N -u -r nsapolicycoreutils/po/fr.po policycoreutils-1.30.22/po/fr.po
--- nsapolicycoreutils/po/fr.po 2006-08-01 09:47:27.000000000 -0400
+++ policycoreutils-1.30.22/po/fr.po 2006-08-02 14:22:10.000000000 -0400
Index: policycoreutils.spec
===================================================================
RCS file: /cvs/dist/rpms/policycoreutils/devel/policycoreutils.spec,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -r1.299 -r1.300
--- policycoreutils.spec 2 Aug 2006 20:53:36 -0000 1.299
+++ policycoreutils.spec 6 Aug 2006 00:18:20 -0000 1.300
@@ -1,15 +1,14 @@
%define libauditver 1.1.4-3
-%define libsepolver 1.12.21-1
-%define libsemanagever 1.6.11-1
-%define libselinuxver 1.30.19-1
+%define libsepolver 1.12.23-1
+%define libsemanagever 1.6.13-1
+%define libselinuxver 1.30.22-1
Summary: SELinux policy core utilities.
Name: policycoreutils
-Version: 1.30.22
-Release: 3
+Version: 1.30.25
+Release: 1
License: GPL
Group: System Environment/Base
Source: http://www.nsa.gov/selinux/archives/policycoreutils-%{version}.tgz
-Patch: policycoreutils-rhat.patch
BuildRequires: pam-devel libsepol-devel >= %{libsepolver} libsemanage-devel >= %{libsemanagever} libselinux-devel >= %{libselinuxver} libcap-devel audit-libs-devel gettext
Requires: /bin/mount /bin/egrep /bin/awk /usr/bin/diff
@@ -36,7 +35,6 @@
%prep
%setup -q
-%patch -p1 -b .rhat
%build
make LOG_AUDIT_PRIV=y LIBDIR="%{_libdir}" CFLAGS="%{optflags}" all
@@ -119,6 +117,19 @@
[ -x /sbin/service ] && /sbin/service restorecond condrestart
%changelog
+* Thu Aug 3 2006 Dan Walsh <dwalsh at redhat.com> 1.30.25-1
+- Update to upstream
+ * Merged patch from Dan Walsh with:
+ * audit2allow: process MAC_POLICY_LOAD events
+ * newrole: run shell with - prefix to start a login shell
+ * po: po file updates
+ * restorecond: bail if SELinux not enabled
+ * fixfiles: omit -q
+ * genhomedircon: fix exit code if non-root
+ * semodule_deps: install man page
+ * Merged secon Makefile fix from Joshua Brindle.
+ * Merged netfilter contexts support patch from Chris PeBenito.
+
* Wed Aug 2 2006 Dan Walsh <dwalsh at redhat.com> 1.30.22-3
- Fix audit2allow to handle reload of policy
Index: sources
===================================================================
RCS file: /cvs/dist/rpms/policycoreutils/devel/sources,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -r1.120 -r1.121
--- sources 1 Aug 2006 13:56:39 -0000 1.120
+++ sources 6 Aug 2006 00:18:20 -0000 1.121
@@ -1 +1 @@
-6f622e70c1f498c4b24c4f8c07ea3cb9 policycoreutils-1.30.22.tgz
+963bc94e0c1bbe0008e509135ec4fdf5 policycoreutils-1.30.25.tgz
- Previous message (by thread): rpms/audit/devel audit-setroubleshoot.patch, 1.4, 1.5 audit.spec, 1.104, 1.105
- Next message (by thread): rpms/setroubleshoot/devel .cvsignore, 1.12, 1.13 setroubleshoot.init, 1.3, 1.4 setroubleshoot.spec, 1.16, 1.17 sources, 1.14, 1.15
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the fedora-cvs-commits
mailing list