rpms/selinux-policy-strict/devel policy-20050719.patch, 1.2, 1.3 selinux-policy-strict.spec, 1.356, 1.357

fedora-cvs-commits at redhat.com fedora-cvs-commits at redhat.com
Thu Jul 21 17:16:02 UTC 2005


Author: dwalsh

Update of /cvs/dist/rpms/selinux-policy-strict/devel
In directory cvs.devel.redhat.com:/tmp/cvs-serv12906

Modified Files:
	policy-20050719.patch selinux-policy-strict.spec 
Log Message:
* Thu Jul 19 2005 Dan Walsh <dwalsh at redhat.com> 1.25.3-3
- Fix spec file for file_context.homedirs


policy-20050719.patch:
 domains/program/crond.te                 |    3 ++-
 domains/program/fsadm.te                 |    2 +-
 domains/program/getty.te                 |    2 +-
 domains/program/ifconfig.te              |    1 +
 domains/program/initrc.te                |    2 +-
 domains/program/modutil.te               |    2 +-
 domains/program/restorecon.te            |    1 -
 domains/program/unused/NetworkManager.te |    8 ++++++++
 domains/program/unused/apmd.te           |    2 +-
 domains/program/unused/cvs.te            |    9 +++++++++
 domains/program/unused/cyrus.te          |    1 +
 domains/program/unused/evolution.te      |    1 +
 domains/program/unused/hald.te           |    4 ++++
 domains/program/unused/hotplug.te        |    3 ++-
 domains/program/unused/kudzu.te          |    5 +++--
 domains/program/unused/lvm.te            |    2 +-
 domains/program/unused/mta.te            |    4 ++--
 domains/program/unused/mysqld.te         |    1 -
 domains/program/unused/pamconsole.te     |    2 +-
 domains/program/unused/ping.te           |    4 ++++
 domains/program/unused/postgresql.te     |    5 +++--
 domains/program/unused/pppd.te           |   29 ++++++++++++++++++++++++++++-
 domains/program/unused/rlogind.te        |    1 +
 domains/program/unused/samba.te          |    1 +
 domains/program/unused/slocate.te        |    4 +++-
 domains/program/unused/squid.te          |    1 +
 domains/program/unused/thunderbird.te    |    1 +
 domains/program/unused/udev.te           |    5 +++--
 domains/program/unused/vpnc.te           |   15 +++++++++++++--
 domains/program/unused/winbind.te        |    1 +
 domains/program/useradd.te               |    1 +
 file_contexts/distros.fc                 |    6 ++++++
 file_contexts/program/postgresql.fc      |    4 ++++
 file_contexts/program/pppd.fc            |    1 +
 file_contexts/program/vpnc.fc            |    1 +
 file_contexts/types.fc                   |    4 ++--
 genfs_contexts                           |    1 +
 macros/admin_macros.te                   |    1 +
 macros/base_user_macros.te               |   13 -------------
 macros/content_macros.te                 |    5 ++++-
 macros/global_macros.te                  |   19 +++++++++++++++++++
 macros/program/apache_macros.te          |    4 +++-
 macros/program/cdrecord_macros.te        |   17 ++++++-----------
 macros/program/evolution_macros.te       |    7 +++----
 macros/program/gconf_macros.te           |    1 +
 macros/program/gnome_vfs_macros.te       |    6 ++++++
 macros/program/mail_client_macros.te     |   13 +++++++++++--
 macros/program/mozilla_macros.te         |    6 +++++-
 macros/program/thunderbird_macros.te     |   14 ++++++++------
 macros/user_macros.te                    |   18 +++---------------
 net_contexts                             |    1 +
 targeted/domains/program/crond.te        |    9 ++++++---
 tunables/distro.tun                      |    2 +-
 tunables/tunable.tun                     |    7 ++-----
 types/file.te                            |    9 +++++++++
 types/network.te                         |    1 +
 56 files changed, 205 insertions(+), 88 deletions(-)

Index: policy-20050719.patch
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy-strict/devel/policy-20050719.patch,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- policy-20050719.patch	20 Jul 2005 03:37:43 -0000	1.2
+++ policy-20050719.patch	21 Jul 2005 17:15:59 -0000	1.3
@@ -1,7 +1,7 @@
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/crond.te policy-1.25.3/domains/program/crond.te
 --- nsapolicy/domains/program/crond.te	2005-07-06 17:15:06.000000000 -0400
-+++ policy-1.25.3/domains/program/crond.te	2005-07-19 15:41:44.000000000 -0400
-@@ -201,7 +201,7 @@
++++ policy-1.25.3/domains/program/crond.te	2005-07-21 09:07:03.000000000 -0400
+@@ -201,11 +201,12 @@
  r_dir_file(system_crond_t, file_context_t)
  can_getsecurity(system_crond_t)
  }
@@ -10,6 +10,11 @@
  #
  # Required for webalizer
  #
+ ifdef(`apache.te', `
+ allow system_crond_t { httpd_log_t httpd_config_t }:file { getattr read };
++allow system_crond_t httpd_modules_t:lnk_file read;
+ ')
+ dontaudit crond_t self:capability sys_tty_config;
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/fsadm.te policy-1.25.3/domains/program/fsadm.te
 --- nsapolicy/domains/program/fsadm.te	2005-07-06 17:15:06.000000000 -0400
 +++ policy-1.25.3/domains/program/fsadm.te	2005-07-19 15:41:44.000000000 -0400
@@ -69,6 +74,17 @@
  ;
  role system_r types insmod_t;
  role sysadm_r types insmod_t;
+diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/restorecon.te policy-1.25.3/domains/program/restorecon.te
+--- nsapolicy/domains/program/restorecon.te	2005-07-06 17:15:06.000000000 -0400
++++ policy-1.25.3/domains/program/restorecon.te	2005-07-20 20:51:57.000000000 -0400
+@@ -49,7 +49,6 @@
+ allow restorecon_t ptyfile:chr_file getattr;
+ 
+ allow restorecon_t fs_t:filesystem getattr;
+-allow restorecon_t fs_type:dir r_dir_perms;
+ 
+ allow restorecon_t etc_runtime_t:file { getattr read };
+ allow restorecon_t etc_t:file { getattr read };
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/apmd.te policy-1.25.3/domains/program/unused/apmd.te
 --- nsapolicy/domains/program/unused/apmd.te	2005-07-12 08:50:43.000000000 -0400
 +++ policy-1.25.3/domains/program/unused/apmd.te	2005-07-19 15:41:44.000000000 -0400
@@ -83,8 +99,8 @@
  role sysadm_r types apm_t;
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/cvs.te policy-1.25.3/domains/program/unused/cvs.te
 --- nsapolicy/domains/program/unused/cvs.te	2005-04-27 10:28:50.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/cvs.te	2005-07-19 15:41:44.000000000 -0400
-@@ -12,5 +12,15 @@
++++ policy-1.25.3/domains/program/unused/cvs.te	2005-07-20 10:09:23.000000000 -0400
+@@ -12,5 +12,14 @@
  #
  
  inetd_child_domain(cvs, tcp)
@@ -94,12 +110,11 @@
  type cvs_data_t, file_type, sysadmfile;
  create_dir_file(cvs_t, cvs_data_t)
 +can_exec(cvs_t, { bin_t sbin_t shell_exec_t })
++allow cvs_t bin_t:dir search;
++allow cvs_t { bin_t sbin_t }:lnk_file read;
 +allow cvs_t etc_runtime_t:file { getattr read };
 +allow system_mail_t cvs_data_t:file { getattr read };
 +dontaudit cvs_t devtty_t:chr_file { read write };
-+allow cvs_t default_t:dir search;
-+allow cvs_t default_t:lnk_file read;
-+
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/cyrus.te policy-1.25.3/domains/program/unused/cyrus.te
 --- nsapolicy/domains/program/unused/cyrus.te	2005-07-12 08:50:43.000000000 -0400
 +++ policy-1.25.3/domains/program/unused/cyrus.te	2005-07-19 15:41:44.000000000 -0400
@@ -185,13 +200,31 @@
  dontaudit lvm_t devpts_t:dir { getattr read };
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/mta.te policy-1.25.3/domains/program/unused/mta.te
 --- nsapolicy/domains/program/unused/mta.te	2005-05-25 11:28:10.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/mta.te	2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/mta.te	2005-07-20 14:35:47.000000000 -0400
+@@ -22,7 +22,7 @@
+ # rules are currently defined in sendmail.te, but it is not included in 
+ # targeted policy.  We could move these rules permanantly here.
+ ifdef(`postfix.te', `', `can_exec_any(system_mail_t)')
+-allow system_mail_t self:dir { search };
++allow system_mail_t self:dir search;
+ allow system_mail_t self:lnk_file read;
+ r_dir_file(system_mail_t, { proc_t proc_net_t })
+ allow system_mail_t fs_t:filesystem getattr;
 @@ -71,4 +71,4 @@
  allow mta_delivery_agent { etc_runtime_t proc_t }:file { getattr read };
  
  allow system_mail_t etc_runtime_t:file { getattr read };
 -allow system_mail_t { random_device_t urandom_device_t }:chr_file read;
 +allow system_mail_t { random_device_t urandom_device_t }:chr_file { getattr read };
+diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/mysqld.te policy-1.25.3/domains/program/unused/mysqld.te
+--- nsapolicy/domains/program/unused/mysqld.te	2005-07-06 17:15:07.000000000 -0400
++++ policy-1.25.3/domains/program/unused/mysqld.te	2005-07-20 14:31:19.000000000 -0400
+@@ -87,5 +87,4 @@
+ allow userdomain mysqld_var_run_t:sock_file write;
+ }
+ ')
+-
+ allow mysqld_t self:netlink_route_socket r_netlink_socket_perms;
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/NetworkManager.te policy-1.25.3/domains/program/unused/NetworkManager.te
 --- nsapolicy/domains/program/unused/NetworkManager.te	2005-07-06 17:15:06.000000000 -0400
 +++ policy-1.25.3/domains/program/unused/NetworkManager.te	2005-07-19 15:41:44.000000000 -0400
@@ -249,7 +282,7 @@
  domain_auto_trans(sysadm_t, ping_exec_t, ping_t)
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/postgresql.te policy-1.25.3/domains/program/unused/postgresql.te
 --- nsapolicy/domains/program/unused/postgresql.te	2005-07-06 17:15:07.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/postgresql.te	2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/postgresql.te	2005-07-20 14:30:01.000000000 -0400
 @@ -67,6 +67,7 @@
  can_tcp_connect(userdomain, postgresql_t)
  allow userdomain postgresql_t:unix_stream_socket connectto;
@@ -258,9 +291,20 @@
  }
  ')
  ifdef(`consoletype.te', `
+@@ -109,8 +110,8 @@
+ allow postgresql_t self:sem create_sem_perms;
+ 
+ allow postgresql_t initrc_var_run_t:file { getattr read lock };
+-dontaudit postgresql_t selinux_config_t:dir { search };
+-allow postgresql_t mail_spool_t:dir { search };
++dontaudit postgresql_t selinux_config_t:dir search;
++allow postgresql_t mail_spool_t:dir search;
+ lock_domain(postgresql)
+ can_exec(postgresql_t, { shell_exec_t bin_t postgresql_exec_t ls_exec_t } )
+ ifdef(`apache.te', `
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/pppd.te policy-1.25.3/domains/program/unused/pppd.te
 --- nsapolicy/domains/program/unused/pppd.te	2005-07-19 10:57:05.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/pppd.te	2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/pppd.te	2005-07-20 08:18:29.000000000 -0400
 @@ -32,9 +32,12 @@
  log_domain(pppd)
  
@@ -318,9 +362,20 @@
  typealias rlogind_port_t alias rlogin_port_t;
  read_sysctl(rlogind_t);
 +allow rlogind_t krb5_keytab_t:file { getattr read };
+diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/samba.te policy-1.25.3/domains/program/unused/samba.te
+--- nsapolicy/domains/program/unused/samba.te	2005-07-12 08:50:43.000000000 -0400
++++ policy-1.25.3/domains/program/unused/samba.te	2005-07-20 08:42:37.000000000 -0400
+@@ -79,6 +79,7 @@
+ 
+ # Access Samba shares.
+ create_dir_file(smbd_t, samba_share_t)
++r_dir_file(smbd_t, ftpd_anon_t)
+ 
+ ifdef(`logrotate.te', `
+ # the application should be changed
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/slocate.te policy-1.25.3/domains/program/unused/slocate.te
 --- nsapolicy/domains/program/unused/slocate.te	2005-04-27 10:28:53.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/slocate.te	2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/slocate.te	2005-07-21 09:07:15.000000000 -0400
 @@ -10,7 +10,8 @@
  # locate_exec_t is the type of the locate executable.
  #
@@ -331,9 +386,17 @@
  allow locate_t fs_t:filesystem getattr;
  
  ifdef(`crond.te', `
+@@ -23,6 +24,7 @@
+ allow locate_t { userpty_type admin_tty_type }:chr_file rw_file_perms;
+ 
+ allow locate_t { fs_type file_type }:dir r_dir_perms;
++dontaudit locate_t sysctl_t:dir getattr;
+ allow locate_t file_type:lnk_file r_file_perms;
+ allow locate_t { file_type -shadow_t }:{ lnk_file sock_file fifo_file file } getattr;
+ dontaudit locate_t { file_type -shadow_t }:{ lnk_file sock_file fifo_file file } read;
 diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/squid.te policy-1.25.3/domains/program/unused/squid.te
 --- nsapolicy/domains/program/unused/squid.te	2005-07-12 08:50:43.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/squid.te	2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/squid.te	2005-07-20 14:27:01.000000000 -0400
 @@ -80,4 +80,5 @@
  r_dir_file(squid_t, cert_t)
  ifdef(`winbind.te', `
@@ -430,6 +493,14 @@
  access_terminal(winbind_helper_t, sysadm)
  read_locale(winbind_helper_t) 
  r_dir_file(winbind_helper_t, samba_etc_t)
+diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/useradd.te policy-1.25.3/domains/program/useradd.te
+--- nsapolicy/domains/program/useradd.te	2005-04-27 10:28:49.000000000 -0400
++++ policy-1.25.3/domains/program/useradd.te	2005-07-21 09:07:34.000000000 -0400
+@@ -102,3 +102,4 @@
+ allow useradd_t default_context_t:dir search;
+ allow useradd_t file_context_t:dir search;
+ allow useradd_t file_context_t:file { getattr read };
++allow useradd_t var_lib_t:dir search;
 diff --exclude-from=exclude -N -u -r nsapolicy/file_contexts/distros.fc policy-1.25.3/file_contexts/distros.fc
 --- nsapolicy/file_contexts/distros.fc	2005-07-06 17:15:07.000000000 -0400
 +++ policy-1.25.3/file_contexts/distros.fc	2005-07-19 15:41:44.000000000 -0400
@@ -455,6 +526,17 @@
  
  # Fedora Extras packages: ladspa, imlib2, ocaml
  /usr/lib/ladspa/analogue_osc_1416\.so		-- system_u:object_r:texrel_shlib_t
+diff --exclude-from=exclude -N -u -r nsapolicy/file_contexts/program/postgresql.fc policy-1.25.3/file_contexts/program/postgresql.fc
+--- nsapolicy/file_contexts/program/postgresql.fc	2005-03-11 15:31:06.000000000 -0500
++++ policy-1.25.3/file_contexts/program/postgresql.fc	2005-07-20 13:51:00.000000000 -0400
+@@ -14,3 +14,7 @@
+ /usr/lib/pgsql/test/regress/.*\.so	-- system_u:object_r:shlib_t
+ /usr/lib/pgsql/test/regress/.*\.sh	-- system_u:object_r:bin_t
+ /usr/lib/pgsql/test/regress/pg_regress	-- system_u:object_r:postgresql_exec_t
++ifdef(`distro_redhat', `
++/usr/share/jonas/pgsql(/.*)?       system_u:object_r:postgresql_db_t
++/var/log/rhdb/rhdb(/.*)?           system_u:object_r:postgresql_log_t 
++')
 diff --exclude-from=exclude -N -u -r nsapolicy/file_contexts/program/pppd.fc policy-1.25.3/file_contexts/program/pppd.fc
 --- nsapolicy/file_contexts/program/pppd.fc	2005-06-01 06:11:22.000000000 -0400
 +++ policy-1.25.3/file_contexts/program/pppd.fc	2005-07-19 15:41:44.000000000 -0400
@@ -473,6 +555,20 @@
  /usr/sbin/vpnc		--	system_u:object_r:vpnc_exec_t
  /sbin/vpnc		--	system_u:object_r:vpnc_exec_t
 +/etc/vpnc/vpnc-script	--	system_u:object_r:bin_t
+diff --exclude-from=exclude -N -u -r nsapolicy/file_contexts/types.fc policy-1.25.3/file_contexts/types.fc
+--- nsapolicy/file_contexts/types.fc	2005-07-12 08:50:43.000000000 -0400
++++ policy-1.25.3/file_contexts/types.fc	2005-07-21 08:57:17.000000000 -0400
+@@ -503,8 +503,8 @@
+ /usr/lib(64)?/[^/]*thunderbird[^/]*/thunderbird --      system_u:object_r:bin_t
+ /usr/lib(64)?/[^/]*thunderbird[^/]*/thunderbird-bin -- system_u:object_r:bin_t
+ /usr/lib(64)?/[^/]*thunderbird[^/]*/open-browser\.sh -- system_u:object_r:bin_t
+-/usr/lib(64)?/[^/]*thunderbird[^/]*/run-mozilla\.sh -- system_u:object_r:bin_t
+-/usr/lib(64)?/[^/]*thunderbird[^/]*/mozilla-xremote-client -- system_u:object_r:bin_t
++/usr/lib(64)?/[^/]*/run-mozilla\.sh -- system_u:object_r:bin_t
++/usr/lib(64)?/[^/]*/mozilla-xremote-client -- system_u:object_r:bin_t
+ 
+ #
+ # /srv
 diff --exclude-from=exclude -N -u -r nsapolicy/genfs_contexts policy-1.25.3/genfs_contexts
 --- nsapolicy/genfs_contexts	2005-05-07 00:41:08.000000000 -0400
 +++ policy-1.25.3/genfs_contexts	2005-07-19 15:41:44.000000000 -0400
@@ -566,10 +662,50 @@
 +allow $1 removable_t:filesystem getattr;
 +
 +')
+diff --exclude-from=exclude -N -u -r nsapolicy/macros/program/apache_macros.te policy-1.25.3/macros/program/apache_macros.te
+--- nsapolicy/macros/program/apache_macros.te	2005-07-12 08:50:43.000000000 -0400
++++ policy-1.25.3/macros/program/apache_macros.te	2005-07-20 08:40:15.000000000 -0400
+@@ -102,6 +102,7 @@
+ r_dir_file(httpd_$1_script_t, httpd_$1_script_ro_t)
+ create_dir_file(httpd_$1_script_t, httpd_$1_script_rw_t)
+ ra_dir_file(httpd_$1_script_t, httpd_$1_script_ra_t)
++r_dir_file(httpd_$1_script_t, ftpd_anon_t)
+ 
+ if (httpd_enable_cgi && httpd_unified ifdef(`targeted_policy', ` && ! httpd_disable_trans')) {
+ create_dir_file(httpd_$1_script_t, httpdcontent)
+@@ -137,8 +138,9 @@
+ r_dir_file(httpd_t, httpd_$1_script_ro_t)
+ create_dir_file(httpd_t, httpd_$1_script_rw_t)
+ ra_dir_file(httpd_t, httpd_$1_script_ra_t)
+-}
+ r_dir_file(httpd_t, httpd_$1_content_t)
++r_dir_file(httpd_t, ftpd_anon_t)
++}
+ 
+ ')
+ define(`apache_user_domain', `
 diff --exclude-from=exclude -N -u -r nsapolicy/macros/program/cdrecord_macros.te policy-1.25.3/macros/program/cdrecord_macros.te
 --- nsapolicy/macros/program/cdrecord_macros.te	2005-05-02 14:06:57.000000000 -0400
-+++ policy-1.25.3/macros/program/cdrecord_macros.te	2005-07-19 15:43:50.000000000 -0400
-@@ -47,8 +47,11 @@
++++ policy-1.25.3/macros/program/cdrecord_macros.te	2005-07-20 15:36:45.000000000 -0400
+@@ -27,16 +27,8 @@
+ 
+ can_resmgrd_connect($1_cdrecord_t)
+ 
+-allow $1_cdrecord_t { tmp_t home_root_t }:dir search;
++read_content($1_cdrecord_t, $1, cdrecord) 
+ 
+-# allow cdrecord to read user files
+-r_dir_file($1_cdrecord_t, { $1_home_t $1_tmp_t })
+-if (use_nfs_home_dirs) {
+-r_dir_file($1_cdrecord_t, nfs_t)
+-}
+-if (use_samba_home_dirs) {
+-r_dir_file($1_cdrecord_t, cifs_t)
+-}
+ allow $1_cdrecord_t etc_t:file { getattr read };
+ 
+ # allow searching for cdrom-drive
+@@ -47,8 +39,11 @@
  allow $1_cdrecord_t removable_device_t:blk_file { getattr read write ioctl };
  allow $1_cdrecord_t scsi_generic_device_t:chr_file { getattr read write ioctl };
  


Index: selinux-policy-strict.spec
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy-strict/devel/selinux-policy-strict.spec,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -r1.356 -r1.357
--- selinux-policy-strict.spec	20 Jul 2005 03:42:16 -0000	1.356
+++ selinux-policy-strict.spec	21 Jul 2005 17:15:59 -0000	1.357
@@ -11,7 +11,7 @@
 Summary: SELinux %{type} policy configuration
 Name: selinux-policy-%{type}
 Version: 1.25.3
-Release: 2
+Release: 3
 License: GPL
 Group: System Environment/Base
 Source: http://www.nsa.gov/selinux/archives/policy-%{version}.tgz
@@ -93,12 +93,12 @@
 %config %{_sysconfdir}/selinux/%{type}/booleans
 %ghost %config(noreplace) %{_sysconfdir}/selinux/%{type}/booleans.local
 %{_sysconfdir}/selinux/%{type}/policy/policy.%{POLICYVER}
-%config %{_sysconfdir}/selinux/%{type}/contexts/files/file_contexts
+%{_sysconfdir}/selinux/%{type}/contexts/files/file_contexts
 %{_sysconfdir}/selinux/%{type}/contexts/files/file_contexts.homedirs
 %config %{_sysconfdir}/selinux/%{type}/contexts/files/homedir_template
 %config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/files/media
 %config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/dbus_contexts
-%config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/default_contexts
+%config %{_sysconfdir}/selinux/%{type}/contexts/default_contexts
 %config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/default_type
 %config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/initrc_context
 %config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/failsafe_context
@@ -236,6 +236,9 @@
 exit 0
 
 %changelog
+* Thu Jul 19 2005 Dan Walsh <dwalsh at redhat.com> 1.25.3-3
+- Fix spec file for file_context.homedirs
+
 * Tue Jul 19 2005 Dan Walsh <dwalsh at redhat.com> 1.25.3-2
 - Update to latest from NSA
 




More information about the fedora-cvs-commits mailing list