diff --git a/libselinux-2.0.67-rhat.patch b/libselinux-2.0.67-rhat.patch deleted file mode 100644 index b0dbffc..0000000 --- a/libselinux-2.0.67-rhat.patch +++ /dev/null @@ -1,369 +0,0 @@ -diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/freecon.3 libselinux-2.0.67/man/man3/freecon.3 ---- nsalibselinux/man/man3/freecon.3 2008-06-12 23:25:12.000000000 -0400 -+++ libselinux-2.0.67/man/man3/freecon.3 2008-07-09 16:52:33.000000000 -0400 -@@ -15,6 +15,11 @@ - .B freeconary - frees the memory allocated for a context array. - -+If -+.I con -+is NULL, no operation is performed. -+ -+ - .SH "SEE ALSO" - .BR selinux "(8)" - -diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/selinuxconlist.8 libselinux-2.0.67/man/man8/selinuxconlist.8 ---- nsalibselinux/man/man8/selinuxconlist.8 1969-12-31 19:00:00.000000000 -0500 -+++ libselinux-2.0.67/man/man8/selinuxconlist.8 2008-07-09 16:52:33.000000000 -0400 -@@ -0,0 +1,18 @@ -+.TH "selinuxconlist" "1" "7 May 2008" "dwalsh@redhat.com" "SELinux Command Line documentation" -+.SH "NAME" -+selinuxconlist \- list all SELinux context reachable for user -+.SH "SYNOPSIS" -+.B selinuxconlist [-l level] user [context] -+ -+.SH "DESCRIPTION" -+.B selinuxconlist -+reports the list of context reachable for user from the current context or specified context -+ -+.B \-l level -+mcs/mls level -+ -+.SH AUTHOR -+This manual page was written by Dan Walsh . -+ -+.SH "SEE ALSO" -+secon(8), selinuxdefcon(8) -diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/selinuxdefcon.8 libselinux-2.0.67/man/man8/selinuxdefcon.8 ---- nsalibselinux/man/man8/selinuxdefcon.8 1969-12-31 19:00:00.000000000 -0500 -+++ libselinux-2.0.67/man/man8/selinuxdefcon.8 2008-07-09 16:52:33.000000000 -0400 -@@ -0,0 +1,19 @@ -+.TH "selinuxdefcon" "1" "7 May 2008" "dwalsh@redhat.com" "SELinux Command Line documentation" -+.SH "NAME" -+selinuxdefcon \- list default SELinux context for user -+ -+.SH "SYNOPSIS" -+.B selinuxdefcon [-l level] user [fromcon] -+ -+.SH "DESCRIPTION" -+.B seconlist -+reports the default context for the specified user from current context or specified context -+ -+.B \-l level -+mcs/mls level -+ -+.SH AUTHOR -+This manual page was written by Dan Walsh . -+ -+.SH "SEE ALSO" -+secon(8), selinuxconlist(8) -diff --exclude-from=exclude -N -u -r nsalibselinux/src/Makefile libselinux-2.0.67/src/Makefile ---- nsalibselinux/src/Makefile 2008-06-22 09:40:25.000000000 -0400 -+++ libselinux-2.0.67/src/Makefile 2008-07-09 16:56:37.000000000 -0400 -@@ -7,16 +7,24 @@ - PYINC ?= /usr/include/$(PYLIBVER) - PYLIB ?= /usr/lib/$(PYLIBVER) - PYTHONLIBDIR ?= $(LIBDIR)/$(PYLIBVER) -+RUBYLIBVER ?= $(shell ruby -e 'print RUBY_VERSION.split(".")[0..1].join(".")') -+RUBYPLATFORM ?= $(shell ruby -e 'print RUBY_PLATFORM') -+RUBYINC ?= $(LIBDIR)/ruby/$(RUBYLIBVER)/$(RUBYPLATFORM) -+RUBYINSTALL ?= $(LIBDIR)/ruby/site_ruby/$(RUBYLIBVER)/$(RUBYPLATFORM) - - LIBVERSION = 1 - - LIBA=libselinux.a - TARGET=libselinux.so - SWIGIF= selinuxswig_python.i -+SWIGRUBYIF= selinuxswig_ruby.i - SWIGCOUT= selinuxswig_wrap.c -+SWIGRUBYCOUT= selinuxswig_ruby_wrap.c - SWIGLOBJ:= $(patsubst %.c,%.lo,$(SWIGCOUT)) -+SWIGRUBYLOBJ:= $(patsubst %.c,%.lo,$(SWIGRUBYCOUT)) - SWIGSO=_selinux.so - SWIGFILES=$(SWIGSO) selinux.py -+SWIGRUBYSO=_rubyselinux.so - LIBSO=$(TARGET).$(LIBVERSION) - AUDIT2WHYSO=audit2why.so - -@@ -29,7 +37,9 @@ - ifeq ($(DISABLE_RPM),y) - UNUSED_SRCS+=rpm.c - endif --SRCS= $(filter-out $(UNUSED_SRCS), $(filter-out audit2why.c $(SWIGCOUT),$(wildcard *.c))) -+ -+GENERATED=$(SWIGCOUT) $(SWIGRUBYCOUT) -+SRCS= $(filter-out $(UNUSED_SRCS), $(filter-out audit2why.c $(GENERATED),$(wildcard *.c))) - - OBJS= $(patsubst %.c,%.o,$(SRCS)) - LOBJS= $(patsubst %.c,%.lo,$(SRCS)) -@@ -44,11 +54,11 @@ - - SWIG = swig -Wall -python -o $(SWIGCOUT) -outdir ./ - --GENERATED=$(SWIGCOUT) -+SWIGRUBY = swig -Wall -ruby -o $(SWIGRUBYCOUT) -outdir ./ - - all: $(LIBA) $(LIBSO) - --pywrap: all $(SWIGSO) $(AUDIT2WHYSO) -+pywrap: all $(SWIGSO) $(AUDIT2WHYSO) $(SWIGRUBYSO) - - $(LIBA): $(OBJS) - $(AR) rcs $@ $^ -@@ -57,8 +67,14 @@ - $(SWIGLOBJ): $(SWIGCOUT) - $(CC) $(filter-out -Werror,$(CFLAGS)) -I$(PYINC) -fPIC -DSHARED -c -o $@ $< - -+$(SWIGRUBYLOBJ): $(SWIGRUBYCOUT) -+ $(CC) $(filter-out -Werror,$(CFLAGS)) -I$(RUBYINC) -fPIC -DSHARED -c -o $@ $< -+ - $(SWIGSO): $(SWIGLOBJ) -- $(CC) $(CFLAGS) $(LDFLAGS) -shared -o $@ $< -L. -lselinux -L$(LIBDIR) -Wl,-soname,$@ -+ $(CC) $(CFLAGS) $(LDFLAGS) -shared -o $@ $^ -L. -lselinux -L$(LIBDIR) -Wl,-soname,$@ -+ -+$(SWIGRUBYSO): $(SWIGRUBYLOBJ) -+ $(CC) $(CFLAGS) $(LDFLAGS) -shared -o $@ $^ -L. -lselinux -L$(LIBDIR) -Wl,-soname,$@ - - $(LIBSO): $(LOBJS) - $(CC) $(CFLAGS) $(LDFLAGS) -shared -o $@ $^ -ldl -L$(LIBDIR) -Wl,-soname,$(LIBSO),-z,defs,-z,relro -@@ -79,6 +95,9 @@ - $(SWIGCOUT): $(SWIGIF) - $(SWIG) $^ - -+$(SWIGRUBYCOUT): $(SWIGRUBYIF) -+ $(SWIGRUBY) $^ -+ - swigify: $(SWIGIF) - $(SWIG) $^ - -@@ -95,6 +114,9 @@ - install -m 755 $(AUDIT2WHYSO) $(PYTHONLIBDIR)/site-packages/selinux - install -m 644 selinux.py $(PYTHONLIBDIR)/site-packages/selinux/__init__.py - -+ test -d $(RUBYINSTALL) || install -m 755 -d $(RUBYINSTALL) -+ install -m 755 $(SWIGRUBYSO) $(RUBYINSTALL)/selinux.so -+ - relabel: - /sbin/restorecon $(SHLIBDIR)/$(LIBSO) - -@@ -102,7 +124,7 @@ - -rm -f $(OBJS) $(LOBJS) $(LIBA) $(LIBSO) $(SWIGLOBJ) $(SWIGSO) $(TARGET) $(AUDIT2WHYSO) *.o *.lo *~ - - distclean: clean -- rm -f $(SWIGCOUT) $(SWIGFILES) -+ rm -f $(GENERATED) $(SWIGFILES) - - indent: - ../../scripts/Lindent $(filter-out $(GENERATED),$(wildcard *.[ch])) -diff --exclude-from=exclude -N -u -r nsalibselinux/src/audit2why.c libselinux-2.0.67/src/audit2why.c ---- nsalibselinux/src/audit2why.c 2008-06-12 23:25:14.000000000 -0400 -+++ libselinux-2.0.67/src/audit2why.c 2008-07-09 16:52:33.000000000 -0400 -@@ -55,7 +55,7 @@ - return 0; - } - --static int check_booleans(struct avc_t *avc, struct boolean_t **bools) -+static int check_booleans(struct boolean_t **bools) - { - char errormsg[PATH_MAX]; - struct sepol_av_decision avd; -@@ -376,7 +376,7 @@ - avc->tsid = tsid; - avc->tclass = tclass; - avc->av = av; -- if (check_booleans(avc, &bools) == 0) { -+ if (check_booleans(&bools) == 0) { - if (av & ~avd.auditdeny) { - RETURN(DONTAUDIT) - } else { -@@ -390,15 +390,15 @@ - len++; b++; - } - b = bools; -- PyObject *boollist = PyTuple_New(len); -+ PyObject *outboollist = PyTuple_New(len); - len=0; - while(b->name) { - PyObject *bool = Py_BuildValue("(si)", b->name, b->active); -- PyTuple_SetItem(boollist, len++, bool); -+ PyTuple_SetItem(outboollist, len++, bool); - b++; - } - free(bools); -- PyTuple_SetItem(result, 1, boollist); -+ PyTuple_SetItem(result, 1, outboollist); - return result; - } - } -diff --exclude-from=exclude -N -u -r nsalibselinux/src/matchpathcon.c libselinux-2.0.67/src/matchpathcon.c ---- nsalibselinux/src/matchpathcon.c 2008-06-12 23:25:14.000000000 -0400 -+++ libselinux-2.0.67/src/matchpathcon.c 2008-07-09 16:52:33.000000000 -0400 -@@ -2,6 +2,7 @@ - #include - #include - #include -+#include - #include "selinux_internal.h" - #include "label_internal.h" - #include "callbacks.h" -@@ -57,7 +58,7 @@ - { - va_list ap; - va_start(ap, fmt); -- vfprintf(stderr, fmt, ap); -+ vsyslog(LOG_ERR, fmt, ap); - va_end(ap); - } - -diff --exclude-from=exclude -N -u -r nsalibselinux/src/selinuxswig_ruby.i libselinux-2.0.67/src/selinuxswig_ruby.i ---- nsalibselinux/src/selinuxswig_ruby.i 1969-12-31 19:00:00.000000000 -0500 -+++ libselinux-2.0.67/src/selinuxswig_ruby.i 2008-07-09 16:52:33.000000000 -0400 -@@ -0,0 +1,147 @@ -+/* Author: James Athey -+ */ -+ -+%module selinux -+%{ -+ #include "selinux/selinux.h" -+%} -+ -+/* security_get_boolean_names() typemap */ -+/* -+%typemap(argout) (char ***names, int *len) { -+ PyObject* list = PyList_New(*$2); -+ int i; -+ for (i = 0; i < *$2; i++) { -+ PyList_SetItem(list, i, PyString_FromString((*$1)[i])); -+ } -+ $result = SWIG_Python_AppendOutput($result, list); -+} -+*/ -+/* return a sid along with the result */ -+%typemap(argout) (security_id_t * sid) { -+ if (*$1) { -+ %append_output(SWIG_NewPointerObj(*$1, $descriptor(security_id_t), 0)); -+ } -+/* else { -+ Py_INCREF(Py_None); -+ %append_output(Py_None); -+ } -+*/ -+} -+ -+%typemap(in,numinputs=0) security_id_t *(security_id_t temp) { -+ $1 = &temp; -+} -+ -+/* Makes security_compute_user() return a Python list of contexts */ -+/* -+%typemap(argout) (security_context_t **con) { -+ PyObject* plist; -+ int i, len = 0; -+ -+ if (*$1) { -+ while((*$1)[len]) -+ len++; -+ plist = PyList_New(len); -+ for (i = 0; i < len; i++) { -+ PyList_SetItem(plist, i, PyString_FromString((*$1)[i])); -+ } -+ } else { -+ plist = PyList_New(0); -+ } -+ -+ $result = SWIG_Python_AppendOutput($result, plist); -+} -+*/ -+/* Makes functions in get_context_list.h return a Python list of contexts */ -+ -+#ifdef fixme -+%typemap(argout) (security_context_t **list) { -+ PyObject* plist; -+ int i; -+ -+ if (*$1) { -+ plist = PyList_New(result); -+ for (i = 0; i < result; i++) { -+ PyList_SetItem(plist, i, PyString_FromString((*$1)[i])); -+ } -+ } else { -+ plist = PyList_New(0); -+ } -+ /* Only return the Python list, don't need to return the length anymore */ -+ $result = plist; -+} -+#endif -+ -+%typemap(in,noblock=1,numinputs=0) security_context_t * (security_context_t temp = 0) { -+ $1 = &temp; -+} -+%typemap(freearg,match="in") security_context_t * ""; -+%typemap(argout,noblock=1) security_context_t * { -+ if (*$1) { -+ %append_output(SWIG_FromCharPtr(*$1)); -+ freecon(*$1); -+ } -+/* -+ else { -+ Py_INCREF(Py_None); -+ %append_output(Py_None); -+ } -+*/ -+} -+ -+%typemap(in,noblock=1,numinputs=0) char ** (char * temp = 0) { -+ $1 = &temp; -+} -+%typemap(freearg,match="in") char ** ""; -+%typemap(argout,noblock=1) char ** { -+ if (*$1) { -+ %append_output(SWIG_FromCharPtr(*$1)); -+ free(*$1); -+ } -+/* -+ else { -+ Py_INCREF(Py_None); -+ %append_output(Py_None); -+ } -+*/ -+} -+/* -+%typemap(in) char * const [] { -+ int i, size; -+ PyObject * s; -+ -+ if (!PySequence_Check($input)) { -+ PyErr_SetString(PyExc_ValueError, "Expected a sequence"); -+ return NULL; -+ } -+ -+ size = PySequence_Size($input); -+ -+ $1 = (char**) malloc(size + 1); -+ for(i = 0; i < size; i++) { -+ if (!PyString_Check(PySequence_GetItem($input, i))) { -+ PyErr_SetString(PyExc_ValueError, "Sequence must contain only strings"); -+ return NULL; -+ } -+ } -+ -+ for(i = 0; i < size; i++) { -+ s = PySequence_GetItem($input, i); -+ $1[i] = (char*) malloc(PyString_Size(s) + 1); -+ strcpy($1[i], PyString_AsString(s)); -+ } -+ $1[size] = NULL; -+} -+*/ -+ -+%typemap(freearg,match="in") char * const [] { -+ int i = 0; -+ while($1[i]) { -+ free($1[i]); -+ i++; -+ } -+ free($1); -+} -+ -+%include "selinuxswig.i" diff --git a/libselinux-2.0.67.tar.bz2 b/libselinux-2.0.67.tar.bz2 deleted file mode 100644 index 6146ab7..0000000 --- a/libselinux-2.0.67.tar.bz2 +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:c6044bb0e9531dfa21aa297b28fcef26df16c46f6d33b567942833524e96a92d -size 135165 diff --git a/libselinux-2.0.71-rhat.patch b/libselinux-2.0.71-rhat.patch new file mode 100644 index 0000000..15ec9f3 --- /dev/null +++ b/libselinux-2.0.71-rhat.patch @@ -0,0 +1,97 @@ +diff --exclude-from=exclude -N -u -r nsalibselinux/ChangeLog libselinux-2.0.70/ChangeLog +--- nsalibselinux/ChangeLog 2008-08-05 09:58:25.000000000 -0400 ++++ libselinux-2.0.70/ChangeLog 2008-08-01 06:51:25.000000000 -0400 +@@ -1,11 +1,3 @@ +-2.0.71 2008-08-05 +- * Add group support to seusers using %groupname syntax from Dan Walsh. +- * Mark setrans socket close-on-exec from Stephen Smalley. +- * Only apply nodups checking to base file contexts from Stephen Smalley. +- +-2.0.70 2008-07-30 +- * Merge ruby bindings from Dan Walsh. +- + 2.0.69 2008-07-29 + * Handle duplicate file context regexes as a fatal error from Stephen Smalley. + This prevents adding them via semanage. +diff --exclude-from=exclude -N -u -r nsalibselinux/VERSION libselinux-2.0.70/VERSION +--- nsalibselinux/VERSION 2008-08-05 09:58:25.000000000 -0400 ++++ libselinux-2.0.70/VERSION 2008-08-01 06:51:25.000000000 -0400 +@@ -1 +1 @@ +-2.0.71 ++2.0.69 +diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/selinuxconlist.8 libselinux-2.0.70/man/man8/selinuxconlist.8 +--- nsalibselinux/man/man8/selinuxconlist.8 1969-12-31 19:00:00.000000000 -0500 ++++ libselinux-2.0.70/man/man8/selinuxconlist.8 2008-08-01 06:51:25.000000000 -0400 +@@ -0,0 +1,18 @@ ++.TH "selinuxconlist" "1" "7 May 2008" "dwalsh@redhat.com" "SELinux Command Line documentation" ++.SH "NAME" ++selinuxconlist \- list all SELinux context reachable for user ++.SH "SYNOPSIS" ++.B selinuxconlist [-l level] user [context] ++ ++.SH "DESCRIPTION" ++.B selinuxconlist ++reports the list of context reachable for user from the current context or specified context ++ ++.B \-l level ++mcs/mls level ++ ++.SH AUTHOR ++This manual page was written by Dan Walsh . ++ ++.SH "SEE ALSO" ++secon(8), selinuxdefcon(8) +diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/selinuxdefcon.8 libselinux-2.0.70/man/man8/selinuxdefcon.8 +--- nsalibselinux/man/man8/selinuxdefcon.8 1969-12-31 19:00:00.000000000 -0500 ++++ libselinux-2.0.70/man/man8/selinuxdefcon.8 2008-08-01 06:51:25.000000000 -0400 +@@ -0,0 +1,19 @@ ++.TH "selinuxdefcon" "1" "7 May 2008" "dwalsh@redhat.com" "SELinux Command Line documentation" ++.SH "NAME" ++selinuxdefcon \- list default SELinux context for user ++ ++.SH "SYNOPSIS" ++.B selinuxdefcon [-l level] user [fromcon] ++ ++.SH "DESCRIPTION" ++.B seconlist ++reports the default context for the specified user from current context or specified context ++ ++.B \-l level ++mcs/mls level ++ ++.SH AUTHOR ++This manual page was written by Dan Walsh . ++ ++.SH "SEE ALSO" ++secon(8), selinuxconlist(8) +diff --exclude-from=exclude -N -u -r nsalibselinux/src/callbacks.c libselinux-2.0.70/src/callbacks.c +--- nsalibselinux/src/callbacks.c 2008-06-12 23:25:14.000000000 -0400 ++++ libselinux-2.0.70/src/callbacks.c 2008-08-01 06:51:25.000000000 -0400 +@@ -16,6 +16,7 @@ + { + int rc; + va_list ap; ++ if (is_selinux_enabled() == 0) return 0; + va_start(ap, fmt); + rc = vfprintf(stderr, fmt, ap); + va_end(ap); +diff --exclude-from=exclude -N -u -r nsalibselinux/src/matchpathcon.c libselinux-2.0.70/src/matchpathcon.c +--- nsalibselinux/src/matchpathcon.c 2008-06-12 23:25:14.000000000 -0400 ++++ libselinux-2.0.70/src/matchpathcon.c 2008-08-01 06:51:25.000000000 -0400 +@@ -2,6 +2,7 @@ + #include + #include + #include ++#include + #include "selinux_internal.h" + #include "label_internal.h" + #include "callbacks.h" +@@ -57,7 +58,7 @@ + { + va_list ap; + va_start(ap, fmt); +- vfprintf(stderr, fmt, ap); ++ vsyslog(LOG_ERR, fmt, ap); + va_end(ap); + } + diff --git a/libselinux-2.0.71.tar.bz2 b/libselinux-2.0.71.tar.bz2 new file mode 100644 index 0000000..5dbd9f9 --- /dev/null +++ b/libselinux-2.0.71.tar.bz2 @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5b5201c6be9863f767774b96c2f008f66eaf24a131e3a4732102cbf4842c4ebd +size 136931 diff --git a/libselinux-bindings.changes b/libselinux-bindings.changes index ccdc99a..d32b399 100644 --- a/libselinux-bindings.changes +++ b/libselinux-bindings.changes @@ -1,3 +1,14 @@ +------------------------------------------------------------------- +Tue Sep 2 12:10:05 CEST 2008 - prusnak@suse.cz + +- updated to 2.0.71 + * Merge ruby bindings from Dan Walsh. + +------------------------------------------------------------------- +Mon Sep 1 07:35:00 CEST 2008 - aj@suse.de + +- Fix build of debuginfo. + ------------------------------------------------------------------- Fri Aug 22 14:45:29 CEST 2008 - prusnak@suse.cz diff --git a/libselinux-bindings.spec b/libselinux-bindings.spec index ae129b0..438cd78 100644 --- a/libselinux-bindings.spec +++ b/libselinux-bindings.spec @@ -1,5 +1,5 @@ # -# spec file for package libselinux-bindings (Version 2.0.67) +# spec file for package libselinux-bindings (Version 2.0.71) # # Copyright (c) 2008 SUSE LINUX Products GmbH, Nuernberg, Germany. # @@ -22,7 +22,7 @@ BuildRequires: python-devel ruby-devel swig BuildRequires: libsepol-devel >= %{libsepol_ver} Name: libselinux-bindings -Version: 2.0.67 +Version: 2.0.71 Release: 1 Url: http://www.nsa.gov/selinux/ License: GPL v2 only; Public Domain, Freeware @@ -31,6 +31,7 @@ Summary: SELinux library and simple utilities Source: libselinux-%{version}.tar.bz2 Patch0: libselinux-%{version}-rhat.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build +%define debug_package_requires python-selinux = %{version}-%{version} %description Security-enhanced Linux is a feature of the Linux(R) kernel and a @@ -105,10 +106,12 @@ decisions. Required for any applications that use the SELinux API. make %{?jobs:-j%jobs} LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" -C src make %{?jobs:-j%jobs} LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" -C src swigify make %{?jobs:-j%jobs} LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" -C src pywrap +make %{?jobs:-j%jobs} LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" -C src rubywrap %install make DESTDIR="$RPM_BUILD_ROOT" LIBDIR="$RPM_BUILD_ROOT%{_libdir}" SHLIBDIR="$RPM_BUILD_ROOT/%{_lib}" -C src install make DESTDIR="$RPM_BUILD_ROOT" LIBDIR="$RPM_BUILD_ROOT%{_libdir}" SHLIBDIR="$RPM_BUILD_ROOT/%{_lib}" -C src install-pywrap +make DESTDIR="$RPM_BUILD_ROOT" LIBDIR="$RPM_BUILD_ROOT%{_libdir}" SHLIBDIR="$RPM_BUILD_ROOT/%{_lib}" -C src install-rubywrap rm -rf $RPM_BUILD_ROOT/%{_lib} $RPM_BUILD_ROOT%{_libdir}/libselinux.* %clean @@ -124,6 +127,11 @@ rm -rf $RPM_BUILD_ROOT %{_libdir}/ruby/site_ruby/%{rb_ver}/%{rb_arch}/selinux.so %changelog +* Tue Sep 02 2008 prusnak@suse.cz +- updated to 2.0.71 + * Merge ruby bindings from Dan Walsh. +* Mon Sep 01 2008 aj@suse.de +- Fix build of debuginfo. * Fri Aug 22 2008 prusnak@suse.cz - added baselibs.conf file - split bindings into separate subpackage (libselinux-bindings) diff --git a/libselinux.changes b/libselinux.changes index ccdc99a..db1eba1 100644 --- a/libselinux.changes +++ b/libselinux.changes @@ -1,3 +1,11 @@ +------------------------------------------------------------------- +Tue Sep 2 12:09:22 CEST 2008 - prusnak@suse.cz + +- updated to 2.0.71 + * Add group support to seusers using %groupname syntax from Dan Walsh. + * Mark setrans socket close-on-exec from Stephen Smalley. + * Only apply nodups checking to base file contexts from Stephen Smalley. + ------------------------------------------------------------------- Fri Aug 22 14:45:29 CEST 2008 - prusnak@suse.cz diff --git a/libselinux.spec b/libselinux.spec index 86e0c0b..251704c 100644 --- a/libselinux.spec +++ b/libselinux.spec @@ -1,5 +1,5 @@ # -# spec file for package libselinux (Version 2.0.67) +# spec file for package libselinux (Version 2.0.71) # # Copyright (c) 2008 SUSE LINUX Products GmbH, Nuernberg, Germany. # @@ -21,8 +21,8 @@ BuildRequires: libsepol-devel >= %{libsepol_ver} Name: libselinux -Version: 2.0.67 -Release: 3 +Version: 2.0.71 +Release: 1 Url: http://www.nsa.gov/selinux/ License: GPL v2 only; Public Domain, Freeware Group: System/Libraries @@ -30,7 +30,7 @@ Summary: SELinux library and simple utilities Source: %{name}-%{version}.tar.bz2 Patch0: %{name}-%{version}-rhat.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build -%define debug_package_requires libselinux1 = %{version} +%define debug_package_requires libselinux1 = %{version}-%{release} %description Security-enhanced Linux is a feature of the Linux(R) kernel and a @@ -181,6 +181,11 @@ rm -rf $RPM_BUILD_ROOT %{_mandir}/man3/* %changelog +* Tue Sep 02 2008 prusnak@suse.cz +- updated to 2.0.71 + * Add group support to seusers using %%groupname syntax from Dan Walsh. + * Mark setrans socket close-on-exec from Stephen Smalley. + * Only apply nodups checking to base file contexts from Stephen Smalley. * Fri Aug 22 2008 prusnak@suse.cz - added baselibs.conf file - split bindings into separate subpackage (libselinux-bindings)