forked from pool/libselinux
8a0ed0bdd6
- Update to version 3.1: * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were removed. All userspace object managers should have been updated to use the dynamic class/perm mapping support. Use string_to_security_class(3) and string_to_av_perm(3) to map the class and permission names to their policy values, or selinux_set_mapping(3) to create a mapping from class and permission index values used by the application to the policy values. * Removed restrictions in libsepol and checkpolicy that required all declared initial SIDs to be assigned a context. * Support for new policy capability genfs_seclabel_symlinks * selinuxfs is mounted with noexec and nosuid * `security_compute_user()` was deprecated * Refreshed python3.8-compat.patch - Update to version 3.1: * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were removed. All userspace object managers should have been updated to use the dynamic class/perm mapping support. Use string_to_security_class(3) and string_to_av_perm(3) to map the class and permission names to their policy values, or selinux_set_mapping(3) to create a mapping from class and permission index values used by the application to the policy values. * Removed restrictions in libsepol and checkpolicy that required all declared initial SIDs to be assigned a context. * Support for new policy capability genfs_seclabel_symlinks * selinuxfs is mounted with noexec and nosuid * `security_compute_user()` was deprecated OBS-URL: https://build.opensuse.org/request/show/820925 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=126 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
baselibs.conf | ||
libselinux-3.1.tar.gz | ||
libselinux-bindings.changes | ||
libselinux-bindings.spec | ||
libselinux.changes | ||
libselinux.spec | ||
python3.8-compat.patch | ||
readv-proto.patch | ||
selinux-ready | ||
skip_cycles.patch | ||
swig4_moduleimport.patch |