3
0
forked from pool/libselinux
Commit Graph

216 Commits

Author SHA256 Message Date
Ana Guerrero
4e7716053c Accepting request 1186963 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/1186963
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=79
2024-07-12 15:04:25 +00:00
Hu
984e3188e2 Accepting request 1186962 from home:cahu:security:SELinux:userspace37
- Fix segfault caused by upstream changes in selabel_open():
  libselinux-set-free-d-data-to-NULL.patch 
  Can be removed once it is upstream.

OBS-URL: https://build.opensuse.org/request/show/1186962
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=172
2024-07-11 19:59:25 +00:00
Hu
f1e382eed0 Accepting request 1184293 from home:cahu:security:SELinux:userspace37
- Update to version 3.7
  https://github.com/SELinuxProject/selinux/releases/tag/3.7
  * User-visible changes
    * libselinux/utils/selabel_digest: drop unsupported option -d
    * libselinux/utils: improve compute_av output
    * libselinux: fail selabel_open(3) on invalid option
    * Improved man pages
  * Improvements
    * libselinux, libsepol: Add CFLAGS and LDFLAGS to Makefile checks
    * libselinux: enable usage with pedantic UB sanitizers
    * libselinux: support huge passwd/group entries
  * Bugfixes:
    * libselinux/utils/selabel_digest: avoid buffer overflow
    * libselinux: avoid pointer dereference before check
    * libselinux/utils/selabel_digest: pass BASEONLY only for file backend
    * libselinux: free empty scandir(3) result
    * libselinux: free data on selabel open failure
    * libselinux: use reentrant strtok_r(3)
- Update to version 3.7
  https://github.com/SELinuxProject/selinux/releases/tag/3.7
  * User-visible changes
    * libselinux/utils/selabel_digest: drop unsupported option -d
    * libselinux/utils: improve compute_av output
    * libselinux: fail selabel_open(3) on invalid option
    * Improved man pages
  * Improvements
    * libselinux, libsepol: Add CFLAGS and LDFLAGS to Makefile checks
    * libselinux: enable usage with pedantic UB sanitizers
    * libselinux: support huge passwd/group entries
  * Bugfixes:
    * libselinux/utils/selabel_digest: avoid buffer overflow
    * libselinux: avoid pointer dereference before check
    * libselinux/utils/selabel_digest: pass BASEONLY only for file backend
    * libselinux: free empty scandir(3) result
    * libselinux: free data on selabel open failure
    * libselinux: use reentrant strtok_r(3)

OBS-URL: https://build.opensuse.org/request/show/1184293
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=171
2024-07-02 09:43:34 +00:00
Ana Guerrero
5edf08be2e Accepting request 1137088 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/1137088
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=78
2024-01-08 22:43:45 +00:00
Johannes Segitz
bc1f0fd379 Accepting request 1134068 from home:cahu:branches:security:SELinux
- Update to version 3.6
  https://github.com/SELinuxProject/selinux/releases/tag/3.6
  * libselinux: performance optimization for duplicate detection
  * Introduce getpolicyload - a helper binary to print the number of policy reloads on the running system
  * Add notself support for neverallow rules
  * Improve man pages
  * man pages: Remove the Russian translations
  * Add notself and other support to CIL
  * Add support for deny rules
  * Translations updated from
    https://translate.fedoraproject.org/projects/selinux/
  * Bug fixes
- Remove keys from keyring since they expired:
  - E853C1848B0185CF42864DF363A8AD4B982C4373
    Petr Lautrbach <plautrba@redhat.com>
  - 63191CE94183098689CAB8DB7EF137EC935B0EAF
    Jason Zaman <jasonzaman@gmail.com>  
- Add key to keyring:   
  - B8682847764DF60DF52D992CBC3905F235179CF1   
    Petr Lautrbach <lautrbach@redhat.com> 
- Update to version 3.6
  https://github.com/SELinuxProject/selinux/releases/tag/3.6
  * libselinux: performance optimization for duplicate detection
  * Introduce getpolicyload - a helper binary to print the number of policy reloads on the running system
  * Add notself support for neverallow rules
  * Improve man pages
  * man pages: Remove the Russian translations
  * Add notself and other support to CIL
  * Add support for deny rules
  * Translations updated from
    https://translate.fedoraproject.org/projects/selinux/
  * Bug fixes
- Remove keys from keyring since they expired:
  - E853C1848B0185CF42864DF363A8AD4B982C4373
    Petr Lautrbach <plautrba@redhat.com>
  - 63191CE94183098689CAB8DB7EF137EC935B0EAF
    Jason Zaman <jasonzaman@gmail.com>  
- Add key to keyring:   
  - B8682847764DF60DF52D992CBC3905F235179CF1   
    Petr Lautrbach <lautrbach@redhat.com>

OBS-URL: https://build.opensuse.org/request/show/1134068
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=169
2024-01-05 15:31:04 +00:00
Johannes Segitz
25b1c72361 Accepting request 1136429 from home:bnavigator:branches:security:SELinux
- The PEP517 python build requires setuptools

OBS-URL: https://build.opensuse.org/request/show/1136429
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=168
2024-01-04 15:47:56 +00:00
Ana Guerrero
820dfbdfb9 Accepting request 1130232 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/1130232
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=77
2023-12-03 19:48:13 +00:00
Johannes Segitz
0979432922 Accepting request 1130058 from home:cahu:branches:security:SELinux
- Also build python3-selinux for toolchain compability on SLE

OBS-URL: https://build.opensuse.org/request/show/1130058
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=166
2023-12-01 13:28:51 +00:00
Ana Guerrero
3b9b63e47d Accepting request 1115588 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/1115588
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=76
2023-10-05 18:02:56 +00:00
Johannes Segitz
653fed71ab Accepting request 1114631 from home:crameleon:branches:security:SELinux
Repair initrd libselinux check in selinux-ready (file is installed unerneath /usr now).

OBS-URL: https://build.opensuse.org/request/show/1114631
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=164
2023-10-04 11:55:58 +00:00
Dominique Leuenberger
8cb8e53187 Accepting request 1102846 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/1102846
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=75
2023-08-09 15:24:23 +00:00
Johannes Segitz
baa5cefbf7 Accepting request 1102817 from home:dimstar:Factory
- Do not BuildRequire swig and ruby-devel in the main build phase:
  those are only needed for the bindings.

OBS-URL: https://build.opensuse.org/request/show/1102817
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=162
2023-08-08 09:22:04 +00:00
Johannes Segitz
1205c5cce4 Accepting request 1102401 from home:mcepl:branches:security:SELinux
- (bsc#1212618) Divide libselinux and libselinux-bindings again.
  libselinux itself is in Ring0 so it has to have absolutely
  minimal dependencies, so it is better to separate
  libselinux-bindings into a separate pacakge.
- Add explicit BuildRequires for python3-pip and python3-wheel on
  15.5, currently the macros don't do the right thing
- allow building this with different python versions, to make this
  usable for the new sle15 macro (using python3.11)
- Add python-wheel build dependency to build correctly with latest
  python-pip version.
- Add _multibuild to define additional spec files as additional
  flavors.
  Eliminates the need for source package links in OBS.
- Enable LTO as it works fine now.
- Update to version 3.5:
  * check for truncations
  * avoid newline in avc message
  * bail out on path truncations
  * add getpidprevcon to gather the previous context before the last
    exec of a given process
  * Workaround for heap overhead of pcre
  * fix memory leaks on the audit2why module init
  * ignore invalid class name lookup
- Drop restorecon_pin_file.patch, is upstream
- Refreshed python3.8-compat.patch
- Added additional developer key (Jason Zaman)
- Update to version 3.4:
  * Use PCRE2 by default
  * Make selinux_log() and is_context_customizable() thread-safe
  * Prevent leakeing file descriptors
  * Correctly hash specfiles larger than 4G
- Refreshed skip_cycles.patch
- Update to version 3.3:
  * Lots of smaller issues fixed found by fuzzing
- Switch to pcre2:
  + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8)
  + Pass USE_PCRE2=y to make.
- Update to version 3.2:
  * Use mmap()'ed kernel status page instead of netlink by default.
    See "KERNEL STATUS PAGE" section in avc_init(3) for more details.
  * New log callback levels for enforcing and policy load notices -
    SELINUX_POLICYLOAD, SELINUX_SETENFORCE
  * Changed userspace AVC setenforce and policy load messages to audit 
    format.
- Update to version 3.1:
  * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were
    removed. All userspace object managers should have been updated to use the
    dynamic class/perm mapping support.
    Use string_to_security_class(3) and string_to_av_perm(3) to map the class
    and permission names to their policy values, or selinux_set_mapping(3) to
    create a mapping from class and permission index values used by the
    application to the policy values.
  * Removed restrictions in libsepol and checkpolicy that required all declared
    initial SIDs to be assigned a context.
  * Support for new policy capability genfs_seclabel_symlinks
  * selinuxfs is mounted with noexec and nosuid
  * `security_compute_user()` was deprecated
  * Refreshed python3.8-compat.patch
- Update to version 3.0
  * Ignore the stem when looking up all matches in file context
  * Save digest of all partial matches for directory
  * Use Python distutils to install SELinux python bindings
  * ensure that digest_len is not zero
  * fix string conversion of unknown perms
  * mark all exported function "extern"
- Added swig4_moduleimport.patch to prevent import errors due to
  SWIG 4
- Add python3.8-compat.patch which makes build possible even with
  Python 3.8, which doesn’t automatically adds -lpython<ver>
- Disable LTO (boo#1133244).
- Set License: to correct value (bsc#1135710)
- Update to version 2.9
  * Add security_reject_unknown(3) man page
  * Change matchpathcon usage to match with matchpathcon manpage
  * Do not define gettid() if glibc >= 2.30 is used
  * Fix RESOURCE_LEAK defects reported by coverity scan
  * Fix line wrapping in selabel_file.5
  * Do not dereference symlink with statfs in selinux_restorecon
  * Fix overly strict validation of file_contexts.bin
  * Fix selinux_restorecon() on non-SELinux hosts
  * Fix the whatis line for the selinux_boolean_sub.3 manpage
  * Fix printf format string specifier for uint64_t
  * Fix handling of unknown classes/perms
  * Set an appropriate errno in booleans.c
- Dropped python3.patch, is now upstream
- Update to version 2.8 (bsc#1111732). 
  For changes please see
  https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt
- ran spec-cleaner on spec files
- Update to version 2.7.
    * %files needed to be heavily modified
    * Based expressly on python3, not just python 
  For changes please see
  https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt
- Updated spec file to use python3. Added python3.patch to fix
  build
- Update to version 2.6. Notable changes:
  * selinux_restorecon: fix realpath logic
  * sefcontext_compile: invert semantics of "-r" flag
  * sefcontext_compile: Add "-i" flag
  * Introduce configurable backends
  * Add function to find security.restorecon_last entries
  * Add openrc_contexts functions
  * Add support for pcre2
  * Handle NULL pcre study data
  * Add setfiles support to selinux_restorecon(3)
  * Evaluate inodes in selinux_restorecon(3)
  * Change the location of _selinux.so
  * Explain how to free policy type from selinux_getpolicytype()
  * Compare absolute pathname in matchpathcon -V
  * Add selinux_snapperd_contexts_path()
  * Modify audit2why analyze function to use loaded policy
  * Avoid mounting /proc outside of selinux_init_load_policy()
  * Fix location of selinuxfs mount point
  * Only mount /proc if necessary
  * procattr: return einval for <= 0 pid args
  * procattr: return error on invalid pid_t input
- Dropped
  * libselinux-2.2-ruby.patch 
  * libselinux-proc-mount-only-if-needed.patch 
  * python-selinux-swig-3.10.patch
- readv-proto.patch: include <sys/uio.h> for readv prototype
- Update RPM groups, trim description and combine filelist entries.
- Adjusted source link
- add patch: python-selinux-swig-3.10.patch, fixed boo#985368
  * swig-3.10 in Factory use importlib instead of imp to find
    _selinux.so. imp searched the same directory as __init__.py
    is while importlib searchs only standard paths. so we have
    to move _selinux.so. fixed by upstream 
- update version 2.5
  * Add selinux_restorecon function
  * read_spec_entry: fail on non-ascii
  * Add man information about thread specific functions
  * Don't wrap rpm_execcon with DISABLE_RPM with SWIG
  * Correct line count for property and service context files
  * label_file: fix memory leaks and uninitialized jump
  * Replace selabel_digest hash function
  * Fix selabel_open(3) services if no digest requested
  * Add selabel_digest function
  * Flush the class/perm string mapping cache on policy reload
  * Fix restorecon when path has no context
  * Free memory when processing media and x specfiles
  * Fix mmap memory release for file labeling
  * Add policy context validation to sefcontext_compile
  * Do not treat an empty file_contexts(.local) as an error
  * Fail hard on invalid property_contexts entries
  * Fail hard on invalid file_contexts entries
  * Support context validation on file_contexts.bin
  * Add selabel_cmp interface and label_file backend
  * Support specifying file_contexts.bin file path
  * Support file_contexts.bin without file_contexts
  * Simplify procattr cache
  * Use /proc/thread-self when available
  * Add const to selinux_opt for label backends
  * Fix binary file labels for regexes with metachars
  * Fix file labels for regexes with metachars
  * Fix if file_contexts not '\n' terminated
  * Enhance file context support
  * Fix property processing and cleanup formatting
  * Add read_spec_entries function to replace sscanf
  * Support consistent mode size for bin files
  * Fix more bin file processing core dumps
  * add selinux_openssh_contexts_path()
  * setrans_client: minimize overhead when mcstransd is not present
  * Ensure selabel_lookup_best_match links NULL terminated
  * Fix core dumps with corrupt *.bin files
  * Add selabel partial and best match APIs
  * Use os.walk() instead of the deprecated os.path.walk()
  * Remove deprecated mudflap option
  * Mount procfs before checking /proc/filesystems
  * Fix -Wformat errors with gcc-5.0.0
  * label_file:  handle newlines in file names
  * Fix audit2why error handling if SELinux is disabled
  * pcre_study can return NULL without error
  * Only check SELinux enabled status once in selinux_check_access
- changes in 2.4
  * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR
  * Fix bugs found by hardened gcc flags
  * Set the system to permissive if failing to disable SELinux because
    policy has already been loaded
  * Add db_exception and db_datatype support to label_db backend
  * Log an error on unknown classes and permissions
  * Add pcre version string to the compiled file_contexts format
  * Deprecate use of flask.h and av_permissions.h
  * Compiled file_context files and the original should have the same DAC
    permissions
- Update libselinux-2.2-ruby.patch: use RbConfig instead of
  deprecated Config.
- Update to version 2.3 
* Get rid of security_context_t and fix const declarations.
* Refactor rpm_execcon() into a new setexecfilecon() from Guillem Jover.
- Update to version 2.2
  * Fix avc_has_perm() returns -1 even when SELinux is in permissive mode.
  * Support overriding Makefile RANLIB
  * Update pkgconfig definition
  * Mount sysfs before trying to mount selinuxfs.
  * Fix man pages
  * Support overriding PATH  and LIBBASE in Makefile
  * Fix LDFLAGS usage
  * Avoid shadowing stat in load_mmap
  * Support building on older PCRE libraries
  * Fix handling of temporary file in sefcontext_compile
  * Fix procattr cache
  * Define python constants for getenforce result
  * Fix label substitution handling of /
  * Add selinux_current_policy_path from
  * Change get_context_list to only return good matches
  * Support udev-197 and higher
  * Add support for local substitutions
  * Change setfilecon to not return ENOSUP if context is already correct
  * Python wrapper leak fixes
  * Export SELINUX_TRANS_DIR definition in selinux.h
  * Add selinux_systemd_contexts_path
  * Add selinux_set_policy_root
  * Add man page for sefcontext_compile
- Remove libselinux-rhat.patch; merged on upstream
- Adapt libselinux-ruby.patch to upstream changes
- Use fdupes to symlink duplicate manpages
- change the source url to the official 2.1.13 release tarball
- update to 2.1.12
- added BuildRequires: pcre-devel
- Remove obsolete defines/sections
- updated to 2.1.9 again (see below)
- update to libselinux-2.1.9
  * better man pages
  * selinux_status interfaces
  * simple interface for access checks
  * multiple bug fixes
- fix build for ruby-1.9
- use %_smp_mflags
- updated to 2.0.91
  * changes too numerous to list
- add baselibs.conf as a source
- updated selinux-ready script
- change libsepol-devel to libsepol-devel-static in dependencies
  of python bindings
- put libsepol-devel back to Requires of libselinux-devel
- added selinux-ready tool to selinux-tools package
- remove static libraries
- libselinux-devel does not require libsepol-devel
- updated to 2.0.80
  * deny_unknown wrapper function from KaiGai Kohei
  * security_compute_av_flags API from KaiGai Kohei
  * Netlink socket management and callbacks from KaiGai Kohei
  * Netlink socket handoff patch from Adam Jackson
  * AVC caching of compute_create results by Eric Paris
  * fix incorrect conversion in discover_class code
- fixed memory leak (memleak.patch)
- updated to 2.0.77
  * add new function getseuser which will take username and service
    and return seuser and level; ipa will populate file in future
  * change selinuxdefcon to return just the context by default
  * fix segfault if seusers file does not work
  * strip trailing / for matchpathcon
  * fix restorecon python code
- updated to 2.0.76
  * allow shell-style wildcarding in X names
  * add Restorecon/Install python functions
  * correct message types in AVC log messages
  * make matchpathcon -V pass mode
  * add man page for selinux_file_context_cmp
  * update flask headers from refpolicy trunk
- fix debug_packages_requires define
- require only version, not release [bnc#429053]
- updated to 2.0.71
  * Add group support to seusers using %groupname syntax from Dan Walsh.
  * Mark setrans socket close-on-exec from Stephen Smalley.
  * Only apply nodups checking to base file contexts from Stephen Smalley.
  * Merge ruby bindings from Dan Walsh.
- Fix build of debuginfo.
- added baselibs.conf file
- split bindings into separate subpackage (libselinux-bindings)
- split tools into separate subpackage (selinux-tools)
- fix requires for debuginfo package
- initial version 2.0.67
  * based on Fedora package by Dan Walsh <dwalsh@redhat.com>
- (bsc#1212618) Divide libselinux and libselinux-bindings again.
  libselinux itself is in Ring0 so it has to have absolutely
  minimal dependencies, so it is better to separate
  libselinux-bindings into a separate pacakge.

OBS-URL: https://build.opensuse.org/request/show/1102401
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=161
2023-08-07 12:24:31 +00:00
Johannes Segitz
d1efca8160 Accepting request 1096707 from home:jsegitz:branches:security:SELinux
- Fix python packaging by setting the name to a fixed value

OBS-URL: https://build.opensuse.org/request/show/1096707
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=160
2023-07-04 09:22:49 +00:00
Johannes Segitz
18c38b5f6e Accepting request 1095431 from home:mcepl:branches:security:SELinux
- Remove separate libselinux-bindings SPEC file (bsc#1212618).
- Add explicit BuildRequires for python3-pip and python3-wheel on
  15.5, currently the macros don't do the right thing
- allow building this with different python versions, to make this
  usable for the new sle15 macro (using python3.11)
- Add python-wheel build dependency to build correctly with latest
  python-pip version.
- Add _multibuild to define additional spec files as additional
  flavors.
  Eliminates the need for source package links in OBS.
- Add -ffat-lto-objects to CFLAGS to prevent rpmlint errors because
  of LTO
- Enable LTO as it works fine now.
- Update to version 3.5:
  * check for truncations
  * avoid newline in avc message
  * bail out on path truncations
  * add getpidprevcon to gather the previous context before the last
    exec of a given process
  * Workaround for heap overhead of pcre
  * fix memory leaks on the audit2why module init
  * ignore invalid class name lookup
- Drop restorecon_pin_file.patch, is upstream
- Refreshed python3.8-compat.patch
- Added additional developer key (Jason Zaman)
- Fixed initrd check in selinux-ready (bnc#1186127)
- Added restorecon_pin_file.patch. Fixes issus when running 
  fixfiles/restorecon
- Update to version 3.4:
  * Use PCRE2 by default
  * Make selinux_log() and is_context_customizable() thread-safe
  * Prevent leakeing file descriptors
  * Correctly hash specfiles larger than 4G
- Refreshed skip_cycles.patch
- Add Requires for exact libselinux1 version for selinux-tools
- Simplyfied check for correct boot paramaters in selinux-ready
  (bsc#1195361)
- Update to version 3.3:
  * Lots of smaller issues fixed found by fuzzing
- Add missing libselinux-utils Provides to selinux-tools so that
  %selinux_requires works
- Remove Recommends for selinux-autorelabel. It's better to have this
  in the policy package itself (bsc#1181837)
- Switch to pcre2:
  + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8)
  + Pass USE_PCRE2=y to make.
  + Replace pkgconfig(libpcre) Requires in -devel static with
    pkgconfig(libpcre2-8).
- Update to version 3.2:
  * Use mmap()'ed kernel status page instead of netlink by default.
    See "KERNEL STATUS PAGE" section in avc_init(3) for more details.
  * New log callback levels for enforcing and policy load notices -
    SELINUX_POLICYLOAD, SELINUX_SETENFORCE
  * Changed userspace AVC setenforce and policy load messages to audit
    format.
- Add Recommends: selinux-autorelabel, which is very important
  for healthy use of the SELinux on the system (/.autorelabel
  mechanism) (bsc#1181837).
- install to /usr (boo#1029961)
- Update to version 3.1:
  * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were
    removed. All userspace object managers should have been updated to use the
    dynamic class/perm mapping support.
    Use string_to_security_class(3) and string_to_av_perm(3) to map the class
    and permission names to their policy values, or selinux_set_mapping(3) to
    create a mapping from class and permission index values used by the
    application to the policy values.
  * Removed restrictions in libsepol and checkpolicy that required all declared
    initial SIDs to be assigned a context.
  * Support for new policy capability genfs_seclabel_symlinks
  * selinuxfs is mounted with noexec and nosuid
  * `security_compute_user()` was deprecated
  * Refreshed python3.8-compat.patch
- Added skip_cycles.patch to skip directory cycles and not error
  out
- Update to version 3.0
  * Ignore the stem when looking up all matches in file context
  * Save digest of all partial matches for directory
  * Use Python distutils to install SELinux python bindings
  * ensure that digest_len is not zero
  * fix string conversion of unknown perms
  * mark all exported function "extern"
  Dropped Use-Python-distutils-to-install-SELinux.patch, included
  upstream
- Added swig4_moduleimport.patch to prevent import errors due to
  SWIG 4
- Added Use-Python-distutils-to-install-SELinux.patch to use 
  Python's distutils instead of building and installing python 
  bindings manually
- Add python3.8-compat.patch which makes build possible even with
  Python 3.8, which doesn’t automatically adds -lpython<ver>
- In selinux-ready
  * Removed check for selinux-policy package as we don't ship one
    (bsc#1136845)
  * Add check that restorecond is installed and enabled 
- Disable LTO (boo#1133244).
- Set License: to correct value (bsc#1135710)
- Disable LTO (boo#1133244).
- Update to version 2.9
  * Add security_reject_unknown(3) man page
  * Change matchpathcon usage to match with matchpathcon manpage
  * Do not define gettid() if glibc >= 2.30 is used
  * Fix RESOURCE_LEAK defects reported by coverity scan
  * Fix line wrapping in selabel_file.5
  * Do not dereference symlink with statfs in selinux_restorecon
  * Fix overly strict validation of file_contexts.bin
  * Fix selinux_restorecon() on non-SELinux hosts
  * Fix the whatis line for the selinux_boolean_sub.3 manpage
  * Fix printf format string specifier for uint64_t
  * Fix handling of unknown classes/perms
  * Set an appropriate errno in booleans.c
- Dropped python3.patch, is now upstream
- Remove unneeded build requires for python3 (bsc#1120255) 
- Update to version 2.8 (bsc#1111732)
  For changes please see
  https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt
- ran spec-cleaner on spec files
- Update to version 2.7.
    * %files needed to be heavily modified
    * Based expressly on python3, not just python
  For changes please see
  https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt
- Updated spec file to use python3. Added python3.patch to fix
  build
- Update to version 2.6. Notable changes:
  * selinux_restorecon: fix realpath logic
  * sefcontext_compile: invert semantics of "-r" flag
  * sefcontext_compile: Add "-i" flag
  * Introduce configurable backends
  * Add function to find security.restorecon_last entries
  * Add openrc_contexts functions
  * Add support for pcre2
  * Handle NULL pcre study data
  * Add setfiles support to selinux_restorecon(3)
  * Evaluate inodes in selinux_restorecon(3)
  * Change the location of _selinux.so
  * Explain how to free policy type from selinux_getpolicytype()
  * Compare absolute pathname in matchpathcon -V
  * Add selinux_snapperd_contexts_path()
  * Modify audit2why analyze function to use loaded policy
  * Avoid mounting /proc outside of selinux_init_load_policy()
  * Fix location of selinuxfs mount point
  * Only mount /proc if necessary
  * procattr: return einval for <= 0 pid args
  * procattr: return error on invalid pid_t input
- Dropped
  * libselinux-2.2-ruby.patch 
  * libselinux-proc-mount-only-if-needed.patch 
  * python-selinux-swig-3.10.patch
- readv-proto.patch: include <sys/uio.h> for readv prototype
- -devel static subpackage requires libpcre-devel and libsepol-devel
- Avoid mounting /proc outside of selinux_init_load_policy().
  (Stephen Smalley) reverts upstream 5a8d8c4, 9df4988, fixes
  among other things systemd seccomp sandboxing otherwise all
  filters must allow mount(2)
  (libselinux-proc-mount-only-if-needed.patch)
- Update RPM groups, trim description and combine filelist entries.
- Adjusted source link
- add patch: python-selinux-swig-3.10.patch, fixed boo#985368
  * swig-3.10 in Factory use importlib instead of imp to find
    _selinux.so. imp searched the same directory as __init__.py
    is while importlib searchs only standard paths. so we have
    to move _selinux.so. fixed by upstream
- update version 2.5
  * Add selinux_restorecon function
  * read_spec_entry: fail on non-ascii
  * Add man information about thread specific functions
  * Don't wrap rpm_execcon with DISABLE_RPM with SWIG
  * Correct line count for property and service context files
  * label_file: fix memory leaks and uninitialized jump
  * Replace selabel_digest hash function
  * Fix selabel_open(3) services if no digest requested
  * Add selabel_digest function
  * Flush the class/perm string mapping cache on policy reload
  * Fix restorecon when path has no context
  * Free memory when processing media and x specfiles
  * Fix mmap memory release for file labeling
  * Add policy context validation to sefcontext_compile
  * Do not treat an empty file_contexts(.local) as an error
  * Fail hard on invalid property_contexts entries
  * Fail hard on invalid file_contexts entries
  * Support context validation on file_contexts.bin
  * Add selabel_cmp interface and label_file backend
  * Support specifying file_contexts.bin file path
  * Support file_contexts.bin without file_contexts
  * Simplify procattr cache
  * Use /proc/thread-self when available
  * Add const to selinux_opt for label backends
  * Fix binary file labels for regexes with metachars
  * Fix file labels for regexes with metachars
  * Fix if file_contexts not '\n' terminated
  * Enhance file context support
  * Fix property processing and cleanup formatting
  * Add read_spec_entries function to replace sscanf
  * Support consistent mode size for bin files
  * Fix more bin file processing core dumps
  * add selinux_openssh_contexts_path()
  * setrans_client: minimize overhead when mcstransd is not present
  * Ensure selabel_lookup_best_match links NULL terminated
  * Fix core dumps with corrupt *.bin files
  * Add selabel partial and best match APIs
  * Use os.walk() instead of the deprecated os.path.walk()
  * Remove deprecated mudflap option
  * Mount procfs before checking /proc/filesystems
  * Fix -Wformat errors with gcc-5.0.0
  * label_file:  handle newlines in file names
  * Fix audit2why error handling if SELinux is disabled
  * pcre_study can return NULL without error
  * Only check SELinux enabled status once in selinux_check_access
- changes in 2.4
  * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR
  * Fix bugs found by hardened gcc flags
  * Set the system to permissive if failing to disable SELinux because
    policy has already been loaded
  * Add db_exception and db_datatype support to label_db backend
  * Log an error on unknown classes and permissions
  * Add pcre version string to the compiled file_contexts format
  * Deprecate use of flask.h and av_permissions.h
  * Compiled file_context files and the original should have the same DAC
    permissions
- fixed selinux-ready to work with initrd files created by dracut (bsc#940006)
- Update libselinux-2.2-ruby.patch: use RbConfig instead of
  deprecated Config.
- updated selinux-ready script to handle initrd files compressed with xz
- Update to version 2.3 
* Get rid of security_context_t and fix const declarations.
* Refactor rpm_execcon() into a new setexecfilecon() from Guillem Jover.
- Update to version 2.2
  * Fix avc_has_perm() returns -1 even when SELinux is in permissive mode.
  * Support overriding Makefile RANLIB
  * Update pkgconfig definition
  * Mount sysfs before trying to mount selinuxfs.
  * Fix man pages
  * Support overriding PATH  and LIBBASE in Makefile
  * Fix LDFLAGS usage
  * Avoid shadowing stat in load_mmap
  * Support building on older PCRE libraries
  * Fix handling of temporary file in sefcontext_compile
  * Fix procattr cache
  * Define python constants for getenforce result
  * Fix label substitution handling of /
  * Add selinux_current_policy_path from
  * Change get_context_list to only return good matches
  * Support udev-197 and higher
  * Add support for local substitutions
  * Change setfilecon to not return ENOSUP if context is already correct
  * Python wrapper leak fixes
  * Export SELINUX_TRANS_DIR definition in selinux.h
  * Add selinux_systemd_contexts_path
  * Add selinux_set_policy_root
  * Add man page for sefcontext_compile
- Remove libselinux-rhat.patch; merged on upstream
- Adapt libselinux-ruby.patch to upstream changes
- Use fdupes to symlink duplicate manpages
  
- change the source url to the official 2.1.13 release tarball
- Reuse implicit dependencies injected by pkgconfig
- fixed source url in libselinux-bindings.spec
- removed old tarball
- fix source url
- document changes in libselinux-rhat.patch from previous submission:
  (most code of the removed code was integrated upstream)
  * Add matchpathcon -P /etc/selinux/mls support by allowing users
    to set alternate root
  * Add new constant SETRANS_DIR which points to the directory
    where mstransd can find the socket and libvirt can write its
    translations files
-update to 2.1.13
 * audit2why: make sure path is nul terminated
 * utils: new file context regex compiler
 * label_file: use precompiled filecontext when possible
 * do not leak mmapfd
 * sefcontontext_compile: Add error handling to help debug problems in libsemanage.
 * man: make selinux.8 mention service man pages
 * audit2why: Fix segfault if finish() called twice
 * audit2why: do not leak on multiple init() calls
 * mode_to_security_class: interface to translate a mode_t in to a security class
 * audit2why: Cleanup audit2why analysys function
 * man: Fix program synopsis and function prototypes in man pages
 * man: Fix man pages formatting
 * man: Fix typo in man page
 * man: Add references and man page links to _raw function variants
 * Use ENOTSUP instead of EOPNOTSUPP for getfilecon functions
 * man: context_new(3): fix the return value description
 * selinux_status_open: handle error from sysconf
 * selinux_status_open: do not leak statusfd on exec
 * Fix errors found by coverity
 * Change boooleans.subs to booleans.subs_dist.
 * optimize set*con functions
 * pkg-config do not specifc ruby version
 * unmap file contexts on selabel_close()
 * do not leak file contexts with mmap'd backend
 * sefcontext_compile: do not leak fd on error
 * matchmediacon: do not leak fd
 * src/label_android_property: do not leak fd on error
- update to 2.1.12
- added BuildRequires: pcre-devel
  - added the recent libselinux-rhat.patch
  * Add support for lxc_contexts_path
  * utils: add service to getdefaultcon
  * libsemanage: do not set soname needlessly
  * libsemanage: remove PYTHONLIBDIR and ruby equivalent
  * boolean name equivalency
  * getsebool: support boolean name substitution
  * Add man page for new selinux_boolean_sub function.
  * expose selinux_boolean_sub
  * matchpathcon: add -m option to force file type check
  * utils: avcstat: clear sa_mask set
  * seusers: Check for strchr failure
  * booleans: initialize pointer to silence coveriety
  * stop messages when SELinux disabled
  * Ensure that we only close the selinux netlink socket once.
  * improve the file_contexts.5 manual page
  * Fortify source now requires all code to be compiled with -O flag
  * asprintf return code must be checked
  * avc_netlink_recieve handle EINTR
  * audit2why: silence -Wmissing-prototypes warning
  * libsemanage: remove build warning when build swig c files
  * matchpathcon: bad handling of symlinks in /
  * seusers: remove unused lineno
  * seusers: getseuser: gracefully handle NULL service
  * New Android property labeling backend
  * label_android_property whitespace cleanups
  * additional makefile support for rubywrap
  * Remove jump over variable declaration
  * Fix old style function definitions
  * Fix const-correctness
  * Remove unused flush_class_cache method
  * Add prototype decl for destructor
  * Add more printf format annotations
  * Add printf format attribute annotation to die() method
  * Fix const-ness of parameters & make usage() methods static
  * Enable many more gcc warnings for libselinux/src/ builds
  * utils: Enable many more gcc warnings for libselinux/utils builds
  * Change annotation on include/selinux/avc.h to avoid upsetting SWIG
  * Ensure there is a prototype for 'matchpathcon_lib_destructor'
  * Update Makefiles to handle /usrmove
  * utils: Stop separating out matchpathcon as something special
  * pkg-config to figure out where ruby include files are located
  * build with either ruby 1.9 or ruby 1.8
  * assert if avc_init() not called
  * take security_deny_unknown into account
  * security_compute_create_name(3)
  * Do not link against python library, this is considered
  * bad practice in debian
  * Hide unnecessarily-exported library destructors
- Remove obsolete defines/sections
- update selinux-ready script
  * use -L when stat()ing /etc/selinux/config
  * make sure that SELINUX isn't disabled in /etc/selinux/config
  * look for either of /sys/fs/selinux and /selinux directory
  * use systemctl to check for restorecond
  * don't look for booleans file (deprecated)
- update selinux-ready script
- updated to 2.1.9 again (see below)
- go back even more - everything else requires the full SELinux stack
  (too late for 12.2)
- revert back to 2.0.98 for 12.2
- update to libselinux-2.1.9
  * better man pages
  * selinux_status interfaces
  * simple interface for access checks
  * multiple bug fixes
- fix build for ruby-1.9
- cross-build fix: use %__cc macro
- use %_smp_mflags
- don't package /var/run/setrans in libselinux1 package
  - Feature#303793
  - the directory will be created in initscript of mcstrans package
- buildrequire pkg-config to fix provides
- selinux-ready: added function to check for restorecond in
                 runlevel 3/5 
- selinux-ready: added functions for checking PAM config and
                 policy boolean init_upstart 
- selinux-ready: fixed init ramfs checking 
- added new selinux-ready script 
- updated to 2.0.91
  * changes too numerous to list
- add baselibs.conf as a source
- updated selinux-ready script
- change libsepol-devel to libsepol-devel-static in dependencies
  of python bindings
- put libsepol-devel back to Requires of libselinux-devel
- added selinux-ready tool to selinux-tools package
- remove static libraries
- libselinux-devel does not require libsepol-devel
- updated to 2.0.80
  * deny_unknown wrapper function from KaiGai Kohei
  * security_compute_av_flags API from KaiGai Kohei
  * Netlink socket management and callbacks from KaiGai Kohei
  * Netlink socket handoff patch from Adam Jackson
  * AVC caching of compute_create results by Eric Paris
  * fix incorrect conversion in discover_class code
- fixed memory leak (memleak.patch)
- updated to 2.0.77
  * add new function getseuser which will take username and service
    and return seuser and level; ipa will populate file in future
  * change selinuxdefcon to return just the context by default
  * fix segfault if seusers file does not work
  * strip trailing / for matchpathcon
  * fix restorecon python code
- updated to 2.0.76
  * allow shell-style wildcarding in X names
  * add Restorecon/Install python functions
  * correct message types in AVC log messages
  * make matchpathcon -V pass mode
  * add man page for selinux_file_context_cmp
  * update flask headers from refpolicy trunk
- fix debug_packages_requires define
- require only version, not release [bnc#429053]
- updated to 2.0.71
  * Add group support to seusers using %groupname syntax from Dan Walsh.
  * Mark setrans socket close-on-exec from Stephen Smalley.
  * Only apply nodups checking to base file contexts from Stephen Smalley.
  * Merge ruby bindings from Dan Walsh.
- Fix build of debuginfo.
- added baselibs.conf file
- split bindings into separate subpackage (libselinux-bindings)
- split tools into separate subpackage (selinux-tools)
- fix requires for debuginfo package
- initial version 2.0.67
  * based on Fedora package by Dan Walsh <dwalsh@redhat.com>

OBS-URL: https://build.opensuse.org/request/show/1095431
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=159
2023-06-27 08:15:55 +00:00
Johannes Segitz
932b2e33f0 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=158 2023-06-21 07:27:56 +00:00
Johannes Segitz
74c2cb087e Accepting request 1094093 from home:jsegitz:branches:security:SELinux
- Add explicit BuildRequires for python3-pip and python3-wheel on
  15.5, currently the macros don't do the right thing

OBS-URL: https://build.opensuse.org/request/show/1094093
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=157
2023-06-20 13:52:57 +00:00
Dominique Leuenberger
01ed6a17a8 Accepting request 1090941 from security:SELinux
- allow building this with different python versions, to make this
  usable for the new sle15 macro (using python3.11)

OBS-URL: https://build.opensuse.org/request/show/1090941
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=74
2023-06-09 18:35:16 +00:00
Johannes Segitz
68b4fddcd5 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=155 2023-06-05 08:29:28 +00:00
Johannes Segitz
8bc935fc0e Accepting request 1090487 from home:jsegitz:branches:home:ojkastl_buildservice:branches:security:SELinux
- allow building this with different python versions, to make this
  usable for the new sle15 macro (using python3.11)

OBS-URL: https://build.opensuse.org/request/show/1090487
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=154
2023-06-02 12:03:50 +00:00
Dominique Leuenberger
9a309bc959 Accepting request 1085125 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/1085125
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=73
2023-05-07 16:54:26 +00:00
Johannes Segitz
781fce764f Accepting request 1085106 from home:dgarcia:branches:security:SELinux
- Add python-wheel build dependency to build correctly with latest
  python-pip version.
Look at staging:H to see the actual problem
https://build.opensuse.org/package/live_build_log/openSUSE:Factory:Staging:H/libselinux-bindings/standard/x86_64

OBS-URL: https://build.opensuse.org/request/show/1085106
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=152
2023-05-05 13:50:20 +00:00
Johannes Segitz
71d3be4288 Accepting request 1084729 from home:fcrozat:branches:security:SELinux
- Add _multibuild to define additional spec files as additional
  flavors.
  Eliminates the need for source package links in OBS.

- Add _multibuild to define additional spec files as additional
  flavors.
  Eliminates the need for source package links in OBS.

OBS-URL: https://build.opensuse.org/request/show/1084729
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=151
2023-05-05 07:29:50 +00:00
Johannes Segitz
3db7e99550 Accepting request 1074195 from home:jsegitz:branches:security:SELinux
- Add -ffat-lto-objects to CFLAGS to prevent rpmlint errors because
  of LTO

OBS-URL: https://build.opensuse.org/request/show/1074195
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=150
2023-03-24 14:08:42 +00:00
Johannes Segitz
90defc5b22 Accepting request 1073997 from home:marxin:branches:security:SELinux
- Enable LTO as it works fine now.

- Enable LTO as it works fine now.

OBS-URL: https://build.opensuse.org/request/show/1073997
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=149
2023-03-24 13:25:03 +00:00
Dominique Leuenberger
2523e0dd9d Accepting request 1068396 from security:SELinux
SELinux 3.5 toolchain

OBS-URL: https://build.opensuse.org/request/show/1068396
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=72
2023-03-07 15:48:18 +00:00
Johannes Segitz
5ccbf70831 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=147 2023-02-24 09:11:29 +00:00
Johannes Segitz
2bc75a4367 - Refreshed python3.8-compat.patch
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=146
2023-02-24 08:56:26 +00:00
Johannes Segitz
5bc0b87998 Accepting request 1067536 from home:jsegitz:branches:security:SELinux_toolchain
- Update to version 3.5:
  * check for truncations
  * avoid newline in avc message
  * bail out on path truncations
  * add getpidprevcon to gather the previous context before the last
    exec of a given process
  * Workaround for heap overhead of pcre
  * fix memory leaks on the audit2why module init
  * ignore invalid class name lookup
- Drop restorecon_pin_file.patch, is upstream
- Added additional developer key (Jason Zaman)

- Update to version 3.5:
  * check for truncations
  * avoid newline in avc message
  * bail out on path truncations
  * add getpidprevcon to gather the previous context before the last
    exec of a given process
  * Workaround for heap overhead of pcre
  * fix memory leaks on the audit2why module init
  * ignore invalid class name lookup
- Drop restorecon_pin_file.patch, is upstream
- Added additional developer key (Jason Zaman)

OBS-URL: https://build.opensuse.org/request/show/1067536
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=145
2023-02-24 08:43:11 +00:00
Richard Brown
7a7e3bbc03 Accepting request 988988 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/988988
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=71
2022-07-18 16:32:42 +00:00
Johannes Segitz
e9ab567ff0 Accepting request 988987 from home:jsegitz:branches:security:SELinux
- Fixed initrd check in selinux-ready (bnc#1186127)

- Added restorecon_pin_file.patch. Fixes issus when running 
  fixfiles/restorecon

OBS-URL: https://build.opensuse.org/request/show/988987
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=143
2022-07-13 12:17:44 +00:00
Dominique Leuenberger
3cdf9f8d26 Accepting request 978304 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/978304
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=70
2022-06-20 13:36:49 +00:00
Johannes Segitz
0b9c3483a5 Accepting request 978290 from home:jsegitz:branches:security:SELinux
- Update to version 3.4:
  * Use PCRE2 by default
  * Make selinux_log() and is_context_customizable() thread-safe
  * Prevent leakeing file descriptors
  * Correctly hash specfiles larger than 4G
- Refreshed skip_cycles.patch

- Update to version 3.4:
  * Use PCRE2 by default
  * Make selinux_log() and is_context_customizable() thread-safe
  * Prevent leakeing file descriptors
  * Correctly hash specfiles larger than 4G
- Refreshed skip_cycles.patch

OBS-URL: https://build.opensuse.org/request/show/978290
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=141
2022-05-20 14:53:35 +00:00
Dominique Leuenberger
de1f0c2bcc Accepting request 956619 from security:SELinux
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/956619
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=69
2022-02-25 20:24:45 +00:00
Johannes Segitz
bf12ad7659 - Simplyfied check for correct boot paramaters in selinux-ready
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=140
2022-02-15 08:03:21 +00:00
Johannes Segitz
b6905172e8 - Add Requires for exact libselinux1 version for selinux-tools
(bsc#1195361)

OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=139
2022-02-15 07:50:34 +00:00
Dominique Leuenberger
39a28afeb8 Accepting request 930941 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/930941
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=68
2021-11-15 14:26:05 +00:00
Johannes Segitz
b9d0e7ecc5 Accepting request 930928 from home:jsegitz:branches:security:SELinux
- Update to version 3.3:
  * Lots of smaller issues fixed found by fuzzing

- Update to version 3.3:
  * Lots of smaller issues fixed found by fuzzing

OBS-URL: https://build.opensuse.org/request/show/930928
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=138
2021-11-11 16:01:53 +00:00
Dominique Leuenberger
3444265a93 Accepting request 907736 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/907736
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=67
2021-07-25 18:09:09 +00:00
Johannes Segitz
a70a6630a5 Accepting request 906915 from home:gmbr3:Active
- Add missing libselinux-utils Provides to selinux-tools so that
  %selinux_requires works

OBS-URL: https://build.opensuse.org/request/show/906915
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=137
2021-07-22 12:03:41 +00:00
Dominique Leuenberger
2fef3f9e18 Accepting request 888478 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/888478
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=66
2021-04-29 20:44:22 +00:00
Johannes Segitz
3c5892f794 Accepting request 888475 from home:jsegitz:branches:security:SELinux
- Remove Recommends for selinux-autorelabel. It's better to have this
  in the policy package itself (bsc#1181837)

OBS-URL: https://build.opensuse.org/request/show/888475
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=135
2021-04-26 12:07:46 +00:00
Dominique Leuenberger
97f837bbb9 Accepting request 879862 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/879862
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=65
2021-03-24 15:09:01 +00:00
Johannes Segitz
04bc1b7bdc Accepting request 879710 from home:dimstar:Factory
- Switch to pcre2:
  + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8)
  + Pass USE_PCRE2=y to make.

As we have currently pcre2 AND pcre in the distro bootstrap, I'm trying to clean that up a little bit

Thie will hopefully allow to keep pcre2, but get rid of pcre - making the bootstrap cycle a little bit smaller
(Requires a Preinstall: libprcre2-8-0 in prjconf, which should replace the existing preinstall libpcre0 we already have)

OBS-URL: https://build.opensuse.org/request/show/879710
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=133
2021-03-18 10:08:18 +00:00
Johannes Segitz
1d19f598e4 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=132 2021-03-12 07:59:14 +00:00
Dominique Leuenberger
851ea4fad9 Accepting request 870223 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/870223
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=64
2021-02-11 11:45:41 +00:00
Johannes Segitz
3acfdcf315 Accepting request 869988 from home:mcepl:branches:security:SELinux
- Add Recommends: selinux-autorelabel, which is very important
  for healthy use of the SELinux on the system (/.autorelabel
  mechanism) (bsc#1181837).

OBS-URL: https://build.opensuse.org/request/show/869988
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=130
2021-02-08 09:39:48 +00:00
Dominique Leuenberger
8643e23761 Accepting request 849697 from security:SELinux
OBS-URL: https://build.opensuse.org/request/show/849697
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=63
2020-11-26 22:09:03 +00:00
Johannes Segitz
a84c4188f5 Accepting request 849625 from home:lnussel:usrmove
- install to /usr (boo#1029961)

OBS-URL: https://build.opensuse.org/request/show/849625
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/libselinux?expand=0&rev=128
2020-11-20 15:12:12 +00:00
Dominique Leuenberger
1acf9db454 Accepting request 832090 from security:SELinux
please stage with updated gcc to prevent build failures

OBS-URL: https://build.opensuse.org/request/show/832090
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libselinux?expand=0&rev=62
2020-10-06 15:06:38 +00:00