rpms/policycoreutils/devel policycoreutils-gui.patch, 1.99, 1.100 policycoreutils.spec, 1.676, 1.677
Daniel J Walsh
dwalsh at fedoraproject.org
Thu Jan 28 17:19:02 UTC 2010
- Previous message: rpms/ggz-base-libs/devel ggz-base-libs.spec,1.7,1.8
- Next message: rpms/smolt/devel .cvsignore, 1.28, 1.29 smolt.spec, 1.78, 1.79 sources, 1.29, 1.30 0001-Client-Hopefully-fix-encoding-trouble.patch, 1.1, NONE 0001-Don-t-print-information-about-the-pager-when-using.patch, 1.1, NONE 0001-rhpl.iconv-is-not-required-anymore-by-firstboot.patch, 1.1, NONE 0002-fixes-the-p-option.patch, 1.1, NONE scan.patch, 1.1, NONE smolt.py.patch, 1.1, NONE
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: dwalsh
Update of /cvs/pkgs/rpms/policycoreutils/devel
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv7961
Modified Files:
policycoreutils-gui.patch policycoreutils.spec
Log Message:
* Thu Jan 28 2010 Dan Walsh <dwalsh at redhat.com> 2.0.78-15
- Add use_resolve to sepolgen
policycoreutils-gui.patch:
Makefile | 40
booleansPage.py | 247 +++
domainsPage.py | 154 ++
fcontextPage.py | 223 ++
html_util.py | 164 ++
lockdown.glade | 771 ++++++++++
lockdown.gladep | 7
lockdown.py | 382 ++++
loginsPage.py | 185 ++
mappingsPage.py | 56
modulesPage.py | 190 ++
polgen.glade | 3305 +++++++++++++++++++++++++++++++++++++++++++
polgen.gladep | 7
polgen.py | 1212 +++++++++++++++
polgengui.py | 627 ++++++++
portsPage.py | 259 +++
selinux.tbl | 234 +++
semanagePage.py | 168 ++
statusPage.py | 190 ++
system-config-selinux.glade | 3024 +++++++++++++++++++++++++++++++++++++++
system-config-selinux.gladep | 7
system-config-selinux.py | 187 ++
templates/__init__.py | 18
templates/boolean.py | 40
templates/etc_rw.py | 129 +
templates/executable.py | 363 ++++
templates/network.py | 80 +
templates/rw.py | 127 +
templates/script.py | 126 +
templates/semodule.py | 41
templates/tmp.py | 97 +
templates/user.py | 182 ++
templates/var_lib.py | 158 ++
templates/var_log.py | 110 +
templates/var_run.py | 118 +
templates/var_spool.py | 129 +
usersPage.py | 150 +
37 files changed, 13507 insertions(+)
Index: policycoreutils-gui.patch
===================================================================
RCS file: /cvs/pkgs/rpms/policycoreutils/devel/policycoreutils-gui.patch,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -p -r1.99 -r1.100
--- policycoreutils-gui.patch 21 Jan 2010 14:35:19 -0000 1.99
+++ policycoreutils-gui.patch 28 Jan 2010 17:19:01 -0000 1.100
@@ -6414,8 +6414,8 @@ diff --exclude-from=exclude -N -u -r nsa
+ app.stand_alone()
diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/polgen.py policycoreutils-2.0.78/gui/polgen.py
--- nsapolicycoreutils/gui/polgen.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/gui/polgen.py 2010-01-08 10:18:49.000000000 -0500
-@@ -0,0 +1,1197 @@
++++ policycoreutils-2.0.78/gui/polgen.py 2010-01-28 12:17:31.000000000 -0500
+@@ -0,0 +1,1212 @@
+#!/usr/bin/python
+#
+# Copyright (C) 2007, 2008, 2009 Red Hat
@@ -6614,6 +6614,9 @@ diff --exclude-from=exclude -N -u -r nsa
+ self.symbols["openlog"] = "set_use_kerberos(True)"
+ self.symbols["openlog"] = "set_use_kerb_rcache(True)"
+ self.symbols["openlog"] = "set_use_syslog(True)"
++ self.symbols["gethostby"] = "set_use_resolve(True)"
++ self.symbols["getaddrinfo"] = "set_use_resolve(True)"
++ self.symbols["getnameinfo"] = "set_use_resolve(True)"
+ self.symbols["krb"] = "set_use_kerberos(True)"
+ self.symbols["gss_accept_sec_context"] = "set_manage_krb5_rcache(True)"
+ self.symbols["krb5_verify_init_creds"] = "set_manage_krb5_rcache(True)"
@@ -6624,7 +6627,6 @@ diff --exclude-from=exclude -N -u -r nsa
+ self.symbols["dbus_"] = "set_use_dbus(True)"
+ self.symbols["pam_"] = "set_use_pam(True)"
+ self.symbols["pam_"] = "set_use_audit(True)"
-+
+ self.symbols["fork"] = "add_process('fork')"
+ self.symbols["transition"] = "add_process('transition')"
+ self.symbols["sigchld"] = "add_process('sigchld')"
@@ -6816,6 +6818,12 @@ diff --exclude-from=exclude -N -u -r nsa
+ def set_out_udp(self, all, ports):
+ self.out_udp = [ all , False, False, verify_ports(ports) ]
+
++ def set_use_resolve(self, val):
++ if val != True and val != False:
++ raise ValueError(_("use_resolve must be a boolean value "))
++
++ self.use_resolve = val
++
+ def set_use_syslog(self, val):
+ if val != True and val != False:
+ raise ValueError(_("use_syslog must be a boolean value "))
@@ -6873,6 +6881,12 @@ diff --exclude-from=exclude -N -u -r nsa
+ else:
+ return ""
+
++ def generate_resolve_rules(self):
++ if self.use_resolve:
++ return re.sub("TEMPLATETYPE", self.name, executable.te_resolve_rules)
++ else:
++ return ""
++
+ def generate_kerberos_rules(self):
+ if self.use_kerberos:
+ return re.sub("TEMPLATETYPE", self.name, executable.te_kerberos_rules)
@@ -7283,6 +7297,7 @@ diff --exclude-from=exclude -N -u -r nsa
+ newte += self.generate_tmp_rules()
+ newte += self.generate_uid_rules()
+ newte += self.generate_syslog_rules()
++ newte += self.generate_resolve_rules()
+ newte += self.generate_pam_rules()
+ newte += self.generate_dbus_rules()
+ newte += self.generate_audit_rules()
@@ -11889,8 +11904,8 @@ diff --exclude-from=exclude -N -u -r nsa
+"""
diff --exclude-from=exclude -N -u -r nsapolicycoreutils/gui/templates/executable.py policycoreutils-2.0.78/gui/templates/executable.py
--- nsapolicycoreutils/gui/templates/executable.py 1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/gui/templates/executable.py 2010-01-21 08:18:05.000000000 -0500
-@@ -0,0 +1,359 @@
++++ policycoreutils-2.0.78/gui/templates/executable.py 2010-01-28 12:17:43.000000000 -0500
+@@ -0,0 +1,363 @@
+# Copyright (C) 2007-2009 Red Hat
+# see file 'COPYING' for use and warranty information
+#
@@ -12031,6 +12046,10 @@ diff --exclude-from=exclude -N -u -r nsa
+logging_send_syslog_msg(TEMPLATETYPE_t)
+"""
+
++te_resolve_rules="""
++sysnet_dns_name_resolve(TEMPLATETYPE_t)
++"""
++
+te_pam_rules="""
+auth_domtrans_chk_passwd(TEMPLATETYPE_t)
+"""
Index: policycoreutils.spec
===================================================================
RCS file: /cvs/pkgs/rpms/policycoreutils/devel/policycoreutils.spec,v
retrieving revision 1.676
retrieving revision 1.677
diff -u -p -r1.676 -r1.677
--- policycoreutils.spec 27 Jan 2010 21:52:29 -0000 1.676
+++ policycoreutils.spec 28 Jan 2010 17:19:02 -0000 1.677
@@ -6,7 +6,7 @@
Summary: SELinux policy core utilities
Name: policycoreutils
Version: 2.0.78
-Release: 14%{?dist}
+Release: 15%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: http://www.nsa.gov/selinux/archives/policycoreutils-%{version}.tgz
@@ -297,6 +297,9 @@ fi
exit 0
%changelog
+* Thu Jan 28 2010 Dan Walsh <dwalsh at redhat.com> 2.0.78-15
+- Add use_resolve to sepolgen
+
* Wed Jan 27 2010 Dan Walsh <dwalsh at redhat.com> 2.0.78-14
- Add session capability to sandbox
- sandbox -SX -H ~/.homedir -t unconfined_t -l s0:c15 /etc/gdm/Xsession
- Previous message: rpms/ggz-base-libs/devel ggz-base-libs.spec,1.7,1.8
- Next message: rpms/smolt/devel .cvsignore, 1.28, 1.29 smolt.spec, 1.78, 1.79 sources, 1.29, 1.30 0001-Client-Hopefully-fix-encoding-trouble.patch, 1.1, NONE 0001-Don-t-print-information-about-the-pager-when-using.patch, 1.1, NONE 0001-rhpl.iconv-is-not-required-anymore-by-firstboot.patch, 1.1, NONE 0002-fixes-the-p-option.patch, 1.1, NONE scan.patch, 1.1, NONE smolt.py.patch, 1.1, NONE
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the scm-commits
mailing list