rpms/selinux-policy/F-12 policy-20100106.patch, 1.57, 1.58 selinux-policy.spec, 1.1043, 1.1044
Miroslav Grepl
mgrepl at fedoraproject.org
Fri Apr 2 12:42:13 UTC 2010
- Previous message: rpms/yaml-cpp/F-11 .cvsignore, 1.3, 1.4 sources, 1.3, 1.4 yaml-cpp.spec, 1.2, 1.3
- Next message: rpms/icu/devel icu.icu7567.libctest.patch, NONE, 1.1 icu.spec, 1.106, 1.107
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: mgrepl
Update of /cvs/pkgs/rpms/selinux-policy/F-12
In directory cvs01.phx2.fedoraproject.org:/tmp/cvs-serv6361
Modified Files:
policy-20100106.patch selinux-policy.spec
Log Message:
- Allow hald to manage block device files
policy-20100106.patch:
config/appconfig-mcs/x_contexts | 109 ----
config/appconfig-mls/x_contexts | 109 ----
config/appconfig-standard/x_contexts | 109 ----
policy/flask/access_vectors | 55 +-
policy/flask/security_classes | 4
policy/modules/admin/alsa.te | 2
policy/modules/admin/consoletype.if | 4
policy/modules/admin/dmesg.fc | 1
policy/modules/admin/logrotate.te | 13
policy/modules/admin/logwatch.te | 5
policy/modules/admin/mcelog.fc | 2
policy/modules/admin/mcelog.if | 20
policy/modules/admin/mcelog.te | 31 +
policy/modules/admin/netutils.fc | 1
policy/modules/admin/netutils.te | 6
policy/modules/admin/prelink.te | 3
policy/modules/admin/quota.te | 1
policy/modules/admin/readahead.te | 3
policy/modules/admin/rpm.if | 60 ++
policy/modules/admin/rpm.te | 2
policy/modules/admin/shutdown.fc | 5
policy/modules/admin/shutdown.if | 100 ++++
policy/modules/admin/shutdown.te | 57 ++
policy/modules/admin/smoltclient.te | 2
policy/modules/admin/usermanage.te | 8
policy/modules/admin/vbetool.te | 13
policy/modules/admin/vpn.te | 7
policy/modules/apps/cdrecord.te | 2
policy/modules/apps/chrome.if | 5
policy/modules/apps/chrome.te | 15
policy/modules/apps/execmem.if | 10
policy/modules/apps/firewallgui.te | 6
policy/modules/apps/gnome.fc | 9
policy/modules/apps/gnome.if | 99 +++-
policy/modules/apps/gnome.te | 8
policy/modules/apps/gpg.fc | 2
policy/modules/apps/gpg.te | 10
policy/modules/apps/java.if | 1
policy/modules/apps/java.te | 1
policy/modules/apps/kdumpgui.te | 4
policy/modules/apps/livecd.if | 57 ++
policy/modules/apps/livecd.te | 9
policy/modules/apps/mozilla.fc | 1
policy/modules/apps/mozilla.if | 36 +
policy/modules/apps/nsplugin.fc | 1
policy/modules/apps/nsplugin.if | 40 +
policy/modules/apps/nsplugin.te | 10
policy/modules/apps/openoffice.if | 1
policy/modules/apps/podsleuth.te | 1
policy/modules/apps/ptchown.te | 1
policy/modules/apps/pulseaudio.fc | 7
policy/modules/apps/pulseaudio.if | 70 ++
policy/modules/apps/pulseaudio.te | 41 +
policy/modules/apps/qemu.te | 1
policy/modules/apps/sambagui.te | 4
policy/modules/apps/sandbox.if | 54 +-
policy/modules/apps/sandbox.te | 49 +
policy/modules/apps/slocate.te | 3
policy/modules/apps/vmware.if | 18
policy/modules/apps/vmware.te | 11
policy/modules/apps/wine.if | 5
policy/modules/apps/wine.te | 18
policy/modules/apps/wm.if | 16
policy/modules/kernel/corecommands.fc | 5
policy/modules/kernel/corenetwork.if.in | 279 ++++++++++-
policy/modules/kernel/corenetwork.te.in | 46 -
policy/modules/kernel/devices.fc | 5
policy/modules/kernel/devices.if | 335 ++++++++++++-
policy/modules/kernel/devices.te | 25 -
policy/modules/kernel/domain.if | 24
policy/modules/kernel/domain.te | 6
policy/modules/kernel/files.fc | 2
policy/modules/kernel/files.if | 352 +++++++++++---
policy/modules/kernel/files.te | 7
policy/modules/kernel/filesystem.if | 212 ++++++++
policy/modules/kernel/filesystem.te | 12
policy/modules/kernel/kernel.if | 54 ++
policy/modules/kernel/terminal.if | 247 +++++++++-
policy/modules/roles/auditadm.te | 2
policy/modules/roles/secadm.te | 2
policy/modules/roles/staff.te | 20
policy/modules/roles/sysadm.te | 12
policy/modules/roles/unconfineduser.fc | 5
policy/modules/roles/unconfineduser.te | 17
policy/modules/roles/unprivuser.te | 2
policy/modules/roles/xguest.te | 7
policy/modules/services/abrt.if | 5
policy/modules/services/abrt.te | 26 +
policy/modules/services/afs.te | 10
policy/modules/services/aisexec.fc | 2
policy/modules/services/aisexec.te | 8
policy/modules/services/amavis.te | 1
policy/modules/services/apache.fc | 11
policy/modules/services/apache.if | 48 +
policy/modules/services/apache.te | 47 +
policy/modules/services/apcupsd.te | 6
policy/modules/services/arpwatch.te | 2
policy/modules/services/asterisk.if | 19
policy/modules/services/asterisk.te | 1
policy/modules/services/avahi.fc | 2
policy/modules/services/avahi.if | 1
policy/modules/services/bind.if | 19
policy/modules/services/bluetooth.te | 2
policy/modules/services/cachefilesd.fc | 28 +
policy/modules/services/cachefilesd.if | 41 +
policy/modules/services/cachefilesd.te | 146 +++++
policy/modules/services/ccs.te | 6
policy/modules/services/chronyd.fc | 2
policy/modules/services/chronyd.te | 15
policy/modules/services/clogd.if | 24
policy/modules/services/clogd.te | 7
policy/modules/services/cobbler.fc | 5
policy/modules/services/cobbler.if | 156 ++++++
policy/modules/services/cobbler.te | 132 +++++
policy/modules/services/consolekit.te | 19
policy/modules/services/corosync.fc | 3
policy/modules/services/corosync.te | 15
policy/modules/services/cron.if | 18
policy/modules/services/cron.te | 9
policy/modules/services/cups.te | 8
policy/modules/services/dbus.if | 7
policy/modules/services/dcc.te | 2
policy/modules/services/devicekit.fc | 4
policy/modules/services/devicekit.te | 14
policy/modules/services/dhcp.if | 19
policy/modules/services/dhcp.te | 4
policy/modules/services/djbdns.if | 38 +
policy/modules/services/djbdns.te | 8
policy/modules/services/dnsmasq.fc | 2
policy/modules/services/dnsmasq.if | 38 +
policy/modules/services/dnsmasq.te | 8
policy/modules/services/dovecot.te | 6
policy/modules/services/exim.if | 18
policy/modules/services/fail2ban.if | 18
policy/modules/services/ftp.fc | 2
policy/modules/services/ftp.if | 37 +
policy/modules/services/ftp.te | 116 ++++
policy/modules/services/git.fc | 17
policy/modules/services/git.if | 466 ++++++++++++++----
policy/modules/services/git.te | 145 +++--
policy/modules/services/gpm.fc | 2
policy/modules/services/hal.te | 36 +
policy/modules/services/inn.te | 1
policy/modules/services/kerberos.if | 21
policy/modules/services/ldap.fc | 3
policy/modules/services/ldap.te | 13
policy/modules/services/likewise.fc | 54 ++
policy/modules/services/likewise.if | 105 ++++
policy/modules/services/likewise.te | 247 ++++++++++
policy/modules/services/lircd.te | 7
policy/modules/services/mailman.te | 1
policy/modules/services/memcached.te | 14
policy/modules/services/modemmanager.te | 2
policy/modules/services/mta.if | 38 +
policy/modules/services/mta.te | 1
policy/modules/services/munin.te | 3
policy/modules/services/mysql.te | 8
policy/modules/services/nagios.fc | 46 +
policy/modules/services/nagios.if | 28 +
policy/modules/services/nagios.te | 90 +++
policy/modules/services/networkmanager.fc | 1
policy/modules/services/networkmanager.if | 19
policy/modules/services/networkmanager.te | 2
policy/modules/services/nis.fc | 5
policy/modules/services/nis.te | 8
policy/modules/services/nut.te | 11
policy/modules/services/nx.if | 18
policy/modules/services/openvpn.te | 10
policy/modules/services/plymouth.fc | 5
policy/modules/services/plymouth.if | 304 ------------
policy/modules/services/plymouth.te | 102 ----
policy/modules/services/plymouthd.fc | 9
policy/modules/services/plymouthd.if | 322 +++++++++++++
policy/modules/services/plymouthd.te | 106 ++++
policy/modules/services/policykit.te | 21
policy/modules/services/postfix.if | 37 +
policy/modules/services/postfix.te | 9
policy/modules/services/ppp.fc | 2
policy/modules/services/ppp.te | 9
policy/modules/services/prelude.te | 2
policy/modules/services/qmail.if | 18
policy/modules/services/qpidd.fc | 9
policy/modules/services/qpidd.if | 236 +++++++++
policy/modules/services/qpidd.te | 61 ++
policy/modules/services/rgmanager.if | 40 +
policy/modules/services/rgmanager.te | 58 +-
policy/modules/services/rhcs.fc | 9
policy/modules/services/rhcs.if | 58 ++
policy/modules/services/rhcs.te | 278 ++---------
policy/modules/services/ricci.te | 8
policy/modules/services/rpc.if | 1
policy/modules/services/rpc.te | 8
policy/modules/services/rsync.if | 38 +
policy/modules/services/rsync.te | 1
policy/modules/services/samba.te | 20
policy/modules/services/sasl.te | 2
policy/modules/services/sendmail.te | 4
policy/modules/services/setroubleshoot.te | 4
policy/modules/services/snmp.te | 5
policy/modules/services/snort.te | 2
policy/modules/services/spamassassin.if | 18
policy/modules/services/spamassassin.te | 6
policy/modules/services/squid.te | 12
policy/modules/services/ssh.if | 4
policy/modules/services/ssh.te | 84 ---
policy/modules/services/sssd.fc | 4
policy/modules/services/sssd.if | 85 ++-
policy/modules/services/sssd.te | 20
policy/modules/services/tftp.if | 20
policy/modules/services/tftp.te | 1
policy/modules/services/tgtd.te | 1
policy/modules/services/tor.fc | 1
policy/modules/services/tuned.fc | 3
policy/modules/services/tuned.te | 15
policy/modules/services/ucspitcp.te | 5
policy/modules/services/usbmuxd.fc | 6
policy/modules/services/usbmuxd.if | 64 ++
policy/modules/services/usbmuxd.te | 51 ++
policy/modules/services/virt.if | 10
policy/modules/services/virt.te | 26 -
policy/modules/services/xserver.fc | 18
policy/modules/services/xserver.if | 738 ++++++++++--------------------
policy/modules/services/xserver.te | 389 ++++++++-------
policy/modules/system/application.te | 16
policy/modules/system/authlogin.if | 4
policy/modules/system/daemontools.if | 62 ++
policy/modules/system/daemontools.te | 26 -
policy/modules/system/fstools.fc | 2
policy/modules/system/hostname.te | 3
policy/modules/system/hotplug.te | 4
policy/modules/system/init.if | 38 +
policy/modules/system/init.te | 28 +
policy/modules/system/ipsec.te | 13
policy/modules/system/iptables.if | 10
policy/modules/system/iptables.te | 6
policy/modules/system/iscsi.fc | 3
policy/modules/system/iscsi.te | 10
policy/modules/system/libraries.fc | 27 -
policy/modules/system/locallogin.te | 22
policy/modules/system/logging.fc | 7
policy/modules/system/logging.if | 18
policy/modules/system/logging.te | 10
policy/modules/system/lvm.fc | 1
policy/modules/system/lvm.if | 4
policy/modules/system/lvm.te | 6
policy/modules/system/miscfiles.fc | 5
policy/modules/system/miscfiles.if | 37 +
policy/modules/system/modutils.te | 2
policy/modules/system/mount.if | 56 ++
policy/modules/system/mount.te | 56 ++
policy/modules/system/selinuxutil.if | 21
policy/modules/system/selinuxutil.te | 25 -
policy/modules/system/sosreport.fc | 2
policy/modules/system/sosreport.if | 74 +++
policy/modules/system/sosreport.te | 129 +++++
policy/modules/system/sysnetwork.fc | 1
policy/modules/system/sysnetwork.if | 4
policy/modules/system/sysnetwork.te | 3
policy/modules/system/udev.te | 5
policy/modules/system/unconfined.if | 2
policy/modules/system/userdomain.fc | 2
policy/modules/system/userdomain.if | 45 +
policy/modules/system/xen.if | 2
policy/modules/system/xen.te | 22
policy/support/obj_perm_sets.spt | 8
policy/users | 2
266 files changed, 7448 insertions(+), 2387 deletions(-)
Index: policy-20100106.patch
===================================================================
RCS file: /cvs/pkgs/rpms/selinux-policy/F-12/policy-20100106.patch,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -p -r1.57 -r1.58
--- policy-20100106.patch 30 Mar 2010 14:31:43 -0000 1.57
+++ policy-20100106.patch 2 Apr 2010 12:42:12 -0000 1.58
@@ -4886,7 +4886,7 @@ diff -b -B --ignore-all-space --exclude-
# Rules for all filesystem types
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/kernel.if serefpolicy-3.6.32/policy/modules/kernel/kernel.if
--- nsaserefpolicy/policy/modules/kernel/kernel.if 2010-01-18 18:24:22.708530703 +0100
-+++ serefpolicy-3.6.32/policy/modules/kernel/kernel.if 2010-03-03 10:57:00.705612069 +0100
++++ serefpolicy-3.6.32/policy/modules/kernel/kernel.if 2010-04-02 14:36:27.722599933 +0200
@@ -610,6 +610,24 @@
search_dirs_pattern($1, debugfs_t, debugfs_t)
')
@@ -4912,7 +4912,32 @@ diff -b -B --ignore-all-space --exclude-
########################################
## <summary>
## Read information from the debugging filesystem.
-@@ -2732,3 +2750,21 @@
+@@ -2063,6 +2081,24 @@
+ dontaudit $1 unlabeled_t:dir list_dir_perms;
+ ')
+
++#######################################
++## <summary>
++## Read and write unlabeled files.
++## </summary>
++## <param name="domain">
++## <summary>
++## Domain allowed access.
++## </summary>
++## </param>
++#
++interface(`kernel_rw_unlabeled_files',`
++ gen_require(`
++ type unlabeled_t;
++ ')
++
++ allow $1 unlabeled_t:file rw_file_perms;
++')
++
+ ########################################
+ ## <summary>
+ ## Read and write unlabeled directories.
+@@ -2732,3 +2768,21 @@
allow $1 kernel_t:unix_stream_socket connectto;
')
@@ -5572,7 +5597,7 @@ diff -b -B --ignore-all-space --exclude-
userdom_dontaudit_use_user_terminals(abrt_helper_t)
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/afs.te serefpolicy-3.6.32/policy/modules/services/afs.te
--- nsaserefpolicy/policy/modules/services/afs.te 2010-01-18 18:24:22.729540009 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/afs.te 2010-01-20 13:19:16.795611181 +0100
++++ serefpolicy-3.6.32/policy/modules/services/afs.te 2010-04-02 10:04:52.832602649 +0200
@@ -1,5 +1,5 @@
-policy_module(afs, 1.5.0)
@@ -5589,12 +5614,16 @@ diff -b -B --ignore-all-space --exclude-
allow afs_t self:udp_socket create_socket_perms;
allow afs_t self:fifo_file rw_file_perms;
allow afs_t self:unix_stream_socket create_stream_socket_perms;
-@@ -105,6 +105,8 @@
+@@ -105,6 +105,12 @@
miscfiles_read_localization(afs_t)
+sysnet_dns_name_resolve(afs_t)
+
++ifdef(`hide_broken_symptoms', `
++ kernel_rw_unlabeled_files(afs_t)
++')
++
########################################
#
# AFS bossserver local policy
@@ -8528,7 +8557,7 @@ diff -b -B --ignore-all-space --exclude-
+/var/run/gpm\.pid -- gen_context(system_u:object_r:gpm_var_run_t,s0)
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.te serefpolicy-3.6.32/policy/modules/services/hal.te
--- nsaserefpolicy/policy/modules/services/hal.te 2010-01-18 18:24:22.795530524 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/hal.te 2010-03-30 08:54:31.516876450 +0200
++++ serefpolicy-3.6.32/policy/modules/services/hal.te 2010-04-02 10:03:49.167852833 +0200
@@ -1,5 +1,5 @@
-policy_module(hal, 1.12.0)
@@ -8556,7 +8585,15 @@ diff -b -B --ignore-all-space --exclude-
dev_read_urand(hald_t)
dev_read_input(hald_t)
dev_read_mouse(hald_t)
-@@ -165,7 +166,6 @@
+@@ -128,6 +129,7 @@
+ dev_read_lvm_control(hald_t)
+ dev_getattr_all_chr_files(hald_t)
+ dev_manage_generic_chr_files(hald_t)
++dev_manage_generic_blk_files(hald_t)
+ dev_rw_generic_usb_dev(hald_t)
+ dev_setattr_generic_usb_dev(hald_t)
+ dev_setattr_usbfs_files(hald_t)
+@@ -165,7 +167,6 @@
fs_unmount_dos_fs(hald_t)
fs_manage_dos_files(hald_t)
fs_manage_fusefs_dirs(hald_t)
@@ -8564,7 +8601,7 @@ diff -b -B --ignore-all-space --exclude-
fs_rw_removable_blk_files(hald_t)
files_getattr_all_mountpoints(hald_t)
-@@ -186,7 +186,7 @@
+@@ -186,7 +187,7 @@
# hal_probe_serial causes these
term_setattr_unallocated_ttys(hald_t)
@@ -8573,7 +8610,7 @@ diff -b -B --ignore-all-space --exclude-
auth_use_nsswitch(hald_t)
-@@ -215,9 +215,9 @@
+@@ -215,9 +216,9 @@
seutil_read_default_contexts(hald_t)
seutil_read_file_contexts(hald_t)
@@ -8584,7 +8621,7 @@ diff -b -B --ignore-all-space --exclude-
sysnet_read_dhcp_config(hald_t)
userdom_dontaudit_use_unpriv_user_fds(hald_t)
-@@ -272,6 +272,10 @@
+@@ -272,6 +273,10 @@
')
optional_policy(`
@@ -8595,7 +8632,7 @@ diff -b -B --ignore-all-space --exclude-
gpm_dontaudit_getattr_gpmctl(hald_t)
')
-@@ -322,11 +326,19 @@
+@@ -322,11 +327,19 @@
')
optional_policy(`
@@ -8615,7 +8652,7 @@ diff -b -B --ignore-all-space --exclude-
updfstab_domtrans(hald_t)
')
-@@ -483,9 +495,10 @@
+@@ -483,9 +496,10 @@
#
# Local hald dccm policy
#
@@ -8627,7 +8664,7 @@ diff -b -B --ignore-all-space --exclude-
allow hald_dccm_t self:tcp_socket create_stream_socket_perms;
allow hald_dccm_t self:udp_socket create_socket_perms;
allow hald_dccm_t self:netlink_route_socket rw_netlink_socket_perms;
-@@ -508,11 +521,9 @@
+@@ -508,11 +522,9 @@
write_files_pattern(hald_dccm_t, hald_log_t, hald_log_t)
@@ -8640,7 +8677,7 @@ diff -b -B --ignore-all-space --exclude-
corenet_all_recvfrom_unlabeled(hald_dccm_t)
corenet_all_recvfrom_netlabel(hald_dccm_t)
-@@ -525,7 +536,7 @@
+@@ -525,7 +537,7 @@
corenet_tcp_bind_generic_node(hald_dccm_t)
corenet_udp_bind_generic_node(hald_dccm_t)
corenet_udp_bind_dhcpc_port(hald_dccm_t)
@@ -8649,7 +8686,7 @@ diff -b -B --ignore-all-space --exclude-
corenet_tcp_bind_dccm_port(hald_dccm_t)
logging_send_syslog_msg(hald_dccm_t)
-@@ -534,6 +545,8 @@
+@@ -534,6 +546,8 @@
miscfiles_read_localization(hald_dccm_t)
@@ -15656,7 +15693,7 @@ diff -b -B --ignore-all-space --exclude-
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/init.if serefpolicy-3.6.32/policy/modules/system/init.if
--- nsaserefpolicy/policy/modules/system/init.if 2010-01-18 18:24:22.933540325 +0100
-+++ serefpolicy-3.6.32/policy/modules/system/init.if 2010-03-19 16:25:23.634611767 +0100
++++ serefpolicy-3.6.32/policy/modules/system/init.if 2010-04-02 10:00:49.830602804 +0200
@@ -165,6 +165,7 @@
type init_t;
role system_r;
@@ -15691,7 +15728,15 @@ diff -b -B --ignore-all-space --exclude-
ifdef(`hide_broken_symptoms',`
# RHEL4 systems seem to have a stray
-@@ -309,7 +315,7 @@
+@@ -292,6 +298,7 @@
+
+ userdom_dontaudit_search_user_home_dirs($1)
+ userdom_dontaudit_rw_stream($1)
++ userdom_dontaudit_write_user_tmp_files($1)
+
+ tunable_policy(`allow_daemons_use_tty',`
+ term_use_all_user_ttys($1)
+@@ -309,7 +316,7 @@
')
optional_policy(`
@@ -15700,7 +15745,7 @@ diff -b -B --ignore-all-space --exclude-
')
optional_policy(`
-@@ -554,7 +560,7 @@
+@@ -554,7 +561,7 @@
')
dev_list_all_dev_nodes($1)
@@ -15709,7 +15754,7 @@ diff -b -B --ignore-all-space --exclude-
')
########################################
-@@ -775,8 +781,10 @@
+@@ -775,8 +782,10 @@
interface(`init_labeled_script_domtrans',`
gen_require(`
type initrc_t;
@@ -15720,7 +15765,7 @@ diff -b -B --ignore-all-space --exclude-
domtrans_pattern($1, $2, initrc_t)
files_search_etc($1)
')
-@@ -1544,7 +1552,7 @@
+@@ -1544,7 +1553,7 @@
type initrc_var_run_t;
')
@@ -15729,7 +15774,7 @@ diff -b -B --ignore-all-space --exclude-
')
########################################
-@@ -1686,3 +1694,26 @@
+@@ -1686,3 +1695,26 @@
allow $1 initrc_t:sem rw_sem_perms;
')
Index: selinux-policy.spec
===================================================================
RCS file: /cvs/pkgs/rpms/selinux-policy/F-12/selinux-policy.spec,v
retrieving revision 1.1043
retrieving revision 1.1044
diff -u -p -r1.1043 -r1.1044
--- selinux-policy.spec 30 Mar 2010 14:31:44 -0000 1.1043
+++ selinux-policy.spec 2 Apr 2010 12:42:13 -0000 1.1044
@@ -20,7 +20,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.6.32
-Release: 108%{?dist}
+Release: 109%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -469,6 +469,9 @@ exit 0
%endif
%changelog
+* Fri Apr 2 2010 Miroslav Grepl <mgrepl at redhat.com> 3.6.32-109
+- Allow hald to manage block device files
+
* Tue Mar 30 2010 Miroslav Grepl <mgrepl at redhat.com> 3.6.32-108
- Add label for libgpac library
- Fixes for openvpn
- Previous message: rpms/yaml-cpp/F-11 .cvsignore, 1.3, 1.4 sources, 1.3, 1.4 yaml-cpp.spec, 1.2, 1.3
- Next message: rpms/icu/devel icu.icu7567.libctest.patch, NONE, 1.1 icu.spec, 1.106, 1.107
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the scm-commits
mailing list