rpms/policycoreutils/F-12 .cvsignore, 1.204, 1.205 policycoreutils-rhat.patch, 1.461, 1.462 policycoreutils.spec, 1.673, 1.674 sources, 1.213, 1.214

Daniel J Walsh dwalsh at fedoraproject.org
Tue Feb 16 21:48:02 UTC 2010


Author: dwalsh

Update of /cvs/extras/rpms/policycoreutils/F-12
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv15741

Modified Files:
	.cvsignore policycoreutils-rhat.patch policycoreutils.spec 
	sources 
Log Message:
* Thu Feb 16 2010 Dan Walsh <dwalsh at redhat.com> 2.0.79-1
- Update to upstream
	* Fix double-free in newrole
- Fix python language handling



Index: .cvsignore
===================================================================
RCS file: /cvs/extras/rpms/policycoreutils/F-12/.cvsignore,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -p -r1.204 -r1.205
--- .cvsignore	9 Dec 2009 21:34:45 -0000	1.204
+++ .cvsignore	16 Feb 2010 21:47:58 -0000	1.205
@@ -213,3 +213,4 @@ policycoreutils-2.0.76.tgz
 policycoreutils-2.0.77.tgz
 policycoreutils-2.0.78.tgz
 sepolgen-1.0.19.tgz
+policycoreutils-2.0.79.tgz

policycoreutils-rhat.patch:
 Makefile                                                                                      |    2 
 audit2allow/audit2allow                                                                       |   64 -
 audit2allow/audit2allow.1                                                                     |    3 
 newrole/newrole.c                                                                             |    2 
 restorecond/Makefile                                                                          |   24 
 restorecond/org.selinux.Restorecond.service                                                   |    3 
 restorecond/restorecond.8                                                                     |   15 
 restorecond/restorecond.c                                                                     |  429 +---------
 restorecond/restorecond.conf                                                                  |    5 
 restorecond/restorecond.desktop                                                               |    7 
 restorecond/restorecond.h                                                                     |   19 
 restorecond/restorecond.init                                                                  |    5 
 restorecond/restorecond_user.conf                                                             |    2 
 restorecond/user.c                                                                            |  239 +++++
 restorecond/watch.c                                                                           |  260 ++++++
 sandbox/.sandboxSKnKBc/.esd_auth                                                              |    1 
 sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/clock/prefs/%gconf.xml                       |   24 
 sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/window_list/prefs/%gconf.xml                 |    8 
 sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/workspace_switcher/prefs/%gconf.xml          |    6 
 sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/accessibility/keyboard/%gconf.xml                 |   23 
 sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/interface/%gconf.xml                              |    6 
 sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/%gconf.xml                   |    4 
 sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/general/%gconf.xml           |    8 
 sandbox/.sandboxSKnKBc/.xmodmap                                                               |  248 +++++
 sandbox/Makefile                                                                              |   31 
 sandbox/deliverables/README                                                                   |   32 
 sandbox/deliverables/basicwrapper                                                             |    4 
 sandbox/deliverables/run-in-sandbox.py                                                        |   49 +
 sandbox/deliverables/sandbox                                                                  |  216 +++++
 sandbox/sandbox                                                                               |  360 ++++++++
 sandbox/sandbox.8                                                                             |   50 +
 sandbox/sandboxX.sh                                                                           |   14 
 sandbox/seunshare.c                                                                           |  265 ++++++
 scripts/fixfiles                                                                              |   20 
 semanage/default_encoding/Makefile                                                            |    8 
 semanage/default_encoding/build/lib.linux-x86_64-2.6/policycoreutils/__init__.py              |   17 
 semanage/default_encoding/build/lib.linux-x86_64-2.6/policycoreutils/default_encoding_utf8.so |binary
 semanage/default_encoding/build/temp.linux-x86_64-2.6/default_encoding.o                      |binary
 semanage/default_encoding/default_encoding.c                                                  |   59 +
 semanage/default_encoding/policycoreutils/__init__.py                                         |   17 
 semanage/default_encoding/setup.py                                                            |   38 
 semanage/semanage                                                                             |  127 ++
 semanage/semanage.8                                                                           |   10 
 semanage/seobject.py                                                                          |  406 +++++++--
 semodule/semodule.8                                                                           |    6 
 semodule/semodule.c                                                                           |   53 +
 setfiles/restore.c                                                                            |  101 ++
 setfiles/restore.h                                                                            |    4 
 setfiles/restorecon.8                                                                         |    7 
 setfiles/setfiles.8                                                                           |    3 
 setfiles/setfiles.c                                                                           |   78 -
 51 files changed, 2775 insertions(+), 607 deletions(-)

Index: policycoreutils-rhat.patch
===================================================================
RCS file: /cvs/extras/rpms/policycoreutils/F-12/policycoreutils-rhat.patch,v
retrieving revision 1.461
retrieving revision 1.462
diff -u -p -r1.461 -r1.462
--- policycoreutils-rhat.patch	10 Feb 2010 19:30:27 -0000	1.461
+++ policycoreutils-rhat.patch	16 Feb 2010 21:47:59 -0000	1.462
@@ -1,6 +1,6 @@
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/audit2allow/audit2allow policycoreutils-2.0.78/audit2allow/audit2allow
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/audit2allow/audit2allow policycoreutils-2.0.79/audit2allow/audit2allow
 --- nsapolicycoreutils/audit2allow/audit2allow	2009-01-13 08:45:35.000000000 -0500
-+++ policycoreutils-2.0.78/audit2allow/audit2allow	2010-01-08 09:32:57.000000000 -0500
++++ policycoreutils-2.0.79/audit2allow/audit2allow	2010-02-16 13:46:01.000000000 -0500
 @@ -28,6 +28,7 @@
  import sepolgen.defaults as defaults
  import sepolgen.module as module
@@ -148,9 +148,9 @@ diff --exclude-from=exclude --exclude=se
 +    audit2why.init()
      app = AuditToPolicy()
      app.main()
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/audit2allow/audit2allow.1 policycoreutils-2.0.78/audit2allow/audit2allow.1
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/audit2allow/audit2allow.1 policycoreutils-2.0.79/audit2allow/audit2allow.1
 --- nsapolicycoreutils/audit2allow/audit2allow.1	2009-02-18 16:44:47.000000000 -0500
-+++ policycoreutils-2.0.78/audit2allow/audit2allow.1	2010-01-25 15:55:32.000000000 -0500
++++ policycoreutils-2.0.79/audit2allow/audit2allow.1	2010-02-16 13:46:01.000000000 -0500
 @@ -44,6 +44,9 @@
  Note that all audit messages are not available via dmesg when
  auditd is running; use "ausearch -m avc | audit2allow"  or "-a" instead.
@@ -161,18 +161,30 @@ diff --exclude-from=exclude --exclude=se
  .B "\-h" | "\-\-help"
  Print a short usage message
  .TP
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/Makefile policycoreutils-2.0.78/Makefile
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/Makefile policycoreutils-2.0.79/Makefile
 --- nsapolicycoreutils/Makefile	2008-08-28 09:34:24.000000000 -0400
-+++ policycoreutils-2.0.78/Makefile	2009-12-08 17:05:49.000000000 -0500
++++ policycoreutils-2.0.79/Makefile	2010-02-16 14:03:54.000000000 -0500
 @@ -1,4 +1,4 @@
 -SUBDIRS = setfiles semanage load_policy newrole run_init secon audit2allow audit2why scripts sestatus semodule_package semodule semodule_link semodule_expand semodule_deps setsebool po
-+SUBDIRS = setfiles semanage load_policy newrole run_init sandbox secon audit2allow audit2why scripts sestatus semodule_package semodule semodule_link semodule_expand semodule_deps setsebool po gui
++SUBDIRS = setfiles semanage semanage/default_encoding load_policy newrole run_init sandbox secon audit2allow audit2why scripts sestatus semodule_package semodule semodule_link semodule_expand semodule_deps setsebool po gui
  
  INOTIFYH = $(shell ls /usr/include/sys/inotify.h 2>/dev/null)
  
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/Makefile policycoreutils-2.0.78/restorecond/Makefile
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/newrole/newrole.c policycoreutils-2.0.79/newrole/newrole.c
+--- nsapolicycoreutils/newrole/newrole.c	2010-02-16 12:33:05.000000000 -0500
++++ policycoreutils-2.0.79/newrole/newrole.c	2010-02-16 13:46:01.000000000 -0500
+@@ -1338,6 +1338,8 @@
+ 	if (transition_to_caller_uid())
+ 		goto err_close_pam_session;
+ #endif
++	freecon(old_context);
++	freecon(new_context);
+ 
+ 	/* Handle environment changes */
+ 	if (restore_environment(preserve_environment, old_environ, &pw)) {
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/Makefile policycoreutils-2.0.79/restorecond/Makefile
 --- nsapolicycoreutils/restorecond/Makefile	2009-08-20 15:49:21.000000000 -0400
-+++ policycoreutils-2.0.78/restorecond/Makefile	2009-12-16 08:16:15.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/Makefile	2010-02-16 13:46:01.000000000 -0500
 @@ -1,17 +1,28 @@
  # Installation directories.
  PREFIX ?= ${DESTDIR}/usr
@@ -187,7 +199,7 @@ diff --exclude-from=exclude --exclude=se
  SELINUXDIR = $(DESTDIR)/etc/selinux
  
 +DBUSFLAGS = -DHAVE_DBUS -I/usr/include/dbus-1.0 -I/usr/lib64/dbus-1.0/include -I/usr/lib/dbus-1.0/include 
-+DBUSLIB = -ldbus-glib-1 
++DBUSLIB = -ldbus-glib-1 -ldbus-1
 +
  CFLAGS ?= -g -Werror -Wall -W
 -override CFLAGS += -I$(PREFIX)/include -D_FILE_OFFSET_BITS=64
@@ -219,16 +231,16 @@ diff --exclude-from=exclude --exclude=se
  
  relabel: install
  	/sbin/restorecon $(SBINDIR)/restorecond 
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/org.selinux.Restorecond.service policycoreutils-2.0.78/restorecond/org.selinux.Restorecond.service
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/org.selinux.Restorecond.service policycoreutils-2.0.79/restorecond/org.selinux.Restorecond.service
 --- nsapolicycoreutils/restorecond/org.selinux.Restorecond.service	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/restorecond/org.selinux.Restorecond.service	2009-12-16 08:16:16.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/org.selinux.Restorecond.service	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,3 @@
 +[D-BUS Service]
 +Name=org.selinux.Restorecond
 +Exec=/usr/sbin/restorecond -u
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.8 policycoreutils-2.0.78/restorecond/restorecond.8
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.8 policycoreutils-2.0.79/restorecond/restorecond.8
 --- nsapolicycoreutils/restorecond/restorecond.8	2009-08-20 15:49:21.000000000 -0400
-+++ policycoreutils-2.0.78/restorecond/restorecond.8	2009-12-16 08:16:16.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/restorecond.8	2010-02-16 13:46:01.000000000 -0500
 @@ -3,7 +3,7 @@
  restorecond \- daemon that watches for file creation and then sets the default SELinux file context
  
@@ -263,9 +275,9 @@ diff --exclude-from=exclude --exclude=se
  
  .SH "SEE ALSO"
  .BR restorecon (8),
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.c policycoreutils-2.0.78/restorecond/restorecond.c
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.c policycoreutils-2.0.79/restorecond/restorecond.c
 --- nsapolicycoreutils/restorecond/restorecond.c	2009-08-20 15:49:21.000000000 -0400
-+++ policycoreutils-2.0.78/restorecond/restorecond.c	2009-12-16 08:16:17.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/restorecond.c	2010-02-16 13:46:01.000000000 -0500
 @@ -30,9 +30,11 @@
   * and makes sure that there security context matches the systems defaults
   *
@@ -772,9 +784,9 @@ diff --exclude-from=exclude --exclude=se
  }
 +
 +
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.conf policycoreutils-2.0.78/restorecond/restorecond.conf
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.conf policycoreutils-2.0.79/restorecond/restorecond.conf
 --- nsapolicycoreutils/restorecond/restorecond.conf	2009-08-20 15:49:21.000000000 -0400
-+++ policycoreutils-2.0.78/restorecond/restorecond.conf	2009-12-16 08:16:18.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/restorecond.conf	2010-02-16 13:46:01.000000000 -0500
 @@ -4,8 +4,5 @@
  /etc/mtab
  /var/run/utmp
@@ -785,9 +797,9 @@ diff --exclude-from=exclude --exclude=se
  /root/.ssh/*
 -
 -
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.desktop policycoreutils-2.0.78/restorecond/restorecond.desktop
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.desktop policycoreutils-2.0.79/restorecond/restorecond.desktop
 --- nsapolicycoreutils/restorecond/restorecond.desktop	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/restorecond/restorecond.desktop	2009-12-16 08:16:19.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/restorecond.desktop	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,7 @@
 +[Desktop Entry]
 +Name=File Context maintainer
@@ -796,9 +808,9 @@ diff --exclude-from=exclude --exclude=se
 +Encoding=UTF-8
 +Type=Application
 +StartupNotify=false
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.h policycoreutils-2.0.78/restorecond/restorecond.h
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.h policycoreutils-2.0.79/restorecond/restorecond.h
 --- nsapolicycoreutils/restorecond/restorecond.h	2009-08-20 15:49:21.000000000 -0400
-+++ policycoreutils-2.0.78/restorecond/restorecond.h	2009-12-16 08:16:20.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/restorecond.h	2010-02-16 13:46:01.000000000 -0500
 @@ -24,7 +24,22 @@
  #ifndef RESTORED_CONFIG_H
  #define RESTORED_CONFIG_H
@@ -824,9 +836,9 @@ diff --exclude-from=exclude --exclude=se
 +extern int watch_list_isempty();
  
  #endif
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.init policycoreutils-2.0.78/restorecond/restorecond.init
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.init policycoreutils-2.0.79/restorecond/restorecond.init
 --- nsapolicycoreutils/restorecond/restorecond.init	2009-08-20 15:49:21.000000000 -0400
-+++ policycoreutils-2.0.78/restorecond/restorecond.init	2009-12-16 08:16:21.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/restorecond.init	2010-02-16 13:46:01.000000000 -0500
 @@ -75,16 +75,15 @@
  	status restorecond
  	RETVAL=$?
@@ -846,15 +858,15 @@ diff --exclude-from=exclude --exclude=se
  
  exit $RETVAL
 -
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond_user.conf policycoreutils-2.0.78/restorecond/restorecond_user.conf
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond_user.conf policycoreutils-2.0.79/restorecond/restorecond_user.conf
 --- nsapolicycoreutils/restorecond/restorecond_user.conf	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/restorecond/restorecond_user.conf	2009-12-16 08:16:22.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/restorecond_user.conf	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,2 @@
 +~/*
 +~/public_html/*
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/user.c policycoreutils-2.0.78/restorecond/user.c
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/user.c policycoreutils-2.0.79/restorecond/user.c
 --- nsapolicycoreutils/restorecond/user.c	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/restorecond/user.c	2009-12-16 08:16:24.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/user.c	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,239 @@
 +/*
 + * restorecond
@@ -1095,9 +1107,9 @@ diff --exclude-from=exclude --exclude=se
 +    return 0;
 +}
 +
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/watch.c policycoreutils-2.0.78/restorecond/watch.c
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/watch.c policycoreutils-2.0.79/restorecond/watch.c
 --- nsapolicycoreutils/restorecond/watch.c	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/restorecond/watch.c	2010-01-29 16:35:39.000000000 -0500
++++ policycoreutils-2.0.79/restorecond/watch.c	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,260 @@
 +#define _GNU_SOURCE
 +#include <sys/inotify.h>
@@ -1359,17 +1371,17 @@ diff --exclude-from=exclude --exclude=se
 +	if (master_wd == -1)
 +		exitApp("Error watching config file.");
 +}
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/deliverables/basicwrapper policycoreutils-2.0.78/sandbox/deliverables/basicwrapper
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/deliverables/basicwrapper policycoreutils-2.0.79/sandbox/deliverables/basicwrapper
 --- nsapolicycoreutils/sandbox/deliverables/basicwrapper	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/deliverables/basicwrapper	2009-12-08 17:05:49.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/deliverables/basicwrapper	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,4 @@
 +import os, sys
 +SANDBOX_ARGS = ['-f%s' % os.environ['_CONDOR_SCRATCH_DIR']]
 +SANDBOX_ARGS.extend(sys.argv[1::])
 +os.execv('/usr/bin/sandbox',SANDBOX_ARGS)
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/deliverables/README policycoreutils-2.0.78/sandbox/deliverables/README
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/deliverables/README policycoreutils-2.0.79/sandbox/deliverables/README
 --- nsapolicycoreutils/sandbox/deliverables/README	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/deliverables/README	2009-12-08 17:05:49.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/deliverables/README	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,32 @@
 +Files:
 +run-in-sandbox.py:
@@ -1403,9 +1415,9 @@ diff --exclude-from=exclude --exclude=se
 +
 +Thanks for a great summer.
 +Chris Pardy
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/deliverables/run-in-sandbox.py policycoreutils-2.0.78/sandbox/deliverables/run-in-sandbox.py
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/deliverables/run-in-sandbox.py policycoreutils-2.0.79/sandbox/deliverables/run-in-sandbox.py
 --- nsapolicycoreutils/sandbox/deliverables/run-in-sandbox.py	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/deliverables/run-in-sandbox.py	2009-12-08 17:05:49.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/deliverables/run-in-sandbox.py	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,49 @@
 +import os
 +import os.path
@@ -1456,9 +1468,9 @@ diff --exclude-from=exclude --exclude=se
 +    def get_background_items(self, window, file):
 +        return
 +
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/deliverables/sandbox policycoreutils-2.0.78/sandbox/deliverables/sandbox
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/deliverables/sandbox policycoreutils-2.0.79/sandbox/deliverables/sandbox
 --- nsapolicycoreutils/sandbox/deliverables/sandbox	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/deliverables/sandbox	2009-12-08 17:05:49.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/deliverables/sandbox	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,216 @@
 +#!/usr/bin/python -E
 +import os, sys, getopt, socket, random, fcntl, shutil
@@ -1676,9 +1688,9 @@ diff --exclude-from=exclude --exclude=se
 +        
 +    sys.exit(rc)
 +
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/Makefile policycoreutils-2.0.78/sandbox/Makefile
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/Makefile policycoreutils-2.0.79/sandbox/Makefile
 --- nsapolicycoreutils/sandbox/Makefile	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/Makefile	2009-12-08 17:05:49.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/Makefile	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,31 @@
 +# Installation directories.
 +PREFIX ?= ${DESTDIR}/usr
@@ -1711,10 +1723,10 @@ diff --exclude-from=exclude --exclude=se
 +	../../scripts/Lindent $(wildcard *.[ch])
 +
 +relabel:
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/sandbox policycoreutils-2.0.78/sandbox/sandbox
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/sandbox policycoreutils-2.0.79/sandbox/sandbox
 --- nsapolicycoreutils/sandbox/sandbox	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/sandbox	2010-01-27 16:39:26.000000000 -0500
-@@ -0,0 +1,357 @@
++++ policycoreutils-2.0.79/sandbox/sandbox	2010-02-16 13:46:01.000000000 -0500
+@@ -0,0 +1,360 @@
 +#! /usr/bin/python -E
 +# Authors: Dan Walsh <dwalsh at redhat.com>
 +# Authors: Josh Cogliati
@@ -1867,12 +1879,13 @@ diff --exclude-from=exclude --exclude=se
 +       fd = open(execfile, "w+")
 +       fd.write("""
 +#! /bin/sh
++#TITLE: %s
 +/usr/bin/test -r ~/.xmodmap && /usr/bin/xmodmap ~/.xmodmap
 +/usr/bin/matchbox-window-manager -use_titlebar no &
 +WM_PID=$!
 +%s
 +kill -TERM $WM_PID  2> /dev/null
-+""" % command)
++""" % (command, command))
 +       fd.close()
 +       os.chmod(execfile, 0700)
 +
@@ -1880,9 +1893,9 @@ diff --exclude-from=exclude --exclude=se
 +       fd = open(execfile, "w+")
 +       fd.write("""
 +#!/bin/sh
-+/usr/bin/test -r ~/.xmodmap && /usr/bin/xmodmap ~/.xmodmap
++#TITLE: %s
 +%s
-+""" % command)
++""" % (command, command))
 +       fd.close()
 +       os.chmod(execfile, 0700)
 +
@@ -1895,7 +1908,8 @@ diff --exclude-from=exclude --exclude=se
 +
 +    def usage(message = ""):
 +        text = _("""
-+sandbox [-h] [-[X|M] [-S] [-l level ] [-H homedir] [-T tempdir]] [-I includefile ] [[-i file ] ...] [ -t type ] command
++sandbox [-h] [-[X|M] [-l level ] [-H homedir] [-T tempdir]] [-I includefile ] [[-i file ] ...] [ -t type ] command
++sandbox [-h] [-[X|M] [-l level ] [-H homedir] [-T tempdir]] [-I includefile ] [[-i file ] ...] [ -t type ] -S
 +""")
 +        error_exit("%s\n%s" % (message, text))
 +
@@ -1955,16 +1969,17 @@ diff --exclude-from=exclude --exclude=se
 +                         newhomedir = a
 +                  if o == "-T" or o == "--tmpdir":
 +                         existing_temp = True
-+                         newtempdir = a
++                         newtmpdir = a
 +                  if o == "-h" or o == "--help":
 +                         usage(_("Usage"));
 +
 +                  if o == "-S" or o == "--session":
 +                         session = True
 +                         homedir=pwd.getpwuid(os.getuid()).pw_dir
-+
++                         if setype in (DEFAULT_TYPE, DEFAULT_X_TYPE):
++                                setype = selinux.getcon()[1].split(":")[2]
 +            
-+           if len(cmds) == 0:
++           if len(cmds) == 0 and not session:
 +                  usage(_("Command required"))
 +
 +           if (existing_home or existing_temp) and not home_and_temp:
@@ -1972,7 +1987,7 @@ diff --exclude-from=exclude --exclude=se
 +           execcon, filecon = gen_context(setype, level)
 +           rc = -1
 +
-+           if cmds[0][0] != "/" and cmds[0][:2] != "./" and cmds[0][:3] != "../":
++           if not session and cmds[0][0] != "/" and cmds[0][:2] != "./" and cmds[0][:3] != "../":
 +                  for i in  os.environ["PATH"].split(':'):
 +                         f = "%s/%s" % (i, cmds[0])
 +                         if os.access(f, os.X_OK):
@@ -2001,8 +2016,8 @@ diff --exclude-from=exclude --exclude=se
 +                                rc = os.spawnvp(os.P_WAIT, chcon[0], chcon)
 +
 +                         if existing_temp:
-+                                if not os.path.isdir(newtempdir):
-+                                       raise IOError("Temp directory "+newtempdir+" not found")                
++                                if not os.path.isdir(newtmpdir):
++                                       raise IOError("Temp directory "+newtmpdir+" not found")                
 +                                if not level and not session:
 +                                       chcon =  ("/usr/bin/chcon -R %s %s" % (filecon, newtmpdir)).split()
 +                                       rc = os.spawnvp(os.P_WAIT, chcon[0], chcon)
@@ -2032,7 +2047,7 @@ diff --exclude-from=exclude --exclude=se
 +
 +                                execfile = newhomedir + "/.sandboxrc"
 +                                if session:
-+                                       setup_session(execfile, " ".join(paths))
++                                       setup_session(execfile)
 +                                else:
 +                                       setup_executable(execfile, " ".join(paths))
 +
@@ -2072,9 +2087,9 @@ diff --exclude-from=exclude --exclude=se
 +           rc = 0
 +           
 +    sys.exit(rc)
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/sandbox.8 policycoreutils-2.0.78/sandbox/sandbox.8
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/sandbox.8 policycoreutils-2.0.79/sandbox/sandbox.8
 --- nsapolicycoreutils/sandbox/sandbox.8	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/sandbox.8	2009-12-18 07:37:35.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/sandbox.8	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,50 @@
 +.TH SANDBOX "8" "May 2009" "chcat" "User Commands"
 +.SH NAME
@@ -2126,15 +2141,15 @@ diff --exclude-from=exclude --exclude=se
 +.TP
 +runcon(1)
 +.PP
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.esd_auth policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.esd_auth
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.esd_auth policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.esd_auth
 --- nsapolicycoreutils/sandbox/.sandboxSKnKBc/.esd_auth	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.esd_auth	2010-01-25 17:24:41.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.esd_auth	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1 @@
 +ÊïhÊ~©òH||”â#xˆ
 \ No newline at end of file
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/clock/prefs/%gconf.xml policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/clock/prefs/%gconf.xml
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/clock/prefs/%gconf.xml policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/clock/prefs/%gconf.xml
 --- nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/clock/prefs/%gconf.xml	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/clock/prefs/%gconf.xml	2010-01-25 17:25:15.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/clock/prefs/%gconf.xml	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,24 @@
 +<?xml version="1.0"?>
 +<gconf>
@@ -2160,9 +2175,9 @@ diff --exclude-from=exclude --exclude=se
 +	<entry name="custom_format" mtime="1264458282" schema="/schemas/apps/clock_applet/prefs/custom_format"/>
 +	<entry name="cities" mtime="1264458282" schema="/schemas/apps/clock_applet/prefs/cities"/>
 +</gconf>
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/window_list/prefs/%gconf.xml policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/window_list/prefs/%gconf.xml
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/window_list/prefs/%gconf.xml policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/window_list/prefs/%gconf.xml
 --- nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/window_list/prefs/%gconf.xml	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/window_list/prefs/%gconf.xml	2010-01-25 17:25:15.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/window_list/prefs/%gconf.xml	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,8 @@
 +<?xml version="1.0"?>
 +<gconf>
@@ -2172,9 +2187,9 @@ diff --exclude-from=exclude --exclude=se
 +	<entry name="group_windows" mtime="1264458281" schema="/schemas/apps/window_list_applet/prefs/group_windows"/>
 +	<entry name="display_all_workspaces" mtime="1264458281" schema="/schemas/apps/window_list_applet/prefs/display_all_workspaces"/>
 +</gconf>
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/workspace_switcher/prefs/%gconf.xml policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/workspace_switcher/prefs/%gconf.xml
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/workspace_switcher/prefs/%gconf.xml policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/workspace_switcher/prefs/%gconf.xml
 --- nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/workspace_switcher/prefs/%gconf.xml	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/workspace_switcher/prefs/%gconf.xml	2010-01-25 17:25:15.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/apps/panel/applets/workspace_switcher/prefs/%gconf.xml	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,6 @@
 +<?xml version="1.0"?>
 +<gconf>
@@ -2182,9 +2197,9 @@ diff --exclude-from=exclude --exclude=se
 +	<entry name="num_rows" mtime="1264458282" schema="/schemas/apps/workspace_switcher_applet/prefs/num_rows"/>
 +	<entry name="display_all_workspaces" mtime="1264458282" schema="/schemas/apps/workspace_switcher_applet/prefs/display_all_workspaces"/>
 +</gconf>
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/accessibility/keyboard/%gconf.xml policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/accessibility/keyboard/%gconf.xml
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/accessibility/keyboard/%gconf.xml policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/accessibility/keyboard/%gconf.xml
 --- nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/accessibility/keyboard/%gconf.xml	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/accessibility/keyboard/%gconf.xml	2010-01-25 17:24:41.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/accessibility/keyboard/%gconf.xml	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,23 @@
 +<?xml version="1.0"?>
 +<gconf>
@@ -2209,9 +2224,9 @@ diff --exclude-from=exclude --exclude=se
 +	<entry name="feature_state_change_beep" mtime="1264458281" type="bool" value="false"/>
 +	<entry name="enable" mtime="1264458281" type="bool" value="false"/>
 +</gconf>
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/interface/%gconf.xml policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/interface/%gconf.xml
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/interface/%gconf.xml policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/interface/%gconf.xml
 --- nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/interface/%gconf.xml	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/interface/%gconf.xml	2010-01-25 17:25:15.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/interface/%gconf.xml	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,6 @@
 +<?xml version="1.0"?>
 +<gconf>
@@ -2219,17 +2234,17 @@ diff --exclude-from=exclude --exclude=se
 +		<stringvalue>gtk-im-context-simple</stringvalue>
 +	</entry>
 +</gconf>
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/%gconf.xml policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/%gconf.xml
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/%gconf.xml policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/%gconf.xml
 --- nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/%gconf.xml	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/%gconf.xml	2010-01-25 17:25:15.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/%gconf.xml	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,4 @@
 +<?xml version="1.0"?>
 +<gconf>
 +	<entry name="disable_xmm_and_xkb_warning" mtime="1264458288" type="bool" value="true"/>
 +</gconf>
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/general/%gconf.xml policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/general/%gconf.xml
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/general/%gconf.xml policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/general/%gconf.xml
 --- nsapolicycoreutils/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/general/%gconf.xml	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/general/%gconf.xml	2010-01-25 17:24:41.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.gconf/desktop/gnome/peripherals/keyboard/general/%gconf.xml	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,8 @@
 +<?xml version="1.0"?>
 +<gconf>
@@ -2239,9 +2254,9 @@ diff --exclude-from=exclude --exclude=se
 +		</li>
 +	</entry>
 +</gconf>
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.xmodmap policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.xmodmap
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/.sandboxSKnKBc/.xmodmap policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.xmodmap
 --- nsapolicycoreutils/sandbox/.sandboxSKnKBc/.xmodmap	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/.sandboxSKnKBc/.xmodmap	2010-01-25 17:24:30.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/.sandboxSKnKBc/.xmodmap	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,248 @@
 +keycode   8 =
 +keycode   9 = Escape NoSymbol Escape
@@ -2491,12 +2506,12 @@ diff --exclude-from=exclude --exclude=se
 +keycode 253 =
 +keycode 254 =
 +keycode 255 =
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/sandboxX.sh policycoreutils-2.0.78/sandbox/sandboxX.sh
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/sandboxX.sh policycoreutils-2.0.79/sandbox/sandboxX.sh
 --- nsapolicycoreutils/sandbox/sandboxX.sh	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/sandboxX.sh	2010-01-27 16:49:23.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/sandboxX.sh	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,14 @@
 +#!/bin/bash 
-+export TITLE="Sandbox: `/usr/bin/tail -1 ~/.sandboxrc | /usr/bin/cut -b1-70` Running as `secon -t -l -P`"
++export TITLE="Sandbox: `grep ^#TITLE: ~/.sandboxrc | /usr/bin/cut -b8-80` Running as `secon -t -l -P`"
 +export SCREENSIZE="1000x700"
 +#export SCREENSIZE=`xdpyinfo | awk  '/dimensions/ {  print $2 }'`
 +trap "exit 0" HUP
@@ -2509,9 +2524,9 @@ diff --exclude-from=exclude --exclude=se
 +    break
 +done
 +exit 0
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/seunshare.c policycoreutils-2.0.78/sandbox/seunshare.c
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/sandbox/seunshare.c policycoreutils-2.0.79/sandbox/seunshare.c
 --- nsapolicycoreutils/sandbox/seunshare.c	1969-12-31 19:00:00.000000000 -0500
-+++ policycoreutils-2.0.78/sandbox/seunshare.c	2010-01-19 12:15:41.000000000 -0500
++++ policycoreutils-2.0.79/sandbox/seunshare.c	2010-02-16 13:46:01.000000000 -0500
 @@ -0,0 +1,265 @@
 +#include <signal.h>
 +#include <sys/types.h>
@@ -2778,9 +2793,9 @@ diff --exclude-from=exclude --exclude=se
 +
 +	return status;
 +}
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/scripts/fixfiles policycoreutils-2.0.78/scripts/fixfiles
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/scripts/fixfiles policycoreutils-2.0.79/scripts/fixfiles
 --- nsapolicycoreutils/scripts/fixfiles	2009-12-01 15:46:50.000000000 -0500
-+++ policycoreutils-2.0.78/scripts/fixfiles	2010-02-03 15:22:51.000000000 -0500
++++ policycoreutils-2.0.79/scripts/fixfiles	2010-02-16 13:46:01.000000000 -0500
 @@ -35,8 +35,8 @@
  LOGGER=/usr/sbin/logger
  SETFILES=/sbin/setfiles
@@ -2829,10 +2844,179 @@ diff --exclude-from=exclude --exclude=se
      LogReadOnly
      restore
  }
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/semanage policycoreutils-2.0.78/semanage/semanage
+Binary files nsapolicycoreutils/semanage/default_encoding/build/lib.linux-x86_64-2.6/policycoreutils/default_encoding_utf8.so and policycoreutils-2.0.79/semanage/default_encoding/build/lib.linux-x86_64-2.6/policycoreutils/default_encoding_utf8.so differ
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/default_encoding/build/lib.linux-x86_64-2.6/policycoreutils/__init__.py policycoreutils-2.0.79/semanage/default_encoding/build/lib.linux-x86_64-2.6/policycoreutils/__init__.py
+--- nsapolicycoreutils/semanage/default_encoding/build/lib.linux-x86_64-2.6/policycoreutils/__init__.py	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.79/semanage/default_encoding/build/lib.linux-x86_64-2.6/policycoreutils/__init__.py	2010-02-16 13:53:02.000000000 -0500
+@@ -0,0 +1,17 @@
++#
++# Copyright (C) 2006,2007,2008, 2009 Red Hat, Inc.
++#
++# This program is free software; you can redistribute it and/or modify
++# it under the terms of the GNU General Public License as published by
++# the Free Software Foundation; either version 2 of the License, or
++# (at your option) any later version.
++#
++# This program is distributed in the hope that it will be useful,
++# but WITHOUT ANY WARRANTY; without even the implied warranty of
++# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
++# GNU General Public License for more details.
++#
++# You should have received a copy of the GNU General Public License
++# along with this program; if not, write to the Free Software
++# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
++#
+Binary files nsapolicycoreutils/semanage/default_encoding/build/temp.linux-x86_64-2.6/default_encoding.o and policycoreutils-2.0.79/semanage/default_encoding/build/temp.linux-x86_64-2.6/default_encoding.o differ
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/default_encoding/default_encoding.c policycoreutils-2.0.79/semanage/default_encoding/default_encoding.c
+--- nsapolicycoreutils/semanage/default_encoding/default_encoding.c	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.79/semanage/default_encoding/default_encoding.c	2010-02-16 13:49:52.000000000 -0500
+@@ -0,0 +1,59 @@
++/*
++ * Authors:
++ *   John Dennis <jdennis at redhat.com>
++ *
++ * Copyright (C) 2009  Red Hat
++ * see file 'COPYING' for use and warranty information
++ *
++ * This program is free software; you can redistribute it and/or
++ * modify it under the terms of the GNU General Public License as
++ * published by the Free Software Foundation.
++ *
++ * This program is distributed in the hope that it will be useful,
++ * but WITHOUT ANY WARRANTY; without even the implied warranty of
++ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
++ * GNU General Public License for more details.
++ *
++ * You should have received a copy of the GNU General Public License
++ * along with this program; if not, write to the Free Software
++ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
++ */
++
++#include <Python.h>
++
++PyDoc_STRVAR(setdefaultencoding_doc,
++"setdefaultencoding(encoding='utf-8')\n\
++\n\
++Set the current default string encoding used by the Unicode implementation.\n\
++Defaults to utf-8."
++);
++
++static PyObject *
++setdefaultencoding(PyObject *self, PyObject *args, PyObject *kwds)
++{
++    static char *kwlist[] = {"utf-8", NULL};
++    char *encoding;
++
++    if (!PyArg_ParseTupleAndKeywords(args, kwds, "s:setdefaultencoding", kwlist, &encoding))
++        return NULL;
++
++    if (PyUnicode_SetDefaultEncoding(encoding))
++        return NULL;
++
++    Py_RETURN_NONE;
++}
++
++static PyMethodDef methods[] = {
++    {"setdefaultencoding", (PyCFunction)setdefaultencoding, METH_VARARGS|METH_KEYWORDS, setdefaultencoding_doc},
++	{NULL,		NULL}		/* sentinel */
++};
++
++
++PyMODINIT_FUNC
++initdefault_encoding_utf8(void) 
++{
++    PyObject* m;
++
++    PyUnicode_SetDefaultEncoding("utf-8");
++    m = Py_InitModule3("default_encoding_utf8", methods, "Forces the default encoding to utf-8");
++}
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/default_encoding/Makefile policycoreutils-2.0.79/semanage/default_encoding/Makefile
+--- nsapolicycoreutils/semanage/default_encoding/Makefile	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.79/semanage/default_encoding/Makefile	2010-02-16 14:34:01.000000000 -0500
+@@ -0,0 +1,8 @@
++all: 
++	LDFLAGS="" python setup.py build
++
++install: all
++	LDFLAGS="" python setup.py install --root=$(DESTDIR)/
++
++clean:
++	rm -rf build *~
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/default_encoding/policycoreutils/__init__.py policycoreutils-2.0.79/semanage/default_encoding/policycoreutils/__init__.py
+--- nsapolicycoreutils/semanage/default_encoding/policycoreutils/__init__.py	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.79/semanage/default_encoding/policycoreutils/__init__.py	2010-02-16 13:53:02.000000000 -0500
+@@ -0,0 +1,17 @@
++#
++# Copyright (C) 2006,2007,2008, 2009 Red Hat, Inc.
++#
++# This program is free software; you can redistribute it and/or modify
++# it under the terms of the GNU General Public License as published by
++# the Free Software Foundation; either version 2 of the License, or
++# (at your option) any later version.
++#
++# This program is distributed in the hope that it will be useful,
++# but WITHOUT ANY WARRANTY; without even the implied warranty of
++# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
++# GNU General Public License for more details.
++#
++# You should have received a copy of the GNU General Public License
++# along with this program; if not, write to the Free Software
++# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
++#
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/default_encoding/setup.py policycoreutils-2.0.79/semanage/default_encoding/setup.py
+--- nsapolicycoreutils/semanage/default_encoding/setup.py	1969-12-31 19:00:00.000000000 -0500
++++ policycoreutils-2.0.79/semanage/default_encoding/setup.py	2010-02-16 13:50:22.000000000 -0500
+@@ -0,0 +1,38 @@
++# Authors:
++#   John Dennis <jdennis at redhat.com>
++#
++# Copyright (C) 2009  Red Hat
++# see file 'COPYING' for use and warranty information
++#
++# This program is free software; you can redistribute it and/or
++# modify it under the terms of the GNU General Public License as
++# published by the Free Software Foundation.
++#
++# This program is distributed in the hope that it will be useful,
++# but WITHOUT ANY WARRANTY; without even the implied warranty of
++# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
++# GNU General Public License for more details.
++#
++# You should have received a copy of the GNU General Public License
++# along with this program; if not, write to the Free Software
++# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
++
++from distutils.core import setup, Extension
++
++default_encoding_utf8 = Extension('policycoreutils.default_encoding_utf8', ['default_encoding.c'])
++
++setup(name             = 'policycoreutils-default-encoding',
++      version          = '0.1',
++      description      = 'Forces the default encoding in Python to be utf-8',
++      long_description = 'Forces the default encoding in Python to be utf-8',
++      author           = 'John Dennis',
++      author_email     = 'jdennis at redhat.com',
++      maintainer       = 'John Dennis',
++      maintainer_email = 'jdennis at redhat.com',
++      license          = 'GPLv3+',
++      platforms        = 'posix',
++      url              = '',
++      download_url     = '',
++      ext_modules      = [default_encoding_utf8],
++      packages=["policycoreutils"],
++)
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/semanage policycoreutils-2.0.79/semanage/semanage
 --- nsapolicycoreutils/semanage/semanage	2009-11-18 17:06:03.000000000 -0500
-+++ policycoreutils-2.0.78/semanage/semanage	2010-02-05 15:04:10.000000000 -0500
-@@ -32,25 +32,34 @@
++++ policycoreutils-2.0.79/semanage/semanage	2010-02-16 14:05:43.000000000 -0500
+@@ -20,6 +20,7 @@
+ #                                        02111-1307  USA
+ #
+ #  
++import policycoreutils.default_encoding_utf8
+ import sys, getopt, re
+ import seobject
+ import selinux
+@@ -32,25 +33,34 @@
  try:
         gettext.install(PROGNAME,
                         localedir="/usr/share/locale",
@@ -2871,7 +3055,7 @@ diff --exclude-from=exclude --exclude=se
  semanage boolean -{d|m} [--on|--off|-1|-0] -F boolean | boolean_file
  semanage permissive -{d|a} type
  semanage dontaudit [ on | off ]
-@@ -61,7 +70,9 @@
+@@ -61,7 +71,9 @@
  	-d, --delete     Delete a OBJECT record NAME
  	-m, --modify     Modify a OBJECT record NAME
          -i, --input      Input multiple semange commands in a transaction 
@@ -2881,7 +3065,7 @@ diff --exclude-from=exclude --exclude=se
  	-C, --locallist  List OBJECTS local customizations
  	-D, --deleteall  Remove all OBJECTS local customizations
  
-@@ -84,12 +95,15 @@
+@@ -84,12 +96,15 @@
          -F, --file       Treat target as an input file for command, change multiple settings
  	-p, --proto      Port protocol (tcp or udp) or internet protocol version of node (ipv4 or ipv6)
  	-M, --mask       Netmask
@@ -2897,7 +3081,7 @@ diff --exclude-from=exclude --exclude=se
  """)
                 raise ValueError("%s\n%s" % (text, message))
  		
-@@ -101,7 +115,7 @@
+@@ -101,7 +116,7 @@
  
  	def get_options():
  		valid_option={}
@@ -2906,7 +3090,7 @@ diff --exclude-from=exclude --exclude=se
  		valid_option["login"] = []
  		valid_option["login"] += valid_everyone + [ '-s', '--seuser', '-r', '--range']
  		valid_option["user"] = []
-@@ -112,8 +126,10 @@
+@@ -112,8 +127,10 @@
  		valid_option["interface"] += valid_everyone + [ '-t', '--type', '-r', '--range']
  		valid_option["node"] = []
  		valid_option["node"] += valid_everyone + [ '-M', '--mask', '-t', '--type', '-r', '--range', '-p', '--protocol']
@@ -2918,7 +3102,7 @@ diff --exclude-from=exclude --exclude=se
  		valid_option["dontaudit"] = [ '-S', '--store' ]
  		valid_option["boolean"] = []
  		valid_option["boolean"] += valid_everyone + [ '--on', "--off", "-1", "-0", "-F", "--file"] 
-@@ -168,6 +184,8 @@
+@@ -168,6 +185,8 @@
                 return ret
  
          def process_args(argv):
@@ -2927,7 +3111,7 @@ diff --exclude-from=exclude --exclude=se
  		serange = ""
  		port = ""
  		proto = ""
-@@ -184,10 +202,14 @@
+@@ -184,10 +203,14 @@
  		modify = False
  		delete = False
  		deleteall = False
@@ -2942,7 +3126,7 @@ diff --exclude-from=exclude --exclude=se
  			
  		object = argv[0]
  		option_dict=get_options()
-@@ -197,10 +219,14 @@
+@@ -197,10 +220,14 @@
  		args = argv[1:]
  
  		gopts, cmds = getopt.getopt(args,
@@ -2958,7 +3142,7 @@ diff --exclude-from=exclude --exclude=se
  					     'ftype=',
  					     'file',
  					     'help',
-@@ -228,26 +254,42 @@
+@@ -228,26 +255,42 @@
  				
  		for o,a in gopts:
  			if o == "-a" or o == "--add":
@@ -3008,7 +3192,7 @@ diff --exclude-from=exclude --exclude=se
  
  			if o == "-n" or o == "--noheading":
  				heading = False
-@@ -256,8 +298,7 @@
+@@ -256,8 +299,7 @@
  				locallist = True
  
  			if o == "-m"or o == "--modify":
@@ -3018,7 +3202,7 @@ diff --exclude-from=exclude --exclude=se
  				modify = True
  				
  			if o == "-S" or o == '--store':
-@@ -295,6 +336,7 @@
+@@ -295,6 +337,7 @@
                          if o == "--off" or o == "-0":
                                 value = "off"
  
@@ -3026,7 +3210,7 @@ diff --exclude-from=exclude --exclude=se
  		if object == "login":
  			OBJECT = seobject.loginRecords(store)
  
-@@ -315,6 +357,10 @@
+@@ -315,6 +358,10 @@
  		
  		if object == "boolean":
  			OBJECT = seobject.booleanRecords(store)
@@ -3037,7 +3221,7 @@ diff --exclude-from=exclude --exclude=se
  		
  		if object == "permissive":
  			OBJECT = seobject.permissiveRecords(store)
-@@ -330,8 +376,13 @@
+@@ -330,8 +377,13 @@
  			OBJECT.deleteall()
                          return
  			
@@ -3052,7 +3236,7 @@ diff --exclude-from=exclude --exclude=se
                          
                  target = cmds[0]
  
-@@ -354,11 +405,17 @@
+@@ -354,11 +406,17 @@
  			if object == "interface":
  				OBJECT.add(target, serange, setype)
  
@@ -3071,7 +3255,7 @@ diff --exclude-from=exclude --exclude=se
  			if object == "permissive":
  				OBJECT.add(target)
  
-@@ -375,6 +432,14 @@
+@@ -375,6 +433,14 @@
  				rlist = roles.split()
  				OBJECT.modify(target, rlist, selevel, serange, prefix)
  
@@ -3086,7 +3270,7 @@ diff --exclude-from=exclude --exclude=se
  			if object == "port":
  				OBJECT.modify(target, proto, serange, setype)
  
-@@ -385,7 +450,10 @@
+@@ -385,7 +451,10 @@
  				OBJECT.modify(target, mask, proto, serange, setype)
  
  			if object == "fcontext":
@@ -3098,7 +3282,7 @@ diff --exclude-from=exclude --exclude=se
  
                          return
  
-@@ -404,12 +472,13 @@
+@@ -404,12 +473,13 @@
  
                          return
  
@@ -3113,7 +3297,7 @@ diff --exclude-from=exclude --exclude=se
                 input = None
                 store = ""
  
-@@ -417,7 +486,7 @@
+@@ -417,7 +487,7 @@
                        usage(_("Requires 2 or more arguments"))
                  
                 gopts, cmds = getopt.getopt(sys.argv[1:],
@@ -3122,7 +3306,7 @@ diff --exclude-from=exclude --exclude=se
                                             ['add',
                                              'delete',
                                              'deleteall',
-@@ -431,6 +500,7 @@
+@@ -431,6 +501,7 @@
                                              'localist',
                                              'off', 
                                              'on', 
@@ -3130,7 +3314,7 @@ diff --exclude-from=exclude --exclude=se
                                              'proto=',
                                              'seuser=',
                                              'store=',
-@@ -438,6 +508,7 @@
+@@ -438,6 +509,7 @@
                                              'level=',
                                              'roles=',
                                              'type=',
@@ -3138,7 +3322,7 @@ diff --exclude-from=exclude --exclude=se
                                              'prefix='
                                              ])
                 for o, a in gopts:
-@@ -445,6 +516,16 @@
+@@ -445,6 +517,16 @@
                               store = a
                        if o == "-i" or o == '--input':
                               input = a
@@ -3155,7 +3339,7 @@ diff --exclude-from=exclude --exclude=se
  
                 if input != None:
                        if input == "-":
-@@ -454,6 +535,7 @@
+@@ -454,6 +536,7 @@
                        trans = seobject.semanageRecords(store)
                        trans.start()
                        for l in fd.readlines():
@@ -3163,15 +3347,15 @@ diff --exclude-from=exclude --exclude=se
                               process_args(mkargv(l))
                        trans.finish()
                 else:
-@@ -467,3 +549,5 @@
+@@ -467,3 +550,5 @@
  		errorExit(_("Invalid value %s") % error.args[0])
  	except IOError, error:
  		errorExit(error.args[1])
 +	except OSError, error:
 +		errorExit(error.args[1])
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/semanage.8 policycoreutils-2.0.78/semanage/semanage.8
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/semanage.8 policycoreutils-2.0.79/semanage/semanage.8
 --- nsapolicycoreutils/semanage/semanage.8	2009-11-18 17:06:03.000000000 -0500
-+++ policycoreutils-2.0.78/semanage/semanage.8	2010-01-08 09:32:28.000000000 -0500
++++ policycoreutils-2.0.79/semanage/semanage.8	2010-02-16 13:46:01.000000000 -0500
 @@ -19,6 +19,8 @@
  .br
  .B semanage fcontext \-{a|d|m} [\-frst] file_spec
@@ -3203,9 +3387,9 @@ diff --exclude-from=exclude --exclude=se
  # Allow Apache to listen on port 81
  $ semanage port -a -t http_port_t -p tcp 81
  # Change apache to a permissive domain
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/seobject.py policycoreutils-2.0.78/semanage/seobject.py
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/seobject.py policycoreutils-2.0.79/semanage/seobject.py
 --- nsapolicycoreutils/semanage/seobject.py	2009-11-20 10:51:25.000000000 -0500
-+++ policycoreutils-2.0.78/semanage/seobject.py	2010-02-03 11:39:44.000000000 -0500
++++ policycoreutils-2.0.79/semanage/seobject.py	2010-02-16 13:46:01.000000000 -0500
 @@ -29,47 +29,12 @@
  import gettext
  gettext.bindtextdomain(PROGNAME, "/usr/share/locale")
@@ -3861,9 +4045,9 @@ diff --exclude-from=exclude --exclude=se
  	def list(self, heading = True, locallist = False, use_file = False):
                  on_off = (_("off"), _("on")) 
  		if use_file:
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semodule/semodule.8 policycoreutils-2.0.78/semodule/semodule.8
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semodule/semodule.8 policycoreutils-2.0.79/semodule/semodule.8
 --- nsapolicycoreutils/semodule/semodule.8	2009-09-17 08:59:43.000000000 -0400
-+++ policycoreutils-2.0.78/semodule/semodule.8	2009-12-08 17:05:49.000000000 -0500
++++ policycoreutils-2.0.79/semodule/semodule.8	2010-02-16 13:46:01.000000000 -0500
 @@ -35,6 +35,12 @@
  .B  \-b,\-\-base=MODULE_PKG   
  install/replace base module package
@@ -3877,9 +4061,9 @@ diff --exclude-from=exclude --exclude=se
  .B  \-r,\-\-remove=MODULE_NAME
  remove existing module
  .TP
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semodule/semodule.c policycoreutils-2.0.78/semodule/semodule.c
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semodule/semodule.c policycoreutils-2.0.79/semodule/semodule.c
 --- nsapolicycoreutils/semodule/semodule.c	2009-09-17 08:59:43.000000000 -0400
-+++ policycoreutils-2.0.78/semodule/semodule.c	2009-12-08 17:05:49.000000000 -0500
++++ policycoreutils-2.0.79/semodule/semodule.c	2010-02-16 13:46:01.000000000 -0500
 @@ -22,12 +22,12 @@
  
  #include <semanage/modules.h>
@@ -3997,9 +4181,9 @@ diff --exclude-from=exclude --exclude=se
  						semanage_module_info_datum_destroy
  						    (m);
  					}
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/restore.c policycoreutils-2.0.78/setfiles/restore.c
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/restore.c policycoreutils-2.0.79/setfiles/restore.c
 --- nsapolicycoreutils/setfiles/restore.c	2009-11-03 09:21:40.000000000 -0500
-+++ policycoreutils-2.0.78/setfiles/restore.c	2010-01-29 16:37:02.000000000 -0500
++++ policycoreutils-2.0.79/setfiles/restore.c	2010-02-16 16:32:12.000000000 -0500
 @@ -1,4 +1,5 @@
  #include "restore.h"
 +#include <glob.h>
@@ -4022,19 +4206,23 @@ diff --exclude-from=exclude --exclude=se
  }
  
  void restore_init(struct restore_opts *opts)
-@@ -303,6 +302,12 @@
- 	FTS *fts_handle;
- 	FTSENT *ftsent;
- 
+@@ -300,8 +299,14 @@
+ 	int rc = 0;
+ 	const char *namelist[2] = {name, NULL};
+ 	dev_t dev_num = 0;
+-	FTS *fts_handle;
+-	FTSENT *ftsent;
++	FTS *fts_handle = NULL;
++	FTSENT *ftsent = NULL;
++
 +	if (r_opts == NULL){
 +		fprintf(stderr,
 +			"Must call initialize first!");
 +		goto err;
 +	}
-+
+ 
  	fts_handle = fts_open((char **)namelist, r_opts->fts_flags, NULL);
  	if (fts_handle  == NULL) {
- 		fprintf(stderr,
 @@ -357,6 +362,29 @@
  	goto out;
  }
@@ -4150,9 +4338,9 @@ diff --exclude-from=exclude --exclude=se
 +	free(buf);
 +}
  
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/restorecon.8 policycoreutils-2.0.78/setfiles/restorecon.8
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/restorecon.8 policycoreutils-2.0.79/setfiles/restorecon.8
 --- nsapolicycoreutils/setfiles/restorecon.8	2008-08-28 09:34:24.000000000 -0400
-+++ policycoreutils-2.0.78/setfiles/restorecon.8	2009-12-16 08:14:22.000000000 -0500
++++ policycoreutils-2.0.79/setfiles/restorecon.8	2010-02-16 13:46:01.000000000 -0500
 @@ -4,10 +4,10 @@
  
  .SH "SYNOPSIS"
@@ -4176,9 +4364,9 @@ diff --exclude-from=exclude --exclude=se
  .TP 
  .B \-v
  show changes in file labels.
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/restore.h policycoreutils-2.0.78/setfiles/restore.h
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/restore.h policycoreutils-2.0.79/setfiles/restore.h
 --- nsapolicycoreutils/setfiles/restore.h	2009-11-03 09:21:40.000000000 -0500
-+++ policycoreutils-2.0.78/setfiles/restore.h	2010-01-29 16:27:56.000000000 -0500
++++ policycoreutils-2.0.79/setfiles/restore.h	2010-02-16 13:46:01.000000000 -0500
 @@ -27,6 +27,7 @@
  	int hard_links;
  	int verbose;
@@ -4198,9 +4386,9 @@ diff --exclude-from=exclude --exclude=se
  
 +void exclude_non_seclabel_mounts();
  #endif
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/setfiles.8 policycoreutils-2.0.78/setfiles/setfiles.8
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/setfiles.8 policycoreutils-2.0.79/setfiles/setfiles.8
 --- nsapolicycoreutils/setfiles/setfiles.8	2008-08-28 09:34:24.000000000 -0400
-+++ policycoreutils-2.0.78/setfiles/setfiles.8	2009-12-16 08:14:25.000000000 -0500
++++ policycoreutils-2.0.79/setfiles/setfiles.8	2010-02-16 13:46:01.000000000 -0500
 @@ -31,6 +31,9 @@
  .TP
  .B \-n
@@ -4211,9 +4399,9 @@ diff --exclude-from=exclude --exclude=se
  .TP 
  .B \-q
  suppress non-error output.
-diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/setfiles.c policycoreutils-2.0.78/setfiles/setfiles.c
+diff --exclude-from=exclude --exclude=sepolgen-1.0.19 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/setfiles/setfiles.c policycoreutils-2.0.79/setfiles/setfiles.c
 --- nsapolicycoreutils/setfiles/setfiles.c	2009-11-03 09:21:40.000000000 -0500
-+++ policycoreutils-2.0.78/setfiles/setfiles.c	2010-01-29 16:31:10.000000000 -0500
++++ policycoreutils-2.0.79/setfiles/setfiles.c	2010-02-16 13:46:01.000000000 -0500
 @@ -5,7 +5,6 @@
  #include <ctype.h>
  #include <regex.h>


Index: policycoreutils.spec
===================================================================
RCS file: /cvs/extras/rpms/policycoreutils/F-12/policycoreutils.spec,v
retrieving revision 1.673
retrieving revision 1.674
diff -u -p -r1.673 -r1.674
--- policycoreutils.spec	10 Feb 2010 19:30:29 -0000	1.673
+++ policycoreutils.spec	16 Feb 2010 21:48:02 -0000	1.674
@@ -5,8 +5,8 @@
 %define	sepolgenver	1.0.19
 Summary: SELinux policy core utilities
 Name:	 policycoreutils
-Version: 2.0.78
-Release: 20%{?dist}
+Version: 2.0.79
+Release: 1%{?dist}
 License: GPLv2+
 Group:	 System Environment/Base
 Source:  http://www.nsa.gov/selinux/archives/policycoreutils-%{version}.tgz
@@ -26,8 +26,13 @@ Patch3:	 policycoreutils-gui.patch
 Patch4:	 policycoreutils-sepolgen.patch
 Obsoletes: policycoreutils < 2.0.61-2
 
+%global python_sitelib %(%{__python} -c "from distutils.sysconfig import get_python_lib; print get_python_lib(1)")
+
+%global pkgpythondir  %{python_sitelib}/%{name}
+
 BuildRequires: pam-devel libsepol-static >= %{libsepolver} libsemanage-devel >= %{libsemanagever} libselinux-devel >= %{libselinuxver}  libcap-devel audit-libs-devel >=  %{libauditver} gettext
 BuildRequires: desktop-file-utils dbus-devel dbus-glib-devel
+BuildRequires: python-devel
 Requires: /bin/mount /bin/egrep /bin/awk /usr/bin/diff rpm /bin/sed
 Requires: libsepol >= %{libsepolver} coreutils checkpolicy  libselinux-utils >=  %{libselinuxver}
 Requires(post): /sbin/chkconfig
@@ -121,9 +126,11 @@ The policycoreutils-python package conta
 %{_bindir}/chcat
 %{_bindir}/sandbox
 %{_bindir}/sepolgen-ifgen
-%{_libdir}/python?.?/site-packages/seobject.py*
-%{_libdir}/python?.?/site-packages/sepolgen/*
-%dir %{_libdir}/python?.?/site-packages/sepolgen
+%{python_sitelib}/seobject.py*
+%{python_sitelib}/sepolgen
+%{python_sitelib}/%{name}	
+%{python_sitelib}/%{name}*.egg-info
+%{pkgpythondir}/default_encoding_utf8.so
 %dir  /var/lib/sepolgen
 %dir  /var/lib/selinux
 /var/lib/sepolgen/perm_map
@@ -298,7 +305,16 @@ fi
 exit 0
 
 %changelog
+* Thu Feb 16 2010 Dan Walsh <dwalsh at redhat.com> 2.0.79-1
+- Update to upstream
+	* Fix double-free in newrole
+- Fix python language handling
+
+* Thu Feb 11 2010 Dan Walsh <dwalsh at redhat.com> 2.0.78-21
+- Fix display of command in sandbox
+
 * Fri Feb 5 2010 Dan Walsh <dwalsh at redhat.com> 2.0.78-20
+
 - Catch OSError in semanage
 
 * Wed Feb 3 2010 Dan Walsh <dwalsh at redhat.com> 2.0.78-19


Index: sources
===================================================================
RCS file: /cvs/extras/rpms/policycoreutils/F-12/sources,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -p -r1.213 -r1.214
--- sources	9 Dec 2009 21:34:46 -0000	1.213
+++ sources	16 Feb 2010 21:48:02 -0000	1.214
@@ -1,3 +1,3 @@
-96b2e73550b7e36daee0f5d347c8a95b  policycoreutils-2.0.78.tgz
 2ae1a9f7242e33413aae036d2edeb1d8  sepolgen-1.0.19.tgz
+e09466b2b02ca5672ce3b43e02c5498f  policycoreutils-2.0.79.tgz
 59d33101d57378ce69889cc078addf90  policycoreutils_man_ru2.tar.bz2



More information about the scm-commits mailing list