[policycoreutils] Update Translations

Daniel J Walsh dwalsh at fedoraproject.org
Tue Jan 15 17:19:29 UTC 2013


commit c910a0cf102cdc7dd8475e2a196d1363691ea229
Author: Dan Walsh <dwalsh at redhat.com>
Date:   Tue Jan 15 12:19:10 2013 -0500

    Update Translations
    
    - Fix handling of semanage generate --cgi -n MODULE PATHTO/CGI
    -   This fixes the spec file and script file getting wrong names for modules and types.

 policycoreutils-rhat.patch |  988 ++++++++++++++++++++++++--------------------
 policycoreutils.spec       |    7 +-
 2 files changed, 547 insertions(+), 448 deletions(-)
---
diff --git a/policycoreutils-rhat.patch b/policycoreutils-rhat.patch
index 0113267..0874e5b 100644
--- a/policycoreutils-rhat.patch
+++ b/policycoreutils-rhat.patch
@@ -140599,10 +140599,10 @@ index 9ccb8e0..75801e9 100644
 +"services."
  msgstr ""
 diff --git a/policycoreutils/po/hu.po b/policycoreutils/po/hu.po
-index e92b9b3..b3c942c 100644
+index e92b9b3..1179592 100644
 --- a/policycoreutils/po/hu.po
 +++ b/policycoreutils/po/hu.po
-@@ -1,7 +1,7 @@
+@@ -1,36 +1,33 @@
  # SOME DESCRIPTIVE TITLE.
  # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
  # This file is distributed under the same license as the PACKAGE package.
@@ -140611,16 +140611,17 @@ index e92b9b3..b3c942c 100644
  # Translators:
  # Arpad Biro <biro_arpad at yahoo.com>, 2006, 2007.
  # Nagy István Zoltán <nagyesta at gmail.com>, 2009.
-@@ -10,27 +10,24 @@ msgid ""
+-# Zoltan Hoppár <hopparz at gmail.com>, 2012.
++# Zoltan Hoppár <hopparz at gmail.com>, 2012-2013.
+ msgid ""
  msgstr ""
  "Project-Id-Version: Policycoreutils\n"
  "Report-Msgid-Bugs-To: \n"
 -"POT-Creation-Date: 2012-05-25 07:28-0400\n"
 -"PO-Revision-Date: 2012-04-23 07:55+0000\n"
--"Last-Translator: Zoltan Hoppár <hopparz at gmail.com>\n"
 +"POT-Creation-Date: 2013-01-04 12:01-0500\n"
-+"PO-Revision-Date: 2013-01-04 17:02+0000\n"
-+"Last-Translator: dwalsh <dwalsh at redhat.com>\n"
++"PO-Revision-Date: 2013-01-09 17:08+0000\n"
+ "Last-Translator: Zoltan Hoppár <hopparz at gmail.com>\n"
  "Language-Team: Hungarian <trans-hu at lists.fedoraproject.org>\n"
 -"Language: hu\n"
  "MIME-Version: 1.0\n"
@@ -140930,7 +140931,7 @@ index e92b9b3..b3c942c 100644
 -#: ../semanage/seobject.py:864
 +#: ../semanage/seobject.py:672
 +msgid "Service"
-+msgstr ""
++msgstr "Szolgáltatás"
 +
 +#: ../semanage/seobject.py:698 ../semanage/seobject.py:729
 +#: ../semanage/seobject.py:796 ../semanage/seobject.py:853
@@ -141101,7 +141102,7 @@ index e92b9b3..b3c942c 100644
 +#: ../semanage/seobject.py:1814
 +#, python-format
 +msgid "Type %s is invalid, must be a port type"
-+msgstr ""
++msgstr "%s típusa helytelen, porttípusnak kell lennie."
 +
 +#: ../semanage/seobject.py:1000 ../semanage/seobject.py:1062
 +#: ../semanage/seobject.py:1117 ../semanage/seobject.py:1123
@@ -141200,17 +141201,17 @@ index e92b9b3..b3c942c 100644
 -msgstr "Meg kell adni SELinux-típust"
 +#: ../semanage/seobject.py:1256
 +msgid "SELinux node type is required"
-+msgstr ""
-+
-+#: ../semanage/seobject.py:1259 ../semanage/seobject.py:1327
-+#, python-format
-+msgid "Type %s is invalid, must be a node type"
-+msgstr ""
++msgstr "SELinux node típus szükséges."
  
 -#: ../semanage/seobject.py:1255 ../semanage/seobject.py:1320
 -#: ../semanage/seobject.py:1356 ../semanage/seobject.py:1454
 -#: ../semanage/seobject.py:1516 ../semanage/seobject.py:1550
 -#: ../semanage/seobject.py:1732
++#: ../semanage/seobject.py:1259 ../semanage/seobject.py:1327
++#, python-format
++msgid "Type %s is invalid, must be a node type"
++msgstr "%s típusa helytelen, node típusú kell lennie."
++
 +#: ../semanage/seobject.py:1263 ../semanage/seobject.py:1331
 +#: ../semanage/seobject.py:1367 ../semanage/seobject.py:1465
 +#: ../semanage/seobject.py:1527 ../semanage/seobject.py:1561
@@ -141490,18 +141491,19 @@ index e92b9b3..b3c942c 100644
  #, python-format
  msgid ""
 -"File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' instead"
+-msgstr ""
 +"File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' "
 +"instead"
 +msgstr "Fájl specifikáció %s ütközik egy azonossági szabállyal  '%s %s'; Próbálja meg helyette hozzáadni ezt: '%s'"
-+
-+#: ../semanage/seobject.py:1755
-+#, python-format
-+msgid "Type %s is invalid, must be a file or device type"
- msgstr ""
  
 -#: ../semanage/seobject.py:1736 ../semanage/seobject.py:1741
 -#: ../semanage/seobject.py:1794 ../semanage/seobject.py:1876
 -#: ../semanage/seobject.py:1880
++#: ../semanage/seobject.py:1755
++#, python-format
++msgid "Type %s is invalid, must be a file or device type"
++msgstr "%s típusa helytelen, fájl vagy eszköztípusnak kell lennie."
++
 +#: ../semanage/seobject.py:1763 ../semanage/seobject.py:1768
 +#: ../semanage/seobject.py:1824 ../semanage/seobject.py:1906
 +#: ../semanage/seobject.py:1910
@@ -142008,12 +142010,12 @@ index e92b9b3..b3c942c 100644
 -"Szabványos Init Daemon-ok azok a szolgáltatások amelyeket rendszerindításkor "
 -"init szkriptekkel indítanak.  Rendszerint egy szkriptet igényel az /etc/rc.d/"
 -"init.d mappában"
-+msgstr "Szabványos Init Daemon-ok azok a szolgáltatások amelyeket rendszerindításkor init szkriptekkel indítanak.  Rendszerint egy szkriptet igényel az /etc/rc.d/init.d mappában"
- 
+-
 -#: ../gui/polgen.glade:241 ../gui/polgen.py:156
 -msgid "Standard Init Daemon"
 -msgstr "Szabványos init daemon"
--
++msgstr "Szabványos Init Daemon-ok azok a szolgáltatások amelyeket rendszerindításkor init szkriptekkel indítanak.  Rendszerint egy szkriptet igényel az /etc/rc.d/init.d mappában"
+ 
 -#: ../gui/polgen.glade:261 ../gui/polgen.py:157
 +#: ../gui/polgen.glade:332 ../sepolicy/sepolicy/generate.py:172
  msgid "DBUS System Daemon"
@@ -142224,12 +142226,12 @@ index e92b9b3..b3c942c 100644
  msgid ""
  "Enter complete path to init script used to start the confined application."
 -msgstr ""
-+msgstr "Adjon meg teljes elérési utat az indiításhoz felhasznált init szkripthez ami elindítja a szabályozni kívánt alkalmazást."
- 
+-
 -#: ../gui/polgen.glade:982
 -msgid "label105"
 -msgstr ""
--
++msgstr "Adjon meg teljes elérési utat az indiításhoz felhasznált init szkripthez ami elindítja a szabályozni kívánt alkalmazást."
+ 
 -#: ../gui/polgen.glade:1011
 +#: ../gui/polgen.glade:887
  msgid "<b>Select existing role to modify:</b>"
@@ -142298,22 +142300,22 @@ index e92b9b3..b3c942c 100644
 +#: ../gui/polgen.glade:1074 ../gui/polgen.glade:1129
  msgid "Select the domains that you would like this user administer."
 -msgstr ""
-+msgstr "Válassza ki azokat a területeket amiket szeretne, ha ez a felhasználó adminisztrálna."
- 
+-
 -#: ../gui/polgen.glade:1346
 -msgid "label109"
 -msgstr ""
--
++msgstr "Válassza ki azokat a területeket amiket szeretne, ha ez a felhasználó adminisztrálna."
+ 
 -#: ../gui/polgen.glade:1375
 +#: ../gui/polgen.glade:1111
  msgid "<b>Select additional roles for %s:</b>"
 -msgstr ""
--
++msgstr "<b>Válasszon tövábbi szerepeket %s számára:</b>"
+ 
 -#: ../gui/polgen.glade:1437
 -msgid "label111"
 -msgstr ""
-+msgstr "<b>Válasszon tövábbi szerepeket %s számára:</b>"
- 
+-
 -#: ../gui/polgen.glade:1466
 +#: ../gui/polgen.glade:1166
  msgid "<b>Enter network ports that %s binds on:</b>"
@@ -142538,12 +142540,12 @@ index e92b9b3..b3c942c 100644
 -#: ../gui/polgen.glade:3254
 -msgid "Add Booleans Dialog"
 -msgstr ""
-+msgstr "Szabályzati mappa"
- 
+-
 -#: ../gui/polgen.glade:3327
 -msgid "Boolean Name"
 -msgstr ""
--
++msgstr "Szabályzati mappa"
+ 
 -#: ../gui/polgengui.py:261
 +#: ../gui/polgengui.py:277
  msgid "Role"
@@ -142676,105 +142678,99 @@ index e92b9b3..b3c942c 100644
 -"Name must be alpha numberic with no spaces. Consider using option \"-n "
 -"MODULENAME\""
 -msgstr ""
+-
+-#: ../gui/polgen.py:414
+-msgid "User Role types can not be assigned executables."
+-msgstr ""
 +"MLS/MCS\n"
 +"Level"
 +msgstr "MLS/MCS\nSzint"
  
--#: ../gui/polgen.py:414
--msgid "User Role types can not be assigned executables."
+-#: ../gui/polgen.py:420
+-msgid "Only Daemon apps can use an init script.."
 -msgstr ""
 +#: ../gui/portsPage.py:101
 +msgid "Port"
 +msgstr "Port"
  
--#: ../gui/polgen.py:420
--msgid "Only Daemon apps can use an init script.."
+-#: ../gui/polgen.py:438
+-msgid "use_resolve must be a boolean value "
 -msgstr ""
 +#: ../gui/portsPage.py:207
 +#, python-format
 +msgid "Port number \"%s\" is not valid.  0 < PORT_NUMBER < 65536 "
 +msgstr "Portszám \"%s\" érvénytelen. 0 < PORT_SZÁM < 65536 "
  
--#: ../gui/polgen.py:438
--msgid "use_resolve must be a boolean value "
+-#: ../gui/polgen.py:444
+-msgid "use_syslog must be a boolean value "
 -msgstr ""
 +#: ../gui/portsPage.py:252
 +msgid "List View"
 +msgstr "Listanézet"
  
--#: ../gui/polgen.py:444
--msgid "use_syslog must be a boolean value "
+-#: ../gui/polgen.py:450
+-msgid "use_kerberos must be a boolean value "
 -msgstr ""
 +#: ../gui/portsPage.py:255 ../gui/system-config-selinux.glade:2419
 +msgid "Group View"
 +msgstr "Csoportnézet"
  
--#: ../gui/polgen.py:450
--msgid "use_kerberos must be a boolean value "
+-#: ../gui/polgen.py:456
+-msgid "manage_krb5_rcache must be a boolean value "
 -msgstr ""
 +#: ../gui/semanagePage.py:126
 +#, python-format
 +msgid "Are you sure you want to delete %s '%s'?"
 +msgstr "Biztos benne hogy törölni akarja %s '%s'?"
  
--#: ../gui/polgen.py:456
--msgid "manage_krb5_rcache must be a boolean value "
+-#: ../gui/polgen.py:486
+-msgid "USER Types automatically get a tmp type"
 -msgstr ""
 +#: ../gui/semanagePage.py:126
 +#, python-format
 +msgid "Delete %s"
 +msgstr "%s törlése"
  
--#: ../gui/polgen.py:486
--msgid "USER Types automatically get a tmp type"
+-#: ../gui/polgen.py:1004
+-msgid "You must enter the executable path for your confined process"
 -msgstr ""
 +#: ../gui/semanagePage.py:134
 +#, python-format
 +msgid "Add %s"
 +msgstr "%s hozzáadása"
  
--#: ../gui/polgen.py:1004
--msgid "You must enter the executable path for your confined process"
+-#: ../gui/polgen.py:1182
+-msgid "Type Enforcement file"
 -msgstr ""
 +#: ../gui/semanagePage.py:148
 +#, python-format
 +msgid "Modify %s"
 +msgstr "%s módosítása"
  
--#: ../gui/polgen.py:1182
--msgid "Type Enforcement file"
+-#: ../gui/polgen.py:1183
+-msgid "Interface file"
 -msgstr ""
 +#: ../gui/statusPage.py:69 ../gui/system-config-selinux.glade:2819
 +msgid "Permissive"
 +msgstr "Átjárható"
  
--#: ../gui/polgen.py:1183
--msgid "Interface file"
+-#: ../gui/polgen.py:1184
+-msgid "File Contexts file"
 -msgstr ""
 +#: ../gui/statusPage.py:70 ../gui/system-config-selinux.glade:2837
 +msgid "Enforcing"
 +msgstr "Vezérelt"
  
--#: ../gui/polgen.py:1184
--msgid "File Contexts file"
+-#: ../gui/polgen.py:1185
+-msgid "Setup Script"
 -msgstr ""
 +#: ../gui/statusPage.py:94
 +msgid "Status"
 +msgstr "Állapot"
  
--#: ../gui/polgen.py:1185
--msgid "Setup Script"
--msgstr ""
-+#: ../gui/statusPage.py:133
-+msgid ""
-+"Changing the policy type will cause a relabel of the entire file system on "
-+"the next boot. Relabeling takes a long time depending on the size of the "
-+"file system.  Do you wish to continue?"
-+msgstr "A szabályzattípus megváltoztatása azzal jár, hogy a teljes fájlrendszert át kell cimkézni a következő rendszerindításkor. Átcimkézés elég hosszadalmas folyamat lehet, a fájlrendszer méretétől függően. Kívánja folytatni?"
- 
 -#: ../gui/polgen.py:1306
 -#, python-format
-+#: ../gui/statusPage.py:147
++#: ../gui/statusPage.py:133
  msgid ""
 -"\n"
 -"%s\n"
@@ -142782,6 +142778,20 @@ index e92b9b3..b3c942c 100644
 -"sepolgen [ -n moduleName ] [ -m ] [ -t type ] [ executable | Name ]\n"
 -"valid Types:\n"
 -msgstr ""
+-
+-#: ../gui/polgen.py:1354
+-msgid "Executable or Name required"
+-msgstr ""
++"Changing the policy type will cause a relabel of the entire file system on "
++"the next boot. Relabeling takes a long time depending on the size of the "
++"file system.  Do you wish to continue?"
++msgstr "A szabályzattípus megváltoztatása azzal jár, hogy a teljes fájlrendszert át kell cimkézni a következő rendszerindításkor. Átcimkézés elég hosszadalmas folyamat lehet, a fájlrendszer méretétől függően. Kívánja folytatni?"
+ 
+-#: ../gui/portsPage.py:51 ../gui/system-config-selinux.glade:2528
+-msgid "Network Port"
+-msgstr ""
++#: ../gui/statusPage.py:147
++msgid ""
 +"Changing to SELinux disabled requires a reboot.  It is not recommended.  If "
 +"you later decide to turn SELinux back on, the system will be required to "
 +"relabel.  If you just want to see if SELinux is causing a problem on your "
@@ -142790,88 +142800,65 @@ index e92b9b3..b3c942c 100644
 +" wish to continue?"
 +msgstr "Az SELinux kikapcsolása ugyan újraindítást igényel - de ez nem javasolt. Ha később úgy dönt hogy visszakapcsolja az SELinux alrendszert, a rendszer számára teljes újracimkézés lesz szükséges. Ha csak azt szeretné látni, hogy maga az SELinux alrendszer okozza a problémát vagy sem, váltson át átjárható módba ami csak logolja a hibákat, és nem lép közbe az SELinux szabályzattal. Az áteresztő mód természetesen nem igényel újraindítást. Kívánja folytatni?"
  
--#: ../gui/polgen.py:1354
--msgid "Executable or Name required"
--msgstr ""
+-#: ../gui/portsPage.py:85
 +#: ../gui/statusPage.py:152
-+msgid ""
+ msgid ""
+-"SELinux Port\n"
+-"Type"
+-msgstr ""
 +"Changing to SELinux enabled will cause a relabel of the entire file system "
 +"on the next boot. Relabeling takes a long time depending on the size of the "
 +"file system.  Do you wish to continue?"
 +msgstr "SELinux engedélyezése azzal jár, hogy a teljes fájlrendszert újra kell cimkézni a következő újraindításkor. Az újracimkézés folyamata a fájlrendszer méretétől függően hosszú időt vehet igénybe. Kívánja folytatni?"
  
--#: ../gui/portsPage.py:51 ../gui/system-config-selinux.glade:2528
--msgid "Network Port"
+-#: ../gui/portsPage.py:91 ../gui/system-config-selinux.glade:363
+-msgid "Protocol"
 -msgstr ""
 +#: ../gui/system-config-selinux.glade:11
 +msgid "system-config-selinux"
 +msgstr "system-config-selinux"
  
--#: ../gui/portsPage.py:85
+-#: ../gui/portsPage.py:96 ../gui/system-config-selinux.glade:479
 +#: ../gui/system-config-selinux.glade:12
  msgid ""
--"SELinux Port\n"
--"Type"
+-"MLS/MCS\n"
+-"Level"
 -msgstr ""
 +"Copyright (c)2006 Red Hat, Inc.\n"
 +"Copyright (c) 2006 Dan Walsh <dwalsh at redhat.com>"
 +msgstr "Copyright (c)2006 Red Hat, Inc.\nCopyright (c) 2006 Dan Walsh <dwalsh at redhat.com>"
  
--#: ../gui/portsPage.py:91 ../gui/system-config-selinux.glade:363
--msgid "Protocol"
+-#: ../gui/portsPage.py:101
+-msgid "Port"
 -msgstr ""
 +#: ../gui/system-config-selinux.glade:22
 +#: ../gui/system-config-selinux.glade:544
 +msgid "Add SELinux Login Mapping"
 +msgstr "SELinux bejelentkezési hozzárendelés hozzáadása"
  
--#: ../gui/portsPage.py:96 ../gui/system-config-selinux.glade:479
--msgid ""
--"MLS/MCS\n"
--"Level"
+-#: ../gui/portsPage.py:207
+-#, python-format
+-msgid "Port number \"%s\" is not valid.  0 < PORT_NUMBER < 65536 "
 -msgstr ""
 +#: ../gui/system-config-selinux.glade:257
 +msgid "Add SELinux Network Ports"
 +msgstr "SELinux Hálózati Portok"
  
--#: ../gui/portsPage.py:101
--msgid "Port"
+-#: ../gui/portsPage.py:252
+-msgid "List View"
 -msgstr ""
 +#: ../gui/system-config-selinux.glade:391
 +#: ../gui/system-config-selinux.glade:678
 +msgid "SELinux Type"
 +msgstr "SELinux Típus"
  
--#: ../gui/portsPage.py:207
--#, python-format
--msgid "Port number \"%s\" is not valid.  0 < PORT_NUMBER < 65536 "
+-#: ../gui/portsPage.py:255 ../gui/system-config-selinux.glade:2419
+-msgid "Group View"
 -msgstr ""
 +#: ../gui/system-config-selinux.glade:622
 +msgid "File Specification"
 +msgstr "Fájl specifikáció"
  
--#: ../gui/portsPage.py:252
--msgid "List View"
--msgstr ""
-+#: ../gui/system-config-selinux.glade:650
-+msgid "File Type"
-+msgstr "Fájltípus"
- 
--#: ../gui/portsPage.py:255 ../gui/system-config-selinux.glade:2419
--msgid "Group View"
--msgstr ""
-+#: ../gui/system-config-selinux.glade:727
-+msgid ""
-+"all files\n"
-+"regular file\n"
-+"directory\n"
-+"character device\n"
-+"block device\n"
-+"socket\n"
-+"symbolic link\n"
-+"named pipe\n"
-+msgstr "összes fájl\nközönséges fájl\nmappa\nkarakteres eszköz\nblokk eszköz\nport\nszimbolikus link\nelnevezett pipe\n"
- 
 -#: ../gui/selinux.tbl:1 ../gui/selinux.tbl:30 ../gui/selinux.tbl:31
 -#: ../gui/selinux.tbl:32 ../gui/selinux.tbl:33 ../gui/selinux.tbl:34
 -#: ../gui/selinux.tbl:36 ../gui/selinux.tbl:37 ../gui/selinux.tbl:38
@@ -142919,16 +142906,24 @@ index e92b9b3..b3c942c 100644
 -#: ../gui/selinux.tbl:226 ../gui/selinux.tbl:227 ../gui/selinux.tbl:230
 -msgid "SELinux Service Protection"
 -msgstr ""
-+#: ../gui/system-config-selinux.glade:773
-+msgid "MLS"
-+msgstr "MLS"
++#: ../gui/system-config-selinux.glade:650
++msgid "File Type"
++msgstr "Fájltípus"
  
 -#: ../gui/selinux.tbl:1
 -msgid "Disable SELinux protection for acct daemon"
 -msgstr ""
-+#: ../gui/system-config-selinux.glade:837
-+msgid "Add SELinux User"
-+msgstr "SELinux felhasználó hozzáadása"
++#: ../gui/system-config-selinux.glade:727
++msgid ""
++"all files\n"
++"regular file\n"
++"directory\n"
++"character device\n"
++"block device\n"
++"socket\n"
++"symbolic link\n"
++"named pipe\n"
++msgstr "összes fájl\nközönséges fájl\nmappa\nkarakteres eszköz\nblokk eszköz\nport\nszimbolikus link\nelnevezett pipe\n"
  
 -#: ../gui/selinux.tbl:2 ../gui/selinux.tbl:3 ../gui/selinux.tbl:70
 -#: ../gui/selinux.tbl:153 ../gui/selinux.tbl:168 ../gui/selinux.tbl:169
@@ -142936,23 +142931,23 @@ index e92b9b3..b3c942c 100644
 -#: ../gui/selinux.tbl:203 ../gui/selinux.tbl:204 ../gui/selinux.tbl:205
 -msgid "Admin"
 -msgstr ""
-+#: ../gui/system-config-selinux.glade:1079
-+msgid "SELinux Administration"
-+msgstr "SELinux Adminisztráció"
++#: ../gui/system-config-selinux.glade:773
++msgid "MLS"
++msgstr "MLS"
  
 -#: ../gui/selinux.tbl:2
 -msgid "Allow all daemons to write corefiles to /"
 -msgstr ""
-+#: ../gui/system-config-selinux.glade:1122
-+msgid "Add"
-+msgstr "Hozzáadás"
++#: ../gui/system-config-selinux.glade:837
++msgid "Add SELinux User"
++msgstr "SELinux felhasználó hozzáadása"
  
 -#: ../gui/selinux.tbl:3
 -msgid "Allow all daemons the ability to use unallocated ttys"
 -msgstr ""
-+#: ../gui/system-config-selinux.glade:1144
-+msgid "_Properties"
-+msgstr "Tulajdonságok"
++#: ../gui/system-config-selinux.glade:1079
++msgid "SELinux Administration"
++msgstr "SELinux Adminisztráció"
  
 -#: ../gui/selinux.tbl:4 ../gui/selinux.tbl:5 ../gui/selinux.tbl:11
 -#: ../gui/selinux.tbl:12 ../gui/selinux.tbl:13 ../gui/selinux.tbl:15
@@ -142962,6 +142957,15 @@ index e92b9b3..b3c942c 100644
 -#: ../gui/selinux.tbl:216 ../gui/selinux.tbl:217
 -msgid "User Privs"
 -msgstr ""
++#: ../gui/system-config-selinux.glade:1122
++msgid "Add"
++msgstr "Hozzáadás"
+ 
+-#: ../gui/selinux.tbl:4
++#: ../gui/system-config-selinux.glade:1144
++msgid "_Properties"
++msgstr "Tulajdonságok"
++
 +#: ../gui/system-config-selinux.glade:1166
 +msgid "_Delete"
 +msgstr "Törlés"
@@ -142973,8 +142977,7 @@ index e92b9b3..b3c942c 100644
 +#: ../gui/system-config-selinux.glade:1273
 +msgid "<b>Select:</b>"
 +msgstr "<b>Válasszon:</b>"
- 
--#: ../gui/selinux.tbl:4
++
 +#: ../gui/system-config-selinux.glade:1326
 +msgid "System Default Enforcing Mode"
 +msgstr "Rendszer alapértelmezés Vezérelt mód"
@@ -143160,7 +143163,8 @@ index e92b9b3..b3c942c 100644
 +#: ../gui/system-config-selinux.glade:2350
 +msgid "Add Network Port"
 +msgstr "Hálózati port hozzáadása"
-+
+ 
+-#: ../gui/selinux.tbl:20
 +#: ../gui/system-config-selinux.glade:2366
 +msgid "Edit Network Port"
 +msgstr "Hálózati port szerkesztése"
@@ -143185,8 +143189,7 @@ index e92b9b3..b3c942c 100644
 +#: ../gui/system-config-selinux.glade:2609
 +msgid "Load policy module"
 +msgstr "Szabályzat modul betöltése"
- 
--#: ../gui/selinux.tbl:20
++
 +#: ../gui/system-config-selinux.glade:2625
 +msgid "Remove loadable policy module"
 +msgstr "Betölthető szabályzat modul eltávolítása"
@@ -143198,161 +143201,164 @@ index e92b9b3..b3c942c 100644
 +"Enable/Disable additional audit rules, that are normally not reported in the"
 +" log files."
 +msgstr "Engedélyezi/Tiltja további auditálási szabályzatokat, ami alapértelmezésben nem kerülnek reportálásra a log fájlokban."
-+
+ 
+-#: ../gui/selinux.tbl:21 ../gui/selinux.tbl:228 ../gui/selinux.tbl:229
+-#: ../gui/selinux.tbl:231
+-msgid "NIS"
+-msgstr ""
 +#: ../gui/system-config-selinux.glade:2781
 +msgid "label44"
 +msgstr "label44"
-+
+ 
+-#: ../gui/selinux.tbl:21
+-msgid "Allow daemons to run with NIS"
+-msgstr ""
 +#: ../gui/system-config-selinux.glade:2818
 +msgid "Change process mode to permissive."
 +msgstr "Változtassa meg feldolgozási módot átjárhatóra."
-+
+ 
+-#: ../gui/selinux.tbl:22 ../gui/selinux.tbl:23 ../gui/selinux.tbl:24
+-#: ../gui/selinux.tbl:25 ../gui/selinux.tbl:26 ../gui/selinux.tbl:27
+-#: ../gui/selinux.tbl:28 ../gui/selinux.tbl:29 ../gui/selinux.tbl:71
+-#: ../gui/selinux.tbl:73 ../gui/selinux.tbl:74 ../gui/selinux.tbl:115
+-#: ../gui/selinux.tbl:118
+-msgid "Web Applications"
+-msgstr ""
 +#: ../gui/system-config-selinux.glade:2836
 +msgid "Change process mode to enforcing"
 +msgstr "Változtassa meg a feldolgozási módot vezéreltre"
-+
+ 
+-#: ../gui/selinux.tbl:22
+-msgid "Transition staff SELinux user to Web Browser Domain"
+-msgstr ""
 +#: ../gui/system-config-selinux.glade:2928
 +msgid "Process Domain"
 +msgstr "Feldolgozási terület"
  
--#: ../gui/selinux.tbl:21 ../gui/selinux.tbl:228 ../gui/selinux.tbl:229
--#: ../gui/selinux.tbl:231
--msgid "NIS"
+-#: ../gui/selinux.tbl:23
+-msgid "Transition sysadm SELinux user to Web Browser Domain"
 -msgstr ""
 +#: ../gui/system-config-selinux.glade:2956
 +msgid "label59"
 +msgstr "label59"
  
--#: ../gui/selinux.tbl:21
--msgid "Allow daemons to run with NIS"
+-#: ../gui/selinux.tbl:24
+-msgid "Transition user SELinux user to Web Browser Domain"
 -msgstr ""
 +#: ../gui/usersPage.py:138
 +#, python-format
 +msgid "SELinux user '%s' is required"
 +msgstr "SELinux felhasználó '%s' szükséges"
  
--#: ../gui/selinux.tbl:22 ../gui/selinux.tbl:23 ../gui/selinux.tbl:24
--#: ../gui/selinux.tbl:25 ../gui/selinux.tbl:26 ../gui/selinux.tbl:27
--#: ../gui/selinux.tbl:28 ../gui/selinux.tbl:29 ../gui/selinux.tbl:71
--#: ../gui/selinux.tbl:73 ../gui/selinux.tbl:74 ../gui/selinux.tbl:115
--#: ../gui/selinux.tbl:118
--msgid "Web Applications"
+-#: ../gui/selinux.tbl:25
+-msgid "Transition xguest SELinux user to Web Browser Domain"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:202
 +msgid "Generate SELinux man pages"
 +msgstr "Állítsa elő az SELinux man oldalakat"
  
--#: ../gui/selinux.tbl:22
--msgid "Transition staff SELinux user to Web Browser Domain"
+-#: ../gui/selinux.tbl:26 ../gui/selinux.tbl:27 ../gui/selinux.tbl:28
+-#: ../gui/selinux.tbl:29
+-msgid "Allow staff Web Browsers to write to home directories"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:205
 +msgid "path in which the generated SELinux man pages will be stored"
 +msgstr "az elérési út ahol az előállított SELinux man oldalak tárolódnak"
  
--#: ../gui/selinux.tbl:23
--msgid "Transition sysadm SELinux user to Web Browser Domain"
+-#: ../gui/selinux.tbl:30
+-msgid "Disable SELinux protection for amanda"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:207
 +msgid "name of the OS for man pages"
- msgstr ""
++msgstr "OS neve a man oldalakhoz"
  
--#: ../gui/selinux.tbl:24
--msgid "Transition user SELinux user to Web Browser Domain"
+-#: ../gui/selinux.tbl:31
+-msgid "Disable SELinux protection for amavis"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:209
 +msgid "Generate HTML man pages structure for selected SELinux man page"
- msgstr ""
++msgstr "Készítsen HTML man oldalakat a kijelólt SELinux man oldalakból"
  
--#: ../gui/selinux.tbl:25
--msgid "Transition xguest SELinux user to Web Browser Domain"
+-#: ../gui/selinux.tbl:32
+-msgid "Disable SELinux protection for apmd daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:213
 +msgid "All domains"
 +msgstr "Mindet terület"
  
--#: ../gui/selinux.tbl:26 ../gui/selinux.tbl:27 ../gui/selinux.tbl:28
--#: ../gui/selinux.tbl:29
--msgid "Allow staff Web Browsers to write to home directories"
+-#: ../gui/selinux.tbl:33
+-msgid "Disable SELinux protection for arpwatch daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:216
 +msgid "Domain name(s) of man pages to be created"
 +msgstr "Elkészíteni kívánt man oldal tartomány(ok) nevei"
  
--#: ../gui/selinux.tbl:30
--msgid "Disable SELinux protection for amanda"
+-#: ../gui/selinux.tbl:34
+-msgid "Disable SELinux protection for auditd daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:221
 +msgid "Query SELinux policy network information"
 +msgstr "SELinux hálózati szabályzat információ lekérdezése"
  
--#: ../gui/selinux.tbl:31
--msgid "Disable SELinux protection for amavis"
+-#: ../gui/selinux.tbl:35
+-msgid "Disable SELinux protection for automount daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:226
 +msgid "list all SELinux port types"
 +msgstr "listázza az összes SELinux porttípust"
  
--#: ../gui/selinux.tbl:32
--msgid "Disable SELinux protection for apmd daemon"
+-#: ../gui/selinux.tbl:36
+-msgid "Disable SELinux protection for avahi"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:229
 +msgid "show SELinux type related to the port"
 +msgstr "jelenítse meg a porthoz kapcsolódó SELinux típust"
  
--#: ../gui/selinux.tbl:33
--msgid "Disable SELinux protection for arpwatch daemon"
+-#: ../gui/selinux.tbl:37
+-msgid "Disable SELinux protection for bluetooth daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:232
 +msgid "Show ports defined for this SELinux type"
 +msgstr "Jelenítse meg a portokat az ehhez definiált SELinux típusokhoz"
  
--#: ../gui/selinux.tbl:34
--msgid "Disable SELinux protection for auditd daemon"
+-#: ../gui/selinux.tbl:38
+-msgid "Disable SELinux protection for canna daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:235
 +msgid "show ports to which this domain can bind and/or connect"
 +msgstr "Jelenítse meg azokat a portokat amelyeket ez a tartomány össze tud kapcsolni - bind/connect"
  
--#: ../gui/selinux.tbl:35
--msgid "Disable SELinux protection for automount daemon"
+-#: ../gui/selinux.tbl:39
+-msgid "Disable SELinux protection for cardmgr daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:250
 +msgid "query SELinux policy to see if domains can communicate with each other"
 +msgstr "Kérdezze le az SELinux szabályzatát hogy mely tartományok képesek egymással kommunikálni"
  
--#: ../gui/selinux.tbl:36
--msgid "Disable SELinux protection for avahi"
+-#: ../gui/selinux.tbl:40
+-msgid "Disable SELinux protection for Cluster Server"
 -msgstr ""
 +#: ../sepolicy/sepolicy.py:253
 +msgid "Source Domain"
 +msgstr "Forrás tartomány"
- 
--#: ../gui/selinux.tbl:37
--msgid "Disable SELinux protection for bluetooth daemon"
--msgstr ""
++
 +#: ../sepolicy/sepolicy.py:256
 +msgid "Target Domain"
 +msgstr "Cél tartomány"
- 
--#: ../gui/selinux.tbl:38
--msgid "Disable SELinux protection for canna daemon"
--msgstr ""
++
 +#: ../sepolicy/sepolicy.py:276
 +msgid "query SELinux Policy to see description of booleans"
 +msgstr "Kérdezze le az SELinux szabályzatát hogy láthassa a boolean-ok leírását"
  
--#: ../gui/selinux.tbl:39
--msgid "Disable SELinux protection for cardmgr daemon"
+-#: ../gui/selinux.tbl:41
 +#: ../sepolicy/sepolicy.py:280
 +msgid "get all booleans descriptions"
- msgstr ""
- 
--#: ../gui/selinux.tbl:40
--msgid "Disable SELinux protection for Cluster Server"
--msgstr ""
++msgstr "gyűjtse be az összes boolean leíróit"
++
 +#: ../sepolicy/sepolicy.py:282
 +msgid "boolean to get description"
 +msgstr "boolean hogy leírást kapjon róla"
- 
--#: ../gui/selinux.tbl:41
++
 +#: ../sepolicy/sepolicy.py:301
  msgid ""
 -"Allow cdrecord to read various content. nfs, samba, removable devices, user "
@@ -143378,15 +143384,17 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:44
 -msgid "Disable SELinux protection for clamscan"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:327
 +msgid "Command required for this type of policy"
- msgstr ""
++msgstr "Parancs szükséges ilyen típusú szabályokhoz"
  
 -#: ../gui/selinux.tbl:45
 -msgid "Disable SELinux protection for clvmd"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:347
 +msgid "List SELinux Policy interfaces"
- msgstr ""
++msgstr "Listázza az SELinux szabályzat interfészeit"
  
 -#: ../gui/selinux.tbl:46
 -msgid "Disable SELinux protection for comsat daemon"
@@ -143398,21 +143406,24 @@ index e92b9b3..b3c942c 100644
 -#: ../gui/selinux.tbl:47 ../gui/selinux.tbl:48 ../gui/selinux.tbl:49
 -#: ../gui/selinux.tbl:50 ../gui/selinux.tbl:51
 -msgid "Disable SELinux protection for courier daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:365
 +msgid "Enter domain type which you will be extending"
- msgstr ""
++msgstr "Adja meg a tartomány típusát amit kiterjeszteni szeretne"
  
 -#: ../gui/selinux.tbl:52
 -msgid "Disable SELinux protection for cpucontrol daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:368
 +msgid "Enter SELinux user(s) which will transition to this domain"
- msgstr ""
++msgstr "Adja meg azon  SELinux felhasználó(k) neveit, amelyek átmenetet képeznek erre a tartományra"
  
 -#: ../gui/selinux.tbl:53
 -msgid "Disable SELinux protection for cpuspeed daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:371
 +msgid "Enter domain(s) that this confined admin will administrate"
- msgstr ""
++msgstr "Adja meg a tartományt, (vagy tartományokat), ahol ez a korlátozott admin adminisztrálni fog"
  
 -#: ../gui/selinux.tbl:54
 -msgid "Cron"
@@ -143423,9 +143434,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:54
 -msgid "Disable SELinux protection for crond daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:378
 +msgid "path in which the generated policy files will be stored"
- msgstr ""
++msgstr "az elérési út ahol az előállított szabályzati fájlok tárolásra kerülnek"
  
 -#: ../gui/selinux.tbl:55 ../gui/selinux.tbl:56 ../gui/selinux.tbl:57
 -#: ../gui/selinux.tbl:91
@@ -143437,6 +143449,7 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:55
 -msgid "Disable SELinux protection for cupsd back end server"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:384 ../sepolicy/sepolicy.py:387
 +#: ../sepolicy/sepolicy.py:390 ../sepolicy/sepolicy.py:393
 +#: ../sepolicy/sepolicy.py:396 ../sepolicy/sepolicy.py:399
@@ -143445,114 +143458,122 @@ index e92b9b3..b3c942c 100644
 +#: ../sepolicy/sepolicy.py:414 ../sepolicy/sepolicy.py:417
 +#, python-format
 +msgid "Generate Policy for %s"
- msgstr ""
- 
--#: ../gui/selinux.tbl:56
--msgid "Disable SELinux protection for cupsd daemon"
--msgstr ""
++msgstr "Készítsen szabályzatot %s számára"
++
 +#: ../sepolicy/sepolicy.py:422
 +msgid "commands"
 +msgstr "parancsok"
  
--#: ../gui/selinux.tbl:57
--msgid "Disable SELinux protection for cupsd_lpd"
+-#: ../gui/selinux.tbl:56
+-msgid "Disable SELinux protection for cupsd daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy.py:425
 +msgid "Alternate SELinux policy, defaults to /sys/fs/selinux/policy"
- msgstr ""
++msgstr "Változó SELinux szabályzat, alapértelmezés erre: /sys/fs/selinux/policy"
  
--#: ../gui/selinux.tbl:58
--msgid "CVS"
+-#: ../gui/selinux.tbl:57
+-msgid "Disable SELinux protection for cupsd_lpd"
+-msgstr ""
 +#: ../sepolicy/sepolicy/__init__.py:48
 +msgid "No SELinux Policy installed"
- msgstr ""
++msgstr "Nincs SELinux szabályzat telepítve"
  
 -#: ../gui/selinux.tbl:58
--msgid "Disable SELinux protection for cvs daemon"
+-msgid "CVS"
+-msgstr ""
 +#: ../sepolicy/sepolicy/__init__.py:54
 +#, python-format
 +msgid "Failed to read %s policy file"
- msgstr ""
++msgstr "%s szabályzatfájl olvasása sikertelen"
  
--#: ../gui/selinux.tbl:59
--msgid "Disable SELinux protection for cyrus daemon"
+-#: ../gui/selinux.tbl:58
+-msgid "Disable SELinux protection for cvs daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/__init__.py:127
 +msgid "unknown"
 +msgstr "ismeretlen"
  
--#: ../gui/selinux.tbl:60
--msgid "Disable SELinux protection for dbskkd daemon"
+-#: ../gui/selinux.tbl:59
+-msgid "Disable SELinux protection for cyrus daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:173
 +msgid "Internet Services Daemon"
 +msgstr "Internet Services Daemon"
  
--#: ../gui/selinux.tbl:61
--msgid "Disable SELinux protection for dbusd daemon"
+-#: ../gui/selinux.tbl:60
+-msgid "Disable SELinux protection for dbskkd daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:177
 +msgid "Existing Domain Type"
- msgstr ""
++msgstr "Létező Tartomány Típusok"
  
--#: ../gui/selinux.tbl:62
--msgid "Disable SELinux protection for dccd"
+-#: ../gui/selinux.tbl:61
+-msgid "Disable SELinux protection for dbusd daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:178
 +msgid "Minimal Terminal Login User Role"
- msgstr ""
++msgstr "Minimális Terminál login felhasználói szerepkör"
  
--#: ../gui/selinux.tbl:63
--msgid "Disable SELinux protection for dccifd"
+-#: ../gui/selinux.tbl:62
+-msgid "Disable SELinux protection for dccd"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:179
 +msgid "Minimal X Windows Login User Role"
- msgstr ""
++msgstr "Minimális X felület login felhasználói szerepkör"
  
--#: ../gui/selinux.tbl:64
--msgid "Disable SELinux protection for dccm"
+-#: ../gui/selinux.tbl:63
+-msgid "Disable SELinux protection for dccifd"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:180
 +msgid "Desktop Login User Role"
- msgstr ""
++msgstr "Desktop Login felhasználói szerepkör"
  
--#: ../gui/selinux.tbl:65
--msgid "Disable SELinux protection for ddt daemon"
+-#: ../gui/selinux.tbl:64
+-msgid "Disable SELinux protection for dccm"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:181
 +msgid "Administrator Login User Role"
- msgstr ""
++msgstr "Admin Login felhasználói szerepkör"
  
--#: ../gui/selinux.tbl:66
--msgid "Disable SELinux protection for devfsd daemon"
+-#: ../gui/selinux.tbl:65
+-msgid "Disable SELinux protection for ddt daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:182
 +msgid "Confined Root Administrator Role"
- msgstr ""
++msgstr "Korlátozott Root Admin szerepkör"
  
--#: ../gui/selinux.tbl:67
--msgid "Disable SELinux protection for dhcpc daemon"
+-#: ../gui/selinux.tbl:66
+-msgid "Disable SELinux protection for devfsd daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:187
 +msgid "Valid Types:\n"
 +msgstr "Érvényes típusok:\n"
  
--#: ../gui/selinux.tbl:68
--msgid "Disable SELinux protection for dhcpd daemon"
+-#: ../gui/selinux.tbl:67
+-msgid "Disable SELinux protection for dhcpc daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:221
 +#, python-format
 +msgid "Ports must be numbers or ranges of numbers from 1 to %d "
 +msgstr "A portoknak számoknak kell lennie vagy tartományoknak 1-től %d-ig"
  
--#: ../gui/selinux.tbl:69
--msgid "Disable SELinux protection for dictd daemon"
+-#: ../gui/selinux.tbl:68
+-msgid "Disable SELinux protection for dhcpd daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:231
 +msgid "You must enter a valid policy type"
- msgstr ""
++msgstr "Adjon meg egy érvényes szabályzattípust"
  
--#: ../gui/selinux.tbl:70
--msgid "Allow sysadm_t to directly start daemons"
+-#: ../gui/selinux.tbl:69
+-msgid "Disable SELinux protection for dictd daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:234
 +#, python-format
 +msgid "You must enter a name for your policy module for your %s."
- msgstr ""
++msgstr "Meg kell adnia egy nevet a szabályzat moduljának %s számára."
  
--#: ../gui/selinux.tbl:71
--msgid "Disable SELinux protection for Evolution"
+-#: ../gui/selinux.tbl:70
+-msgid "Allow sysadm_t to directly start daemons"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:355
 +msgid ""
@@ -143560,134 +143581,141 @@ index e92b9b3..b3c942c 100644
 +"MODULENAME\""
 +msgstr "A névnek alfanumerikusnak kell lennie szóközök nélkül. Vagy alkalmazza az \"-n MODULNÉV' opciót"
  
--#: ../gui/selinux.tbl:72
--msgid "Games"
+-#: ../gui/selinux.tbl:71
+-msgid "Disable SELinux protection for Evolution"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:447
 +msgid "User Role types can not be assigned executables."
 +msgstr "Felhasználói szerepkörök nem lehetnek hozzákapcsolt végrehajtható állományok."
  
 -#: ../gui/selinux.tbl:72
--msgid "Disable SELinux protection for games"
+-msgid "Games"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:453
 +msgid "Only Daemon apps can use an init script.."
 +msgstr "Csak daemon alkalmazások használhatnak init szkriptet..."
  
--#: ../gui/selinux.tbl:73
--msgid "Disable SELinux protection for the web browsers"
+-#: ../gui/selinux.tbl:72
+-msgid "Disable SELinux protection for games"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:471
 +msgid "use_resolve must be a boolean value "
 +msgstr "use_resolve boolean értékűnek kell lennie"
  
--#: ../gui/selinux.tbl:74
--msgid "Disable SELinux protection for Thunderbird"
+-#: ../gui/selinux.tbl:73
+-msgid "Disable SELinux protection for the web browsers"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:477
 +msgid "use_syslog must be a boolean value "
 +msgstr "use_syslog boolean értékűnek kell lennie"
  
--#: ../gui/selinux.tbl:75
--msgid "Disable SELinux protection for distccd daemon"
+-#: ../gui/selinux.tbl:74
+-msgid "Disable SELinux protection for Thunderbird"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:483
 +msgid "use_kerberos must be a boolean value "
 +msgstr "use_kerberos boolean értékűnek kell lennie"
  
--#: ../gui/selinux.tbl:76
--msgid "Disable SELinux protection for dmesg daemon"
+-#: ../gui/selinux.tbl:75
+-msgid "Disable SELinux protection for distccd daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:489
 +msgid "manage_krb5_rcache must be a boolean value "
 +msgstr "manage_krb5_rcache boolean értékűnek kell lennie"
  
--#: ../gui/selinux.tbl:77
--msgid "Disable SELinux protection for dnsmasq daemon"
+-#: ../gui/selinux.tbl:76
+-msgid "Disable SELinux protection for dmesg daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:519
 +msgid "USER Types automatically get a tmp type"
 +msgstr "FELHASZNÁLÓ típus automatikusan kap egy tmp típust"
  
--#: ../gui/selinux.tbl:78
--msgid "Disable SELinux protection for dovecot daemon"
+-#: ../gui/selinux.tbl:77
+-msgid "Disable SELinux protection for dnsmasq daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:857
 +#, python-format
 +msgid "%s policy modules require existing domains"
- msgstr ""
++msgstr "%s szabályzatmodulok számára meglévő tartományokat igényelnek"
  
--#: ../gui/selinux.tbl:79
--msgid "Disable SELinux protection for entropyd daemon"
+-#: ../gui/selinux.tbl:78
+-msgid "Disable SELinux protection for dovecot daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:1059
 +msgid "You must enter the executable path for your confined process"
 +msgstr "Adjon meg egy végrehajtható elérési utat a szabályozott folyamatához"
  
--#: ../gui/selinux.tbl:80
--msgid "Disable SELinux protection for fetchmail"
+-#: ../gui/selinux.tbl:79
+-msgid "Disable SELinux protection for entropyd daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:1321
 +msgid "Type Enforcement file"
 +msgstr "Típus vezérlő fájl"
  
--#: ../gui/selinux.tbl:81
--msgid "Disable SELinux protection for fingerd daemon"
+-#: ../gui/selinux.tbl:80
+-msgid "Disable SELinux protection for fetchmail"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:1322
 +msgid "Interface file"
 +msgstr "Kezelőfelületi fájl"
  
--#: ../gui/selinux.tbl:82
--msgid "Disable SELinux protection for freshclam daemon"
+-#: ../gui/selinux.tbl:81
+-msgid "Disable SELinux protection for fingerd daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:1323
 +msgid "File Contexts file"
 +msgstr "Fájl kontextus fájl"
  
--#: ../gui/selinux.tbl:83
--msgid "Disable SELinux protection for fsdaemon daemon"
+-#: ../gui/selinux.tbl:82
+-msgid "Disable SELinux protection for freshclam daemon"
+-msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:1324
 +msgid "Spec file"
- msgstr ""
++msgstr "Spec fájl"
  
--#: ../gui/selinux.tbl:84
--msgid "Disable SELinux protection for gpm daemon"
+-#: ../gui/selinux.tbl:83
+-msgid "Disable SELinux protection for fsdaemon daemon"
 -msgstr ""
 +#: ../sepolicy/sepolicy/generate.py:1325
 +msgid "Setup Script"
 +msgstr "Beállító szkript"
  
--#: ../gui/selinux.tbl:85 ../gui/selinux.tbl:125
--msgid "NFS"
+-#: ../gui/selinux.tbl:84
+-msgid "Disable SELinux protection for gpm daemon"
 -msgstr ""
 +#: booleans.py:1
 +msgid ""
 +"Allow ABRT to modify public files used for public file transfer services."
 +msgstr "Engedélyezi az ABRT számára hogy módosíthassa a publikus fájlokat amik a publikus fájlátvitel szolgáltatásoknál vannak"
  
--#: ../gui/selinux.tbl:85
--msgid "Disable SELinux protection for gss daemon"
+-#: ../gui/selinux.tbl:85 ../gui/selinux.tbl:125
+-msgid "NFS"
 -msgstr ""
 +#: booleans.py:2
 +msgid ""
 +"Allow ABRT to run in abrt_handle_event_t domain to handle ABRT event scripts"
 +msgstr "Engedélyezi az ABRT számára hogy a abrt_handle_event_t tartományban fusson, ezzel pedig kezelni tudja az ABRT események szkriptjeit"
  
--#: ../gui/selinux.tbl:86
--msgid "Disable SELinux protection for Hal daemon"
+-#: ../gui/selinux.tbl:85
+-msgid "Disable SELinux protection for gss daemon"
+-msgstr ""
 +#: booleans.py:3
 +msgid "Allow amavis to use JIT compiler"
 +msgstr "Engedélyezi az Amavis számára a JIT fordító használatát"
-+
+ 
+-#: ../gui/selinux.tbl:86
+-msgid "Disable SELinux protection for Hal daemon"
+-msgstr ""
 +#: booleans.py:4
 +msgid "Allow antivirus programs to read non security files on a system"
- msgstr ""
++msgstr "Engedélyezi az antivírus programoknak, hogy olvashassanak nem biztonsági fájlokat a rendszerben"
  
 -#: ../gui/selinux.tbl:87
 -msgid "Compatibility"
+-msgstr ""
 +#: booleans.py:5
 +msgid "Allow auditadm to exec content"
- msgstr ""
++msgstr "Engedélyezi az auditadm futását exec tartalomra"
  
 -#: ../gui/selinux.tbl:87
 +#: booleans.py:6
@@ -143708,15 +143736,17 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:89
 -msgid "Disable SELinux protection for hotplug daemon"
+-msgstr ""
 +#: booleans.py:8
 +msgid "Allow users to login using a yubikey  server"
- msgstr ""
++msgstr "Engedélyezi a felhasználók számára, hogy bejelentkezhessenek yubikey kiszolgálóval"
  
 -#: ../gui/selinux.tbl:90
 -msgid "Disable SELinux protection for howl daemon"
+-msgstr ""
 +#: booleans.py:9
 +msgid "Allow awstats to purge Apache logs"
- msgstr ""
++msgstr "Engedélyezi awstats számára, hogy megsemmisítse az Apache logfájljait"
  
 -#: ../gui/selinux.tbl:91
 -msgid "Disable SELinux protection for cups hplip daemon"
@@ -143829,15 +143859,17 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:105 ../gui/selinux.tbl:107
 -msgid "Kerberos"
+-msgstr ""
 +#: booleans.py:25
 +msgid "Allow dan to manage user files"
- msgstr ""
++msgstr "Engedélyezi dan számára, hogy felhasználói fájlokat kezeljen"
  
 -#: ../gui/selinux.tbl:105
 -msgid "Disable SELinux protection for kadmind daemon"
+-msgstr ""
 +#: booleans.py:26
 +msgid "Allow dan to read user files"
- msgstr ""
++msgstr "Engedélyezi dan számára, hogy felhasználói fájlokat olvasson"
  
 -#: ../gui/selinux.tbl:106
 -msgid "Disable SELinux protection for klogd daemon"
@@ -143949,9 +143981,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:121
 -msgid "Disable SELinux protection for nagios daemon"
+-msgstr ""
 +#: booleans.py:42
 +msgid "Allow all domains to execute in fips_mode"
- msgstr ""
++msgstr "Engedélyezi az összes tartomány számára hogy működhessen fips_mode módban"
  
 -#: ../gui/selinux.tbl:122 ../gui/selinux.tbl:128
 -msgid "Name Service"
@@ -144115,9 +144148,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:141
 -msgid "pppd"
+-msgstr ""
 +#: booleans.py:64
 +msgid "Allow guest to exec content"
- msgstr ""
++msgstr "Engedélyezi a vendég számára, hogy tartalmat futtathasson"
  
 -#: ../gui/selinux.tbl:141
 -msgid "Allow pppd to be run for a regular user"
@@ -144309,12 +144343,12 @@ index e92b9b3..b3c942c 100644
 +"Allow apache scripts to write to public content, directories/files must be "
 +"labeled public_rw_content_t."
 +msgstr "Engedélyezze az apache szkriptek számára hogy publikus tartalmat rögzítsenek, a mappáknak/fájloknak public_rw_content_t cimkével kell rendelkezniük."
- 
--#: ../gui/selinux.tbl:165
++
 +#: booleans.py:91
 +msgid "Allow Apache to execute tmp content."
 +msgstr "Engedélyezze az Apache számára hogy végrehajthasson tmp tartalmat."
-+
+ 
+-#: ../gui/selinux.tbl:165
 +#: booleans.py:92
  msgid ""
 -"Allow X-Windows server to map a memory region as both executable and writable"
@@ -144374,9 +144408,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:173
 -msgid "Disable SELinux protection for setroubleshoot daemon"
+-msgstr ""
 +#: booleans.py:100
 +msgid "Allow Apache to query NS records"
- msgstr ""
++msgstr "Engedélyezi az Apache számára, hogy NS bejegyzéseket kérdezhessen le"
  
 -#: ../gui/selinux.tbl:174
 -msgid "Disable SELinux protection for slapd daemon"
@@ -144534,9 +144569,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:191
 -msgid "Allow stunnel daemon to run as standalone, outside of xinetd"
+-msgstr ""
 +#: booleans.py:122
 +msgid "Allow openshift to lockdown app"
- msgstr ""
++msgstr "Engedélyezi az openshift számára, hogy alkalmazásokat zárolhasson"
  
 -#: ../gui/selinux.tbl:192
 -msgid "Disable SELinux protection for swat daemon"
@@ -144628,12 +144664,12 @@ index e92b9b3..b3c942c 100644
 +#: booleans.py:135
 +msgid "Allow unprivileged users to execute DDL statement"
 +msgstr "Engedélyezi jogosulatlan felhasználók számára hogy végrehajthassanak DDL statement műveletet"
- 
--#: ../gui/selinux.tbl:203
++
 +#: booleans.py:136
 +msgid "Allow pppd to load kernel modules for certain modems"
 +msgstr "Engedélyezi a pppd számára hogy betölthessen kernelmodulokat bizonyos modemek számára"
-+
+ 
+-#: ../gui/selinux.tbl:203
 +#: booleans.py:137
 +msgid "Allow pppd to be run for a regular user"
 +msgstr "Engedélyezi a pppd futtatását egy egyszerű felhasználó számára"
@@ -144810,9 +144846,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/selinux.tbl:225
 -msgid "Allow xen to read/write physical disk devices"
+-msgstr ""
 +#: booleans.py:161
 +msgid "Allow secadm to exec content"
- msgstr ""
++msgstr "Engedélyezi secadm számára, hogy tartalmat futtathasson"
  
 -#: ../gui/selinux.tbl:226
 -msgid "Disable SELinux protection for xfs daemon"
@@ -144924,9 +144961,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/statusPage.py:69 ../gui/system-config-selinux.glade:2819
 -msgid "Permissive"
+-msgstr ""
 +#: booleans.py:174
 +msgid "Allow user  to use ssh chroot environment."
- msgstr ""
++msgstr "Engedélyezi a felhasználó számára, hogy ssh chroot környezetet használhasson."
  
 -#: ../gui/statusPage.py:70 ../gui/system-config-selinux.glade:2837
 -msgid "Enforcing"
@@ -145072,9 +145110,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/system-config-selinux.glade:1079
 -msgid "SELinux Administration"
+-msgstr ""
 +#: booleans.py:191
 +msgid "Allow staff to exec content"
- msgstr ""
++msgstr "Engedélyezi a staff számára, hogy tartalmat futtathasson"
  
 -#: ../gui/system-config-selinux.glade:1122
 -msgid "Add"
@@ -145085,9 +145124,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/system-config-selinux.glade:1144
 -msgid "_Properties"
+-msgstr ""
 +#: booleans.py:193
 +msgid "Allow sysadm to exec content"
- msgstr ""
++msgstr "Engedélyezi sysadm számára, hogy tartalmat futtathasson"
  
 -#: ../gui/system-config-selinux.glade:1166
 -msgid "_Delete"
@@ -145115,9 +145155,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/system-config-selinux.glade:1326
 -msgid "System Default Enforcing Mode"
+-msgstr ""
 +#: booleans.py:197
 +msgid "Allow tftp to read and write files in the user home directories"
- msgstr ""
++msgstr "Engedélyezi a tftp számára, hogy olvasshassa és írhasson fájlokat a felhasználó home mappáiba"
  
 -#: ../gui/system-config-selinux.glade:1354
 -msgid ""
@@ -145131,9 +145172,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/system-config-selinux.glade:1373
 -msgid "Current Enforcing Mode"
+-msgstr ""
 +#: booleans.py:199
 +msgid "Allow tor to act as a relay"
- msgstr ""
++msgstr "Engedélyezi a tor számára, hogy reléként működjön"
  
 -#: ../gui/system-config-selinux.glade:1418
 -msgid "System Default Policy Type: "
@@ -145217,9 +145259,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/system-config-selinux.glade:1787
 -msgid "Modify File Context"
+-msgstr ""
 +#: booleans.py:210
 +msgid "Allow user to exec content"
- msgstr ""
++msgstr "Engedélyezi a felhasználó számára, hogy tartalmat futtathasson"
  
 -#: ../gui/system-config-selinux.glade:1803
 -msgid "Delete File Context"
@@ -145267,9 +145310,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/system-config-selinux.glade:2126
 -msgid "label39"
+-msgstr ""
 +#: booleans.py:217
 +msgid "Allow confined virtual guests to interact with rawip sockets"
- msgstr ""
++msgstr "Engedélyezi a korlátozott virtuális vendégek számára, hogy együttműködjenek rawip socket-ekkel"
  
 -#: ../gui/system-config-selinux.glade:2163
 -msgid "Add User"
@@ -145374,9 +145418,10 @@ index e92b9b3..b3c942c 100644
  
 -#: ../gui/system-config-selinux.glade:2781
 -msgid "label44"
+-msgstr ""
 +#: booleans.py:232
 +msgid "Allow xguest to exec content"
- msgstr ""
++msgstr "Engedélyezi xguest számára, hogy tartalmat futtathasson"
  
 -#: ../gui/system-config-selinux.glade:2818
 -msgid "Change process mode to permissive."
@@ -339011,10 +339056,10 @@ index 0000000..d59452a
 +
 diff --git a/policycoreutils/sepolicy/search.c b/policycoreutils/sepolicy/search.c
 new file mode 100644
-index 0000000..adf7141
+index 0000000..a87e215
 --- /dev/null
 +++ b/policycoreutils/sepolicy/search.c
-@@ -0,0 +1,994 @@
+@@ -0,0 +1,1030 @@
 +// Author: Thomas Liu <tliu at redhat.com>
 +
 +/**
@@ -339023,7 +339068,7 @@ index 0000000..adf7141
 + *
 + *  @author Thomas Liu  <tliu at redhat.com>
 + *  @author Dan Walsh  <dwalsh at redhat.com>
-+ *  Copyright (C) 2012 Red Hat, inc
++ *  Copyright (C) 2012-2013 Red Hat, inc
 + *
 + *  Sections copied from sesearch.c in setools package
 + *  @author Frank Mayer  mayerf at tresys.com
@@ -339118,7 +339163,6 @@ index 0000000..adf7141
 +	int rt;
 +	if (!obj) return -1;
 +	rt = PyTuple_SetItem(tuple, pos, obj);
-+	Py_DECREF(obj);
 +	return rt;
 +}
 +
@@ -339208,7 +339252,7 @@ index 0000000..adf7141
 +			goto err;
 +		}
 +		obj = PyString_FromString(tmp);
-+		if (py_insert_obj(dict, "source", obj)) 
++		if (py_insert_obj(dict, "source", obj))
 +			goto err;
 +
 +		if (qpol_role_allow_get_target_role(q, rule, &role)) {
@@ -339218,7 +339262,7 @@ index 0000000..adf7141
 +			goto err;
 +		}
 +		obj = PyString_FromString(tmp);
-+		if (py_insert_obj(dict, "target", obj)) 
++		if (py_insert_obj(dict, "target", obj))
 +			goto err;
 +
 +		rt = py_append_obj(output, dict);
@@ -339314,6 +339358,75 @@ index 0000000..adf7141
 +	return -1;
 +}
 +
++static PyObject* get_bool(const qpol_policy_t *q, const qpol_cond_t * cond, int enabled)
++{
++	qpol_iterator_t *iter = NULL;
++	qpol_cond_expr_node_t *expr = NULL;
++	char *tmp = NULL;
++	const char *bool_name = NULL;
++	int error = 0;
++	uint32_t expr_type = 0;
++	qpol_bool_t *cond_bool = NULL;
++	PyObject *obj, *tuple = NULL;
++	PyObject *boollist = NULL;
++
++	if (!q || !cond) {
++		errno = EINVAL;
++		return NULL;
++	}
++	if (qpol_cond_get_expr_node_iter(q, cond, &iter) < 0) {
++		goto err;
++	}
++
++	boollist = PyList_New(0);
++	if (! boollist) goto err;
++
++	for (; !qpol_iterator_end(iter); qpol_iterator_next(iter)) {
++		if (qpol_iterator_get_item(iter, (void **)&expr)) {
++			goto err;
++		}
++		if (qpol_cond_expr_node_get_expr_type(q, expr, &expr_type)) {
++			goto err;
++		}
++		if (expr_type != QPOL_COND_EXPR_BOOL) {
++			obj = PyString_FromString(apol_cond_expr_type_to_str(expr_type));
++			if (!obj) goto err;
++			py_append_obj(boollist, obj);
++		} else {
++			tuple = PyTuple_New(2);
++			if (!tuple) goto err;
++
++			if (qpol_cond_expr_node_get_bool(q, expr, &cond_bool)) {
++				goto err;
++			}
++			if (qpol_bool_get_name(q, cond_bool, &bool_name)) {
++				goto err;
++			}
++			obj = PyString_FromString(bool_name);
++			if (py_tuple_insert_obj(tuple, 0, obj))
++				goto err;
++			obj = PyBool_FromLong(enabled);
++			if (py_tuple_insert_obj(tuple, 1, obj))
++				goto err;
++			if (py_append_obj(boollist, tuple)) 
++				goto err;
++			tuple=NULL;
++		}
++	}
++
++	qpol_iterator_destroy(&iter);
++	return boollist;
++
++      err:
++	error = errno;
++	qpol_iterator_destroy(&iter);
++	py_decref(tuple);
++	py_decref(boollist);
++	free(tmp);
++	errno = error;
++	return NULL;
++}
++
 +static PyObject* get_te_results(const apol_policy_t * policy, const options_t * opt, const apol_vector_t * v, PyObject *output)
 +{
 +	int error = 0;
@@ -339325,9 +339438,8 @@ index 0000000..adf7141
 +	size_t i, num_rules = 0;
 +	const qpol_terule_t *rule = NULL;
 +	char *tmp = NULL, *rule_str = NULL, *expr = NULL;
-+	qpol_iterator_t *iter = NULL;
 +	const qpol_cond_t *cond = NULL;
-+	uint32_t enabled = 0, list = 0;
++	uint32_t enabled = 0;
 +	const char *tmp_name;
 +	const qpol_class_t *obj_class = NULL;
 +
@@ -339346,31 +339458,16 @@ index 0000000..adf7141
 +		if (!dict) goto err;
 +		if (!(rule = apol_vector_get_element(v, i)))
 +			goto err;
-+		if (opt->show_cond) {
-+			if (qpol_terule_get_cond(q, rule, &cond))
-+				goto err;
-+			if (qpol_terule_get_is_enabled(q, rule, &enabled))
-+				goto err;
-+			if (cond) {
-+				if (qpol_terule_get_which_list(q, rule, &list))
-+					goto err;
-+				if (qpol_cond_get_expr_node_iter(q, cond, &iter))
-+					goto err;
++		if (qpol_terule_get_cond(q, rule, &cond))
++			goto err;
++		if (qpol_terule_get_is_enabled(q, rule, &enabled))
++			goto err;
 +
-+				qpol_iterator_destroy(&iter);
-+				tuple = PyTuple_New(2);
-+				if (!tuple) goto err;
-+				tmp_name = apol_cond_expr_render(policy, cond);
-+				obj = PyString_FromString(tmp_name);
-+				if (py_tuple_insert_obj(tuple, 1, obj))
-+					goto err;
-+				obj = PyBool_FromLong(enabled);
-+				if (py_tuple_insert_obj(tuple, 2, obj))
-+					goto err;
-+				rt = py_insert_obj(dict, "boolean", tuple);
-+				Py_DECREF(tuple); tuple = NULL;
-+				if (rt) goto err;
-+			}
++		if (cond) {
++			obj = get_bool(q, cond, enabled);
++			if (!obj) goto err;
++			rt = PyDict_SetItemString(dict, "boolean", obj);
++			Py_DECREF(obj);
 +		}
 +
 +		if (qpol_terule_get_rule_type(q, rule, &rule_type))
@@ -339632,13 +339729,14 @@ index 0000000..adf7141
 +
 +	if (opt->allow || opt->all)
 +		rules |= QPOL_RULE_ALLOW;
-+	if ((opt->nallow || opt->all) && qpol_policy_has_capability(apol_policy_get_qpol(policy), QPOL_CAP_NEVERALLOW))
++	if (opt->nallow || opt->all)	// Add this regardless of policy capabilities
 +		rules |= QPOL_RULE_NEVERALLOW;
 +	if (opt->auditallow || opt->all)
 +		rules |= QPOL_RULE_AUDITALLOW;
 +	if (opt->dontaudit || opt->all)
 +		rules |= QPOL_RULE_DONTAUDIT;
-+	apol_avrule_query_set_rules(policy, avq, rules);
++	if (rules != 0)	// Setting rules = 0 means you want all the rules
++		apol_avrule_query_set_rules(policy, avq, rules);
 +	apol_avrule_query_set_regex(policy, avq, opt->useregex);
 +	if (opt->src_name)
 +		apol_avrule_query_set_source(policy, avq, opt->src_name, opt->indirect);
@@ -339694,7 +339792,7 @@ index 0000000..adf7141
 +
 +err:
 +	error = errno;
-+	PyErr_SetString(PyExc_RuntimeError,strerror(error));	
++	PyErr_SetString(PyExc_RuntimeError,strerror(error));
 +	apol_vector_destroy(v);
 +	apol_avrule_query_destroy(&avq);
 +	free(tmp);
@@ -339705,16 +339803,23 @@ index 0000000..adf7141
 +
 +static PyObject* get_av_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *output)
 +{
-+	PyObject *dict = NULL;
++	PyObject *obj, *dict=NULL;
 +	PyObject *permlist = NULL;
++	PyObject *boollist = NULL;
++	uint32_t rule_type = 0;
 +	int rt;
 +	int error = 0;
 +	qpol_policy_t *q;
 +	size_t i, num_rules = 0;
 +	const qpol_avrule_t *rule = NULL;
-+	char *tmp = NULL, *rule_str = NULL, *expr = NULL;
++	char *tmp = NULL, *rule_str = NULL;
++	qpol_cond_expr_node_t *expr = NULL;
 +	qpol_iterator_t *iter = NULL;
++	const qpol_cond_t *cond = NULL;
 +	uint32_t enabled = 0;
++	const qpol_type_t *type;
++	const char *tmp_name;
++	const qpol_class_t *obj_class = NULL;
 +
 +	if (!policy || !v) {
 +		errno = EINVAL;
@@ -339730,29 +339835,19 @@ index 0000000..adf7141
 +		if (!(rule = apol_vector_get_element(v, i)))
 +			goto err;
 +
-+		if (qpol_avrule_get_is_enabled(q, rule, &enabled))
-+			goto err;
-+		if (!enabled)
-+			continue;
-+
-+		const qpol_type_t *type;
-+		const char *tmp_name;
-+		uint32_t rule_type = 0;
-+
-+		const qpol_class_t *obj_class = NULL;
-+
 +		dict = PyDict_New();
 +		if (!dict) goto err;
 +
 +		if (qpol_avrule_get_rule_type(q, rule, &rule_type))
 +			goto err;
-+			
++
 +		if (!(tmp_name = apol_rule_type_to_str(rule_type))) {
 +			PyErr_SetString(PyExc_RuntimeError, "Could not get TE rule type's string");
++			errno = EINVAL;
 +			goto err;
 +		}
 +
-+		if (py_insert_string(dict, "type", tmp_name)) 
++		if (py_insert_string(dict, "type", tmp_name))
 +			goto err;
 +
 +		if (qpol_avrule_get_source_type(q, rule, &type)) {
@@ -339763,7 +339858,7 @@ index 0000000..adf7141
 +			goto err;
 +		}
 +
-+		if (py_insert_string(dict, "source", tmp_name)) 
++		if (py_insert_string(dict, "source", tmp_name))
 +			goto err;
 +
 +		if (qpol_avrule_get_target_type(q, rule, &type)) {
@@ -339773,7 +339868,7 @@ index 0000000..adf7141
 +			goto err;
 +		}
 +
-+		if (py_insert_string(dict, "target", tmp_name)) 
++		if (py_insert_string(dict, "target", tmp_name))
 +			goto err;
 +
 +		if (qpol_avrule_get_object_class(q, rule, &obj_class)) {
@@ -339783,7 +339878,7 @@ index 0000000..adf7141
 +			goto err;
 +		}
 +
-+		if (py_insert_string(dict, "class", tmp_name)) 
++		if (py_insert_string(dict, "class", tmp_name))
 +			goto err;
 +
 +		if (qpol_avrule_get_perm_iter(q, rule, &iter)) {
@@ -339801,9 +339896,25 @@ index 0000000..adf7141
 +		}
 +
 +		rt = PyDict_SetItemString(dict, "permlist", permlist);
-+		Py_DECREF(permlist); 
++		Py_DECREF(permlist); permlist=NULL;
 +		if (rt) goto err;
 +
++		if (qpol_avrule_get_cond(q, rule, &cond))
++			goto err;
++		if (qpol_avrule_get_is_enabled(q, rule, &enabled))
++			goto err;
++
++		obj = PyBool_FromLong(enabled);
++		rt = PyDict_SetItemString(dict, "enabled", obj);
++		Py_DECREF(obj);
++
++		if (cond) {
++			obj = get_bool(q, cond, enabled);
++			if (!obj) goto err;
++			rt = PyDict_SetItemString(dict, "boolean", obj);
++			Py_DECREF(obj);
++		}
++
 +		rt = py_append_obj(output, dict);
 +		Py_DECREF(dict); dict=NULL;
 +		if (rt) goto err;
@@ -339818,6 +339929,7 @@ index 0000000..adf7141
 +	PyErr_SetString(PyExc_RuntimeError,strerror(errno));
 +	py_decref(dict);
 +	py_decref(permlist);
++	py_decref(boollist);
 +
 +cleanup:
 +	free(tmp);
@@ -339845,6 +339957,7 @@ index 0000000..adf7141
 +
 +	memset(&cmd_opts, 0, sizeof(cmd_opts));
 +	cmd_opts.indirect = true;
++	cmd_opts.show_cond = true;
 +	cmd_opts.allow = allow;
 +	cmd_opts.nallow = neverallow;
 +	cmd_opts.auditallow = auditallow;
@@ -339867,38 +339980,6 @@ index 0000000..adf7141
 +
 +	pol_opt |= QPOL_POLICY_OPTION_MATCH_SYSTEM;
 +
-+	/* handle regex for class name */
-+	if (cmd_opts.useregex && cmd_opts.class_name != NULL) {
-+		cmd_opts.class_vector = apol_vector_create(NULL);
-+		apol_vector_t *qpol_matching_classes = NULL;
-+		apol_class_query_t *regex_match_query = apol_class_query_create();
-+		apol_class_query_set_regex(policy, regex_match_query, 1);
-+		apol_class_query_set_class(policy, regex_match_query, cmd_opts.class_name);
-+		if (apol_class_get_by_query(policy, regex_match_query, &qpol_matching_classes)) {
-+			apol_class_query_destroy(&regex_match_query);
-+			PyErr_SetString(PyExc_RuntimeError,"Query failed");
-+			goto cleanup;
-+		}
-+		const qpol_class_t *class = NULL;
-+		size_t i;
-+		for (i = 0; i < apol_vector_get_size(qpol_matching_classes); ++i) {
-+			const char *class_name;
-+			class = apol_vector_get_element(qpol_matching_classes, i);
-+			if (!class)
-+				break;
-+			qpol_class_get_name(apol_policy_get_qpol(policy), class, &class_name);
-+			apol_vector_append(cmd_opts.class_vector, (void *)class_name);
-+		}
-+		if (!apol_vector_get_size(qpol_matching_classes)) {
-+			apol_vector_destroy(&qpol_matching_classes);
-+			apol_class_query_destroy(&regex_match_query);
-+			PyErr_SetString(PyExc_RuntimeError,"No classes match expression");
-+			goto cleanup;
-+		}
-+		apol_vector_destroy(&qpol_matching_classes);
-+		apol_class_query_destroy(&regex_match_query);
-+	}
-+
 +	if (!cmd_opts.semantic && qpol_policy_has_capability(apol_policy_get_qpol(policy), QPOL_CAP_SYN_RULES)) {
 +		if (qpol_policy_build_syn_rule_table(apol_policy_get_qpol(policy))) {
 +			apol_policy_destroy(&policy);
@@ -339920,7 +340001,7 @@ index 0000000..adf7141
 +		goto cleanup;
 +	}
 +	output = PyList_New(0);
-+	if (!output) 
++	if (!output)
 +		goto cleanup;
 +
 +	if (v) {
@@ -340632,10 +340713,10 @@ index 0000000..0748ca9
 +selinux(8), sepolicy-booleans(8), sepolicy-communicate(8), sepolicy-generate(8), sepolicy-interface(8),  sepolicy-network(8), sepolicy-manpage(8), sepolicy-transition(8)
 diff --git a/policycoreutils/sepolicy/sepolicy.py b/policycoreutils/sepolicy/sepolicy.py
 new file mode 100755
-index 0000000..3526249
+index 0000000..ca86f5f
 --- /dev/null
 +++ b/policycoreutils/sepolicy/sepolicy.py
-@@ -0,0 +1,433 @@
+@@ -0,0 +1,438 @@
 +#! /usr/bin/python -Es
 +# Copyright (C) 2012 Red Hat
 +# AUTHOR: Dan Walsh <dwalsh at redhat.com>
@@ -340823,6 +340904,11 @@ index 0000000..3526249
 +    from sepolicy.manpage import ManPage, HTMLManPages, manpage_domains, manpage_roles, gen_domains
 +
 +    path = args.path
++    if args.policy:
++        for f in ( "policy.xml", "file_context", "file_context.homedirs"):
++            if not os.path.exists(path + f):
++                raise ValueError("manpage creation with alternate policy requires the %s file exist" % (path + f))
++
 +    if args.all:
 +        test_domains = gen_domains()
 +    else:
@@ -341338,10 +341424,10 @@ index 0000000..a179d95
 +
 diff --git a/policycoreutils/sepolicy/sepolicy/generate.py b/policycoreutils/sepolicy/sepolicy/generate.py
 new file mode 100644
-index 0000000..c5ff610
+index 0000000..e0b1893
 --- /dev/null
 +++ b/policycoreutils/sepolicy/sepolicy/generate.py
-@@ -0,0 +1,1326 @@
+@@ -0,0 +1,1329 @@
 +#!/usr/bin/python -Es
 +#
 +# Copyright (C) 2007-2012 Red Hat
@@ -342457,6 +342543,7 @@ index 0000000..c5ff610
 +
 +	def generate_sh(self):
 +                temp  = re.sub("TEMPLATETYPE", self.file_name, script.compile)
++                temp  = re.sub("DOMAINTYPE", self.name, temp)
 +                if self.type == EUSER:
 +                    newsh  = re.sub("TEMPLATEFILE", "%s" % self.file_name, temp)
 +                else:
@@ -342505,10 +342592,12 @@ index 0000000..c5ff610
 +				newspec += re.sub("FILENAME", i, spec.define_relabel_files_end)
 +
 +                newspec += re.sub("VERSION", selinux_policyver, spec.base_section)
-+                newspec = re.sub("MODULENAME", self.name, newspec)
++                newspec = re.sub("MODULENAME", self.file_name, newspec)
++                newspec = re.sub("DOMAINNAME", self.name, newspec)
 +                if len(self.rpms) > 0:
 +                    newspec += "Requires(post): %s\n" % ", ".join(self.rpms)
-+                newspec += re.sub("MODULENAME", self.name, spec.mid_section)
++                newspec += re.sub("MODULENAME", self.file_name, spec.mid_section)
++                newspec = re.sub("DOMAINNAME", self.name, newspec)
 +                newspec = re.sub("TODAYSDATE", time.strftime("%a %b %e %Y"), newspec) 
 +
 +		if self.type not in APPLICATIONS:
@@ -342757,12 +342846,12 @@ index 0000000..8b063ca
 +    return trans_list
 diff --git a/policycoreutils/sepolicy/sepolicy/manpage.py b/policycoreutils/sepolicy/sepolicy/manpage.py
 new file mode 100755
-index 0000000..f3f0246
+index 0000000..e196a65
 --- /dev/null
 +++ b/policycoreutils/sepolicy/sepolicy/manpage.py
-@@ -0,0 +1,1433 @@
+@@ -0,0 +1,1432 @@
 +#! /usr/bin/python -Es
-+# Copyright (C) 2012 Red Hat
++# Copyright (C) 2012-2013 Red Hat
 +# AUTHOR: Dan Walsh <dwalsh at redhat.com>
 +# AUTHOR: Miroslav Grepl <mgrepl at redhat.com>
 +# see file 'COPYING' for use and warranty information
@@ -342796,7 +342885,7 @@ index 0000000..f3f0246
 +import commands
 +import sys, os, re, time
 +
-+equiv_dict={ "smbd" : [ "samba" ], "httpd" : [ "apache" ], "virtd" : [ "virt", "libvirt" ], "named" : [ "bind" ] }
++equiv_dict={ "smbd" : [ "samba" ], "httpd" : [ "apache" ], "virtd" : [ "virt", "libvirt" ], "named" : [ "bind" ], "fsdaemon" : [ "smartmon" ], "mdadm" : [ "raid" ] }
 +
 +equiv_dirs=[ "/var" ]
 +modules_dict = None
@@ -342862,7 +342951,7 @@ index 0000000..f3f0246
 +	global domains
 +	if domains:
 +		return domains
-+        domains = []
++	domains = []
 +	for d in get_all_domains():
 +		found = False
 +		domain = d[:-2]
@@ -343258,6 +343347,7 @@ index 0000000..f3f0246
 +    modules_dict = None
 +    domains = gen_domains()
 +    role_allows = get_all_role_allows()
++    enabled_str = ["Disabled", "Enabled"]
 +
 +    def __init__(self, domainname, path = "/tmp", html = False):
 +	self.html = html
@@ -343291,6 +343381,7 @@ index 0000000..f3f0246
 +	self.short_name = self.domainname
 +
 +	self.type = self.domainname + "_t"
++	self._gen_bools()
 +	self.man_page_path = "%s/%s_selinux.8" % (path, self.domainname)
 +	self.fd = open(self.man_page_path, 'w')
 +	if domainname in self.all_roles:
@@ -343308,6 +343399,23 @@ index 0000000..f3f0246
 +			for alias in equiv_dict[k]:
 +				self.__gen_man_page_link(alias)
 +
++    def _gen_bools(self):
++	    self.bools=[]
++	    self.domainbools=[]
++	    for i in map(lambda x: x['boolean'], filter(lambda x: 'boolean' in x, sepolicy.search([sepolicy.ALLOW],{'source' : self.type }))):
++		    for b in i:
++			    if not isinstance(b,tuple):
++				    continue
++			    if b[0].startswith(self.short_name):
++				    if b not in self.domainbools and (b[0], not b[1]) not in self.domainbools:
++					    self.domainbools.append(b)
++			    else:
++				    if b not in self.bools and (b[0], not b[1]) not in self.bools:
++					    self.bools.append(b)
++
++	    self.bools.sort()
++	    self.domainbools.sort()
++
 +    def get_man_page_path(self):
 +	    return self.man_page_path
 +
@@ -343502,47 +343610,27 @@ index 0000000..f3f0246
 +		    desc = desc[:-1]
 +	    return desc
 +
-+    def _gen_bool_text(self, name):
++    def _gen_bool_text(self):
 +	booltext = ""
-+	for bdict in self.all_bools:
-+	    b = bdict['name']
-+	    if b.find(name) >= 0:
-+		if b.endswith("anon_write"):
++	for b, enabled in self.domainbools + self.bools:
++		if b.endswith("anon_write") and b not in self.anon_list:
 +		    self.anon_list.append(b)
 +		else:
 +		    if b not in self.booleans_dict:
 +			    continue
 +		    booltext += """
 +.PP
-+If you want to %s, you must turn on the %s boolean.
++If you want to %s, you must turn on the %s boolean. %s by default.
 +
 +.EX
 +.B setsebool -P %s 1
++
 +.EE
-+""" % (self._format_boolean_desc(b), b, b)
++""" % (self._format_boolean_desc(b), b, self.enabled_str[enabled], b)
 +	return booltext
-+    def _booleans(self):
-+	self.booltext = self._gen_bool_text(self.short_name)
-+	if self.domainname in equiv_dict.keys():
-+		for alias in equiv_dict[self.domainname]:
-+			self.booltext += self._gen_bool_text(alias)
-+
-+	for bdict in self.all_bools:
-+	    b = bdict['name']
-+	    if b.find(self.short_name) >= 0:
-+		if b.endswith("anon_write"):
-+		    self.anon_list.append(b)
-+		else:
-+		    if b not in self.booleans_dict:
-+			    continue
-+		    self.booltext += """
-+.PP
-+If you want to %s, you must turn on the %s boolean.
 +
-+.EX
-+.B setsebool -P %s 1
-+.EE
-+""" % (self._format_boolean_desc(b), b, b)
++    def _booleans(self):
++	self.booltext = self._gen_bool_text()
 +
 +	if self.booltext != "":
 +	    self.fd.write("""
@@ -343646,8 +343734,8 @@ index 0000000..f3f0246
 +.EE""" % (prot, ",".join(self.portrecs[(p,prot)])))
 +
 +    def _file_context(self):
-+        flist=[]
-+        mpaths=[]
++	flist=[]
++	mpaths=[]
 +	for f in self.all_file_types:
 +		if f.startswith(self.domainname):
 +			flist.append(f)
@@ -343706,8 +343794,8 @@ index 0000000..f3f0246
 +.PP
 +.B STANDARD FILE CONTEXT
 +
-+SELinux defines the file context types for the %(domainname)s, if you wanted to 
-+store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk. 
++SELinux defines the file context types for the %(domainname)s, if you wanted to
++store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk.
 +
 +.B semanage fcontext -a -t %(type)s '/srv/%(domainname)s/content(/.*)?'
 +.br
@@ -343851,7 +343939,7 @@ index 0000000..f3f0246
 +	    return True
 +
 +    def _entrypoints(self):
-+        try:
++	try:
 +		entrypoints = map(lambda x: x['target'], sepolicy.search([sepolicy.ALLOW],{'source':self.type,  'permlist':['entrypoint'], 'class':'file'}))
 +	except:
 +		return
@@ -344196,7 +344284,7 @@ index 0000000..f3f0246
 +""" % (", ".join(troles), plural, self.domainname))
 diff --git a/policycoreutils/sepolicy/sepolicy/network.py b/policycoreutils/sepolicy/sepolicy/network.py
 new file mode 100755
-index 0000000..501210d
+index 0000000..66efe26
 --- /dev/null
 +++ b/policycoreutils/sepolicy/sepolicy/network.py
 @@ -0,0 +1,92 @@
@@ -344252,7 +344340,7 @@ index 0000000..501210d
 +    allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm})
 +    nlist=[]
 +    if allows:
-+        for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
++        for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]) and x['enabled'], allows)):
 +            if i not in nlist:
 +                nlist.append(i)
 +    return nlist
@@ -344507,10 +344595,10 @@ index 0000000..dcf445e
 +"""
 diff --git a/policycoreutils/sepolicy/sepolicy/templates/executable.py b/policycoreutils/sepolicy/sepolicy/templates/executable.py
 new file mode 100644
-index 0000000..fd89671
+index 0000000..092a53e
 --- /dev/null
 +++ b/policycoreutils/sepolicy/sepolicy/templates/executable.py
-@@ -0,0 +1,450 @@
+@@ -0,0 +1,454 @@
 +# Copyright (C) 2007-2012 Red Hat
 +# see file 'COPYING' for use and warranty information
 +#
@@ -344593,10 +344681,12 @@ index 0000000..fd89671
 +# Declarations
 +#
 +
++attribute_role TEMPLATETYPE_roles;
++roleattribute system_r TEMPLATETYPE_roles;
++
 +type TEMPLATETYPE_t;
 +type TEMPLATETYPE_exec_t;
 +application_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
-+role system_r types TEMPLATETYPE_t;
 +
 +permissive TEMPLATETYPE_t;
 +"""
@@ -344768,10 +344858,11 @@ index 0000000..fd89671
 +interface(`TEMPLATETYPE_run',`
 +	gen_require(`
 +		type TEMPLATETYPE_t;
++		attribute_role TEMPLATETYPE_roles;
 +	')
 +
 +	TEMPLATETYPE_domtrans($1)
-+	role $2 types TEMPLATETYPE_t;
++	roleattribute $2 TEMPLATETYPE_roles;
 +')
 +
 +########################################
@@ -344792,9 +344883,10 @@ index 0000000..fd89671
 +interface(`TEMPLATETYPE_role',`
 +	gen_require(`
 +		type TEMPLATETYPE_t;
++		attribute_role TEMPLATETYPE_roles;
 +	')
 +
-+	role $1 types TEMPLATETYPE_t;
++	roleattribute $1 TEMPLATETYPE_roles;
 +
 +	TEMPLATETYPE_domtrans($2)
 +
@@ -345234,7 +345326,7 @@ index 0000000..46dd367
 +"""
 diff --git a/policycoreutils/sepolicy/sepolicy/templates/script.py b/policycoreutils/sepolicy/sepolicy/templates/script.py
 new file mode 100644
-index 0000000..82f90bb
+index 0000000..c139070
 --- /dev/null
 +++ b/policycoreutils/sepolicy/sepolicy/templates/script.py
 @@ -0,0 +1,134 @@
@@ -345307,7 +345399,7 @@ index 0000000..82f90bb
 +/usr/sbin/semodule -i TEMPLATEFILE.pp
 +
 +# Generate a man page off the installed module
-+sepolicy manpage -p . -d TEMPLATETYPE_t
++sepolicy manpage -p . -d DOMAINTYPE_t
 +
 +# Generate a rpm package for the newly generated policy
 +
@@ -345420,7 +345512,7 @@ index 0000000..f77e50e
 +"""
 diff --git a/policycoreutils/sepolicy/sepolicy/templates/spec.py b/policycoreutils/sepolicy/sepolicy/templates/spec.py
 new file mode 100644
-index 0000000..c0a8b41
+index 0000000..dbddf39
 --- /dev/null
 +++ b/policycoreutils/sepolicy/sepolicy/templates/spec.py
 @@ -0,0 +1,77 @@
@@ -345443,7 +345535,7 @@ index 0000000..c0a8b41
 +URL:		http://HOSTNAME
 +Source0:	MODULENAME.pp
 +Source1:	MODULENAME.if
-+Source2:	MODULENAME_selinux.8
++Source2:	DOMAINNAME_selinux.8
 +
 +Requires: policycoreutils, libselinux-utils
 +Requires(post): selinux-policy-base >= %{selinux_policyver}, policycoreutils
@@ -345485,7 +345577,7 @@ index 0000000..c0a8b41
 +%files
 +%attr(0600,root,root) %{_datadir}/selinux/packages/MODULENAME.pp
 +%{_datadir}/selinux/devel/include/contrib/MODULENAME.if
-+%{_mandir}/man8/MODULENAME_selinux.8.*
++%{_mandir}/man8/DOMAINNAME_selinux.8.*
 +
 +%changelog
 +* TODAYSDATE YOUR NAME <YOUR at EMAILADDRESS> 1.0-1
@@ -345638,10 +345730,10 @@ index 0000000..c000a75
 +"""
 diff --git a/policycoreutils/sepolicy/sepolicy/templates/unit_file.py b/policycoreutils/sepolicy/sepolicy/templates/unit_file.py
 new file mode 100644
-index 0000000..60e5844
+index 0000000..3069044
 --- /dev/null
 +++ b/policycoreutils/sepolicy/sepolicy/templates/unit_file.py
-@@ -0,0 +1,72 @@
+@@ -0,0 +1,74 @@
 +# Copyright (C) 2012 Red Hat
 +# see file 'COPYING' for use and warranty information
 +#
@@ -345714,6 +345806,8 @@ index 0000000..60e5844
 +fc_file="""\
 +FILENAME		--	gen_context(system_u:object_r:TEMPLATETYPE_unit_file_t,s0)
 +"""
++
++fc_dir=""
 diff --git a/policycoreutils/sepolicy/sepolicy/templates/user.py b/policycoreutils/sepolicy/sepolicy/templates/user.py
 new file mode 100644
 index 0000000..79f3997
diff --git a/policycoreutils.spec b/policycoreutils.spec
index fda5e61..3e020c5 100644
--- a/policycoreutils.spec
+++ b/policycoreutils.spec
@@ -7,7 +7,7 @@
 Summary: SELinux policy core utilities
 Name:	 policycoreutils
 Version: 2.1.13
-Release: 54%{?dist}
+Release: 55%{?dist}
 License: GPLv2
 Group:	 System Environment/Base
 # Based on git repository with tag 20101221
@@ -338,6 +338,11 @@ The policycoreutils-restorecond package contains the restorecond service.
 %{_bindir}/systemctl try-restart restorecond.service >/dev/null 2>&1 || :
 
 %changelog
+* Tue Jan 15 2013 Dan Walsh <dwalsh at redhat.com> - 2.1.12-55
+- Update Translations
+- Fix handling of semanage generate --cgi -n MODULE PATHTO/CGI
+-   This fixes the spec file and script file getting wrong names for modules and types.
+
 * Wed Jan 9 2013 Dan Walsh <dwalsh at redhat.com> - 2.1.12-54
 - Additional patch from Miroslav to handle role attributes
 


More information about the scm-commits mailing list