rpms/selinux-policy/devel modules-strict.conf, 1.27, 1.28 modules-targeted.conf, 1.55, 1.56 policy-20070219.patch, 1.48, 1.49 selinux-policy.spec, 1.433, 1.434

fedora-cvs-commits at redhat.com fedora-cvs-commits at redhat.com
Tue Apr 17 19:28:17 UTC 2007


Author: dwalsh

Update of /cvs/dist/rpms/selinux-policy/devel
In directory cvs.devel.redhat.com:/tmp/cvs-serv9459

Modified Files:
	modules-strict.conf modules-targeted.conf 
	policy-20070219.patch selinux-policy.spec 
Log Message:
* Tue Apr 17 2007 Dan Walsh <dwalsh at redhat.com> 2.5.12-4
- Rwho policy
- Fixes for consolekit



Index: modules-strict.conf
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/modules-strict.conf,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -r1.27 -r1.28
--- modules-strict.conf	11 Apr 2007 20:55:28 -0000	1.27
+++ modules-strict.conf	17 Apr 2007 19:28:14 -0000	1.28
@@ -1145,6 +1145,13 @@
 rsync = module
 
 # Layer: services
+# Module: rwho
+#
+# who is logged in on local machines
+# 
+rwho = module
+
+# Layer: services
 # Module: djbdns
 #
 # small and secure DNS daemon


Index: modules-targeted.conf
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/modules-targeted.conf,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -r1.55 -r1.56
--- modules-targeted.conf	11 Apr 2007 20:55:28 -0000	1.55
+++ modules-targeted.conf	17 Apr 2007 19:28:14 -0000	1.56
@@ -1036,6 +1036,12 @@
 # 
 rsync = base
 
+# Layer: services
+# Module: rwho
+#
+# who is logged in on local machines
+# 
+rwho = module
 
 # Layer: services
 # Module: sasl

policy-20070219.patch:
 Rules.modular                           |   12 +
 policy/flask/access_vectors             |    4 
 policy/global_booleans                  |    2 
 policy/global_tunables                  |    7 
 policy/mls                              |   31 ++-
 policy/modules/admin/acct.te            |    1 
 policy/modules/admin/amtu.fc            |    3 
 policy/modules/admin/amtu.if            |   53 ++++++
 policy/modules/admin/amtu.te            |   56 ++++++
 policy/modules/admin/bootloader.te      |    3 
 policy/modules/admin/consoletype.te     |   10 -
 policy/modules/admin/dmesg.te           |    1 
 policy/modules/admin/kudzu.te           |    6 
 policy/modules/admin/logwatch.te        |    4 
 policy/modules/admin/netutils.te        |    6 
 policy/modules/admin/rpm.fc             |    3 
 policy/modules/admin/rpm.if             |   85 +++++++---
 policy/modules/admin/rpm.te             |    2 
 policy/modules/admin/su.if              |    4 
 policy/modules/admin/usermanage.if      |    2 
 policy/modules/admin/usermanage.te      |   26 +++
 policy/modules/apps/gnome.if            |   26 ++-
 policy/modules/apps/gpg.fc              |    2 
 policy/modules/apps/loadkeys.if         |   44 +----
 policy/modules/apps/mozilla.if          |    1 
 policy/modules/apps/slocate.te          |    5 
 policy/modules/apps/uml.if              |   27 ---
 policy/modules/kernel/corecommands.fc   |    5 
 policy/modules/kernel/corecommands.if   |   20 ++
 policy/modules/kernel/corenetwork.te.in |   15 +
 policy/modules/kernel/devices.if        |   36 ++++
 policy/modules/kernel/domain.if         |   18 ++
 policy/modules/kernel/domain.te         |   46 +++++
 policy/modules/kernel/files.fc          |    1 
 policy/modules/kernel/files.if          |   83 ++++++++-
 policy/modules/kernel/filesystem.if     |   39 ++++
 policy/modules/kernel/filesystem.te     |   13 +
 policy/modules/kernel/kernel.if         |   23 ++
 policy/modules/kernel/kernel.te         |    2 
 policy/modules/kernel/mls.if            |   20 ++
 policy/modules/kernel/mls.te            |    3 
 policy/modules/kernel/selinux.if        |   38 ++++
 policy/modules/kernel/storage.if        |    2 
 policy/modules/kernel/terminal.if       |    2 
 policy/modules/kernel/terminal.te       |    1 
 policy/modules/services/amavis.te       |    3 
 policy/modules/services/apache.fc       |   14 -
 policy/modules/services/apache.if       |  171 +++++++++++++++++++-
 policy/modules/services/apache.te       |   72 ++++++++
 policy/modules/services/apcupsd.fc      |    9 +
 policy/modules/services/apcupsd.if      |  108 ++++++++++++
 policy/modules/services/apcupsd.te      |   91 ++++++++++
 policy/modules/services/automount.te    |    2 
 policy/modules/services/avahi.if        |   19 ++
 policy/modules/services/bluetooth.te    |    2 
 policy/modules/services/consolekit.te   |   21 +-
 policy/modules/services/cron.fc         |    1 
 policy/modules/services/cron.if         |   33 +--
 policy/modules/services/cron.te         |   43 ++++-
 policy/modules/services/cups.te         |    6 
 policy/modules/services/cvs.te          |    1 
 policy/modules/services/cyrus.te        |    1 
 policy/modules/services/dbus.if         |   63 +++++++
 policy/modules/services/dhcp.te         |    2 
 policy/modules/services/djbdns.te       |    5 
 policy/modules/services/dovecot.te      |    5 
 policy/modules/services/ftp.te          |    5 
 policy/modules/services/hal.fc          |    8 
 policy/modules/services/hal.if          |   39 ++++
 policy/modules/services/hal.te          |  143 ++++++++++++++++-
 policy/modules/services/inetd.te        |    5 
 policy/modules/services/kerberos.if     |   79 ++-------
 policy/modules/services/kerberos.te     |   36 ++++
 policy/modules/services/mailman.if      |   19 ++
 policy/modules/services/mta.if          |   19 ++
 policy/modules/services/mta.te          |    2 
 policy/modules/services/nis.if          |    4 
 policy/modules/services/nis.te          |    4 
 policy/modules/services/nscd.te         |   10 +
 policy/modules/services/ntp.te          |    4 
 policy/modules/services/pegasus.if      |   18 ++
 policy/modules/services/pegasus.te      |    6 
 policy/modules/services/postfix.if      |    1 
 policy/modules/services/postfix.te      |    8 
 policy/modules/services/procmail.te     |    1 
 policy/modules/services/pyzor.te        |    7 
 policy/modules/services/radius.te       |    4 
 policy/modules/services/rpc.if          |    5 
 policy/modules/services/rsync.te        |    1 
 policy/modules/services/rwho.fc         |    3 
 policy/modules/services/rwho.if         |   84 +++++++++
 policy/modules/services/rwho.te         |   65 +++++++
 policy/modules/services/samba.fc        |    3 
 policy/modules/services/samba.if        |   86 ++++++++++
 policy/modules/services/samba.te        |   83 +++++++++
 policy/modules/services/sendmail.if     |   22 ++
 policy/modules/services/smartmon.te     |    1 
 policy/modules/services/snmp.te         |   15 +
 policy/modules/services/spamassassin.te |    7 
 policy/modules/services/squid.fc        |    2 
 policy/modules/services/squid.if        |   22 ++
 policy/modules/services/squid.te        |   12 +
 policy/modules/services/ssh.if          |   39 ++++
 policy/modules/services/ssh.te          |   10 -
 policy/modules/services/w3c.fc          |    2 
 policy/modules/services/w3c.if          |    1 
 policy/modules/services/w3c.te          |   14 +
 policy/modules/system/application.fc    |    1 
 policy/modules/system/application.if    |  104 ++++++++++++
 policy/modules/system/application.te    |   14 +
 policy/modules/system/authlogin.if      |   83 ++++++++-
 policy/modules/system/authlogin.te      |    3 
 policy/modules/system/fstools.fc        |    1 
 policy/modules/system/fstools.te        |    1 
 policy/modules/system/fusermount.fc     |    6 
 policy/modules/system/fusermount.if     |   41 ++++
 policy/modules/system/fusermount.te     |   45 +++++
 policy/modules/system/getty.te          |    3 
 policy/modules/system/hostname.te       |   14 +
 policy/modules/system/init.if           |   42 ++++
 policy/modules/system/init.te           |   35 +++-
 policy/modules/system/ipsec.if          |   20 ++
 policy/modules/system/ipsec.te          |    3 
 policy/modules/system/iptables.te       |    4 
 policy/modules/system/libraries.fc      |    3 
 policy/modules/system/locallogin.te     |    7 
 policy/modules/system/logging.if        |   21 ++
 policy/modules/system/logging.te        |    2 
 policy/modules/system/lvm.te            |    6 
 policy/modules/system/modutils.te       |    6 
 policy/modules/system/mount.fc          |    3 
 policy/modules/system/mount.if          |   37 ++++
 policy/modules/system/mount.te          |   64 +++++++
 policy/modules/system/raid.te           |    1 
 policy/modules/system/selinuxutil.fc    |    1 
 policy/modules/system/selinuxutil.if    |    5 
 policy/modules/system/selinuxutil.te    |   52 +++---
 policy/modules/system/sysnetwork.te     |    3 
 policy/modules/system/udev.te           |   12 +
 policy/modules/system/unconfined.fc     |    1 
 policy/modules/system/unconfined.if     |   10 -
 policy/modules/system/unconfined.te     |   24 ++
 policy/modules/system/userdomain.if     |  269 +++++++++++++++++++-------------
 policy/modules/system/userdomain.te     |   46 ++++-
 policy/modules/system/xen.te            |   35 ++++
 policy/support/obj_perm_sets.spt        |   12 +
 146 files changed, 2967 insertions(+), 437 deletions(-)

Index: policy-20070219.patch
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/policy-20070219.patch,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -r1.48 -r1.49
--- policy-20070219.patch	16 Apr 2007 17:29:00 -0000	1.48
+++ policy-20070219.patch	17 Apr 2007 19:28:14 -0000	1.49
@@ -875,7 +875,7 @@
 +
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/corenetwork.te.in serefpolicy-2.5.12/policy/modules/kernel/corenetwork.te.in
 --- nsaserefpolicy/policy/modules/kernel/corenetwork.te.in	2007-04-11 15:52:53.000000000 -0400
-+++ serefpolicy-2.5.12/policy/modules/kernel/corenetwork.te.in	2007-04-11 17:07:34.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/kernel/corenetwork.te.in	2007-04-17 15:19:50.000000000 -0400
 @@ -48,6 +48,11 @@
  type reserved_port_t, port_type, reserved_port_type;
  
@@ -914,7 +914,15 @@
  type lrrd_port_t, port_type; dnl network_port(lrrd_port_t) # no defined portcon
  network_port(lmtp, tcp,24,s0, udp,24,s0)
  network_port(mail, tcp,2000,s0)
-@@ -140,6 +146,7 @@
+@@ -132,6 +138,7 @@
+ network_port(router, udp,520,s0)
+ network_port(rsh, tcp,514,s0)
+ network_port(rsync, tcp,873,s0, udp,873,s0)
++network_port(rwho, udp,513,s0)
+ network_port(smbd, tcp,139,s0, tcp,445,s0)
+ network_port(smtp, tcp,25,s0, tcp,465,s0, tcp,587,s0)
+ network_port(snmp, udp,161,s0, udp,162,s0, tcp,199,s0)
+@@ -140,6 +147,7 @@
  network_port(soundd, tcp,8000,s0, tcp,9433,s0)
  type socks_port_t, port_type; dnl network_port(socks) # no defined portcon
  type stunnel_port_t, port_type; dnl network_port(stunnel) # no defined portcon in current strict
@@ -922,7 +930,7 @@
  network_port(swat, tcp,901,s0)
  network_port(syslogd, udp,514,s0)
  network_port(telnetd, tcp,23,s0)
-@@ -157,6 +164,9 @@
+@@ -157,6 +165,9 @@
  
  # Defaults for reserved ports.  Earlier portcon entries take precedence;
  # these entries just cover any remaining reserved ports not otherwise declared.
@@ -2243,13 +2251,27 @@
  term_use_unallocated_ttys(bluetooth_t)
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/consolekit.te serefpolicy-2.5.12/policy/modules/services/consolekit.te
 --- nsaserefpolicy/policy/modules/services/consolekit.te	2007-04-11 16:04:02.000000000 -0400
-+++ serefpolicy-2.5.12/policy/modules/services/consolekit.te	2007-04-11 17:07:34.000000000 -0400
-@@ -38,18 +38,23 @@
++++ serefpolicy-2.5.12/policy/modules/services/consolekit.te	2007-04-17 15:08:20.000000000 -0400
+@@ -23,10 +23,9 @@
+ allow consolekit_t self:process { getsched signal };
+ allow consolekit_t self:fifo_file rw_fifo_file_perms;
+ allow consolekit_t self:unix_stream_socket create_stream_socket_perms;
++allow consolekit_t self:unix_dgram_socket create_socket_perms;
+ 
+-# pid file
+-manage_files_pattern(consolekit_t,consolekit_var_run_t,consolekit_var_run_t)
+-files_pid_filetrans(consolekit_t,consolekit_var_run_t, file)
++corecmd_search_bin(consolekit_t)
+ 
+ dev_read_urand(consolekit_t)
+ dev_read_sysfs(consolekit_t)
+@@ -38,18 +37,28 @@
  # needs to read /var/lib/dbus/machine-id
  files_read_var_lib_files(consolekit_t)
  
 -term_use_console(consolekit_t)
--
++fs_list_inotifyfs(consolekit_t)
+ 
  libs_use_ld_so(consolekit_t)
  libs_use_shared_libs(consolekit_t)
  
@@ -2257,6 +2279,9 @@
  
 +term_use_all_terms(consolekit_t)
 +
++manage_files_pattern(consolekit_t,consolekit_var_run_t,consolekit_var_run_t)
++files_pid_filetrans(consolekit_t,consolekit_var_run_t, file)
++
  ifdef(`targeted_policy',`
 -	term_dontaudit_use_unallocated_ttys(consolekit_t)
 -	term_dontaudit_use_generic_ptys(consolekit_t)
@@ -3538,6 +3563,170 @@
  role system_r types rsync_t;
  
  type rsync_data_t;
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/rwho.fc serefpolicy-2.5.12/policy/modules/services/rwho.fc
+--- nsaserefpolicy/policy/modules/services/rwho.fc	1969-12-31 19:00:00.000000000 -0500
++++ serefpolicy-2.5.12/policy/modules/services/rwho.fc	2007-04-17 15:22:46.000000000 -0400
+@@ -0,0 +1,3 @@
++
++/usr/sbin/rwhod		--	gen_context(system_u:object_r:rwho_exec_t,s0)
++/var/spool/rwho(/.*)?		gen_context(system_u:object_r:rwho_spool_t,s0)
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/rwho.if serefpolicy-2.5.12/policy/modules/services/rwho.if
+--- nsaserefpolicy/policy/modules/services/rwho.if	1969-12-31 19:00:00.000000000 -0500
++++ serefpolicy-2.5.12/policy/modules/services/rwho.if	2007-04-17 15:09:15.000000000 -0400
+@@ -0,0 +1,84 @@
++
++## <summary>policy for rwho</summary>
++
++########################################
++## <summary>
++##	Execute a domain transition to run rwho.
++## </summary>
++## <param name="domain">
++## <summary>
++##	Domain allowed to transition.
++## </summary>
++## </param>
++#
++interface(`rwho_domtrans',`
++	gen_require(`
++		type rwho_t, rwho_exec_t;
++	')
++
++	domain_auto_trans($1,rwho_exec_t,rwho_t)
++
++	allow rwho_t $1:fd use;
++	allow rwho_t $1:fifo_file rw_file_perms;
++	allow rwho_t $1:process sigchld;
++')
++
++########################################
++## <summary>
++##	Search rwho spool directories.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`rwho_search_spool',`
++	gen_require(`
++		type rwho_spool_t;
++	')
++
++	allow $1 rwho_spool_t:dir search_dir_perms;
++	files_search_spool($1)
++')
++
++########################################
++## <summary>
++##	Read rwho spool files.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`rwho_read_spool_files',`
++	gen_require(`
++		type rwho_spool_t;
++	')
++
++	allow $1 rwho_spool_t:file r_file_perms;
++	allow $1 rwho_spool_t:dir list_dir_perms;
++	files_search_spool($1)
++')
++
++########################################
++## <summary>
++##	Create, read, write, and delete
++##	rwho spool files.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`rwho_manage_spool_files',`
++	gen_require(`
++		type rwho_spool_t;
++	')
++
++	allow $1 rwho_spool_t:file manage_file_perms;
++	allow $1 rwho_spool_t:dir rw_dir_perms;
++	files_search_spool($1)
++')
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/rwho.te serefpolicy-2.5.12/policy/modules/services/rwho.te
+--- nsaserefpolicy/policy/modules/services/rwho.te	1969-12-31 19:00:00.000000000 -0500
++++ serefpolicy-2.5.12/policy/modules/services/rwho.te	2007-04-17 15:21:00.000000000 -0400
+@@ -0,0 +1,65 @@
++policy_module(rwho,1.0.0)
++
++########################################
++#
++# Declarations
++#
++
++type rwho_t;
++type rwho_exec_t;
++domain_type(rwho_t)
++init_daemon_domain(rwho_t, rwho_exec_t)
++
++# var/spool files
++type rwho_spool_t;
++files_type(rwho_spool_t)
++
++########################################
++#
++# rwho local policy
++#
++
++#============= rwho_t ==============
++allow rwho_t self:capability sys_chroot;
++allow rwho_t self:unix_dgram_socket create;
++allow rwho_t self:fifo_file rw_file_perms;
++allow rwho_t self:unix_stream_socket create_stream_socket_perms;
++allow rwho_t self:udp_socket create_socket_perms;
++
++# var/spool files for rwho
++allow rwho_t rwho_spool_t:dir manage_dir_perms;
++allow rwho_t rwho_spool_t:file manage_file_perms;
++files_spool_filetrans(rwho_t,rwho_spool_t, { file dir })
++
++domain_use_interactive_fds(rwho_t)
++
++files_read_etc_files(rwho_t)
++
++init_read_utmp(rwho_t)
++init_dontaudit_write_utmp(rwho_t)
++init_use_fds(rwho_t)
++init_use_script_ptys(rwho_t)
++
++kernel_read_system_state(rwho_t)
++
++libs_use_ld_so(rwho_t)
++libs_use_shared_libs(rwho_t)
++
++miscfiles_read_localization(rwho_t)
++
++# Default Networking
++corenet_non_ipsec_sendrecv(rwho_t)
++corenet_udp_sendrecv_all_if(rwho_t)
++corenet_udp_sendrecv_all_nodes(rwho_t)
++corenet_udp_sendrecv_all_ports(rwho_t)
++corenet_udp_bind_all_nodes(rwho_t)
++corenet_udp_bind_rwho_port(rwho_t)
++
++sysnet_dns_name_resolve(rwho_t)
++
++ifdef(`targeted_policy',`
++	term_dontaudit_use_unallocated_ttys(rwho_t)
++	term_dontaudit_use_generic_ptys(rwho_t)
++')
++
++
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/samba.fc serefpolicy-2.5.12/policy/modules/services/samba.fc
 --- nsaserefpolicy/policy/modules/services/samba.fc	2007-02-23 16:50:01.000000000 -0500
 +++ serefpolicy-2.5.12/policy/modules/services/samba.fc	2007-04-11 17:07:34.000000000 -0400
@@ -4320,7 +4509,7 @@
 +
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/authlogin.if serefpolicy-2.5.12/policy/modules/system/authlogin.if
 --- nsaserefpolicy/policy/modules/system/authlogin.if	2007-03-26 10:39:07.000000000 -0400
-+++ serefpolicy-2.5.12/policy/modules/system/authlogin.if	2007-04-11 17:07:34.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/system/authlogin.if	2007-04-16 14:43:27.000000000 -0400
 @@ -152,21 +152,12 @@
  ## </param>
  #
@@ -4799,6 +4988,24 @@
  ##	Execute racoon in the racoon domain.
  ## </summary>
  ## <param name="domain">
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/ipsec.te serefpolicy-2.5.12/policy/modules/system/ipsec.te
+--- nsaserefpolicy/policy/modules/system/ipsec.te	2007-03-28 14:09:41.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/system/ipsec.te	2007-04-16 14:47:37.000000000 -0400
+@@ -283,12 +283,13 @@
+ # Racoon local policy
+ #
+ 
+-allow racoon_t self:capability { net_admin net_bind_service };
++allow racoon_t self:capability { net_admin net_bind_service audit_control };
+ allow racoon_t self:netlink_route_socket create_netlink_socket_perms;
+ allow racoon_t self:unix_dgram_socket { connect create ioctl write };
+ allow racoon_t self:netlink_selinux_socket { bind create read };
+ allow racoon_t self:udp_socket create_socket_perms;
+ allow racoon_t self:key_socket { create read setopt write };
++allow racoon_t self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay };
+ 
+ # manage pid file
+ manage_files_pattern(racoon_t,ipsec_var_run_t,ipsec_var_run_t)
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/iptables.te serefpolicy-2.5.12/policy/modules/system/iptables.te
 --- nsaserefpolicy/policy/modules/system/iptables.te	2007-03-26 16:24:13.000000000 -0400
 +++ serefpolicy-2.5.12/policy/modules/system/iptables.te	2007-04-11 17:07:34.000000000 -0400
@@ -4812,7 +5019,7 @@
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/libraries.fc serefpolicy-2.5.12/policy/modules/system/libraries.fc
 --- nsaserefpolicy/policy/modules/system/libraries.fc	2007-04-10 16:13:39.000000000 -0400
-+++ serefpolicy-2.5.12/policy/modules/system/libraries.fc	2007-04-11 17:07:34.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/system/libraries.fc	2007-04-17 10:00:22.000000000 -0400
 @@ -59,7 +59,6 @@
  ')
  
@@ -4829,6 +5036,14 @@
  
  ifdef(`distro_gentoo',`
  # despite the extensions, they are actually libs
+@@ -132,6 +132,7 @@
+ /usr/(.*/)?nvidia/.+\.so(\..*)?		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
+ 
+ /usr/lib/win32/.*			--	gen_context(system_u:object_r:shlib_t,s0)
++/usr/lib/transgaming_cedega/gddb_parser.so --	gen_context(system_u:object_r:shlib_t,s0)
+ 
+ /usr/(.*/)?lib(64)?(/.*)?/nvidia/.+\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib(64)?(/.*)?/nvidia/.+\.so(\..*)? --	gen_context(system_u:object_r:textrel_shlib_t,s0)
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/locallogin.te serefpolicy-2.5.12/policy/modules/system/locallogin.te
 --- nsaserefpolicy/policy/modules/system/locallogin.te	2007-03-26 10:39:07.000000000 -0400
 +++ serefpolicy-2.5.12/policy/modules/system/locallogin.te	2007-04-11 17:07:34.000000000 -0400


Index: selinux-policy.spec
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/selinux-policy.spec,v
retrieving revision 1.433
retrieving revision 1.434
diff -u -r1.433 -r1.434
--- selinux-policy.spec	16 Apr 2007 17:11:45 -0000	1.433
+++ selinux-policy.spec	17 Apr 2007 19:28:14 -0000	1.434
@@ -17,7 +17,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 2.5.12
-Release: 3%{?dist}
+Release: 4%{?dist}
 License: GPL
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -358,6 +358,10 @@
 %endif
 
 %changelog
+* Tue Apr 17 2007 Dan Walsh <dwalsh at redhat.com> 2.5.12-4
+- Rwho policy
+- Fixes for consolekit
+
 * Fri Apr 12 2007 Dan Walsh <dwalsh at redhat.com> 2.5.12-3
 - fixes for fusefs
 




More information about the fedora-cvs-commits mailing list