rpms/libselinux/F-10 .cvsignore, 1.176, 1.177 libselinux-rhat.patch, 1.172, 1.173 libselinux.spec, 1.348, 1.349 sources, 1.180, 1.181

Daniel J Walsh dwalsh at fedoraproject.org
Fri Mar 27 18:30:00 UTC 2009


Author: dwalsh

Update of /cvs/extras/rpms/libselinux/F-10
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv18200

Modified Files:
	.cvsignore libselinux-rhat.patch libselinux.spec sources 
Log Message:
* Thu Mar 12 2009 Dan Walsh <dwalsh at redhat.com> - 2.0.79-2
- Add back in av_decision to python swig



Index: .cvsignore
===================================================================
RCS file: /cvs/extras/rpms/libselinux/F-10/.cvsignore,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -r1.176 -r1.177
--- .cvsignore	30 Sep 2008 13:30:18 -0000	1.176
+++ .cvsignore	27 Mar 2009 18:29:29 -0000	1.177
@@ -157,3 +157,9 @@
 libselinux-2.0.70.tgz
 libselinux-2.0.71.tgz
 libselinux-2.0.73.tgz
+libselinux-2.0.74.tgz
+libselinux-2.0.75.tgz
+libselinux-2.0.76.tgz
+libselinux-2.0.77.tgz
+libselinux-2.0.78.tgz
+libselinux-2.0.79.tgz

libselinux-rhat.patch:

View full diff with command:
/usr/bin/cvs -f diff  -kk -u -N -r 1.172 -r 1.173 libselinux-rhat.patch
Index: libselinux-rhat.patch
===================================================================
RCS file: /cvs/extras/rpms/libselinux/F-10/libselinux-rhat.patch,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -r1.172 -r1.173
--- libselinux-rhat.patch	2 Mar 2009 18:24:55 -0000	1.172
+++ libselinux-rhat.patch	27 Mar 2009 18:29:29 -0000	1.173
@@ -1,8 +1,11 @@
-diff --exclude-from=exclude -N -u -r nsalibselinux/include/selinux/selinux.h libselinux-2.0.77/include/selinux/selinux.h
---- nsalibselinux/include/selinux/selinux.h	2009-01-05 17:45:35.000000000 -0500
-+++ libselinux-2.0.77/include/selinux/selinux.h	2009-02-18 14:18:54.000000000 -0500
-@@ -459,6 +459,8 @@
+diff --exclude-from=exclude -N -u -r nsalibselinux/include/selinux/selinux.h libselinux-2.0.79/include/selinux/selinux.h
+--- nsalibselinux/include/selinux/selinux.h	2009-03-06 14:41:44.000000000 -0500
++++ libselinux-2.0.79/include/selinux/selinux.h	2009-03-27 11:38:27.000000000 -0400
+@@ -457,8 +457,11 @@
+ extern const char *selinux_file_context_path(void);
+ extern const char *selinux_file_context_homedir_path(void);
  extern const char *selinux_file_context_local_path(void);
++extern const char *selinux_file_context_subs_path(void);
  extern const char *selinux_homedir_context_path(void);
  extern const char *selinux_media_context_path(void);
 +extern const char *selinux_virtual_domain_context_path(void);
@@ -10,7 +13,7 @@
  extern const char *selinux_x_context_path(void);
  extern const char *selinux_contexts_path(void);
  extern const char *selinux_securetty_types_path(void);
-@@ -520,6 +522,14 @@
+@@ -520,6 +523,14 @@
     Caller must free the returned strings via free. */
  extern int getseuserbyname(const char *linuxuser, char **seuser, char **level);
  
@@ -25,9 +28,9 @@
  /* Compare two file contexts, return 0 if equivalent. */
  int selinux_file_context_cmp(const security_context_t a,
  			     const security_context_t b);
-diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/selinuxconlist.8 libselinux-2.0.77/man/man8/selinuxconlist.8
+diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/selinuxconlist.8 libselinux-2.0.79/man/man8/selinuxconlist.8
 --- nsalibselinux/man/man8/selinuxconlist.8	1969-12-31 19:00:00.000000000 -0500
-+++ libselinux-2.0.77/man/man8/selinuxconlist.8	2009-02-18 14:18:54.000000000 -0500
++++ libselinux-2.0.79/man/man8/selinuxconlist.8	2009-03-27 10:09:31.000000000 -0400
 @@ -0,0 +1,18 @@
 +.TH "selinuxconlist" "1" "7 May 2008" "dwalsh at redhat.com" "SELinux Command Line documentation"
 +.SH "NAME"
@@ -47,9 +50,9 @@
 +
 +.SH "SEE ALSO"
 +secon(8), selinuxdefcon(8)
-diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/selinuxdefcon.8 libselinux-2.0.77/man/man8/selinuxdefcon.8
+diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/selinuxdefcon.8 libselinux-2.0.79/man/man8/selinuxdefcon.8
 --- nsalibselinux/man/man8/selinuxdefcon.8	1969-12-31 19:00:00.000000000 -0500
-+++ libselinux-2.0.77/man/man8/selinuxdefcon.8	2009-02-18 14:18:54.000000000 -0500
++++ libselinux-2.0.79/man/man8/selinuxdefcon.8	2009-03-27 10:09:31.000000000 -0400
 @@ -0,0 +1,19 @@
 +.TH "selinuxdefcon" "1" "7 May 2008" "dwalsh at redhat.com" "SELinux Command Line documentation"
 +.SH "NAME"
@@ -70,9 +73,9 @@
 +
 +.SH "SEE ALSO"
 +secon(8), selinuxconlist(8)
-diff --exclude-from=exclude -N -u -r nsalibselinux/src/callbacks.c libselinux-2.0.77/src/callbacks.c
---- nsalibselinux/src/callbacks.c	2008-08-28 09:34:24.000000000 -0400
-+++ libselinux-2.0.77/src/callbacks.c	2009-02-18 14:18:54.000000000 -0500
+diff --exclude-from=exclude -N -u -r nsalibselinux/src/callbacks.c libselinux-2.0.79/src/callbacks.c
+--- nsalibselinux/src/callbacks.c	2009-03-06 14:41:45.000000000 -0500
++++ libselinux-2.0.79/src/callbacks.c	2009-03-27 10:09:31.000000000 -0400
 @@ -16,6 +16,7 @@
  {
  	int rc;
@@ -81,6761 +84,6648 @@
  	va_start(ap, fmt);
  	rc = vfprintf(stderr, fmt, ap);
  	va_end(ap);
-diff --exclude-from=exclude -N -u -r nsalibselinux/src/file_path_suffixes.h libselinux-2.0.77/src/file_path_suffixes.h
---- nsalibselinux/src/file_path_suffixes.h	2009-01-05 17:45:35.000000000 -0500
-+++ libselinux-2.0.77/src/file_path_suffixes.h	2009-02-18 14:18:54.000000000 -0500
-@@ -20,3 +20,5 @@
-     S_(FILE_CONTEXTS_LOCAL, "/contexts/files/file_contexts.local")
-     S_(X_CONTEXTS, "/contexts/x_contexts")
-     S_(COLORS, "/secolor.conf")
-+    S_(VIRTUAL_DOMAIN, "/contexts/virtual_domain_context")
-+    S_(VIRTUAL_IMAGE, "/contexts/virtual_image_context")
-diff --exclude-from=exclude -N -u -r nsalibselinux/src/matchpathcon.c libselinux-2.0.77/src/matchpathcon.c
---- nsalibselinux/src/matchpathcon.c	2008-08-28 09:34:24.000000000 -0400
-+++ libselinux-2.0.77/src/matchpathcon.c	2009-02-18 14:18:54.000000000 -0500
-@@ -2,6 +2,7 @@
- #include <string.h>
- #include <errno.h>
- #include <stdio.h>
-+#include <syslog.h>
- #include "selinux_internal.h"
- #include "label_internal.h"
- #include "callbacks.h"
-@@ -57,7 +58,7 @@
- {
- 	va_list ap;
- 	va_start(ap, fmt);
--	vfprintf(stderr, fmt, ap);
-+	vsyslog(LOG_ERR, fmt, ap);
- 	va_end(ap);
- }
- 
-diff --exclude-from=exclude -N -u -r nsalibselinux/src/selinux_config.c libselinux-2.0.77/src/selinux_config.c
---- nsalibselinux/src/selinux_config.c	2009-01-05 17:45:35.000000000 -0500
-+++ libselinux-2.0.77/src/selinux_config.c	2009-02-18 14:18:54.000000000 -0500
-@@ -40,7 +40,9 @@
- #define SECURETTY_TYPES   18
- #define X_CONTEXTS        19
- #define COLORS            20
--#define NEL               21
-+#define VIRTUAL_DOMAIN    21
-+#define VIRTUAL_IMAGE     22
-+#define NEL               23
- 
- /* New layout is relative to SELINUXDIR/policytype. */
- static char *file_paths[NEL];
-@@ -391,3 +393,17 @@
- }
- 
- hidden_def(selinux_x_context_path)
+diff --exclude-from=exclude -N -u -r nsalibselinux/src/d libselinux-2.0.79/src/d
+--- nsalibselinux/src/d	1969-12-31 19:00:00.000000000 -0500
++++ libselinux-2.0.79/src/d	2009-03-27 11:32:04.000000000 -0400
+@@ -0,0 +1,801 @@
 +
-+const char *selinux_virtual_domain_context_path()
-+{
-+	return get_path(VIRTUAL_DOMAIN);
++%exception is_selinux_enabled {
++   
++  if (result < 0) {
++     PyErr_SetFromErrno(PyExc_OSError);
++     return NULL;
++  }
 +}
 +
-+hidden_def(selinux_virtual_domain_context_path)
 +
-+const char *selinux_virtual_image_context_path()
-+{
-+	return get_path(VIRTUAL_IMAGE);
++%exception is_selinux_mls_enabled {
++   
++  if (result < 0) {
++     PyErr_SetFromErrno(PyExc_OSError);
++     return NULL;
++  }
 +}
 +
-+hidden_def(selinux_virtual_image_context_path)
-diff --exclude-from=exclude -N -u -r nsalibselinux/src/selinux_internal.h libselinux-2.0.77/src/selinux_internal.h
---- nsalibselinux/src/selinux_internal.h	2009-01-05 17:45:35.000000000 -0500
-+++ libselinux-2.0.77/src/selinux_internal.h	2009-02-18 14:18:54.000000000 -0500
-@@ -56,6 +56,8 @@
-     hidden_proto(selinux_securetty_types_path)
-     hidden_proto(selinux_failsafe_context_path)
-     hidden_proto(selinux_removable_context_path)
-+    hidden_proto(selinux_virtual_domain_context_path)
-+    hidden_proto(selinux_virtual_image_context_path)
-     hidden_proto(selinux_file_context_path)
-     hidden_proto(selinux_file_context_homedir_path)
-     hidden_proto(selinux_file_context_local_path)
-diff --exclude-from=exclude -N -u -r nsalibselinux/src/selinux.py libselinux-2.0.77/src/selinux.py
---- nsalibselinux/src/selinux.py	2009-01-13 08:45:35.000000000 -0500
-+++ libselinux-2.0.77/src/selinux.py	2009-02-18 14:18:54.000000000 -0500
-@@ -1,5 +1,5 @@
- # This file was automatically generated by SWIG (http://www.swig.org).
--# Version 1.3.35
-+# Version 1.3.36
- #
- # Don't modify this file, modify the SWIG interface instead.
- # This file is compatible with both classic and new-style classes.
-@@ -61,6 +61,15 @@
-                              map(restorecon, [os.path.join(dirname, fname)
-                                               for fname in fnames]), None)
- 
-+def copytree(src, dest):
-+    """ An SELinux-friendly shutil.copytree method """
-+    shutil.copytree(src, dest)
-+    restorecon(dest, recursive=True)
 +
-+def install(src, dest):
-+    """ An SELinux-friendly shutil.move method """
-+    shutil.move(src, dest)
-+    restorecon(dest, recursive=True)
- 
- is_selinux_enabled = _selinux.is_selinux_enabled
- is_selinux_mls_enabled = _selinux.is_selinux_mls_enabled
-@@ -102,86 +111,9 @@
- fsetfilecon_raw = _selinux.fsetfilecon_raw
- getpeercon = _selinux.getpeercon
- getpeercon_raw = _selinux.getpeercon_raw
--class av_decision(_object):
--    __swig_setmethods__ = {}
--    __setattr__ = lambda self, name, value: _swig_setattr(self, av_decision, name, value)
--    __swig_getmethods__ = {}
--    __getattr__ = lambda self, name: _swig_getattr(self, av_decision, name)
--    __repr__ = _swig_repr
--    __swig_setmethods__["allowed"] = _selinux.av_decision_allowed_set
[...15824 lines suppressed...]
    _swigc__p_unsigned_short,
-diff --exclude-from=exclude -N -u -r nsalibselinux/src/seusers.c libselinux-2.0.77/src/seusers.c
---- nsalibselinux/src/seusers.c	2008-08-28 09:34:24.000000000 -0400
-+++ libselinux-2.0.77/src/seusers.c	2009-02-18 14:18:54.000000000 -0500
+@@ -10791,18 +9497,48 @@
+   
+   SWIGINTERN PyObject *
+   swig_varlink_repr(swig_varlinkobject *SWIGUNUSEDPARM(v)) {
++#if PY_VERSION_HEX >= 0x03000000
++    return PyUnicode_InternFromString("<Swig global variables>");
++#else
+     return PyString_FromString("<Swig global variables>");
++#endif
+   }
+   
+   SWIGINTERN PyObject *
+   swig_varlink_str(swig_varlinkobject *v) {
++#if PY_VERSION_HEX >= 0x03000000
++    PyObject *str = PyUnicode_InternFromString("(");
++    PyObject *tail;
++    PyObject *joined;
++    swig_globalvar *var;
++    for (var = v->vars; var; var=var->next) {
++      tail = PyUnicode_FromString(var->name);
++      joined = PyUnicode_Concat(str, tail);
++      Py_DecRef(str);
++      Py_DecRef(tail);
++      str = joined;
++      if (var->next) {
++        tail = PyUnicode_InternFromString(", ");
++        joined = PyUnicode_Concat(str, tail);
++        Py_DecRef(str);
++        Py_DecRef(tail);
++        str = joined;
++      }
++    }
++    tail = PyUnicode_InternFromString(")");
++    joined = PyUnicode_Concat(str, tail);
++    Py_DecRef(str);
++    Py_DecRef(tail);
++    str = joined;
++#else
+     PyObject *str = PyString_FromString("(");
+-    swig_globalvar  *var;
++    swig_globalvar *var;
+     for (var = v->vars; var; var=var->next) {
+       PyString_ConcatAndDel(&str,PyString_FromString(var->name));
+       if (var->next) PyString_ConcatAndDel(&str,PyString_FromString(", "));
+     }
+     PyString_ConcatAndDel(&str,PyString_FromString(")"));
++#endif
+     return str;
+   }
+   
+@@ -10810,7 +9546,7 @@
+   swig_varlink_print(swig_varlinkobject *v, FILE *fp, int SWIGUNUSEDPARM(flags)) {
+     PyObject *str = swig_varlink_str(v);
+     fprintf(fp,"Swig global variables ");
+-    fprintf(fp,"%s\n", PyString_AsString(str));
++    fprintf(fp,"%s\n", SWIG_Python_str_AsChar(str));
+     Py_DECREF(str);
+     return 0;
+   }
+@@ -10868,8 +9604,13 @@
+     if (!type_init) {
+       const PyTypeObject tmp
+       = {
++        /* PyObject header changed in Python 3 */
++#if PY_VERSION_HEX >= 0x03000000
++        PyVarObject_HEAD_INIT(&PyType_Type, 0)
++#else
+         PyObject_HEAD_INIT(NULL)
+         0,                                  /* Number of items in variable part (ob_size) */
++#endif
+         (char *)"swigvarlink",              /* Type name (tp_name) */
+         sizeof(swig_varlinkobject),         /* Basic size (tp_basicsize) */
+         0,                                  /* Itemsize (tp_itemsize) */
+@@ -10905,7 +9646,10 @@
+ #endif
+       };
+       varlink_type = tmp;
++      /* for Python 3 we already assigned the ob_type in PyVarObject_HEAD_INIT() */
++#if PY_VERSION_HEX < 0x03000000
+       varlink_type.ob_type = &PyType_Type;
++#endif
+       type_init = 1;
+     }
+     return &varlink_type;
+@@ -11030,13 +9774,35 @@
+ #ifdef __cplusplus
+ extern "C"
+ #endif
+-SWIGEXPORT void SWIG_init(void) {
++
++SWIGEXPORT 
++#if PY_VERSION_HEX >= 0x03000000
++PyObject*
++#else
++void
++#endif
++SWIG_init(void) {
+   PyObject *m, *d;
+   
+   /* Fix SwigMethods to carry the callback ptrs when needed */
+   SWIG_Python_FixMethods(SwigMethods, swig_const_table, swig_types, swig_type_initial);
++#if PY_VERSION_HEX >= 0x03000000
++  static struct PyModuleDef SWIG_module = {
++    PyModuleDef_HEAD_INIT,
++    (char *) SWIG_name,
++    NULL,
++    -1,
++    SwigMethods,
++    NULL,
++    NULL,
++    NULL,
++    NULL
++  };
+   
++  m = PyModule_Create(&SWIG_module);
++#else
+   m = Py_InitModule((char *) SWIG_name, SwigMethods);
++#endif
+   d = PyModule_GetDict(m);
+   
+   SWIG_InitializeModule(0);
+@@ -11065,5 +9831,10 @@
+   SWIG_Python_SetConstant(d, "AVC_CALLBACK_AUDITDENY_DISABLE",SWIG_From_int((int)(128)));
+   SWIG_Python_SetConstant(d, "AVC_CACHE_STATS",SWIG_From_int((int)(1)));
+   SWIG_Python_SetConstant(d, "SELINUX_DEFAULTUSER",SWIG_FromCharPtr("user_u"));
++#if PY_VERSION_HEX >= 0x03000000
++  return m;
++#else
++  return;
++#endif
+ }
+ 
+diff --exclude-from=exclude -N -u -r nsalibselinux/src/seusers.c libselinux-2.0.79/src/seusers.c
+--- nsalibselinux/src/seusers.c	2009-03-06 14:41:45.000000000 -0500
++++ libselinux-2.0.79/src/seusers.c	2009-03-27 10:09:31.000000000 -0400
 @@ -243,3 +243,67 @@
  	*r_level = NULL;
  	return 0;
@@ -10362,9 +10085,9 @@
 +
 +	return (ret ? getseuserbyname(username, r_seuser, r_level) : ret);
 +}
-diff --exclude-from=exclude -N -u -r nsalibselinux/utils/getdefaultcon.c libselinux-2.0.77/utils/getdefaultcon.c
---- nsalibselinux/utils/getdefaultcon.c	2008-08-28 09:34:24.000000000 -0400
-+++ libselinux-2.0.77/utils/getdefaultcon.c	2009-02-18 14:18:54.000000000 -0500
+diff --exclude-from=exclude -N -u -r nsalibselinux/utils/getdefaultcon.c libselinux-2.0.79/utils/getdefaultcon.c
+--- nsalibselinux/utils/getdefaultcon.c	2009-03-06 14:41:45.000000000 -0500
++++ libselinux-2.0.79/utils/getdefaultcon.c	2009-03-27 10:09:31.000000000 -0400
 @@ -22,8 +22,9 @@
  	security_context_t usercon = NULL, cur_context = NULL;
  	char *user = NULL, *level = NULL, *role=NULL, *seuser=NULL, *dlevel=NULL;
@@ -10410,9 +10133,9 @@
 -	return 0;
 +	return ret >= 0;
  }
-diff --exclude-from=exclude -N -u -r nsalibselinux/utils/Makefile libselinux-2.0.77/utils/Makefile
---- nsalibselinux/utils/Makefile	2008-08-28 09:34:24.000000000 -0400
-+++ libselinux-2.0.77/utils/Makefile	2009-02-18 14:18:54.000000000 -0500
+diff --exclude-from=exclude -N -u -r nsalibselinux/utils/Makefile libselinux-2.0.79/utils/Makefile
+--- nsalibselinux/utils/Makefile	2009-03-06 14:41:45.000000000 -0500
++++ libselinux-2.0.79/utils/Makefile	2009-03-27 10:09:31.000000000 -0400
 @@ -2,28 +2,33 @@
  PREFIX ?= $(DESTDIR)/usr
  LIBDIR ?= $(PREFIX)/lib
@@ -10451,10 +10174,27 @@
  
  indent:
  	../../scripts/Lindent $(wildcard *.[ch])
-diff --exclude-from=exclude -N -u -r nsalibselinux/utils/matchpathcon.c libselinux-2.0.77/utils/matchpathcon.c
---- nsalibselinux/utils/matchpathcon.c	2008-10-28 10:06:51.000000000 -0400
-+++ libselinux-2.0.77/utils/matchpathcon.c	2009-02-18 14:18:54.000000000 -0500
-@@ -101,6 +101,11 @@
+diff --exclude-from=exclude -N -u -r nsalibselinux/utils/matchpathcon.c libselinux-2.0.79/utils/matchpathcon.c
+--- nsalibselinux/utils/matchpathcon.c	2009-03-06 14:41:45.000000000 -0500
++++ libselinux-2.0.79/utils/matchpathcon.c	2009-03-27 10:09:31.000000000 -0400
+@@ -22,9 +22,13 @@
+ 	char *buf;
+ 	int rc = matchpathcon(path, mode, &buf);
+ 	if (rc < 0) {
+-		fprintf(stderr, "matchpathcon(%s) failed: %s\n", path,
+-			strerror(errno));
+-		return 1;
++		if (errno == ENOENT) {
++			buf=strdup("<<none>>");
++		} else {
++			fprintf(stderr, "matchpathcon(%s) failed: %s\n", path,
++				strerror(errno));
++			return 1;
++		}
+ 	}
+ 	if (header)
+ 		printf("%s\t%s\n", path, buf);
+@@ -101,6 +105,11 @@
  	for (i = optind; i < argc; i++) {
  		int mode = 0;
  		struct stat buf;


Index: libselinux.spec
===================================================================
RCS file: /cvs/extras/rpms/libselinux/F-10/libselinux.spec,v
retrieving revision 1.348
retrieving revision 1.349
diff -u -r1.348 -r1.349
--- libselinux.spec	2 Mar 2009 18:24:56 -0000	1.348
+++ libselinux.spec	27 Mar 2009 18:29:29 -0000	1.349
@@ -4,13 +4,13 @@
 
 Summary: SELinux library and simple utilities
 Name: libselinux
-Version: 2.0.78
-Release: 1%{?dist}
+Version: 2.0.79
+Release: 2%{?dist}
 License: Public Domain
 Group: System Environment/Libraries
-Source: http://www.nsa.gov/selinux/archives/%{name}-%{version}.tgz
+Source: http://www.nsa.gov/research/selinux/%{name}-%{version}.tgz
 Patch: libselinux-rhat.patch
-URL: http://www.nsa.gov/selinux
+URL: http://www.selinuxproject.org
 
 BuildRequires: python-devel ruby-devel ruby libsepol-static >= %{libsepolver} swig
 Requires: libsepol >= %{libsepolver}
@@ -164,6 +164,28 @@
 %{ruby_sitearch}/selinux.so
 
 %changelog
+* Thu Mar 12 2009 Dan Walsh <dwalsh at redhat.com> - 2.0.79-2
+- Add back in av_decision to python swig
+
+* Thu Mar 12 2009 Dan Walsh <dwalsh at redhat.com> - 2.0.79-1
+- Update to upstream 
+	* Netlink socket handoff patch from Adam Jackson.
+	* AVC caching of compute_create results by Eric Paris.
+
+* Tue Mar 10 2009 Dan Walsh <dwalsh at redhat.com> - 2.0.78-5
+- Add patch from ajax to accellerate X SELinux 
+- Update eparis patch
+
+* Mon Mar 9 2009 Dan Walsh <dwalsh at redhat.com> - 2.0.78-4
+- Add eparis patch to accellerate Xwindows performance
+
+* Mon Mar 9 2009 Dan Walsh <dwalsh at redhat.com> - 2.0.78-3
+- Fix URL 
+
+* Fri Mar 6 2009 Dan Walsh <dwalsh at redhat.com> - 2.0.78-2
+- Add substitute pattern 
+- matchpathcon output <<none>> on ENOENT
+
 * Mon Mar 2 2009 Dan Walsh <dwalsh at redhat.com> - 2.0.78-1
 - Update to upstream
 	* Fix incorrect conversion in discover_class code.


Index: sources
===================================================================
RCS file: /cvs/extras/rpms/libselinux/F-10/sources,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -r1.180 -r1.181
--- sources	2 Mar 2009 18:24:56 -0000	1.180
+++ sources	27 Mar 2009 18:29:29 -0000	1.181
@@ -1 +1 @@
-c34327ec14643572f284589a2c72dcaa  libselinux-2.0.78.tgz
+f7418923f1f721e450ac8cf4151f8360  libselinux-2.0.79.tgz




More information about the fedora-extras-commits mailing list