File libselinux-bindings.changes of Package libselinux
331
1
-------------------------------------------------------------------
2
Wed Oct 17 11:48:30 UTC 2018 - jsegitz@suse.com
3
4
- Update to version 2.8 (bsc#1111732).
5
For changes please see
6
https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt
7
- ran spec-cleaner on spec files
8
9
-------------------------------------------------------------------
10
Mon May 14 22:50:42 UTC 2018 - mcepl@cepl.eu
11
12
- Update to version 2.7.
13
* %files needed to be heavily modified
14
* Based expressly on python3, not just python
15
For changes please see
16
https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt
17
18
-------------------------------------------------------------------
19
Fri Mar 16 15:25:10 UTC 2018 - jsegitz@suse.com
20
21
- Updated spec file to use python3. Added python3.patch to fix
22
build
23
24
-------------------------------------------------------------------
25
Fri Nov 24 09:09:02 UTC 2017 - jsegitz@suse.com
26
27
- Update to version 2.6. Notable changes:
28
* selinux_restorecon: fix realpath logic
29
* sefcontext_compile: invert semantics of "-r" flag
30
* sefcontext_compile: Add "-i" flag
31
* Introduce configurable backends
32
* Add function to find security.restorecon_last entries
33
* Add openrc_contexts functions
34
* Add support for pcre2
35
* Handle NULL pcre study data
36
* Add setfiles support to selinux_restorecon(3)
37
* Evaluate inodes in selinux_restorecon(3)
38
* Change the location of _selinux.so
39
* Explain how to free policy type from selinux_getpolicytype()
40
* Compare absolute pathname in matchpathcon -V
41
* Add selinux_snapperd_contexts_path()
42
* Modify audit2why analyze function to use loaded policy
43
* Avoid mounting /proc outside of selinux_init_load_policy()
44
* Fix location of selinuxfs mount point
45
* Only mount /proc if necessary
46
* procattr: return einval for <= 0 pid args
47
* procattr: return error on invalid pid_t input
48
- Dropped
49
* libselinux-2.2-ruby.patch
50
* libselinux-proc-mount-only-if-needed.patch
51
* python-selinux-swig-3.10.patch
52
53
-------------------------------------------------------------------
54
Wed Jul 5 10:30:57 UTC 2017 - schwab@suse.de
55
56
- readv-proto.patch: include <sys/uio.h> for readv prototype
57
58
-------------------------------------------------------------------
59
Sun Jul 17 15:30:05 UTC 2016 - jengelh@inai.de
60
61
- Update RPM groups, trim description and combine filelist entries.
62
63
-------------------------------------------------------------------
64
Thu Jul 14 07:59:04 UTC 2016 - jsegitz@novell.com
65
66
- Adjusted source link
67
68
-------------------------------------------------------------------
69
Tue Jul 5 16:44:44 UTC 2016 - i@marguerite.su
70
71
- add patch: python-selinux-swig-3.10.patch, fixed boo#985368
72
* swig-3.10 in Factory use importlib instead of imp to find
73
_selinux.so. imp searched the same directory as __init__.py
74
is while importlib searchs only standard paths. so we have
75
to move _selinux.so. fixed by upstream
76
- update version 2.5
77
* Add selinux_restorecon function
78
* read_spec_entry: fail on non-ascii
79
* Add man information about thread specific functions
80
* Don't wrap rpm_execcon with DISABLE_RPM with SWIG
81
* Correct line count for property and service context files
82
* label_file: fix memory leaks and uninitialized jump
83
* Replace selabel_digest hash function
84
* Fix selabel_open(3) services if no digest requested
85
* Add selabel_digest function
86
* Flush the class/perm string mapping cache on policy reload
87
* Fix restorecon when path has no context
88
* Free memory when processing media and x specfiles
89
* Fix mmap memory release for file labeling
90
* Add policy context validation to sefcontext_compile
91
* Do not treat an empty file_contexts(.local) as an error
92
* Fail hard on invalid property_contexts entries
93
* Fail hard on invalid file_contexts entries
94
* Support context validation on file_contexts.bin
95
* Add selabel_cmp interface and label_file backend
96
* Support specifying file_contexts.bin file path
97
* Support file_contexts.bin without file_contexts
98
* Simplify procattr cache
99
* Use /proc/thread-self when available
100
* Add const to selinux_opt for label backends
101
* Fix binary file labels for regexes with metachars
102
* Fix file labels for regexes with metachars
103
* Fix if file_contexts not '\n' terminated
104
* Enhance file context support
105
* Fix property processing and cleanup formatting
106
* Add read_spec_entries function to replace sscanf
107
* Support consistent mode size for bin files
108
* Fix more bin file processing core dumps
109
* add selinux_openssh_contexts_path()
110
* setrans_client: minimize overhead when mcstransd is not present
111
* Ensure selabel_lookup_best_match links NULL terminated
112
* Fix core dumps with corrupt *.bin files
113
* Add selabel partial and best match APIs
114
* Use os.walk() instead of the deprecated os.path.walk()
115
* Remove deprecated mudflap option
116
* Mount procfs before checking /proc/filesystems
117
* Fix -Wformat errors with gcc-5.0.0
118
* label_file: handle newlines in file names
119
* Fix audit2why error handling if SELinux is disabled
120
* pcre_study can return NULL without error
121
* Only check SELinux enabled status once in selinux_check_access
122
- changes in 2.4
123
* Remove assumption that SHLIBDIR is ../../ relative to LIBDIR
124
* Fix bugs found by hardened gcc flags
125
* Set the system to permissive if failing to disable SELinux because
126
policy has already been loaded
127
* Add db_exception and db_datatype support to label_db backend
128
* Log an error on unknown classes and permissions
129
* Add pcre version string to the compiled file_contexts format
130
* Deprecate use of flask.h and av_permissions.h
131
* Compiled file_context files and the original should have the same DAC
132
permissions
133
-------------------------------------------------------------------
134
Wed May 27 11:53:54 UTC 2015 - dimstar@opensuse.org
135
136
- Update libselinux-2.2-ruby.patch: use RbConfig instead of
137
deprecated Config.
138
139
-------------------------------------------------------------------
140
Sun May 18 00:15:17 UTC 2014 - crrodriguez@opensuse.org
141
142
- Update to version 2.3
143
* Get rid of security_context_t and fix const declarations.
144
* Refactor rpm_execcon() into a new setexecfilecon() from Guillem Jover.
145
146
-------------------------------------------------------------------
147
Thu Oct 31 13:43:41 UTC 2013 - p.drouand@gmail.com
148
149
- Update to version 2.2
150
* Fix avc_has_perm() returns -1 even when SELinux is in permissive mode.
151
* Support overriding Makefile RANLIB
152
* Update pkgconfig definition
153
* Mount sysfs before trying to mount selinuxfs.
154
* Fix man pages
155
* Support overriding PATH and LIBBASE in Makefile
156
* Fix LDFLAGS usage
157
* Avoid shadowing stat in load_mmap
158
* Support building on older PCRE libraries
159
* Fix handling of temporary file in sefcontext_compile
160
* Fix procattr cache
161
* Define python constants for getenforce result
162
* Fix label substitution handling of /
163
* Add selinux_current_policy_path from
164
* Change get_context_list to only return good matches
165
* Support udev-197 and higher
166
* Add support for local substitutions
167
* Change setfilecon to not return ENOSUP if context is already correct
168
* Python wrapper leak fixes
169
* Export SELINUX_TRANS_DIR definition in selinux.h
170
* Add selinux_systemd_contexts_path
171
* Add selinux_set_policy_root
172
* Add man page for sefcontext_compile
173
- Remove libselinux-rhat.patch; merged on upstream
174
- Adapt libselinux-ruby.patch to upstream changes
175
- Use fdupes to symlink duplicate manpages
176
177
-------------------------------------------------------------------
178
Thu Jun 27 14:57:53 UTC 2013 - vcizek@suse.com
179
180
- change the source url to the official 2.1.13 release tarball
181
182
-------------------------------------------------------------------
183
Wed Jan 30 12:33:45 UTC 2013 - vcizek@suse.com
184
185
- update to 2.1.12
186
- added BuildRequires: pcre-devel
187
188
-------------------------------------------------------------------
189
Mon Jan 7 22:34:03 UTC 2013 - jengelh@inai.de
190
191
- Remove obsolete defines/sections
192
193
-------------------------------------------------------------------
194
Wed Jul 25 11:15:02 UTC 2012 - meissner@suse.com
195
196
- updated to 2.1.9 again (see below)
197
198
-------------------------------------------------------------------
199
Fri Jun 1 18:34:04 CEST 2012 - mls@suse.de
200
201
- update to libselinux-2.1.9
202
* better man pages
203
* selinux_status interfaces
204
* simple interface for access checks
205
* multiple bug fixes
206
- fix build for ruby-1.9
207
208
-------------------------------------------------------------------
209
Mon Jun 28 06:38:35 UTC 2010 - jengelh@medozas.de
210
211
- use %_smp_mflags
212
213
-------------------------------------------------------------------
214
Thu Feb 25 14:57:16 UTC 2010 - prusnak@suse.cz
215
216
- updated to 2.0.91
217
* changes too numerous to list
218
219
-------------------------------------------------------------------
220
Sat Dec 12 16:43:54 CET 2009 - jengelh@medozas.de
221
222
- add baselibs.conf as a source
223
224
-------------------------------------------------------------------
225
Fri Jul 24 17:09:50 CEST 2009 - thomas@novell.com
226
227
- updated selinux-ready script
228
229
-------------------------------------------------------------------
230
Wed Jul 22 15:17:25 CEST 2009 - prusnak@suse.cz
231
232
- change libsepol-devel to libsepol-devel-static in dependencies
233
of python bindings
234
235
-------------------------------------------------------------------
236
Wed Jul 1 12:26:48 CEST 2009 - prusnak@suse.cz
237
238
- put libsepol-devel back to Requires of libselinux-devel
239
240
-------------------------------------------------------------------
241
Mon Jun 29 21:24:16 CEST 2009 - prusnak@suse.cz
242
243
- added selinux-ready tool to selinux-tools package
244
245
-------------------------------------------------------------------
246
Tue Jun 9 20:17:54 CEST 2009 - crrodriguez@suse.de
247
248
- remove static libraries
249
- libselinux-devel does not require libsepol-devel
250
251
-------------------------------------------------------------------
252
Wed May 27 14:06:14 CEST 2009 - prusnak@suse.cz
253
254
- updated to 2.0.80
255
* deny_unknown wrapper function from KaiGai Kohei
256
* security_compute_av_flags API from KaiGai Kohei
257
* Netlink socket management and callbacks from KaiGai Kohei
258
* Netlink socket handoff patch from Adam Jackson
259
* AVC caching of compute_create results by Eric Paris
260
* fix incorrect conversion in discover_class code
261
262
-------------------------------------------------------------------
263
Fri Apr 17 17:12:06 CEST 2009 - prusnak@suse.cz
264
265
- fixed memory leak (memleak.patch)
266
267
-------------------------------------------------------------------
268
Wed Jan 14 14:04:30 CET 2009 - prusnak@suse.cz
269
270
- updated to 2.0.77
271
* add new function getseuser which will take username and service
272
and return seuser and level; ipa will populate file in future
273
* change selinuxdefcon to return just the context by default
274
* fix segfault if seusers file does not work
275
* strip trailing / for matchpathcon
276
* fix restorecon python code
277
278
-------------------------------------------------------------------
279
Mon Dec 1 11:32:50 CET 2008 - prusnak@suse.cz
280
281
- updated to 2.0.76
282
* allow shell-style wildcarding in X names
283
* add Restorecon/Install python functions
284
* correct message types in AVC log messages
285
* make matchpathcon -V pass mode
286
* add man page for selinux_file_context_cmp
287
* update flask headers from refpolicy trunk
288
289
-------------------------------------------------------------------
290
Wed Oct 22 16:28:59 CEST 2008 - mrueckert@suse.de
291
292
- fix debug_packages_requires define
293
294
-------------------------------------------------------------------
295
Tue Sep 23 12:51:10 CEST 2008 - prusnak@suse.cz
296
297
- require only version, not release [bnc#429053]
298
299
-------------------------------------------------------------------
300
Tue Sep 2 12:09:22 CEST 2008 - prusnak@suse.cz
301
302
- updated to 2.0.71
303
* Add group support to seusers using %groupname syntax from Dan Walsh.
304
* Mark setrans socket close-on-exec from Stephen Smalley.
305
* Only apply nodups checking to base file contexts from Stephen Smalley.
306
* Merge ruby bindings from Dan Walsh.
307
308
-------------------------------------------------------------------
309
Mon Sep 1 07:35:00 CEST 2008 - aj@suse.de
310
311
- Fix build of debuginfo.
312
313
-------------------------------------------------------------------
314
Fri Aug 22 14:45:29 CEST 2008 - prusnak@suse.cz
315
316
- added baselibs.conf file
317
- split bindings into separate subpackage (libselinux-bindings)
318
- split tools into separate subpackage (selinux-tools)
319
320
-------------------------------------------------------------------
321
Fri Aug 1 17:32:20 CEST 2008 - ro@suse.de
322
323
- fix requires for debuginfo package
324
325
-------------------------------------------------------------------
326
Tue Jul 15 16:26:31 CEST 2008 - prusnak@suse.cz
327
328
- initial version 2.0.67
329
* based on Fedora package by Dan Walsh <dwalsh@redhat.com>
330
331