File libselinux-bindings.changes of Package libselinux
336
1
-------------------------------------------------------------------
2
Tue Jan 12 12:54:37 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
3
4
- Correct license to public domain (bsc#1180603)
5
6
-------------------------------------------------------------------
7
Wed Oct 17 11:48:30 UTC 2018 - jsegitz@suse.com
8
9
- Update to version 2.8 (bsc#1111732).
10
For changes please see
11
https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt
12
- ran spec-cleaner on spec files
13
14
-------------------------------------------------------------------
15
Mon May 14 22:50:42 UTC 2018 - mcepl@cepl.eu
16
17
- Update to version 2.7.
18
* %files needed to be heavily modified
19
* Based expressly on python3, not just python
20
For changes please see
21
https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt
22
23
-------------------------------------------------------------------
24
Fri Mar 16 15:25:10 UTC 2018 - jsegitz@suse.com
25
26
- Updated spec file to use python3. Added python3.patch to fix
27
build
28
29
-------------------------------------------------------------------
30
Fri Nov 24 09:09:02 UTC 2017 - jsegitz@suse.com
31
32
- Update to version 2.6. Notable changes:
33
* selinux_restorecon: fix realpath logic
34
* sefcontext_compile: invert semantics of "-r" flag
35
* sefcontext_compile: Add "-i" flag
36
* Introduce configurable backends
37
* Add function to find security.restorecon_last entries
38
* Add openrc_contexts functions
39
* Add support for pcre2
40
* Handle NULL pcre study data
41
* Add setfiles support to selinux_restorecon(3)
42
* Evaluate inodes in selinux_restorecon(3)
43
* Change the location of _selinux.so
44
* Explain how to free policy type from selinux_getpolicytype()
45
* Compare absolute pathname in matchpathcon -V
46
* Add selinux_snapperd_contexts_path()
47
* Modify audit2why analyze function to use loaded policy
48
* Avoid mounting /proc outside of selinux_init_load_policy()
49
* Fix location of selinuxfs mount point
50
* Only mount /proc if necessary
51
* procattr: return einval for <= 0 pid args
52
* procattr: return error on invalid pid_t input
53
- Dropped
54
* libselinux-2.2-ruby.patch
55
* libselinux-proc-mount-only-if-needed.patch
56
* python-selinux-swig-3.10.patch
57
58
-------------------------------------------------------------------
59
Wed Jul 5 10:30:57 UTC 2017 - schwab@suse.de
60
61
- readv-proto.patch: include <sys/uio.h> for readv prototype
62
63
-------------------------------------------------------------------
64
Sun Jul 17 15:30:05 UTC 2016 - jengelh@inai.de
65
66
- Update RPM groups, trim description and combine filelist entries.
67
68
-------------------------------------------------------------------
69
Thu Jul 14 07:59:04 UTC 2016 - jsegitz@novell.com
70
71
- Adjusted source link
72
73
-------------------------------------------------------------------
74
Tue Jul 5 16:44:44 UTC 2016 - i@marguerite.su
75
76
- add patch: python-selinux-swig-3.10.patch, fixed boo#985368
77
* swig-3.10 in Factory use importlib instead of imp to find
78
_selinux.so. imp searched the same directory as __init__.py
79
is while importlib searchs only standard paths. so we have
80
to move _selinux.so. fixed by upstream
81
- update version 2.5
82
* Add selinux_restorecon function
83
* read_spec_entry: fail on non-ascii
84
* Add man information about thread specific functions
85
* Don't wrap rpm_execcon with DISABLE_RPM with SWIG
86
* Correct line count for property and service context files
87
* label_file: fix memory leaks and uninitialized jump
88
* Replace selabel_digest hash function
89
* Fix selabel_open(3) services if no digest requested
90
* Add selabel_digest function
91
* Flush the class/perm string mapping cache on policy reload
92
* Fix restorecon when path has no context
93
* Free memory when processing media and x specfiles
94
* Fix mmap memory release for file labeling
95
* Add policy context validation to sefcontext_compile
96
* Do not treat an empty file_contexts(.local) as an error
97
* Fail hard on invalid property_contexts entries
98
* Fail hard on invalid file_contexts entries
99
* Support context validation on file_contexts.bin
100
* Add selabel_cmp interface and label_file backend
101
* Support specifying file_contexts.bin file path
102
* Support file_contexts.bin without file_contexts
103
* Simplify procattr cache
104
* Use /proc/thread-self when available
105
* Add const to selinux_opt for label backends
106
* Fix binary file labels for regexes with metachars
107
* Fix file labels for regexes with metachars
108
* Fix if file_contexts not '\n' terminated
109
* Enhance file context support
110
* Fix property processing and cleanup formatting
111
* Add read_spec_entries function to replace sscanf
112
* Support consistent mode size for bin files
113
* Fix more bin file processing core dumps
114
* add selinux_openssh_contexts_path()
115
* setrans_client: minimize overhead when mcstransd is not present
116
* Ensure selabel_lookup_best_match links NULL terminated
117
* Fix core dumps with corrupt *.bin files
118
* Add selabel partial and best match APIs
119
* Use os.walk() instead of the deprecated os.path.walk()
120
* Remove deprecated mudflap option
121
* Mount procfs before checking /proc/filesystems
122
* Fix -Wformat errors with gcc-5.0.0
123
* label_file: handle newlines in file names
124
* Fix audit2why error handling if SELinux is disabled
125
* pcre_study can return NULL without error
126
* Only check SELinux enabled status once in selinux_check_access
127
- changes in 2.4
128
* Remove assumption that SHLIBDIR is ../../ relative to LIBDIR
129
* Fix bugs found by hardened gcc flags
130
* Set the system to permissive if failing to disable SELinux because
131
policy has already been loaded
132
* Add db_exception and db_datatype support to label_db backend
133
* Log an error on unknown classes and permissions
134
* Add pcre version string to the compiled file_contexts format
135
* Deprecate use of flask.h and av_permissions.h
136
* Compiled file_context files and the original should have the same DAC
137
permissions
138
-------------------------------------------------------------------
139
Wed May 27 11:53:54 UTC 2015 - dimstar@opensuse.org
140
141
- Update libselinux-2.2-ruby.patch: use RbConfig instead of
142
deprecated Config.
143
144
-------------------------------------------------------------------
145
Sun May 18 00:15:17 UTC 2014 - crrodriguez@opensuse.org
146
147
- Update to version 2.3
148
* Get rid of security_context_t and fix const declarations.
149
* Refactor rpm_execcon() into a new setexecfilecon() from Guillem Jover.
150
151
-------------------------------------------------------------------
152
Thu Oct 31 13:43:41 UTC 2013 - p.drouand@gmail.com
153
154
- Update to version 2.2
155
* Fix avc_has_perm() returns -1 even when SELinux is in permissive mode.
156
* Support overriding Makefile RANLIB
157
* Update pkgconfig definition
158
* Mount sysfs before trying to mount selinuxfs.
159
* Fix man pages
160
* Support overriding PATH and LIBBASE in Makefile
161
* Fix LDFLAGS usage
162
* Avoid shadowing stat in load_mmap
163
* Support building on older PCRE libraries
164
* Fix handling of temporary file in sefcontext_compile
165
* Fix procattr cache
166
* Define python constants for getenforce result
167
* Fix label substitution handling of /
168
* Add selinux_current_policy_path from
169
* Change get_context_list to only return good matches
170
* Support udev-197 and higher
171
* Add support for local substitutions
172
* Change setfilecon to not return ENOSUP if context is already correct
173
* Python wrapper leak fixes
174
* Export SELINUX_TRANS_DIR definition in selinux.h
175
* Add selinux_systemd_contexts_path
176
* Add selinux_set_policy_root
177
* Add man page for sefcontext_compile
178
- Remove libselinux-rhat.patch; merged on upstream
179
- Adapt libselinux-ruby.patch to upstream changes
180
- Use fdupes to symlink duplicate manpages
181
182
-------------------------------------------------------------------
183
Thu Jun 27 14:57:53 UTC 2013 - vcizek@suse.com
184
185
- change the source url to the official 2.1.13 release tarball
186
187
-------------------------------------------------------------------
188
Wed Jan 30 12:33:45 UTC 2013 - vcizek@suse.com
189
190
- update to 2.1.12
191
- added BuildRequires: pcre-devel
192
193
-------------------------------------------------------------------
194
Mon Jan 7 22:34:03 UTC 2013 - jengelh@inai.de
195
196
- Remove obsolete defines/sections
197
198
-------------------------------------------------------------------
199
Wed Jul 25 11:15:02 UTC 2012 - meissner@suse.com
200
201
- updated to 2.1.9 again (see below)
202
203
-------------------------------------------------------------------
204
Fri Jun 1 18:34:04 CEST 2012 - mls@suse.de
205
206
- update to libselinux-2.1.9
207
* better man pages
208
* selinux_status interfaces
209
* simple interface for access checks
210
* multiple bug fixes
211
- fix build for ruby-1.9
212
213
-------------------------------------------------------------------
214
Mon Jun 28 06:38:35 UTC 2010 - jengelh@medozas.de
215
216
- use %_smp_mflags
217
218
-------------------------------------------------------------------
219
Thu Feb 25 14:57:16 UTC 2010 - prusnak@suse.cz
220
221
- updated to 2.0.91
222
* changes too numerous to list
223
224
-------------------------------------------------------------------
225
Sat Dec 12 16:43:54 CET 2009 - jengelh@medozas.de
226
227
- add baselibs.conf as a source
228
229
-------------------------------------------------------------------
230
Fri Jul 24 17:09:50 CEST 2009 - thomas@novell.com
231
232
- updated selinux-ready script
233
234
-------------------------------------------------------------------
235
Wed Jul 22 15:17:25 CEST 2009 - prusnak@suse.cz
236
237
- change libsepol-devel to libsepol-devel-static in dependencies
238
of python bindings
239
240
-------------------------------------------------------------------
241
Wed Jul 1 12:26:48 CEST 2009 - prusnak@suse.cz
242
243
- put libsepol-devel back to Requires of libselinux-devel
244
245
-------------------------------------------------------------------
246
Mon Jun 29 21:24:16 CEST 2009 - prusnak@suse.cz
247
248
- added selinux-ready tool to selinux-tools package
249
250
-------------------------------------------------------------------
251
Tue Jun 9 20:17:54 CEST 2009 - crrodriguez@suse.de
252
253
- remove static libraries
254
- libselinux-devel does not require libsepol-devel
255
256
-------------------------------------------------------------------
257
Wed May 27 14:06:14 CEST 2009 - prusnak@suse.cz
258
259
- updated to 2.0.80
260
* deny_unknown wrapper function from KaiGai Kohei
261
* security_compute_av_flags API from KaiGai Kohei
262
* Netlink socket management and callbacks from KaiGai Kohei
263
* Netlink socket handoff patch from Adam Jackson
264
* AVC caching of compute_create results by Eric Paris
265
* fix incorrect conversion in discover_class code
266
267
-------------------------------------------------------------------
268
Fri Apr 17 17:12:06 CEST 2009 - prusnak@suse.cz
269
270
- fixed memory leak (memleak.patch)
271
272
-------------------------------------------------------------------
273
Wed Jan 14 14:04:30 CET 2009 - prusnak@suse.cz
274
275
- updated to 2.0.77
276
* add new function getseuser which will take username and service
277
and return seuser and level; ipa will populate file in future
278
* change selinuxdefcon to return just the context by default
279
* fix segfault if seusers file does not work
280
* strip trailing / for matchpathcon
281
* fix restorecon python code
282
283
-------------------------------------------------------------------
284
Mon Dec 1 11:32:50 CET 2008 - prusnak@suse.cz
285
286
- updated to 2.0.76
287
* allow shell-style wildcarding in X names
288
* add Restorecon/Install python functions
289
* correct message types in AVC log messages
290
* make matchpathcon -V pass mode
291
* add man page for selinux_file_context_cmp
292
* update flask headers from refpolicy trunk
293
294
-------------------------------------------------------------------
295
Wed Oct 22 16:28:59 CEST 2008 - mrueckert@suse.de
296
297
- fix debug_packages_requires define
298
299
-------------------------------------------------------------------
300
Tue Sep 23 12:51:10 CEST 2008 - prusnak@suse.cz
301
302
- require only version, not release [bnc#429053]
303
304
-------------------------------------------------------------------
305
Tue Sep 2 12:09:22 CEST 2008 - prusnak@suse.cz
306
307
- updated to 2.0.71
308
* Add group support to seusers using %groupname syntax from Dan Walsh.
309
* Mark setrans socket close-on-exec from Stephen Smalley.
310
* Only apply nodups checking to base file contexts from Stephen Smalley.
311
* Merge ruby bindings from Dan Walsh.
312
313
-------------------------------------------------------------------
314
Mon Sep 1 07:35:00 CEST 2008 - aj@suse.de
315
316
- Fix build of debuginfo.
317
318
-------------------------------------------------------------------
319
Fri Aug 22 14:45:29 CEST 2008 - prusnak@suse.cz
320
321
- added baselibs.conf file
322
- split bindings into separate subpackage (libselinux-bindings)
323
- split tools into separate subpackage (selinux-tools)
324
325
-------------------------------------------------------------------
326
Fri Aug 1 17:32:20 CEST 2008 - ro@suse.de
327
328
- fix requires for debuginfo package
329
330
-------------------------------------------------------------------
331
Tue Jul 15 16:26:31 CEST 2008 - prusnak@suse.cz
332
333
- initial version 2.0.67
334
* based on Fedora package by Dan Walsh <dwalsh@redhat.com>
335
336