1fcf42
%global debug_package   %{nil}
1fcf42
1fcf42
# container-selinux
b23639
%global git0 https://github.com/containers/container-selinux
1fcf42
1fcf42
# container-selinux stuff (prefix with ds_ for version/release etc.)
1fcf42
# Some bits borrowed from the openstack-selinux package
1fcf42
%global selinuxtype targeted
1fcf42
%global moduletype services
1fcf42
%global modulenames container
1fcf42
1fcf42
# Usage: _format var format
1fcf42
# Expand 'modulenames' into various formats as needed
1fcf42
# Format must contain '$x' somewhere to do anything useful
1fcf42
%global _format() export %1=""; for x in %{modulenames}; do %1+=%2; %1+=" "; done;
1fcf42
1fcf42
# Version of SELinux we were using
b23639
%global selinux_policyver 3.14.3-9.el8
1fcf42
1fcf42
Epoch: 2
b23639
Name: container-selinux
8766a0
Version: 2.137.0
1fcf42
Release: 1%{?dist}
1fcf42
License: GPLv2
1fcf42
URL: %{git0}
1fcf42
Summary: SELinux policies for container runtimes
8766a0
Source0: %{git0}/archive/v%{version}.tar.gz
1fcf42
BuildArch: noarch
1fcf42
BuildRequires: git
1fcf42
BuildRequires: pkgconfig(systemd)
1fcf42
BuildRequires: selinux-policy >= %{selinux_policyver}
1fcf42
BuildRequires: selinux-policy-devel >= %{selinux_policyver}
1fcf42
# RE: rhbz#1195804 - ensure min NVR for selinux-policy
1fcf42
Requires: selinux-policy >= %{selinux_policyver}
1fcf42
Requires(post): selinux-policy-base >= %{selinux_policyver}
1fcf42
Requires(post): selinux-policy-targeted >= %{selinux_policyver}
1fcf42
Requires(post): policycoreutils >= 2.5-11
1fcf42
%if 0%{?rhel} > 7 || 0%{?fedora}
1fcf42
Requires(post): policycoreutils-python-utils
1fcf42
%else
1fcf42
Requires(post): policycoreutils-python
1fcf42
%endif
1fcf42
Requires(post): libselinux-utils
1fcf42
Requires(post): sed
1fcf42
Obsoletes: %{name} <= 2:1.12.5-14
1fcf42
Obsoletes: docker-selinux <= 2:1.12.4-28
1fcf42
Provides: docker-selinux = %{epoch}:%{version}-%{release}
1fcf42
Provides: docker-engine-selinux = %{epoch}:%{version}-%{release}
1fcf42
1fcf42
%description
1fcf42
SELinux policy modules for use with container runtimes.
1fcf42
1fcf42
%prep
8766a0
%autosetup -Sgit
1fcf42
1fcf42
%build
1fcf42
make
1fcf42
1fcf42
%install
1fcf42
# install policy modules
1fcf42
%_format MODULES $x.pp.bz2
1fcf42
install -d %{buildroot}%{_datadir}/selinux/packages
1fcf42
install -d -p %{buildroot}%{_datadir}/selinux/devel/include/services
8766a0
install -p -m 644 container.if %{buildroot}%{_datadir}/selinux/devel/include/services
1fcf42
install -m 0644 $MODULES %{buildroot}%{_datadir}/selinux/packages
8766a0
install -d %{buildroot}/%{_datadir}/containers/selinux
8766a0
install -m 644 container_contexts %{buildroot}/%{_datadir}/containers/selinux/contexts
1fcf42
1fcf42
# remove spec file
1fcf42
rm -rf %{name}.spec
1fcf42
1fcf42
%check
1fcf42
b23639
%pre
b23639
%selinux_relabel_pre -s %{selinuxtype}
b23639
1fcf42
%post
1fcf42
# Install all modules in a single transaction
1fcf42
if [ $1 -eq 1 ]; then
b23639
   %{_sbindir}/setsebool -P -N virt_use_nfs=1 virt_sandbox_use_all_caps=1
1fcf42
fi
1fcf42
%_format MODULES %{_datadir}/selinux/packages/$x.pp.bz2
1fcf42
%{_sbindir}/semodule -n -s %{selinuxtype} -r container 2> /dev/null
1fcf42
%{_sbindir}/semodule -n -s %{selinuxtype} -d docker 2> /dev/null
1fcf42
%{_sbindir}/semodule -n -s %{selinuxtype} -d gear 2> /dev/null
b23639
%selinux_modules_install -s %{selinuxtype} $MODULES
1fcf42
. %{_sysconfdir}/selinux/config
8766a0
sed -e "\|container_file_t|h; \${x;s|container_file_t||;{g;t};a\\" -e "container_file_t" -e "}" -i /etc/selinux/${SELINUXTYPE}/contexts/customizable_types > /dev/null 2>&1
1fcf42
matchpathcon -qV %{_sharedstatedir}/containers || restorecon -R %{_sharedstatedir}/containers &> /dev/null || :
1fcf42
1fcf42
%postun
1fcf42
if [ $1 -eq 0 ]; then
b23639
%selinux_modules_uninstall -s %{selinuxtype} %{modulenames} docker
1fcf42
fi
1fcf42
b23639
%posttrans
b23639
%selinux_relabel_post -s %{selinuxtype}
b23639
1fcf42
#define license tag if not already defined
1fcf42
%{!?_licensedir:%global license %doc}
1fcf42
1fcf42
%files
1fcf42
%doc README.md
1fcf42
%{_datadir}/selinux/*
8766a0
%dir %{_datadir}/containers/selinux
8766a0
%{_datadir}/containers/selinux/contexts
1fcf42
1fcf42
%changelog
8766a0
* Fri Jun 12 2020 Jindrich Novy <jnovy@redhat.com> - 2:2.137.0-1
8766a0
- update to https://github.com/containers/container-selinux/releases/tag/v2.137.0
8766a0
- Related: #1821193
8766a0
8766a0
* Sun May 31 2020 Jindrich Novy <jnovy@redhat.com> - 2:2.135.0-1
8766a0
- update to https://github.com/containers/container-selinux/releases/tag/v2.135.0
8766a0
- Related: #1821193
8766a0
8766a0
* Fri May 29 2020 Jindrich Novy <jnovy@redhat.com> - 2:2.134.0-1
8766a0
- update to https://github.com/containers/container-selinux/releases/tag/v2.134.0
8766a0
- Related: #1821193
8766a0
8766a0
* Tue May 12 2020 Jindrich Novy <jnovy@redhat.com> - 2:2.132.0-1
8766a0
- synchronize containter-tools 8.3.0 with 8.2.1
8766a0
- Related: #1821193
8766a0
8766a0
* Tue Apr 07 2020 Jindrich Novy <jnovy@redhat.com> - 2:2.130.0-1
8766a0
- update to https://github.com/containers/container-selinux/releases/tag/v2.130.0
8766a0
- don't use macros in changelog
8766a0
- Related: #1821193
8766a0
b23639
* Wed Dec 11 2019 Jindrich Novy <jnovy@redhat.com> - 2:2.124.0-1
b23639
- update to 2.124.0
b23639
- Related: RHELPLAN-25139
b23639
b23639
* Fri Dec 06 2019 Jindrich Novy <jnovy@redhat.com> - 2:2.123.0-2
b23639
- implement spec file refactoring by Zdenek Pytela, namely:
8766a0
  Change the uninstall command in the %%postun section of the specfile
8766a0
  to use the %%selinux_modules_uninstall macro which uses priority 200.
8766a0
  Change the install command in the %%post section if the specfile
8766a0
  to use the %%selinux_modules_install macro.
8766a0
  Replace relabel commands with using the %%selinux_relabel_pre and
8766a0
  %%selinux_relabel_post macros.
b23639
  Change formatting so that the lines are vertically aligned
8766a0
  in the %%postun section.
b23639
  (https://github.com/containers/container-selinux/pull/85)
b23639
- Related: RHELPLAN-25139
b23639
b23639
* Tue Nov 26 2019 Jindrich Novy <jnovy@redhat.com> - 2:2.123.0-1
b23639
- update to 2.123.0
b23639
- Related: RHELPLAN-25139
b23639
b23639
* Mon Nov 25 2019 Jindrich Novy <jnovy@redhat.com> - 2:2.122.0-1
b23639
- update to 2.122.0
b23639
- Related: RHELPLAN-25139
b23639
b23639
* Thu Nov 21 2019 Jindrich Novy <jnovy@redhat.com> - 2:2.119.0-3.gita233788
b23639
- update to master container-selinux - bug 1769469
b23639
- Related: RHELPLAN-25139
b23639
b23639
* Tue Nov 19 2019 Jindrich Novy <jnovy@redhat.com> - 2:2.119.0-2
b23639
- fix post scriptlet - fail if semodule fails - bug 1729272
b23639
- Related: RHELPLAN-25139
b23639
b23639
* Fri Nov 08 2019 Jindrich Novy <jnovy@redhat.com> - 2:2.119.0-1
b23639
- update to 2.119.0
b23639
- Related: RHELPLAN-25139
b23639
b23639
* Thu Oct 17 2019 Jindrich Novy <jnovy@redhat.com> - 2:2.116-1
b23639
- update to 2.116
b23639
  Resolves: #1748519
b23639
b23639
* Tue Aug 13 2019 Jindrich Novy <jnovy@redhat.com> - 2:2.107-2
b23639
- Use at least selinux policy 3.14.3-9.el8,
b23639
  Resolves: #1728700
b23639
1fcf42
* Fri Jun 14 2019 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.107-1
1fcf42
- Resolves: #1720654 - rebase to v2.107
1fcf42
1fcf42
* Mon Mar 11 2019 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.89-1.git2521d0d
1fcf42
- bump to v2.89
1fcf42
1fcf42
* Tue Nov 13 2018 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.75-1.git99e2cfd
1fcf42
- bump to v2.75
1fcf42
- built commit 99e2cfd
1fcf42
1fcf42
* Mon Oct 22 2018 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.74-1
1fcf42
- Resolves: #1641655 - bump to v2.74
1fcf42
- built commit a62c2db
1fcf42
1fcf42
* Tue Sep 18 2018 Frantisek Kluknavsky <fkluknav@redhat.com> - 2:2.73-3
1fcf42
- tweak macro for fedora - applies to rhel8 as well
1fcf42
1fcf42
* Mon Sep 17 2018 Frantisek Kluknavsky <fkluknav@redhat.com> - 2:2.73-2
1fcf42
- moved changelog entries:
1fcf42
- Define spc_t as a container_domain, so that container_runtime will transition
1fcf42
to spc_t even when setup with nosuid.
1fcf42
- Allow container_runtimes to setattr on callers fifo_files
1fcf42
- Fix restorecon to not error on missing directory
1fcf42
1fcf42
* Thu Sep 6 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.69-3
1fcf42
- Make sure we pull in the latest selinux-policy
1fcf42
1fcf42
* Wed Jul 25 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.69-2
1fcf42
- Add map support to container-selinux for RHEL 7.5
1fcf42
- Dontudit attempts to write to kernel_sysctl_t
1fcf42
1fcf42
* Mon Jul 16 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.68-1
1fcf42
- Add label for /var/lib/origin
1fcf42
- Add customizable_file_t to customizable_types
1fcf42
1fcf42
* Sun Jul 15 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.67-1
1fcf42
- Add policy for container_logreader_t
1fcf42
1fcf42
* Thu Jun 14 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.66-1
1fcf42
- Allow dnsmasq to dbus chat with spc_t
1fcf42
1fcf42
* Sun Jun 3 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.64-1
1fcf42
- Allow containers to create all socket classes
1fcf42
1fcf42
* Thu May 24 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.62-1
1fcf42
- Label overlay directories under /var/lib/containers/ correctly
1fcf42
1fcf42
* Mon May 21 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.61-1
1fcf42
- Allow spc_t to load kernel modules from inside of container 
1fcf42
1fcf42
* Mon May 21 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.60-1
1fcf42
- Allow containers to list cgroup directories
1fcf42
- Transition for unconfined_service_t to container_runtime_t when executing container_runtime_exec_t.
1fcf42
1fcf42
* Mon May 21 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.58-2
1fcf42
- Run restorecon /usr/bin/podman in postinstall
1fcf42
1fcf42
* Fri May 18 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.58-1
1fcf42
- Add labels to allow podman to be run from a systemd unit file
1fcf42
1fcf42
* Mon May 7 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.57-1
1fcf42
- Set the version of SELinux policy required to the latest to fix build issues.
1fcf42
1fcf42
* Wed Apr 11 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.56-1
1fcf42
- Allow container_runtime_t to transition to spc_t over unlabeled files
1fcf42
1fcf42
* Mon Mar 26 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.55-1
1fcf42
    Allow iptables to read container state
1fcf42
    Dontaudit attempts from containers to write to /proc/self
1fcf42
    Allow spc_t to change attributes on container_runtime_t fifo files
1fcf42
1fcf42
* Thu Mar 8 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.52-1
1fcf42
- Add better support for writing custom selinux policy for customer container domains.
1fcf42
1fcf42
* Thu Mar 8 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.51-1
1fcf42
- Allow shell_exec_t as a container_runtime_t entrypoint
1fcf42
1fcf42
* Wed Mar 7 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.50-1
1fcf42
- Allow bin_t as a container_runtime_t entrypoint
1fcf42
1fcf42
* Fri Mar 2 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.49-1
1fcf42
- Add support for MLS running container runtimes
1fcf42
- Add missing allow rules for running systemd in a container
1fcf42
1fcf42
* Wed Feb 21 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.48-1
1fcf42
- Update policy to match master branch
1fcf42
- Remove typebounds and replace with nnp_transition and nosuid_transition calls
1fcf42
1fcf42
* Tue Jan 9 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.41-1
1fcf42
- Add support to nnp_transition for container domains
1fcf42
- Eliminates need for typebounds.
1fcf42
1fcf42
* Tue Jan 9 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.40-1
1fcf42
- Allow container_runtime_t to use user ttys
1fcf42
- Fixes bounds check for container_t
1fcf42
1fcf42
* Mon Jan 8 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.39-1
1fcf42
- Allow container runtimes to use interited terminals.  This helps
1fcf42
satisfy the bounds check of container_t versus container_runtime_t.
1fcf42
1fcf42
* Sat Jan 6 2018 Dan Walsh <dwalsh@fedoraproject.org> - 2.38-1
1fcf42
- Allow container runtimes to mmap container_file_t devices
1fcf42
- Add labeling for rhel push plugin
1fcf42
1fcf42
* Tue Dec 12 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.37-1
1fcf42
- Allow containers to use inherited ttys
1fcf42
- Allow ostree to handle labels under /var/lib/containers/ostree
1fcf42
1fcf42
* Mon Nov 27 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.36-1
1fcf42
- Allow containers to relabelto/from all file types to container_file_t
1fcf42
1fcf42
* Mon Nov 27 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.35-1
1fcf42
- Allow container to map chr_files labeled container_file_t
1fcf42
1fcf42
* Wed Nov 22 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.34-1
1fcf42
- Dontaudit container processes getattr on kernel file systems
1fcf42
1fcf42
* Sun Nov 19 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.33-1
1fcf42
- Allow containers to read /etc/resolv.conf and /etc/hosts if volume
1fcf42
- mounted into container.
1fcf42
1fcf42
* Wed Nov 8 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.32-1
1fcf42
- Make sure users creating content in /var/lib with right labels
1fcf42
1fcf42
* Thu Oct 26 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.31-1
1fcf42
- Allow the container runtime to dbus chat with dnsmasq
1fcf42
- add dontaudit rules for container trying to write to /proc
1fcf42
1fcf42
* Tue Oct 10 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.29-1
1fcf42
- Add support for lxcd
1fcf42
- Add support for labeling of tmpfs storage created within a container.
1fcf42
1fcf42
* Mon Oct 9 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.28-1
1fcf42
- Allow a container to umount a container_file_t filesystem
1fcf42
1fcf42
* Fri Sep 22 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.27-1
1fcf42
-  Allow container runtimes to work with the netfilter sockets
1fcf42
-  Allow container_file_t to be an entrypoint for VM's
1fcf42
-  Allow spc_t domains to transition to svirt_t
1fcf42
1fcf42
* Fri Sep 22 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.24-1
1fcf42
-     Make sure container_runtime_t has all access of container_t
1fcf42
1fcf42
* Thu Sep 7 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.23-1
1fcf42
- Allow container runtimes to create sockets in tmp dirs
1fcf42
1fcf42
* Tue Sep 5 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.22-1
1fcf42
- Add additonal support for crio labeling.
1fcf42
1fcf42
* Mon Aug 14 2017 Troy Dawson <tdawson@redhat.com> - 2.21-3
1fcf42
- Fixup spec file conditionals
1fcf42
1fcf42
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2:2.21-2
1fcf42
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
1fcf42
1fcf42
* Thu Jul 6 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.21-1
1fcf42
- Allow containers to execmod on container_share_t files.
1fcf42
1fcf42
* Thu Jul 6 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.20-2
1fcf42
- Relabel runc and crio executables
1fcf42
1fcf42
* Fri Jun 30 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.20-1
1fcf42
- Allow container processes to getsession
1fcf42
1fcf42
* Wed Jun 14 2017 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.19-2.1
1fcf42
- update release tag to isolate from 7.3
1fcf42
1fcf42
* Wed Jun 14 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:2.19-1
1fcf42
- Fix mcs transition problem on stdin/stdout/stderr
1fcf42
- Add labels for CRI-O
1fcf42
- Allow containers to use tunnel sockets
1fcf42
1fcf42
* Tue Jun 06 2017 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.15-1.1
1fcf42
- Resolves: #1451289
1fcf42
- rebase to v2.15
1fcf42
- built @origin/RHEL-1.12 commit 583ca40
1fcf42
1fcf42
* Mon Mar 20 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:2.10-2.1
1fcf42
- Make sure we have a late enough version of policycoreutils
1fcf42
1fcf42
* Mon Mar 6 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:2.10-1
1fcf42
- Update to the latest container-selinux patch from upstream
1fcf42
- Label files under /usr/libexec/lxc as container_runtime_exec_t
1fcf42
- Give container_t access to XFRM sockets
1fcf42
- Allow spc_t to dbus chat with init system
1fcf42
- Allow containers to read cgroup configuration mounted into a container
1fcf42
1fcf42
* Tue Feb 21 2017 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.9-4
1fcf42
- Resolves: #1425574
1fcf42
- built commit 79a6d70
1fcf42
1fcf42
* Mon Feb 20 2017 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.9-3
1fcf42
- Resolves: #1420591
1fcf42
- built @origin/RHEL-1.12 commit 8f876c4
1fcf42
1fcf42
* Mon Feb 13 2017 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.9-2
1fcf42
- built @origin/RHEL-1.12 commit 33cb78b
1fcf42
1fcf42
* Fri Feb 10 2017 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.8-2
1fcf42
-
1fcf42
1fcf42
* Tue Feb 07 2017 Lokesh Mandvekar <lsm5@redhat.com> - 2:2.7-1
1fcf42
- built origin/RHEL-1.12 commit 21dd37b
1fcf42
1fcf42
* Fri Jan 20 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.4-2
1fcf42
- correct version-release in changelog entries
1fcf42
1fcf42
* Thu Jan 19 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:2.4-1
1fcf42
- Add typebounds statement for container_t from container_runtime_t
1fcf42
- We should only label runc not runc*
1fcf42
1fcf42
* Tue Jan 17 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:2.3-1
1fcf42
- Fix labeling on /usr/bin/runc.*
1fcf42
- Add sandbox_net_domain access to container.te
1fcf42
- Remove containers ability to look at /etc content
1fcf42
1fcf42
* Wed Jan 11 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.2-4
1fcf42
- use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7
1fcf42
1fcf42
* Tue Jan 10 2017 Jonathan Lebon <jlebon@redhat.com> - 2:2.2-3
1fcf42
- properly disable docker module in %%post
1fcf42
1fcf42
* Sat Jan 07 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.2-2
1fcf42
- depend on selinux-policy-targeted
1fcf42
- relabel docker-latest* files as well
1fcf42
1fcf42
* Fri Jan 06 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.2-1
1fcf42
- bump to v2.2
1fcf42
- additional labeling for ocid
1fcf42
1fcf42
* Fri Jan 06 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.0-2
1fcf42
- install policy at level 200
1fcf42
- From: Dan Walsh <dwalsh@redhat.com>
1fcf42
1fcf42
* Fri Jan 06 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.0-1
1fcf42
- Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a
1fcf42
standalone package)
1fcf42
- include projectatomic/RHEL-1.12 branch commit for building on centos/rhel
1fcf42
1fcf42
* Mon Dec 19 2016 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:1.12.4-29
1fcf42
- new package (separated from docker)