diff --git a/selinux-policy.spec b/selinux-policy.spec index 9a92715..7cd104c 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,6 +1,6 @@ # github repo with selinux-policy sources %global giturl https://github.com/fedora-selinux/selinux-policy -%global commit 0ed7e9a797ca5be979a5b0b3e626efd775004851 +%global commit 1f7f05d908f1c93939d7eed9f24a826b0f3ae723 %global shortcommit %(c=%{commit}; echo ${c:0:7}) %define distro redhat @@ -23,7 +23,7 @@ %define CHECKPOLICYVER 3.2 Summary: SELinux policy configuration Name: selinux-policy -Version: 40.19 +Version: 40.20 Release: 1%{?dist} License: GPL-2.0-or-later Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz @@ -860,6 +860,12 @@ exit 0 %endif %changelog +* Sun May 19 2024 Zdenek Pytela - 40.20-1 +- Allow journald read systemd config files and directories +- Allow systemd_domain read systemd_conf_t dirs +- Fix bad Python regexp escapes +- Allow fido services connect to postgres database + * Fri May 17 2024 Zdenek Pytela - 40.19-1 - Allow postfix smtpd map aliases file - Ensure dbus communication is allowed bidirectionally diff --git a/sources b/sources index 469019b..d496d97 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-0ed7e9a.tar.gz) = d31dab5b9845cad0ec586bf78d00a655b0165ce24af7839e6af43140937b9a890ccb5c7f1219883560929556f700404114d1ccaa9cc921e8eb7615aa8e0e6406 +SHA512 (selinux-policy-1f7f05d.tar.gz) = 49bd67c54abb676ffe903cd2c118e3448b41446ff222a56c688a25ebcd01ebc9c5edefc23cdfcbc9fa53e8a75b3aa626c8269a94dab9de0265a1b5b0cf3e69c3 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 -SHA512 (container-selinux.tgz) = bd286d53acd1e4c9ad376ce9a816a8ac7ae54cf7576db52443d1c30ea807ddfdd7b70c588f0a9d6160099a0ae9083b6377ae48d887625c36044388328126133f +SHA512 (container-selinux.tgz) = 975a2e0d99b0a54f4570169b4e267ea2fcb5b2483d9f584aee31d0e78332a195d1419e8504fc1b198b09dce58eac910a1c0857fafff2c53af9851b79487d5376