diff --git a/.gitignore b/.gitignore index c3b54ba..1ec9e6a 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,3 @@ SOURCES/container-selinux.tgz -SOURCES/selinux-policy-ab10edf.tar.gz -SOURCES/selinux-policy-contrib-0dcd5a2.tar.gz +SOURCES/selinux-policy-31a9744.tar.gz +SOURCES/selinux-policy-contrib-f659db9.tar.gz diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata index 71d33ea..6cbe2d1 100644 --- a/.selinux-policy.metadata +++ b/.selinux-policy.metadata @@ -1,3 +1,3 @@ -f075f9101786139a39ae35ff0c3d2646fb92a9b8 SOURCES/container-selinux.tgz -63370b22c1c8e54e56b2636c09d124754cb0f2d4 SOURCES/selinux-policy-ab10edf.tar.gz -7c1a9475a5bf23fffc4d4bf10988947b60cd507e SOURCES/selinux-policy-contrib-0dcd5a2.tar.gz +7e8924346f497afc19e9e727b431673b7a9d68a9 SOURCES/container-selinux.tgz +029927e86dab9c8acfb0f9ee90b7727537c7657b SOURCES/selinux-policy-31a9744.tar.gz +138acf482a7c4c350809c7b31c79294281be49db SOURCES/selinux-policy-contrib-f659db9.tar.gz diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec index bc0ecce..9e69a17 100644 --- a/SPECS/selinux-policy.spec +++ b/SPECS/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 ab10edf9d09f671f038fbc4446ddc7d8ceb1a266 +%global commit0 31a9744d4abf9817c82d29dd791b0439bd632852 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 0dcd5a2a17170740399ea0c6b2c1be5a21c0f701 +%global commit1 f659db9cce300873aabec1a11fcc39d69e043267 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 95%{?dist}.1 +Release: 95%{?dist}.4 License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -717,6 +717,80 @@ exit 0 %endif %changelog +* Mon Aug 22 2022 Zdenek Pytela - 3.14.3-95.4 +- rebuild +Resolves: rhbz#2103606 + +* Thu Aug 04 2022 Zdenek Pytela - 3.14.3-95.3 +- Allow insights-client rpm named file transitions +Resolves: rhbz#2103606 +- Add /var/tmp/insights-archive to insights_client_filetrans_named_content +Resolves: rhbz#2103606 +- Use insights_client_filetrans_named_content +Resolves: rhbz#2103606 +- Make default file context match with named transitions +Resolves: rhbz#2103606 +- Allow rhsmcertd to read insights config files +Resolves: rhbz#2103606 +- Label /etc/insights-client/machine-id +Resolves: rhbz#2103606 + +* Tue Jul 12 2022 Zdenek Pytela - 3.14.3-95.2 +- Add the init_status_config_transient_files() interface +Resolves: rhbz#2103606 +- Allow transition to insights_client named content +Resolves: rhbz#2103606 +- Allow init_t to rw insights_client unnamed pipe +Resolves: rhbz#2103606 +- Update kernel_read_unix_sysctls() for sysctl_net_unix_t handling +Resolves: rhbz#2103606 +- Add the gpg_manage_admin_home_content() interface +Resolves: rhbz#2103606 +- Update insights_client_filetrans_named_content() +Resolves: rhbz#2103606 +- Add the insights_client_filetrans_named_content() interface +Resolves: rhbz#2103606 +- Update policy for insights-client to run additional commands 3 +Resolves: rhbz#2103606 +- Allow insights-client get status of the systemd transient scripts +Resolves: rhbz#2103606 +- Allow insights-client execute its private memfd: objects +Resolves: rhbz#2103606 +- Update policy for insights-client to run additional commands 2 +Resolves: rhbz#2103606 +- Do not call systemd_userdbd_stream_connect() for insights-client +Resolves: rhbz#2103606 +- Use insights_client_tmp_t instead of insights_client_var_tmp_t +Resolves: rhbz#2103606 +- Change space indentation to tab in insights-client +Resolves: rhbz#2103606 +- Use socket permissions sets in insights-client +Resolves: rhbz#2103606 +- Update policy for insights-client to run additional commands +Resolves: rhbz#2103606 +- Change rpm_setattr_db_files() to use a pattern +Resolves: rhbz#2103606 +- Add rpm setattr db files macro +Resolves: rhbz#2103606 +- Fix insights client +Resolves: rhbz#2103606 +- Do not let system_cronjob_t create redhat-access-insights.log with var_log_t +Resolves: rhbz#2103606 +- Allow insights-client manage gpg admin home content +Resolves: rhbz#2103606 +- Label /var/cache/insights with insights_client_cache_t +Resolves: rhbz#2103606 +- Allow insights-client search gconf homedir +Resolves: rhbz#2103606 +- Allow insights-client create and use unix_dgram_socket +Resolves: rhbz#2103606 +- Allow insights-client create_socket_perms for tcp/udp sockets +Resolves: rhbz#2103606 +- Allow insights-client read rhnsd config files +Resolves: rhbz#2103606 +- Allow insights-client search rhnsd configuration directory +Resolves: rhbz#2103606 + * Thu Jun 09 2022 Zdenek Pytela - 3.14.3-95.1 - Label more vdsm utils with virtd_exec_t Resolves: rhbz#2095184