- Add context function to python to split context into 4 parts
This commit is contained in:
parent
751b5d4cbd
commit
ad1a6889cc
@ -1,555 +1,160 @@
|
|||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/avc_add_callback.3 libselinux-1.33.4/man/man3/avc_add_callback.3
|
Binary files nsalibselinux/src/selinux.pyc and libselinux-1.34.0/src/selinux.pyc differ
|
||||||
--- nsalibselinux/man/man3/avc_add_callback.3 2006-11-16 17:15:30.000000000 -0500
|
diff --exclude-from=exclude -N -u -r nsalibselinux/src/selinuxswig.i libselinux-1.34.0/src/selinuxswig.i
|
||||||
+++ libselinux-1.33.4/man/man3/avc_add_callback.3 2007-01-15 16:21:55.000000000 -0500
|
--- nsalibselinux/src/selinuxswig.i 2006-11-16 17:15:25.000000000 -0500
|
||||||
@@ -3,7 +3,7 @@
|
+++ libselinux-1.34.0/src/selinuxswig.i 2007-01-24 12:16:39.000000000 -0500
|
||||||
.\" Author: Eamon Walsh (ewalsh@epoch.ncsc.mil) 2004
|
@@ -25,7 +25,7 @@
|
||||||
.TH "avc_add_callback" "3" "9 June 2004" "" "SE Linux API documentation"
|
%apply int *OUTPUT { int * };
|
||||||
.SH "NAME"
|
%apply int *OUTPUT { size_t * };
|
||||||
-avc_add_callback \- additional event notification for userspace object managers.
|
|
||||||
+avc_add_callback \- additional event notification for SELinux userspace object managers.
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.br
|
|
||||||
@@ -181,3 +181,4 @@
|
|
||||||
.BR avc_context_to_sid (3),
|
|
||||||
.BR avc_cache_stats (3),
|
|
||||||
.BR security_compute_av (3)
|
|
||||||
+.BR selinux (8)
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/avc_cache_stats.3 libselinux-1.33.4/man/man3/avc_cache_stats.3
|
|
||||||
--- nsalibselinux/man/man3/avc_cache_stats.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/avc_cache_stats.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -3,7 +3,7 @@
|
|
||||||
.\" Author: Eamon Walsh (ewalsh@epoch.ncsc.mil) 2004
|
|
||||||
.TH "avc_cache_stats" "3" "27 May 2004" "" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-avc_cache_stats, avc_av_stats, avc_sid_stats \- obtain userspace AVC statistics.
|
|
||||||
+avc_cache_stats, avc_av_stats, avc_sid_stats \- obtain userspace SELinux AVC statistics.
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.br
|
|
||||||
@@ -96,3 +96,4 @@
|
|
||||||
.BR avc_has_perm (3),
|
|
||||||
.BR avc_context_to_sid (3),
|
|
||||||
.BR avc_add_callback (3)
|
|
||||||
+.BR selinux (8)
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/avc_context_to_sid.3 libselinux-1.33.4/man/man3/avc_context_to_sid.3
|
|
||||||
--- nsalibselinux/man/man3/avc_context_to_sid.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/avc_context_to_sid.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -3,7 +3,7 @@
|
|
||||||
.\" Author: Eamon Walsh (ewalsh@epoch.ncsc.mil) 2004
|
|
||||||
.TH "avc_context_to_sid" "3" "27 May 2004" "" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-avc_context_to_sid, avc_sid_to_context, sidput, sidget \- obtain and manipulate security ID's.
|
|
||||||
+avc_context_to_sid, avc_sid_to_context, sidput, sidget \- obtain and manipulate SELinux security ID's.
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.br
|
|
||||||
@@ -88,3 +88,4 @@
|
|
||||||
.BR avc_add_callback (3),
|
|
||||||
.BR getcon (3),
|
|
||||||
.BR freecon (3)
|
|
||||||
+.BR selinux (8)
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/avc_has_perm.3 libselinux-1.33.4/man/man3/avc_has_perm.3
|
|
||||||
--- nsalibselinux/man/man3/avc_has_perm.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/avc_has_perm.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -152,3 +152,4 @@
|
|
||||||
.BR avc_cache_stats (3),
|
|
||||||
.BR avc_add_callback (3),
|
|
||||||
.BR security_compute_av (3)
|
|
||||||
+.BR selinux(8)
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/avc_init.3 libselinux-1.33.4/man/man3/avc_init.3
|
|
||||||
--- nsalibselinux/man/man3/avc_init.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/avc_init.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -3,7 +3,7 @@
|
|
||||||
.\" Author: Eamon Walsh (ewalsh@epoch.ncsc.mil) 2004
|
|
||||||
.TH "avc_init" "3" "27 May 2004" "" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-avc_init, avc_destroy, avc_reset, avc_cleanup \- userspace AVC setup and teardown.
|
|
||||||
+avc_init, avc_destroy, avc_reset, avc_cleanup \- userspace SELinux AVC setup and teardown.
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.br
|
|
||||||
@@ -209,3 +209,5 @@
|
|
||||||
.BR avc_cache_stats (3),
|
|
||||||
.BR avc_add_callback (3),
|
|
||||||
.BR security_compute_av (3)
|
|
||||||
+.BR selinux (8)
|
|
||||||
+
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/context_new.3 libselinux-1.33.4/man/man3/context_new.3
|
|
||||||
--- nsalibselinux/man/man3/context_new.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/context_new.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -56,3 +56,6 @@
|
|
||||||
On success, zero is returned. On failure, -1 is returned and errno is
|
|
||||||
set appropriately.
|
|
||||||
|
|
||||||
+.SH "SEE ALSO"
|
-%typemap(in, numinputs=0) security_context_t *(security_context_t temp) {
|
||||||
+.BR selinux "(8)"
|
+%typemap(in, numinputs=0) security_context_t *(security_context_t temp=NULL) {
|
||||||
+
|
$1 = &temp;
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/freecon.3 libselinux-1.33.4/man/man3/freecon.3
|
}
|
||||||
--- nsalibselinux/man/man3/freecon.3 2006-11-16 17:15:30.000000000 -0500
|
%typemap(argout) security_context_t * (char *temp) {
|
||||||
+++ libselinux-1.33.4/man/man3/freecon.3 2007-01-15 16:21:55.000000000 -0500
|
diff --exclude-from=exclude -N -u -r nsalibselinux/src/selinuxswig_wrap.c libselinux-1.34.0/src/selinuxswig_wrap.c
|
||||||
@@ -1,6 +1,6 @@
|
--- nsalibselinux/src/selinuxswig_wrap.c 2006-11-16 17:15:25.000000000 -0500
|
||||||
.TH "freecon" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
+++ libselinux-1.34.0/src/selinuxswig_wrap.c 2007-01-24 12:16:58.000000000 -0500
|
||||||
.SH "NAME"
|
@@ -2831,7 +2831,7 @@
|
||||||
-freecon, freeconary \- free memory associated with SE Linux security contexts.
|
PyObject *resultobj = 0;
|
||||||
+freecon, freeconary \- free memory associated with SELinux security contexts.
|
security_context_t *arg1 = (security_context_t *) 0 ;
|
||||||
.SH "SYNOPSIS"
|
int result;
|
||||||
.B #include <selinux/selinux.h>
|
- security_context_t temp1 ;
|
||||||
.sp
|
+ security_context_t temp1 = NULL ;
|
||||||
@@ -14,3 +14,7 @@
|
char *temp10 ;
|
||||||
|
|
||||||
.B freeconary
|
{
|
||||||
frees the memory allocated for a context array.
|
@@ -2878,7 +2878,7 @@
|
||||||
+
|
int result;
|
||||||
+.SH "SEE ALSO"
|
int val1 ;
|
||||||
+.BR selinux "(8)"
|
int ecode1 = 0 ;
|
||||||
+
|
- security_context_t temp2 ;
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/getcon.3 libselinux-1.33.4/man/man3/getcon.3
|
+ security_context_t temp2 = NULL ;
|
||||||
--- nsalibselinux/man/man3/getcon.3 2006-11-16 17:15:30.000000000 -0500
|
char *temp20 ;
|
||||||
+++ libselinux-1.33.4/man/man3/getcon.3 2007-01-15 16:21:55.000000000 -0500
|
PyObject * obj0 = 0 ;
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "getcon" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-getcon, getprevcon, getpidcon \- get SE Linux security context of a process.
|
|
||||||
+getcon, getprevcon, getpidcon \- get SELinux security context of a process.
|
|
||||||
.br
|
|
||||||
getpeercon - get security context of a peer socket.
|
|
||||||
.br
|
|
||||||
@@ -59,4 +59,4 @@
|
|
||||||
On error -1 is returned. On success 0 is returned.
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
@@ -2910,7 +2910,7 @@
|
||||||
-.BR freecon "(3), " setexeccon "(3)"
|
PyObject *resultobj = 0;
|
||||||
+.BR selinux "(8), " freecon "(3), " setexeccon "(3)"
|
security_context_t *arg1 = (security_context_t *) 0 ;
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/getexeccon.3 libselinux-1.33.4/man/man3/getexeccon.3
|
int result;
|
||||||
--- nsalibselinux/man/man3/getexeccon.3 2006-11-16 17:15:30.000000000 -0500
|
- security_context_t temp1 ;
|
||||||
+++ libselinux-1.33.4/man/man3/getexeccon.3 2007-01-15 16:21:55.000000000 -0500
|
+ security_context_t temp1 = NULL ;
|
||||||
@@ -1,6 +1,6 @@
|
char *temp10 ;
|
||||||
.TH "getexeccon" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-getexeccon, setexeccon \- get or set the SE Linux security context used for executing a new process.
|
|
||||||
+getexeccon, setexeccon \- get or set the SELinux security context used for executing a new process.
|
|
||||||
.br
|
|
||||||
rpm_execcon \- run a helper for rpm in an appropriate security context
|
|
||||||
|
|
||||||
@@ -55,6 +55,6 @@
|
{
|
||||||
rpm_execcon only returns upon errors, as it calls execve(2).
|
@@ -2936,7 +2936,7 @@
|
||||||
|
PyObject *resultobj = 0;
|
||||||
|
security_context_t *arg1 = (security_context_t *) 0 ;
|
||||||
|
int result;
|
||||||
|
- security_context_t temp1 ;
|
||||||
|
+ security_context_t temp1 = NULL ;
|
||||||
|
char *temp10 ;
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
{
|
||||||
-.BR freecon "(3), " getcon "(3)"
|
@@ -2980,7 +2980,7 @@
|
||||||
+.BR selinux "(8), " freecon "(3), " getcon "(3)"
|
PyObject *resultobj = 0;
|
||||||
|
security_context_t *arg1 = (security_context_t *) 0 ;
|
||||||
|
int result;
|
||||||
|
- security_context_t temp1 ;
|
||||||
|
+ security_context_t temp1 = NULL ;
|
||||||
|
char *temp10 ;
|
||||||
|
|
||||||
|
{
|
||||||
|
@@ -3024,7 +3024,7 @@
|
||||||
|
PyObject *resultobj = 0;
|
||||||
|
security_context_t *arg1 = (security_context_t *) 0 ;
|
||||||
|
int result;
|
||||||
|
- security_context_t temp1 ;
|
||||||
|
+ security_context_t temp1 = NULL ;
|
||||||
|
char *temp10 ;
|
||||||
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/getfilecon.3 libselinux-1.33.4/man/man3/getfilecon.3
|
{
|
||||||
--- nsalibselinux/man/man3/getfilecon.3 2006-11-16 17:15:30.000000000 -0500
|
@@ -3068,7 +3068,7 @@
|
||||||
+++ libselinux-1.33.4/man/man3/getfilecon.3 2007-01-15 16:21:55.000000000 -0500
|
PyObject *resultobj = 0;
|
||||||
@@ -1,6 +1,6 @@
|
security_context_t *arg1 = (security_context_t *) 0 ;
|
||||||
.TH "getfilecon" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
int result;
|
||||||
.SH "NAME"
|
- security_context_t temp1 ;
|
||||||
-getfilecon, fgetfilecon, lgetfilecon \- get SE Linux security context of a file
|
+ security_context_t temp1 = NULL ;
|
||||||
+getfilecon, fgetfilecon, lgetfilecon \- get SELinux security context of a file
|
char *temp10 ;
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.sp
|
|
||||||
@@ -40,4 +40,4 @@
|
|
||||||
here.
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
{
|
||||||
-.BR freecon "(3), " setfilecon "(3), " setfscreatecon "(3)"
|
@@ -3116,7 +3116,7 @@
|
||||||
+.BR selinux "(8), " freecon "(3), " setfilecon "(3), " setfscreatecon "(3)"
|
int res1 ;
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/getfscreatecon.3 libselinux-1.33.4/man/man3/getfscreatecon.3
|
char *buf1 = 0 ;
|
||||||
--- nsalibselinux/man/man3/getfscreatecon.3 2006-11-16 17:15:30.000000000 -0500
|
int alloc1 = 0 ;
|
||||||
+++ libselinux-1.33.4/man/man3/getfscreatecon.3 2007-01-15 16:21:55.000000000 -0500
|
- security_context_t temp2 ;
|
||||||
@@ -1,6 +1,6 @@
|
+ security_context_t temp2 = NULL ;
|
||||||
.TH "getfscreatecon" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
char *temp20 ;
|
||||||
.SH "NAME"
|
PyObject * obj0 = 0 ;
|
||||||
-getfscreatecon, setfscreatecon \- get or set the SE Linux security context used for creating a new file system object.
|
|
||||||
+getfscreatecon, setfscreatecon \- get or set the SELinux security context used for creating a new file system object.
|
|
||||||
|
|
||||||
.SH "SYNOPSIS"
|
@@ -3154,7 +3154,7 @@
|
||||||
.B #include <selinux/selinux.h>
|
int res1 ;
|
||||||
@@ -35,4 +35,4 @@
|
char *buf1 = 0 ;
|
||||||
On success 0 is returned.
|
int alloc1 = 0 ;
|
||||||
|
- security_context_t temp2 ;
|
||||||
|
+ security_context_t temp2 = NULL ;
|
||||||
|
char *temp20 ;
|
||||||
|
PyObject * obj0 = 0 ;
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
@@ -3191,7 +3191,7 @@
|
||||||
-.BR freecon "(3), " getcon "(3), " getexeccon "(3)"
|
int result;
|
||||||
+.BR selinux "(8), " freecon "(3), " getcon "(3), " getexeccon "(3)"
|
int val1 ;
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/get_ordered_context_list.3 libselinux-1.33.4/man/man3/get_ordered_context_list.3
|
int ecode1 = 0 ;
|
||||||
--- nsalibselinux/man/man3/get_ordered_context_list.3 2006-11-16 17:15:30.000000000 -0500
|
- security_context_t temp2 ;
|
||||||
+++ libselinux-1.33.4/man/man3/get_ordered_context_list.3 2007-01-15 16:21:55.000000000 -0500
|
+ security_context_t temp2 = NULL ;
|
||||||
@@ -1,6 +1,6 @@
|
char *temp20 ;
|
||||||
.TH "get_ordered_context_list" "3" "1 January 2004" "russell@coker.com.au" "SE Linux"
|
PyObject * obj0 = 0 ;
|
||||||
.SH "NAME"
|
|
||||||
-get_ordered_context_list, get_ordered_context_list_with_level, get_default_context, get_default_context_with_level, get_default_context_with_role, get_default_context_with_rolelevel, query_user_context, manual_user_enter_context, get_default_role \- determine context(s) for user sessions
|
|
||||||
+get_ordered_context_list, get_ordered_context_list_with_level, get_default_context, get_default_context_with_level, get_default_context_with_role, get_default_context_with_rolelevel, query_user_context, manual_user_enter_context, get_default_role \- determine SELinux context(s) for user sessions
|
|
||||||
|
|
||||||
.SH "SYNOPSIS"
|
@@ -3313,7 +3313,7 @@
|
||||||
.B #include <selinux/selinux.h>
|
int result;
|
||||||
@@ -77,4 +77,4 @@
|
int val1 ;
|
||||||
The other functions return 0 for success or -1 for errors.
|
int ecode1 = 0 ;
|
||||||
|
- security_context_t temp2 ;
|
||||||
|
+ security_context_t temp2 = NULL ;
|
||||||
|
char *temp20 ;
|
||||||
|
PyObject * obj0 = 0 ;
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
@@ -3474,7 +3474,7 @@
|
||||||
-.BR freeconary "(3), " freecon "(3), " security_compute_av "(3)", getseuserbyname"(3)"
|
security_context_t arg1 ;
|
||||||
+.BR selinux "(8), " freeconary "(3), " freecon "(3), " security_compute_av "(3)", getseuserbyname"(3)"
|
security_context_t *arg2 = (security_context_t *) 0 ;
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/getseuserbyname.3 libselinux-1.33.4/man/man3/getseuserbyname.3
|
int result;
|
||||||
--- nsalibselinux/man/man3/getseuserbyname.3 2006-11-16 17:15:30.000000000 -0500
|
- security_context_t temp2 ;
|
||||||
+++ libselinux-1.33.4/man/man3/getseuserbyname.3 2007-01-15 16:21:55.000000000 -0500
|
+ security_context_t temp2 = NULL ;
|
||||||
@@ -23,3 +23,6 @@
|
char *temp20 ;
|
||||||
The errors documented for the stat(2) system call are also applicable
|
PyObject * obj0 = 0 ;
|
||||||
here.
|
|
||||||
|
|
||||||
+.SH "SEE ALSO"
|
@@ -3734,7 +3734,7 @@
|
||||||
+.BR selinux "(8)"
|
int alloc1 = 0 ;
|
||||||
+
|
unsigned int val2 ;
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/is_context_customizable.3 libselinux-1.33.4/man/man3/is_context_customizable.3
|
int ecode2 = 0 ;
|
||||||
--- nsalibselinux/man/man3/is_context_customizable.3 2006-11-16 17:15:30.000000000 -0500
|
- security_context_t temp3 ;
|
||||||
+++ libselinux-1.33.4/man/man3/is_context_customizable.3 2007-01-15 16:21:55.000000000 -0500
|
+ security_context_t temp3 = NULL ;
|
||||||
@@ -1,6 +1,6 @@
|
char *temp30 ;
|
||||||
.TH "is_context_customizable" "3" "10 January 2005" "dwalsh@redhat.com" "SELinux API documentation"
|
PyObject * obj0 = 0 ;
|
||||||
.SH "NAME"
|
PyObject * obj1 = 0 ;
|
||||||
-is_context_customizable \- check whether context type is customizable by the administrator.
|
@@ -3778,7 +3778,7 @@
|
||||||
+is_context_customizable \- check whether SELinux context type is customizable by the administrator.
|
int res1 ;
|
||||||
.SH "SYNOPSIS"
|
char *buf1 = 0 ;
|
||||||
.B #include <selinux/selinux.h>
|
int alloc1 = 0 ;
|
||||||
.sp
|
- security_context_t temp2 ;
|
||||||
@@ -20,3 +20,6 @@
|
+ security_context_t temp2 = NULL ;
|
||||||
.SH "FILE"
|
char *temp20 ;
|
||||||
/etc/selinux/SELINUXTYPE/context/customizable_types
|
PyObject * obj0 = 0 ;
|
||||||
|
|
||||||
+.SH "SEE ALSO"
|
@@ -4212,7 +4212,7 @@
|
||||||
+.BR selinux "(8)"
|
int res1 ;
|
||||||
+
|
char *buf1 = 0 ;
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/is_selinux_enabled.3 libselinux-1.33.4/man/man3/is_selinux_enabled.3
|
int alloc1 = 0 ;
|
||||||
--- nsalibselinux/man/man3/is_selinux_enabled.3 2006-11-16 17:15:30.000000000 -0500
|
- security_context_t temp2 ;
|
||||||
+++ libselinux-1.33.4/man/man3/is_selinux_enabled.3 2007-01-15 16:21:55.000000000 -0500
|
+ security_context_t temp2 = NULL ;
|
||||||
@@ -1,6 +1,6 @@
|
char *temp20 ;
|
||||||
.TH "is_selinux_enabled" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
PyObject * obj0 = 0 ;
|
||||||
.SH "NAME"
|
|
||||||
-is_selinux_enabled \- check whether SE Linux is enabled
|
|
||||||
+is_selinux_enabled \- check whether SELinux is enabled
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.sp
|
|
||||||
@@ -9,3 +9,7 @@
|
|
||||||
.SH "DESCRIPTION"
|
|
||||||
.B is_selinux_enabled
|
|
||||||
returns 1 if SE Linux is running or 0 if it is not. May change soon.
|
|
||||||
+
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8)"
|
|
||||||
+
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/matchmediacon.3 libselinux-1.33.4/man/man3/matchmediacon.3
|
|
||||||
--- nsalibselinux/man/man3/matchmediacon.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/matchmediacon.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "matchmediacon" "3" "15 November 2004" "dwalsh@redhat.com" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-matchmediacon \- get the default security context for the specified mediatype from the policy.
|
|
||||||
+matchmediacon \- get the default SELinux security context for the specified mediatype from the policy.
|
|
||||||
|
|
||||||
.SH "SYNOPSIS"
|
@@ -4250,7 +4250,7 @@
|
||||||
.B #include <selinux/selinux.h>
|
int res1 ;
|
||||||
@@ -23,4 +23,4 @@
|
char *buf1 = 0 ;
|
||||||
/etc/selinux/POLICYTYPE/contexts/files/media
|
int alloc1 = 0 ;
|
||||||
|
- security_context_t temp2 ;
|
||||||
|
+ security_context_t temp2 = NULL ;
|
||||||
|
char *temp20 ;
|
||||||
|
PyObject * obj0 = 0 ;
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
-.BR freecon "(3)
|
|
||||||
+.BR selinux "(8), " freecon "(3)
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/matchpathcon.3 libselinux-1.33.4/man/man3/matchpathcon.3
|
|
||||||
--- nsalibselinux/man/man3/matchpathcon.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/matchpathcon.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "matchpathcon" "3" "16 March 2005" "sds@tycho.nsa.gov" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-matchpathcon \- get the default security context for the specified path from the file contexts configuration.
|
|
||||||
+matchpathcon \- get the default SELinux security context for the specified path from the file contexts configuration.
|
|
||||||
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
@@ -117,4 +117,4 @@
|
|
||||||
Returns 0 on success or -1 otherwise.
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
-.BR freecon "(3), " setfilecon "(3), " setfscreatecon "(3)"
|
|
||||||
+.BR selinux "(8), " freecon "(3), " setfilecon "(3), " setfscreatecon "(3)"
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/security_check_context.3 libselinux-1.33.4/man/man3/security_check_context.3
|
|
||||||
--- nsalibselinux/man/man3/security_check_context.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/security_check_context.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "security_check_context" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-security_check_context \- check the validity of a context
|
|
||||||
+security_check_context \- check the validity of a SELinux context
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.sp
|
|
||||||
@@ -10,3 +10,7 @@
|
|
||||||
.B security_check_context
|
|
||||||
returns 0 if SE Linux is running and the context is valid, otherwise it
|
|
||||||
returns -1.
|
|
||||||
+
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8)"
|
|
||||||
+
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/security_compute_av.3 libselinux-1.33.4/man/man3/security_compute_av.3
|
|
||||||
--- nsalibselinux/man/man3/security_compute_av.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/security_compute_av.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,7 +1,7 @@
|
|
||||||
.TH "security_compute_av" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
security_compute_av, security_compute_create, security_compute_relabel, security_compute_user \- query
|
|
||||||
-the SE Linux policy database in the kernel.
|
|
||||||
+the SELinux policy database in the kernel.
|
|
||||||
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
@@ -51,4 +51,4 @@
|
|
||||||
0 for success and on error -1 is returned.
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
-.BR getcon "(3), " getfilecon "(3), " get_ordered_context_list "(3)"
|
|
||||||
+.BR selinux "(8), " getcon "(3), " getfilecon "(3), " get_ordered_context_list "(3)"
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/security_getenforce.3 libselinux-1.33.4/man/man3/security_getenforce.3
|
|
||||||
--- nsalibselinux/man/man3/security_getenforce.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/security_getenforce.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "security_getenforce" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-security_getenforce, security_setenforce \- get or set the enforcing state of SE Linux
|
|
||||||
+security_getenforce, security_setenforce \- get or set the enforcing state of SELinux
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.sp
|
|
||||||
@@ -17,3 +17,7 @@
|
|
||||||
sets SE Linux to enforcing mode if the value 1 is passed in, and sets it to
|
|
||||||
permissive mode if 0 is passed in. On success 0 is returned, on error -1 is
|
|
||||||
returned.
|
|
||||||
+
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8)"
|
|
||||||
+
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/security_load_booleans.3 libselinux-1.33.4/man/man3/security_load_booleans.3
|
|
||||||
--- nsalibselinux/man/man3/security_load_booleans.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/security_load_booleans.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -56,4 +56,4 @@
|
|
||||||
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
-getsebool(8), booleans(8), togglesebool(8)
|
|
||||||
+selinux(8), getsebool(8), booleans(8), togglesebool(8)
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/security_load_policy.3 libselinux-1.33.4/man/man3/security_load_policy.3
|
|
||||||
--- nsalibselinux/man/man3/security_load_policy.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/security_load_policy.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "security_load_policy" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-security_load_policy \- load a new policy
|
|
||||||
+security_load_policy \- load a new SELinux policy
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.sp
|
|
||||||
@@ -9,3 +9,7 @@
|
|
||||||
.SH "DESCRIPTION"
|
|
||||||
.B security_load_policy
|
|
||||||
loads a new policy, returns 0 for success and -1 for error.
|
|
||||||
+
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8)"
|
|
||||||
+
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/security_policyvers.3 libselinux-1.33.4/man/man3/security_policyvers.3
|
|
||||||
--- nsalibselinux/man/man3/security_policyvers.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/security_policyvers.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "security_policyvers" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-security_policyvers \- get the version of the SE Linux policy
|
|
||||||
+security_policyvers \- get the version of the SELinux policy
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.sp
|
|
||||||
@@ -10,3 +10,7 @@
|
|
||||||
.B security_policyvers
|
|
||||||
returns the version of the policy (a positive integer) on success, or -1 on
|
|
||||||
error.
|
|
||||||
+
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8)"
|
|
||||||
+
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/selinux_binary_policy_path.3 libselinux-1.33.4/man/man3/selinux_binary_policy_path.3
|
|
||||||
--- nsalibselinux/man/man3/selinux_binary_policy_path.3 2007-01-11 14:01:22.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/selinux_binary_policy_path.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -4,7 +4,7 @@
|
|
||||||
selinux_failsafe_context_path, selinux_removable_context_path,
|
|
||||||
selinux_default_context_path, selinux_user_contexts_path,
|
|
||||||
selinux_file_context_path, selinux_media_context_path,
|
|
||||||
-selinux_contexts_path, selinux_booleans_path \- These functions return the paths to the active policy configuration
|
|
||||||
+selinux_contexts_path, selinux_booleans_path \- These functions return the paths to the active SELinux policy configuration
|
|
||||||
directories and files.
|
|
||||||
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
@@ -65,3 +65,6 @@
|
|
||||||
.SH AUTHOR
|
|
||||||
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
|
|
||||||
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8)"
|
|
||||||
+
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/selinux_check_securetty_context.3 libselinux-1.33.4/man/man3/selinux_check_securetty_context.3
|
|
||||||
--- nsalibselinux/man/man3/selinux_check_securetty_context.3 2007-01-11 14:01:22.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/selinux_check_securetty_context.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "selinux_check_securetty_context" "3" "1 January 2007" "dwalsh@redhat.com" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-selinux_check_securetty_context \- check whether a tty security context is defined as a securetty context
|
|
||||||
+selinux_check_securetty_context \- check whether a SELinux tty security context is defined as a securetty context
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.sp
|
|
||||||
@@ -10,3 +10,7 @@
|
|
||||||
.B selinux_check_securetty_context
|
|
||||||
returns 0 if tty_context is a securetty context
|
|
||||||
returns < 0 otherwise.
|
|
||||||
+
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8)"
|
|
||||||
+
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/selinux_getenforcemode.3 libselinux-1.33.4/man/man3/selinux_getenforcemode.3
|
|
||||||
--- nsalibselinux/man/man3/selinux_getenforcemode.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/selinux_getenforcemode.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "selinux_getenforcemode" "3" "25 May 2004" "dwalsh@redhat.com" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-selinux_getenforcemode \- get the enforcing state of SE Linux
|
|
||||||
+selinux_getenforcemode \- get the enforcing state of SELinux
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
.sp
|
|
||||||
@@ -19,4 +19,7 @@
|
|
||||||
On success, zero is returned.
|
|
||||||
On failure, -1 is returned.
|
|
||||||
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8)"
|
|
||||||
+
|
|
||||||
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/selinux_policy_root.3 libselinux-1.33.4/man/man3/selinux_policy_root.3
|
|
||||||
--- nsalibselinux/man/man3/selinux_policy_root.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/selinux_policy_root.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -14,4 +14,7 @@
|
|
||||||
On success, returns a directory path containing the SELinux policy files.
|
|
||||||
On failure, NULL is returned.
|
|
||||||
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8)"
|
|
||||||
+
|
|
||||||
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man3/setfilecon.3 libselinux-1.33.4/man/man3/setfilecon.3
|
|
||||||
--- nsalibselinux/man/man3/setfilecon.3 2006-11-16 17:15:30.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man3/setfilecon.3 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "setfilecon" "3" "1 January 2004" "russell@coker.com.au" "SE Linux API documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-setfilecon, fsetfilecon, lsetfilecon \- set SE Linux security context of a file
|
|
||||||
+setfilecon, fsetfilecon, lsetfilecon \- set SELinux security context of a file
|
|
||||||
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B #include <selinux/selinux.h>
|
|
||||||
@@ -38,4 +38,4 @@
|
|
||||||
here.
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
-.BR freecon "(3), " getfilecon "(3), " setfscreatecon "(3)"
|
|
||||||
+.BR selinux "(3), " freecon "(3), " getfilecon "(3), " setfscreatecon "(3)"
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/avcstat.8 libselinux-1.33.4/man/man8/avcstat.8
|
|
||||||
--- nsalibselinux/man/man8/avcstat.8 2006-11-16 17:15:26.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man8/avcstat.8 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -22,6 +22,9 @@
|
|
||||||
.B \-f
|
|
||||||
Specifies the location of the AVC statistics file, defaulting to '/selinux/avc/cache_stats'.
|
|
||||||
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+selinux(8)
|
|
||||||
+
|
|
||||||
.SH AUTHOR
|
|
||||||
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
|
|
||||||
The program was written by James Morris <jmorris@redhat.com>.
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/getenforce.8 libselinux-1.33.4/man/man8/getenforce.8
|
|
||||||
--- nsalibselinux/man/man8/getenforce.8 2006-11-16 17:15:26.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man8/getenforce.8 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -12,4 +12,4 @@
|
|
||||||
Dan Walsh, <dwalsh@redhat.com>
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
-setenforce(8), selinuxenabled(8)
|
|
||||||
+selinux(8), setenforce(8), selinuxenabled(8)
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/getsebool.8 libselinux-1.33.4/man/man8/getsebool.8
|
|
||||||
--- nsalibselinux/man/man8/getsebool.8 2006-11-16 17:15:26.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man8/getsebool.8 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -26,9 +26,10 @@
|
|
||||||
.B \-a
|
|
||||||
Show all SELinux booleans.
|
|
||||||
|
|
||||||
+.SH "SEE ALSO"
|
|
||||||
+selinux(8), setsebool(8), booleans(8)
|
|
||||||
+
|
|
||||||
.SH AUTHOR
|
|
||||||
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
|
|
||||||
The program was written by Tresys Technology.
|
|
||||||
|
|
||||||
-.SH "SEE ALSO"
|
|
||||||
-setsebool(8), booleans(8)
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/matchpathcon.8 libselinux-1.33.4/man/man8/matchpathcon.8
|
|
||||||
--- nsalibselinux/man/man8/matchpathcon.8 2006-11-16 17:15:26.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man8/matchpathcon.8 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "matchpathcon" "8" "21 April 2005" "dwalsh@redhat.com" "SE Linux Command Line documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-matchpathcon \- get the default security context for the specified path from the file contexts configuration.
|
|
||||||
+matchpathcon \- get the default SELinux security context for the specified path from the file contexts configuration.
|
|
||||||
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B matchpathcon [-V] [-N] [-n] [-f file_contexts_file ] [-p prefix ] filepath...
|
|
||||||
@@ -27,4 +27,5 @@
|
|
||||||
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
+.BR selinux "(8), "
|
|
||||||
.BR mathpathcon "(3), "
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/selinuxenabled.8 libselinux-1.33.4/man/man8/selinuxenabled.8
|
|
||||||
--- nsalibselinux/man/man8/selinuxenabled.8 2006-11-16 17:15:26.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man8/selinuxenabled.8 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -13,4 +13,4 @@
|
|
||||||
Dan Walsh, <dwalsh@redhat.com>
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
-setenforce(8), getenforce(8)
|
|
||||||
+selinux(8), setenforce(8), getenforce(8)
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/setenforce.8 libselinux-1.33.4/man/man8/setenforce.8
|
|
||||||
--- nsalibselinux/man/man8/setenforce.8 2006-11-16 17:15:26.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man8/setenforce.8 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -17,7 +17,7 @@
|
|
||||||
Dan Walsh, <dwalsh@redhat.com>
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
-getenforce(8), selinuxenabled(8)
|
|
||||||
+selinux(8), getenforce(8), selinuxenabled(8)
|
|
||||||
|
|
||||||
.SH FILES
|
|
||||||
/etc/grub.conf, /etc/selinux/config
|
|
||||||
diff --exclude-from=exclude -N -u -r nsalibselinux/man/man8/togglesebool.8 libselinux-1.33.4/man/man8/togglesebool.8
|
|
||||||
--- nsalibselinux/man/man8/togglesebool.8 2006-11-16 17:15:26.000000000 -0500
|
|
||||||
+++ libselinux-1.33.4/man/man8/togglesebool.8 2007-01-15 16:21:55.000000000 -0500
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
.TH "togglesebool" "1" "26 Oct 2004" "sgrubb@redhat.com" "SELinux Command Line documentation"
|
|
||||||
.SH "NAME"
|
|
||||||
-togglesebool \- flip the current value of a boolean
|
|
||||||
+togglesebool \- flip the current value of a SELinux boolean
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.B togglesebool boolean...
|
|
||||||
|
|
||||||
@@ -14,4 +14,4 @@
|
|
||||||
This man page was written by Steve Grubb <sgrubb@redhat.com>
|
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
-booleans(8), getsebool(8), setsebool(8)
|
|
||||||
+selinux(8), booleans(8), getsebool(8), setsebool(8)
|
|
||||||
|
@ -2,10 +2,11 @@
|
|||||||
Summary: SELinux library and simple utilities
|
Summary: SELinux library and simple utilities
|
||||||
Name: libselinux
|
Name: libselinux
|
||||||
Version: 1.34.0
|
Version: 1.34.0
|
||||||
Release: 1%{?dist}
|
Release: 3%{?dist}
|
||||||
License: Public domain (uncopyrighted)
|
License: Public domain (uncopyrighted)
|
||||||
Group: System Environment/Libraries
|
Group: System Environment/Libraries
|
||||||
Source: http://www.nsa.gov/selinux/archives/%{name}-%{version}.tgz
|
Source: http://www.nsa.gov/selinux/archives/%{name}-%{version}.tgz
|
||||||
|
Patch: libselinux-rhat.patch
|
||||||
|
|
||||||
BuildRequires: libsepol-devel >= %{libsepolver} swig
|
BuildRequires: libsepol-devel >= %{libsepolver} swig
|
||||||
Requires: libsepol >= %{libsepolver} setransd
|
Requires: libsepol >= %{libsepolver} setransd
|
||||||
@ -48,6 +49,7 @@ needed for developing SELinux applications.
|
|||||||
|
|
||||||
%prep
|
%prep
|
||||||
%setup -q
|
%setup -q
|
||||||
|
%patch -p1 -b .rhat
|
||||||
|
|
||||||
%build
|
%build
|
||||||
make clean
|
make clean
|
||||||
@ -119,6 +121,9 @@ exit 0
|
|||||||
%{_libdir}/python*/site-packages/selinux.py*
|
%{_libdir}/python*/site-packages/selinux.py*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Jan 19 2007 Dan Walsh <dwalsh@redhat.com> - 1.34.0-2
|
||||||
|
- Add context function to python to split context into 4 parts
|
||||||
|
|
||||||
* Fri Jan 19 2007 Dan Walsh <dwalsh@redhat.com> - 1.34.0-1
|
* Fri Jan 19 2007 Dan Walsh <dwalsh@redhat.com> - 1.34.0-1
|
||||||
- Upgrade to upstream
|
- Upgrade to upstream
|
||||||
* Updated version for stable branch.
|
* Updated version for stable branch.
|
||||||
|
Loading…
Reference in New Issue
Block a user