import selinux-policy-34.1.41-1.el9
This commit is contained in:
parent
ac95e7125b
commit
30844ae27f
2
.gitignore
vendored
2
.gitignore
vendored
@ -1,2 +1,2 @@
|
|||||||
SOURCES/container-selinux.tgz
|
SOURCES/container-selinux.tgz
|
||||||
SOURCES/selinux-policy-9dcf505.tar.gz
|
SOURCES/selinux-policy-63e80c0.tar.gz
|
||||||
|
@ -1,2 +1,2 @@
|
|||||||
ff295d4c0bb4af2a3972c810f93a7fb2c17fbf27 SOURCES/container-selinux.tgz
|
f41207ff670544c6b3c0bb578c47ed5f1977a173 SOURCES/container-selinux.tgz
|
||||||
be1161ae8772afa2747bf1cf58d59828934ba05a SOURCES/selinux-policy-9dcf505.tar.gz
|
beca74c63ac29151f2b2dc1a3861cd7bafaefe63 SOURCES/selinux-policy-63e80c0.tar.gz
|
||||||
|
@ -2670,3 +2670,24 @@ ica = module
|
|||||||
# insights_client
|
# insights_client
|
||||||
#
|
#
|
||||||
insights_client = module
|
insights_client = module
|
||||||
|
|
||||||
|
# Layer: contrib
|
||||||
|
# Module: stalld
|
||||||
|
#
|
||||||
|
# stalld
|
||||||
|
#
|
||||||
|
stalld = module
|
||||||
|
|
||||||
|
# Layer: contrib
|
||||||
|
# Module: rhcd
|
||||||
|
#
|
||||||
|
# rhcd
|
||||||
|
#
|
||||||
|
rhcd = module
|
||||||
|
|
||||||
|
# Layer: contrib
|
||||||
|
# Module: wireguard
|
||||||
|
#
|
||||||
|
# wireguard
|
||||||
|
#
|
||||||
|
wireguard = module
|
||||||
|
@ -36,3 +36,4 @@ gen_user(sysadm_u, user, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
|||||||
# not in the sysadm_r.
|
# not in the sysadm_r.
|
||||||
#
|
#
|
||||||
gen_user(root, user, unconfined_r sysadm_r staff_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
gen_user(root, user, unconfined_r sysadm_r staff_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
gen_user(unconfined_u, user, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
@ -36,3 +36,5 @@ gen_user(sysadm_u, user, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
|||||||
# not in the sysadm_r.
|
# not in the sysadm_r.
|
||||||
#
|
#
|
||||||
gen_user(root, user, sysadm_r staff_r secadm_r auditadm_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
gen_user(root, user, sysadm_r staff_r secadm_r auditadm_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
gen_user(guest_u, user, guest_r, s0, s0)
|
||||||
|
gen_user(xguest_u, user, xguest_r, s0, s0)
|
||||||
|
@ -36,3 +36,6 @@ gen_user(sysadm_u, user, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
|||||||
# not in the sysadm_r.
|
# not in the sysadm_r.
|
||||||
#
|
#
|
||||||
gen_user(root, user, unconfined_r sysadm_r staff_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
gen_user(root, user, unconfined_r sysadm_r staff_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
gen_user(unconfined_u, user, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||||
|
gen_user(guest_u, user, guest_r, s0, s0)
|
||||||
|
gen_user(xguest_u, user, xguest_r, s0, s0)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# github repo with selinux-policy sources
|
# github repo with selinux-policy sources
|
||||||
%global giturl https://github.com/fedora-selinux/selinux-policy
|
%global giturl https://github.com/fedora-selinux/selinux-policy
|
||||||
%global commit 9dcf505fec91d3cc2feae61d9b76726a98dd6b98
|
%global commit 63e80c0f2e0d58ce6c28201dab17927594c4b5db
|
||||||
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
||||||
|
|
||||||
%define distro redhat
|
%define distro redhat
|
||||||
@ -19,11 +19,11 @@
|
|||||||
%define BUILD_MLS 1
|
%define BUILD_MLS 1
|
||||||
%endif
|
%endif
|
||||||
%define POLICYVER 33
|
%define POLICYVER 33
|
||||||
%define POLICYCOREUTILSVER 3.3-5
|
%define POLICYCOREUTILSVER 3.4-1
|
||||||
%define CHECKPOLICYVER 3.2
|
%define CHECKPOLICYVER 3.2
|
||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 34.1.28
|
Version: 34.1.41
|
||||||
Release: 1%{?dist}
|
Release: 1%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
||||||
@ -139,6 +139,7 @@ and some additional files.
|
|||||||
%dir %{_datadir}/selinux/devel
|
%dir %{_datadir}/selinux/devel
|
||||||
%dir %{_datadir}/selinux/devel/include
|
%dir %{_datadir}/selinux/devel/include
|
||||||
%{_datadir}/selinux/devel/include/*
|
%{_datadir}/selinux/devel/include/*
|
||||||
|
%exclude %{_usr}/share/selinux/devel/include/contrib/container.if
|
||||||
%dir %{_datadir}/selinux/devel/html
|
%dir %{_datadir}/selinux/devel/html
|
||||||
%{_datadir}/selinux/devel/html/*html
|
%{_datadir}/selinux/devel/html/*html
|
||||||
%{_datadir}/selinux/devel/html/*css
|
%{_datadir}/selinux/devel/html/*css
|
||||||
@ -584,7 +585,7 @@ fi
|
|||||||
exit 0
|
exit 0
|
||||||
|
|
||||||
|
|
||||||
%triggerin -- pcre
|
%triggerin -- pcre2
|
||||||
%{_sbindir}/selinuxenabled && %{_sbindir}/semodule -nB
|
%{_sbindir}/selinuxenabled && %{_sbindir}/semodule -nB
|
||||||
exit 0
|
exit 0
|
||||||
|
|
||||||
@ -793,6 +794,283 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Aug 25 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.41-1
|
||||||
|
- Allow unconfined domains to bpf all other domains
|
||||||
|
Resolves: RHBZ#2112014
|
||||||
|
- Allow stalld get and set scheduling policy of all domains.
|
||||||
|
Resolves: rhbz#2105038
|
||||||
|
- Allow unconfined_t transition to targetclid_home_t
|
||||||
|
Resolves: RHBZ#2106360
|
||||||
|
- Allow samba-bgqd to read a printer list
|
||||||
|
Resolves: rhbz#2118977
|
||||||
|
- Allow system_dbusd ioctl kernel with a unix stream sockets
|
||||||
|
Resolves: rhbz#2085392
|
||||||
|
- Allow chronyd bind UDP sockets to ptp_event ports.
|
||||||
|
Resolves: RHBZ#2118631
|
||||||
|
- Update tor_bind_all_unreserved_ports interface
|
||||||
|
Resolves: RHBZ#2089486
|
||||||
|
- Remove permissive domain for rhcd_t
|
||||||
|
Resolves: rhbz#2119351
|
||||||
|
- Allow unconfined and sysadm users transition for /root/.gnupg
|
||||||
|
Resolves: rhbz#2121125
|
||||||
|
- Add gpg_filetrans_admin_home_content() interface
|
||||||
|
Resolves: rhbz#2121125
|
||||||
|
- Update rhcd policy for executing additional commands
|
||||||
|
Resolves: rhbz#2119351
|
||||||
|
- Update insights-client policy for additional commands execution
|
||||||
|
Resolves: rhbz#2119507
|
||||||
|
- Add rpm setattr db files macro
|
||||||
|
Resolves: rhbz#2119507
|
||||||
|
- Add userdom_view_all_users_keys() interface
|
||||||
|
Resolves: rhbz#2119507
|
||||||
|
- Allow gpg read and write generic pty type
|
||||||
|
Resolves: rhbz#2119507
|
||||||
|
- Allow chronyc read and write generic pty type
|
||||||
|
Resolves: rhbz#2119507
|
||||||
|
|
||||||
|
* Wed Aug 10 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.40-1
|
||||||
|
- Allow systemd-modules-load write to /dev/kmsg and send a message to syslogd
|
||||||
|
Resolves: RHBZ#2088257
|
||||||
|
- Allow systemd_hostnamed label /run/systemd/* as hostnamed_etc_t
|
||||||
|
Resolves: RHBZ#1976684
|
||||||
|
- Allow samba-bgqd get a printer list
|
||||||
|
Resolves: rhbz#2112395
|
||||||
|
- Allow networkmanager to signal unconfined process
|
||||||
|
Resolves: RHBZ#2074414
|
||||||
|
- Update NetworkManager-dispatcher policy
|
||||||
|
Resolves: RHBZ#2101910
|
||||||
|
- Allow openvswitch search tracefs dirs
|
||||||
|
Resolves: rhbz#1988164
|
||||||
|
- Allow openvswitch use its private tmpfs files and dirs
|
||||||
|
Resolves: rhbz#1988164
|
||||||
|
- Allow openvswitch fsetid capability
|
||||||
|
Resolves: rhbz#1988164
|
||||||
|
|
||||||
|
* Tue Aug 02 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.39-1
|
||||||
|
- Add support for systemd-network-generator
|
||||||
|
Resolves: RHBZ#2111069
|
||||||
|
- Allow systemd work with install_t unix stream sockets
|
||||||
|
Resolves: rhbz#2111206
|
||||||
|
- Allow sa-update to get init status and start systemd files
|
||||||
|
Resolves: RHBZ#2061844
|
||||||
|
|
||||||
|
* Fri Jul 15 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.38-1
|
||||||
|
- Allow some domains use sd_notify()
|
||||||
|
Resolves: rhbz#2056565
|
||||||
|
- Revert "Allow rabbitmq to use systemd notify"
|
||||||
|
Resolves: rhbz#2056565
|
||||||
|
- Update winbind_rpcd_t
|
||||||
|
Resolves: rhbz#2102084
|
||||||
|
- Update chronyd_pid_filetrans() to allow create dirs
|
||||||
|
Resolves: rhbz#2101910
|
||||||
|
- Allow keepalived read the contents of the sysfs filesystem
|
||||||
|
Resolves: rhbz#2098130
|
||||||
|
- Define LIBSEPOL version 3.4-1
|
||||||
|
Resolves: rhbz#2095688
|
||||||
|
|
||||||
|
* Wed Jun 29 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.37-1
|
||||||
|
- Allow targetclid read /var/target files
|
||||||
|
Resolves: rhbz#2020169
|
||||||
|
- Update samba-dcerpcd policy for kerberos usage 2
|
||||||
|
Resolves: rhbz#2096521
|
||||||
|
- Allow samba-dcerpcd work with sssd
|
||||||
|
Resolves: rhbz#2096521
|
||||||
|
- Allow stalld set scheduling policy of kernel threads
|
||||||
|
Resolves: rhbz#2102224
|
||||||
|
|
||||||
|
* Tue Jun 28 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.36-1
|
||||||
|
- Allow targetclid read generic SSL certificates (fixed)
|
||||||
|
Resolves: rhbz#2020169
|
||||||
|
- Fix file context pattern for /var/target
|
||||||
|
Resolves: rhbz#2020169
|
||||||
|
- Use insights_client_etc_t in insights_search_config()
|
||||||
|
Resolves: rhbz#1965013
|
||||||
|
|
||||||
|
* Fri Jun 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.35-1
|
||||||
|
-Add the corecmd_watch_bin_dirs() interface
|
||||||
|
Resolves: rhbz#1965013
|
||||||
|
- Update rhcd policy
|
||||||
|
Resolves: rhbz#1965013
|
||||||
|
- Allow rhcd search insights configuration directories
|
||||||
|
Resolves: rhbz#1965013
|
||||||
|
- Add the kernel_read_proc_files() interface
|
||||||
|
Resolves: rhbz#1965013
|
||||||
|
- Update insights_client_filetrans_named_content()
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Allow transition to insights_client named content
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Add the insights_client_filetrans_named_content() interface
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Update policy for insights-client to run additional commands 3
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Allow insights-client execute its private memfd: objects
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Update policy for insights-client to run additional commands 2
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Use insights_client_tmp_t instead of insights_client_var_tmp_t
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Change space indentation to tab in insights-client
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Use socket permissions sets in insights-client
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Update policy for insights-client to run additional commands
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Allow init_t to rw insights_client unnamed pipe
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Fix insights client
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Update kernel_read_unix_sysctls() for sysctl_net_unix_t handling
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Do not let system_cronjob_t create redhat-access-insights.log with var_log_t
|
||||||
|
Resolves: rhbz#2081425
|
||||||
|
- Allow stalld get scheduling policy of kernel threads
|
||||||
|
Resolves: rhbz#2096776
|
||||||
|
- Update samba-dcerpcd policy for kerberos usage
|
||||||
|
Resolves: rhbz#2096521
|
||||||
|
- Allow winbind_rpcd_t connect to self over a unix_stream_socket
|
||||||
|
Resolves: rhbz#2096255
|
||||||
|
- Allow dlm_controld send a null signal to a cluster daemon
|
||||||
|
Resolves: rhbz#2095884
|
||||||
|
- Allow dhclient manage pid files used by chronyd
|
||||||
|
The chronyd_manage_pid_files() interface was added.
|
||||||
|
- Resolves: rhbz#2094155
|
||||||
|
Allow install_t nnp_domtrans to setfiles_mac_t
|
||||||
|
- Resolves: rhbz#2073010
|
||||||
|
- Allow rabbitmq to use systemd notify
|
||||||
|
Resolves: rhbz#2056565
|
||||||
|
- Allow ksmctl create hardware state information files
|
||||||
|
Resolves: rhbz#2021131
|
||||||
|
- Label /var/target with targetd_var_t
|
||||||
|
Resolves: rhbz#2020169
|
||||||
|
- Allow targetclid read generic SSL certificates
|
||||||
|
Resolves: rhbz#2020169
|
||||||
|
|
||||||
|
* Thu Jun 09 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.34-1
|
||||||
|
- Allow stalld setsched and sys_nice
|
||||||
|
Resolves: rhbz#2092864
|
||||||
|
- Allow rhsmcertd to create cache file in /var/cache/cloud-what
|
||||||
|
Resolves: rhbz#2092333
|
||||||
|
- Update policy for samba-dcerpcd
|
||||||
|
Resolves: rhbz#2083509
|
||||||
|
- Add support for samba-dcerpcd
|
||||||
|
Resolves: rhbz#2083509
|
||||||
|
- Allow rabbitmq to access its private memfd: objects
|
||||||
|
Resolves: rhbz#2056565
|
||||||
|
- Confine targetcli
|
||||||
|
Resolves: rhbz#2020169
|
||||||
|
- Add policy for wireguard
|
||||||
|
Resolves: 1964862
|
||||||
|
- Label /var/cache/insights with insights_client_cache_t
|
||||||
|
Resolves: rhbz#2062136
|
||||||
|
- Allow ctdbd nlmsg_read on netlink_tcpdiag_socket
|
||||||
|
Resolves: rhbz#2094489
|
||||||
|
- Allow auditd_t noatsecure for a transition to audisp_remote_t
|
||||||
|
Resolves: rhbz#2081907
|
||||||
|
|
||||||
|
* Fri May 27 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.33-1
|
||||||
|
- Allow insights-client manage gpg admin home content
|
||||||
|
Resolves: rhbz#2062136
|
||||||
|
- Add the gpg_manage_admin_home_content() interface
|
||||||
|
Resolves: rhbz#2062136
|
||||||
|
- Add rhcd policy
|
||||||
|
Resolves: bz#1965013
|
||||||
|
- Allow svirt connectto virtlogd
|
||||||
|
Resolves: rhbz#2000881
|
||||||
|
- Add ksm service to ksmtuned
|
||||||
|
Resolves: rhbz#2021131
|
||||||
|
- Allow nm-privhelper setsched permission and send system logs
|
||||||
|
Resolves: rhbz#2053639
|
||||||
|
- Update the policy for systemd-journal-upload
|
||||||
|
Resolves: rhbz#2085369
|
||||||
|
- Allow systemd-journal-upload watch logs and journal
|
||||||
|
Resolves: rhbz#2085369
|
||||||
|
- Create a policy for systemd-journal-upload
|
||||||
|
Resolves: rhbz#2085369
|
||||||
|
- Allow insights-client create and use unix_dgram_socket
|
||||||
|
Resolves: rhbz#2087765
|
||||||
|
- Allow insights-client search gconf homedir
|
||||||
|
Resolves: rhbz#2087765
|
||||||
|
|
||||||
|
* Wed May 11 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.32-1
|
||||||
|
- Dontaudit guest attempts to dbus chat with systemd domains
|
||||||
|
Resolves: rhbz#2062740
|
||||||
|
- Dontaudit guest attempts to dbus chat with system bus types
|
||||||
|
Resolves: rhbz#2062740
|
||||||
|
- Fix users for SELinux userspace 3.4
|
||||||
|
Resolves: rhbz#2079290
|
||||||
|
- Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template
|
||||||
|
Resolves: rhbz#2076681
|
||||||
|
- Allow systemd-sleep get removable devices attributes
|
||||||
|
Resolves: rhbz#2082404
|
||||||
|
- Allow systemd-sleep tlp_filetrans_named_content()
|
||||||
|
Resolves: rhbz#2082404
|
||||||
|
- Allow systemd-sleep execute generic programs
|
||||||
|
Resolves: rhbz#2082404
|
||||||
|
- Allow systemd-sleep execute shell
|
||||||
|
Resolves: rhbz#2082404
|
||||||
|
- Allow systemd-sleep transition to sysstat_t
|
||||||
|
Resolves: rhbz#2082404
|
||||||
|
- Allow systemd-sleep transition to tlp_t
|
||||||
|
Resolves: rhbz#2082404
|
||||||
|
- Allow systemd-sleep transition to unconfined_service_t on bin_t executables
|
||||||
|
Resolves: rhbz#2082404
|
||||||
|
- allow systemd-sleep to set timer for suspend-then-hibernate
|
||||||
|
Resolves: rhbz#2082404
|
||||||
|
- Add default fc specifications for patterns in /opt
|
||||||
|
Resolves: rhbz#2081059
|
||||||
|
- Use a named transition in systemd_hwdb_manage_config()
|
||||||
|
Resolves: rhbz#2061725
|
||||||
|
|
||||||
|
* Wed May 04 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.31-2
|
||||||
|
- Remove "v" from the package version
|
||||||
|
|
||||||
|
* Mon May 02 2022 Nikola Knazekova <nknazeko@redhat.com> - v34.1.31-1
|
||||||
|
- Label /var/run/machine-id as machineid_t
|
||||||
|
Resolves: rhbz#2061680
|
||||||
|
- Allow insights-client create_socket_perms for tcp/udp sockets
|
||||||
|
Resolves: rhbz#2077377
|
||||||
|
- Allow insights-client read rhnsd config files
|
||||||
|
Resolves: rhbz#2077377
|
||||||
|
- Allow rngd drop privileges via setuid/setgid/setcap
|
||||||
|
Resolves: rhbz#2076642
|
||||||
|
- Allow tmpreaper the sys_ptrace userns capability
|
||||||
|
Resolves: rhbz#2062823
|
||||||
|
- Add stalld to modules.conf
|
||||||
|
Resolves: rhbz#2042614
|
||||||
|
- New policy for stalld
|
||||||
|
Resolves: rhbz#2042614
|
||||||
|
- Label new utility of NetworkManager nm-priv-helper
|
||||||
|
Resolves: rhbz#2053639
|
||||||
|
- Exclude container.if from selinux-policy-devel
|
||||||
|
Resolves: rhbz#1861968
|
||||||
|
|
||||||
|
* Tue Apr 19 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.30-2
|
||||||
|
- Update source branches to build a new package for RHEL 9.1.0
|
||||||
|
|
||||||
|
* Tue Apr 12 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.30-1
|
||||||
|
- Allow administrative users the bpf capability
|
||||||
|
Resolves: RHBZ#2070982
|
||||||
|
- Allow NetworkManager talk with unconfined user over unix domain dgram socket
|
||||||
|
Resolves: rhbz#2064688
|
||||||
|
- Allow hostapd talk with unconfined user over unix domain dgram socket
|
||||||
|
Resolves: rhbz#2064688
|
||||||
|
- Allow fprintd read and write hardware state information
|
||||||
|
Resolves: rhbz#2062911
|
||||||
|
- Allow fenced read kerberos key tables
|
||||||
|
Resolves: RHBZ#2060722
|
||||||
|
- Allow init watch and watch_reads user ttys
|
||||||
|
Resolves: rhbz#2060289
|
||||||
|
- Allow systemd watch and watch_reads console devices
|
||||||
|
Resolves: rhbz#2060289
|
||||||
|
- Allow nmap create and use rdma socket
|
||||||
|
Resolves: RHBZ#2059603
|
||||||
|
|
||||||
|
* Thu Mar 31 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.29-1
|
||||||
|
- Allow qemu-kvm create and use netlink rdma sockets
|
||||||
|
Resolves: rhbz#2063612
|
||||||
|
- Label corosync-cfgtool with cluster_exec_t
|
||||||
|
Resolves: rhbz#2061277
|
||||||
|
|
||||||
* Thu Mar 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.28-1
|
* Thu Mar 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.28-1
|
||||||
- Allow logrotate a domain transition to cluster administrative domain
|
- Allow logrotate a domain transition to cluster administrative domain
|
||||||
Resolves: rhbz#2061277
|
Resolves: rhbz#2061277
|
||||||
|
Loading…
Reference in New Issue
Block a user