diff --git a/selinux-policy.spec b/selinux-policy.spec index 240d6ee5..5f1e7e33 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,6 +1,6 @@ # github repo with selinux-policy sources %global giturl https://github.com/fedora-selinux/selinux-policy -%global commit 85f35a10d97af810016aa668dc24f8e5bbc36596 +%global commit 85d254ceaa5c4ec8fbf658e9cbccbd996b7ba12f %global shortcommit %(c=%{commit}; echo ${c:0:7}) %define distro redhat @@ -23,8 +23,8 @@ %define CHECKPOLICYVER 3.2 Summary: SELinux policy configuration Name: selinux-policy -Version: 34.12 -Release: 2 +Version: 34.13 +Release: 1%{?dist} License: GPLv2+ Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz Source1: modules-targeted-base.conf @@ -810,6 +810,11 @@ exit 0 %endif %changelog +* Thu Jul 01 2021 Zdenek Pytela - 34.13-1 +- Allow radius map its library files +- Allow nftables read NetworkManager unnamed pipes +- Allow logrotate rotate container log files + * Tue Jun 22 2021 Zdenek Pytela - 34.12-2 - Add a systemd service to check that SELinux is disabled properly - specfile: Add unowned dir to the macro diff --git a/sources b/sources index 0e6ea201..241005ba 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-85f35a1.tar.gz) = aafb4ef00018011b62de0bf70562da4456087661bbda971fc9b63704cd41df01a26e7838fd8de19c4ac164d73f247e6939fe68b0d2e1a4b83057f1c7c005530a -SHA512 (container-selinux.tgz) = 82949a11f5d946928422d096ce6dfb23f9fdab317b95c9209e72919840b2e9f12121302ee7772412bbf456fe295a231ee7a5599f0a2f45c1a3d03bf950c5175b +SHA512 (selinux-policy-85d254c.tar.gz) = 81e0de529fdf099182c2f70e7c266665d5ab49771a71f7914290649eb30e6ee441f43e29a657a07627a89aa04ec897e043573bcc1558a96b001ad1381eb27ae2 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 +SHA512 (container-selinux.tgz) = 623417d92f2b529a5b419e5c769b649ba2efb310f5ea3b072172a05dc1ac6db1562c362be765e0e8b7997e274a58946afe6ee3e53a93cab6c7f454e2549a5822