* Wed Apr 29 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-13

- Update networkmanager_read_pid_files() to allow also list_dir_perms
- Update policy for NetworkManager_ssh_t
- Allow glusterd synchronize between master and slave
- Allow spamc_t domain to read network state
- Allow strongswan use tun/tap devices and keys
- Allow systemd_userdbd_t domain logging to journal
This commit is contained in:
Zdenek Pytela 2020-04-29 11:21:16 +02:00
parent 53368f319b
commit 6a3fec4b74
3 changed files with 16 additions and 6 deletions

2
.gitignore vendored
View File

@ -458,3 +458,5 @@ serefpolicy*
/selinux-policy-50a6afe.tar.gz
/selinux-policy-ad1d355.tar.gz
/selinux-policy-contrib-6db7310.tar.gz
/selinux-policy-b583642.tar.gz
/selinux-policy-contrib-80860a3.tar.gz

View File

@ -1,11 +1,11 @@
# github repo with selinux-policy base sources
%global git0 https://github.com/fedora-selinux/selinux-policy
%global commit0 ad1d35503f55f535401daa0a59913aa559c38d44
%global commit0 b5836428b2a73ac6fee5fc101a630ea79095a82f
%global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
# github repo with selinux-policy contrib sources
%global git1 https://github.com/fedora-selinux/selinux-policy-contrib
%global commit1 6db7310a3b7385e07359a978a46c52d7ec22bedd
%global commit1 80860a357b13706296074de5e53362dd46887577
%global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
%define distro redhat
@ -29,7 +29,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.14.6
Release: 12%{?dist}
Release: 13%{?dist}
License: GPLv2+
Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@ -774,6 +774,14 @@ exit 0
%endif
%changelog
* Wed Apr 29 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-13
- Update networkmanager_read_pid_files() to allow also list_dir_perms
- Update policy for NetworkManager_ssh_t
- Allow glusterd synchronize between master and slave
- Allow spamc_t domain to read network state
- Allow strongswan use tun/tap devices and keys
- Allow systemd_userdbd_t domain logging to journal
* Tue Apr 14 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-12
- Allow rngd create netlink_kobject_uevent_socket and read udev runtime files
- Allow ssh-keygen create file in /var/lib/glusterd

View File

@ -1,4 +1,4 @@
SHA512 (selinux-policy-ad1d355.tar.gz) = c58b42b7b0a6c92f0efb3cd64c7c7dc4d8645dcc1a66e1af59a508ac22cbf777e82d7ecd69ba65eb0031470b7c8c6f8e55a3f0275da21da2f0b5ce2d5a394750
SHA512 (selinux-policy-contrib-6db7310.tar.gz) = 805bffcdee4cdf870973419c22f04b9862873c68f73fede5c8360750719efb96c28a72e2bb5382e4a7b7df25a3dbd3997f740c4a6d194c00f9b1468afe6a3009
SHA512 (container-selinux.tgz) = 551b7288daeb2742e6bdbf8ec31ae5ff5efc3223ef30776359ec3480a0d9a5b16174a0f74bbacd446c56f822b51c83c3b4ad7c74b2e843f2c698dcfacbf6a175
SHA512 (selinux-policy-b583642.tar.gz) = 6ba0e3a86700485d5c83b2849601a1ccc2a53dde94ce394c6f756a6a58f3173ba7595f741da4b19febc90df6fb9efd627cfddc2fdbb9474b5a2446c1c1454c4b
SHA512 (selinux-policy-contrib-80860a3.tar.gz) = d42d86bb5b75d24fb59ac7312880da31535c4971b890636be42e63bc99ff74fc8e6b184cf3ab17cfd35d0f17c9e26f928015b15e4b0d3451b512223bf22ada11
SHA512 (container-selinux.tgz) = ccc15935ad53f5c6e955c500f7c4612e0e6544ee41647dfef13208b55edf52af0a7f652d4ec56130dc944a84f398bf6f991d2baf9bc0fb37d80cd3bee9eac6c9
SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4