From e408680df85801a9896a14273f16babd9f08dc0c Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Tue, 22 Nov 2022 18:09:09 +0000 Subject: [PATCH] Auto sync2gitlab import of selinux-policy-3.14.3-111.el8.src.rpm --- .gitignore | 2 ++ selinux-policy.spec | 32 +++++++++++++++++++++++++++++--- sources | 6 +++--- 3 files changed, 34 insertions(+), 6 deletions(-) diff --git a/.gitignore b/.gitignore index e73e2d70..1eb73939 100644 --- a/.gitignore +++ b/.gitignore @@ -19,3 +19,5 @@ /selinux-policy-contrib-425f663.tar.gz /selinux-policy-0d0cdeb.tar.gz /selinux-policy-contrib-e792d43.tar.gz +/selinux-policy-contrib-ab25857.tar.gz +/selinux-policy-f69f5fb.tar.gz diff --git a/selinux-policy.spec b/selinux-policy.spec index ea556764..76dfa166 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 0d0cdebcd0a3f596318d298842d0d1c10ae646cf +%global commit0 f69f5fbff260b71fa7c116d3253ae4f1d218dad4 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 e792d43860b96b60c4c17888670369702ee64eb2 +%global commit1 ab258574b9c3e3e3b0b4af6c5e50c2759b0daf3a %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 110%{?dist} +Release: 111%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -717,6 +717,32 @@ exit 0 %endif %changelog +* Fri Nov 11 2022 Zdenek Pytela - 3.14.3-111 +- Add domain_unix_read_all_semaphores() interface +Resolves: rhbz#2141311 +- Allow iptables list cgroup directories +Resolves: rhbz#2134820 +- Allow systemd-hostnamed dbus chat with init scripts +Resolves: rhbz#2111632 +- Allow systemd to read symlinks in /var/lib +Resolves: rhbz#2118784 +- Allow insights-client domain transition on semanage execution +Resolves: rhbz#2141311 +- Allow insights-client create gluster log dir with a transition +Resolves: rhbz#2141311 +- Allow insights-client manage generic locks +Resolves: rhbz#2141311 +- Allow insights-client unix_read all domain semaphores +Resolves: rhbz#2141311 +- Allow winbind-rpcd use the terminal multiplexor +Resolves: rhbz#2107106 +- Allow mrtg send mails +Resolves: rhbz#2103675 +- Allow sssd dbus chat with system cronjobs +Resolves: rhbz#2132922 +- Allow postfix/smtp and postfix/virtual read kerberos key table +Resolves: rhbz#1983308 + * Thu Oct 20 2022 Zdenek Pytela - 3.14.3-110 - Add the systemd_connectto_socket_proxyd_unix_sockets() interface Resolves: rhbz#208441 diff --git a/sources b/sources index abe48fa1..b7b9dbc9 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (container-selinux.tgz) = 33c882a9392490bdca6a111eebc3b0e624ac7a38beb3ce461586963ae6bf01f177dafc5d0ddb24bc0aaf2632af3da62f0b1d1f1dbcae72e863ddb4df74c6164c -SHA512 (selinux-policy-0d0cdeb.tar.gz) = 8bb03ee107a1d1909b8abb984a1f8dfbccfca5a92b2fa2f46a9cd8ca4249b13dfb6e7027c9124dc8e4229040338ddcaa110b45a45cbca8bb9152f9b566e826aa -SHA512 (selinux-policy-contrib-e792d43.tar.gz) = 2344432c1a4aa576d6ba184b56a95542e22214207bd95055bd0dc7f882c43e74aac45365102ea105e3802a9b966827527c5a52ad64ccd31328a26f0bfb515afc +SHA512 (container-selinux.tgz) = 880ecab7b19e062c994544c8ae884ae9f73ee39619e9916ec701d6f025247d10ffca199f3404af6d02eea6f4abc4316871fad95a5026d7abcf0f9c00ff792210 +SHA512 (selinux-policy-contrib-ab25857.tar.gz) = 9056612240ea6027d1ab5bf2b185e1cf1e27a08198ad42343b1d2e0cc49ae94b46d0b121846376de450e3cde75022e6d52c45c1c51cd7e207344e4e40ab74912 +SHA512 (selinux-policy-f69f5fb.tar.gz) = 9279a5ef5730d72d506f0993b23208d1255808b37942fbda80da05063a9773f1c72bd16d2d2058584e241ab55bbdec245be8659ffe36ddf24027f60d50bec9b7