import selinux-policy-3.14.3-114.el8

This commit is contained in:
CentOS Sources 2023-01-14 10:10:01 +00:00 committed by Stepan Oksanichenko
parent 8c112be2d7
commit e64262046b
3 changed files with 26 additions and 8 deletions

4
.gitignore vendored
View File

@ -1,3 +1,3 @@
SOURCES/container-selinux.tgz
SOURCES/selinux-policy-1aa8a0e.tar.gz
SOURCES/selinux-policy-contrib-4edd823.tar.gz
SOURCES/selinux-policy-69f08ca.tar.gz
SOURCES/selinux-policy-contrib-58ad0c6.tar.gz

View File

@ -1,3 +1,3 @@
816e9fafc89d3e15db6675cbda54f34b18b0e5f9 SOURCES/container-selinux.tgz
0965955a2b5f2c0e227f0cbafd2628b860d4728f SOURCES/selinux-policy-1aa8a0e.tar.gz
9066c165077809df6abfcbacf5da30a482e9b62d SOURCES/selinux-policy-contrib-4edd823.tar.gz
c756a5380431581b13d6c68417202e00015a7ef7 SOURCES/container-selinux.tgz
8a5ddc921e8fdcf4b4aa42d472d064e3b64ef414 SOURCES/selinux-policy-69f08ca.tar.gz
7bc2148eecd91474263b434a411e26732319fe6f SOURCES/selinux-policy-contrib-58ad0c6.tar.gz

View File

@ -1,11 +1,11 @@
# github repo with selinux-policy base sources
%global git0 https://github.com/fedora-selinux/selinux-policy
%global commit0 1aa8a0e438335c2a5a26350c2dcb180447985f3f
%global commit0 69f08cae339813fbcaaad35e75a033f7ecd66037
%global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
# github repo with selinux-policy contrib sources
%global git1 https://github.com/fedora-selinux/selinux-policy-contrib
%global commit1 4edd823afd43e6e576de2a9f738e686ab485dcc8
%global commit1 58ad0c627362a116b66219ac502261b07800e898
%global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
%define distro redhat
@ -29,7 +29,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.14.3
Release: 113%{?dist}
Release: 114%{?dist}
License: GPLv2+
Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@ -717,6 +717,24 @@ exit 0
%endif
%changelog
* Thu Jan 12 2023 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-114
- Add interfaces in domain, files, and unconfined modules
Resolves: rhbz#2141311
- Allow sysadm_t read/write ipmi devices
Resolves: rhbz#2148561
- Allow sudodomain use sudo.log as a logfile
Resolves: rhbz#2143762
- Add insights additional capabilities
Resolves: rhbz#2158779
- Allow insights client work with gluster and pcp
Resolves: rhbz#2141311
- Allow prosody manage its runtime socket files
Resolves: rhbz#2157902
- Allow system mail service read inherited certmonger runtime files
Resolves: rhbz#2143337
- Add lpr_roles to system_r roles
Resolves: rhbz#2151111
* Thu Dec 15 2022 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-113
- Allow systemd-socket-proxyd get attributes of cgroup filesystems
Resolves: rhbz#2088441