diff --git a/.gitignore b/.gitignore index f04b9632..ba2fcb11 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,3 @@ SOURCES/container-selinux.tgz -SOURCES/selinux-policy-930de65.tar.gz -SOURCES/selinux-policy-contrib-c6da44c.tar.gz +SOURCES/selinux-policy-9a47a4a.tar.gz +SOURCES/selinux-policy-contrib-a8396fe.tar.gz diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata index 56b25789..e5a75d7b 100644 --- a/.selinux-policy.metadata +++ b/.selinux-policy.metadata @@ -1,3 +1,3 @@ -d3b0894e41c57d99285b3b27157a5005562a1544 SOURCES/container-selinux.tgz -b4b9fc7c30163b9d407c714c413ead42290cc838 SOURCES/selinux-policy-930de65.tar.gz -84a66625f87ed784dc752c76eca051d058abfa8d SOURCES/selinux-policy-contrib-c6da44c.tar.gz +d83aa4d6d4668e9ca15a3e5160506af44eaf56f1 SOURCES/container-selinux.tgz +3a0184fb534ece4e1fb8b5c2102c9d615ef49623 SOURCES/selinux-policy-9a47a4a.tar.gz +7fbb4d1e48eeed45e637fe3c0ac63f2fed74dfe6 SOURCES/selinux-policy-contrib-a8396fe.tar.gz diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec index 72e1fda5..7db58705 100644 --- a/SPECS/selinux-policy.spec +++ b/SPECS/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 930de6594243a232b5dfa8931790ad51c982fe8d +%global commit0 9a47a4acc0a62b081f8681508a87f974de4bfd7f %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 c6da44cc670eb76341a756f7d338e60cfa7cd8ac +%global commit1 a8396fef9ea6130a68308bfbd54dfc656fb5037f %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 117%{?dist}.2 +Release: 117%{?dist}.3 License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -717,6 +717,30 @@ exit 0 %endif %changelog +* Tue Aug 29 2023 Zdenek Pytela - 3.14.3-117.3 +- Add unconfined_server_read_semaphores() interface +Resolves: rhbz#2233929 +- Allow insights-client create all rpm logs with a correct label +Resolves: rhbz#2233929 +- Allow insights-client manage generic logs +Resolves: rhbz#2233929 +- Allow insights-client execmem +Resolves: rhbz#2233929 +- Allow insights-client map generic log files +Resolves: rhbz#2233929 +- Allow insights-client work with pipe and socket tmp files +Resolves: rhbz#2233929 +- Allow insights-client getsession process permission +Resolves: rhbz#2233929 +- Allow insights-client work with teamdctl +Resolves: rhbz#2233929 +- Allow insights-client read unconfined service semaphores +Resolves: rhbz#2233929 +- Allow insights-client get quotas of all filesystems +Resolves: rhbz#2233929 +- Allow insights-client read all sysctls +Resolves: rhbz#2233931 + * Mon Jun 12 2023 Zdenek Pytela - 3.14.3-117.2 - Label /run/fsck with fsadm_var_run_t Resolves: rhbz#2212328