#83 * Thu Jun 04 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-40
Merged 3 years ago by zpytela. Opened 3 years ago by zpytela.
rpms/ zpytela/selinux-policy f32  into  f32

file modified
+2
@@ -462,3 +462,5 @@ 

  /selinux-policy-contrib-80860a3.tar.gz

  /selinux-policy-contrib-f777b81.tar.gz

  /selinux-policy-3c8db64.tar.gz

+ /selinux-policy-contrib-9c8a834.tar.gz

+ /selinux-policy-483ebda.tar.gz

file modified
+20 -3
@@ -1,11 +1,11 @@ 

  # github repo with selinux-policy base sources

  %global git0 https://github.com/fedora-selinux/selinux-policy

- %global commit0 3c8db64d6c6e6f4e682c04ec6a2008a89f125b75

+ %global commit0 483ebda05c11f49c5686b1de646a672147fd5174

  %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})

  

  # github repo with selinux-policy contrib sources

  %global git1 https://github.com/fedora-selinux/selinux-policy-contrib

- %global commit1 f777b8108b617bd8aa91cb884dabe9b43212c248

+ %global commit1 9c8a834c123b78c6650538b829cfc93608965335

  %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})

  

  %define distro redhat
@@ -29,7 +29,7 @@ 

  Summary: SELinux policy configuration

  Name: selinux-policy

  Version: 3.14.5

- Release: 39%{?dist}

+ Release: 40%{?dist}

  License: GPLv2+

  Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz

  Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@@ -774,6 +774,23 @@ 

  %endif

  

  %changelog

+ * Thu Jun 04 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-40

+ - Add fetchmail_uidl_cache_t type for /var/mail/.fetchmail.pid

+ - Support multiple ways of tlp invocation

+ - Allow to getattr files on an nsfs filesystem

+ - httpd: Allow NoNewPriv transition from systemd

+ - Allow rhsmd read process state of all domains and kernel threads

+ - Allow rhsmd mmap /etc/passwd

+ - Allow systemd-logind manage efivarfs files

+ - Allow systemd_modules_load_t to read efivarfs

+ - Allow named transition for /run/tlp from a user shell

+ - Allow initrc_t tlp_filetrans_named_content()

+ - Introduce systemd_read_efivarfs_type attribute

+ - Allow systemd_resolved_t to read efivarfs

+ - Allow ipsec_mgmt_t mmap ipsec_conf_file_t files

+ - Merge pull request #357 from zpytela/f32-tracefs

+ - Add file context for /sys/kernel/tracing

+ 

  * Tue May 19 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-39

  - Label dirsrv systemd unit files and add dirsrv_systemctl()

  - Allow nagios_plugin_domain execute programs in bin directories

file modified
+3 -3
@@ -1,4 +1,4 @@ 

- SHA512 (selinux-policy-contrib-f777b81.tar.gz) = b0ed3aa4a745b9db6bb7654a146cf8809e9d610d4fddec4f87a3cfe7f547358fb930e91cc58b562d9589aa8e93f7557990725fd342d4e1e2b14438a920ffb960

- SHA512 (selinux-policy-3c8db64.tar.gz) = 30907c4df7753a6bee2dcdea38f2bcf3b94bbccb3244879d5b24b925770473ccc4b0c7ee05c39c54ac4350ba6b0f1edd80d3283ed20793d4eabb4026dad92019

- SHA512 (container-selinux.tgz) = 69ce9ee52c8c2050d8547c5a5958e0e8631801272b03eacfbc31a3c6c420bdc67f2b51714506fa5274338b4728f2e898955aa27433b3ade129b22bd9993c7b11

+ SHA512 (selinux-policy-contrib-9c8a834.tar.gz) = 739c1caf7c6f645707133609fe65430704a0ad9187ae8e0ac5cb49d982300e4688eac26cf80d3f2688680442310e57833a5a8c04906e6438358779d50ba3722e

+ SHA512 (selinux-policy-483ebda.tar.gz) = a70fbd90fa4d52d4a9274b2124c0b5f7c1d1deda4bd65c792bb0363224e26e96d562bc51651fcf1ee7eebb957750ee593dcf457c1c03491a8633dcaf6eb9b5c8

+ SHA512 (container-selinux.tgz) = b4e4977e46dcbd824479334e5086a9f7154d70a62a17844684e9c48887872b39c82886cabb9d6ba2c5e5e1a51d49056a22b32b80d8ba01de0b68fb9514d2b670

  SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4

  • Add fetchmail_uidl_cache_t type for /var/mail/.fetchmail.pid
  • Support multiple ways of tlp invocation
  • Allow to getattr files on an nsfs filesystem
  • httpd: Allow NoNewPriv transition from systemd
  • Allow rhsmd read process state of all domains and kernel threads
  • Allow rhsmd mmap /etc/passwd
  • Allow systemd-logind manage efivarfs files
  • Allow systemd_modules_load_t to read efivarfs
  • Allow named transition for /run/tlp from a user shell
  • Allow initrc_t tlp_filetrans_named_content()
  • Introduce systemd_read_efivarfs_type attribute
  • Allow systemd_resolved_t to read efivarfs
  • Allow ipsec_mgmt_t mmap ipsec_conf_file_t files
  • Merge pull request #357 from zpytela/f32-tracefs
  • Add file context for /sys/kernel/tracing

Fedora CI fails only in the bootchartd test which is expected.

Pull-Request has been merged by zpytela

3 years ago