From: <ssm...@us...> - 2007-01-05 14:14:51
|
Revision: 2143 http://svn.sourceforge.net/selinux/?rev=2143&view=rev Author: ssmalley Date: 2007-01-05 06:14:50 -0800 (Fri, 05 Jan 2007) Log Message: ----------- Move into place. Added Paths: ----------- tags/policycoreutils_1_33_5/policycoreutils/ Removed Paths: ------------- tags/policycoreutils_1_33_5x/ Copied: tags/policycoreutils_1_33_5/policycoreutils (from rev 2142, tags/policycoreutils_1_33_5x) This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. |
From: <ssm...@us...> - 2007-01-05 14:14:56
|
Revision: 2144 http://svn.sourceforge.net/selinux/?rev=2144&view=rev Author: ssmalley Date: 2007-01-05 06:14:55 -0800 (Fri, 05 Jan 2007) Log Message: ----------- Move aside. Added Paths: ----------- tags/policycoreutils_1_33_7x/ Removed Paths: ------------- tags/policycoreutils_1_33_7/ Copied: tags/policycoreutils_1_33_7x (from rev 2143, tags/policycoreutils_1_33_7) This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. |
From: <ssm...@us...> - 2007-01-05 14:15:08
|
Revision: 2146 http://svn.sourceforge.net/selinux/?rev=2146&view=rev Author: ssmalley Date: 2007-01-05 06:15:06 -0800 (Fri, 05 Jan 2007) Log Message: ----------- Move into place. Added Paths: ----------- tags/policycoreutils_1_33_7/policycoreutils/ Removed Paths: ------------- tags/policycoreutils_1_33_7x/ Copied: tags/policycoreutils_1_33_7/policycoreutils (from rev 2145, tags/policycoreutils_1_33_7x) This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. |
From: <ssm...@us...> - 2007-01-05 14:43:24
|
Revision: 2149 http://svn.sourceforge.net/selinux/?rev=2149&view=rev Author: ssmalley Date: 2007-01-05 06:43:22 -0800 (Fri, 05 Jan 2007) Log Message: ----------- Cleanups. Added Paths: ----------- tags/policycoreutils_1_27_34/ Removed Paths: ------------- tags/libsemananage_1_3_23/ tags/policyoreutils_1_27_34/ Copied: tags/policycoreutils_1_27_34 (from rev 2148, tags/policyoreutils_1_27_34) This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. |
From: <mad...@us...> - 2007-01-08 20:44:36
|
Revision: 2159 http://svn.sourceforge.net/selinux/?rev=2159&view=rev Author: madmethod Date: 2007-01-08 12:44:34 -0800 (Mon, 08 Jan 2007) Log Message: ----------- tag for libsemanage 1.9.2 Added Paths: ----------- tags/libsemanage_1_9_2/ tags/libsemanage_1_9_2/libsemanage/ tags/libsemanage_1_9_2/libsemanage/ChangeLog tags/libsemanage_1_9_2/libsemanage/VERSION tags/libsemanage_1_9_2/libsemanage/src/conf-parse.y tags/libsemanage_1_9_2/libsemanage/src/conf-scan.l tags/libsemanage_1_9_2/libsemanage/src/direct_api.c tags/libsemanage_1_9_2/libsemanage/src/semanage_conf.h tags/libsemanage_1_9_2/libsemanage/src/semanage_store.c Removed Paths: ------------- tags/libsemanage_1_9_2/libsemanage/ChangeLog tags/libsemanage_1_9_2/libsemanage/VERSION tags/libsemanage_1_9_2/libsemanage/src/conf-parse.y tags/libsemanage_1_9_2/libsemanage/src/conf-scan.l tags/libsemanage_1_9_2/libsemanage/src/direct_api.c tags/libsemanage_1_9_2/libsemanage/src/semanage_conf.h tags/libsemanage_1_9_2/libsemanage/src/semanage_store.c Copied: tags/libsemanage_1_9_2/libsemanage (from rev 2153, trunk/libsemanage) Deleted: tags/libsemanage_1_9_2/libsemanage/ChangeLog =================================================================== --- trunk/libsemanage/ChangeLog 2007-01-05 19:15:46 UTC (rev 2153) +++ tags/libsemanage_1_9_2/libsemanage/ChangeLog 2007-01-08 20:44:34 UTC (rev 2159) @@ -1,535 +0,0 @@ -1.9.1 2006-11-27 - * Merged patch to compile wit -fPIC instead of -fpic from - Manoj Srivastava to prevent hitting the global offest table - limit. Patch changed to include libselinux and libsemanage in - addition to libsepol. -1.8 2006-10-17 - * Updated version for release. - -1.6.17 2006-09-29 - * Merged patch to skip reload if no active store exists and - the store path doesn't match the active store path from Dan Walsh. - * Merged patch to not destroy sepol handle on error path of - connect from James Athey. - * Merged patch to add genhomedircon path to semanage.conf from - James Athey. - -1.6.16 2006-08-14 - * Make most copy errors fatal, but allow exceptions for - file_contexts.local, seusers, and netfilter_contexts if - the source file does not exist in the store. - -1.6.15 2006-08-11 - * Merged separate local file contexts patch from Chris PeBenito. - -1.6.14 2006-08-11 - * Merged patch to make most copy errors non-fatal from Dan Walsh. - -1.6.13 2006-08-03 - * Merged netfilter contexts support from Chris PeBenito. - -1.6.12 2006-07-11 - * Merged support for read operations on read-only fs from - Caleb Case (Tresys Technology). - -1.6.11 2006-06-29 - * Lindent. - -1.6.10 2006-06-26 - * Merged setfiles location check patch from Dan Walsh. - -1.6.9 2006-06-16 - * Merged several fixes from Serge Hallyn: - dbase_file_cache: deref of uninit data on error path. - dbase_policydb_cache: clear fp to avoid double fclose - semanage_fc_sort: destroy temp on error paths - -1.6.8 2006-06-02 - * Updated default location for setfiles to /sbin to - match policycoreutils. This can also be adjusted via - semanage.conf using the syntax: - [setfiles] - path = /path/to/setfiles - args = -q -c $@ $< - [end] - -1.6.7 2006-05-05 - * Merged fix warnings patch from Karl MacMillan. - -1.6.6 2006-04-14 - * Merged updated file context sorting patch from Christopher - Ashworth, with bug fix for escaped character flag. - -1.6.5 2006-04-13 - * Merged file context sorting code from Christopher Ashworth - (Tresys Technology), based on fc_sort.c code in refpolicy. - -1.6.4 2006-04-12 - * Merged python binding t_output_helper removal patch from Dan Walsh. - * Regenerated swig files. - -1.6.3 2006-03-30 - * Merged corrected fix for descriptor leak from Dan Walsh. - -1.6.2 2006-03-20 - * Merged Makefile PYLIBVER definition patch from Dan Walsh. - -1.6.1 2006-03-20 - * Merged man page reorganization from Ivan Gyurdiev. - -1.6 2006-03-14 - * Updated version for release. - -1.5.31 2006-03-09 - * Merged abort early on merge errors patch from Ivan Gyurdiev. - -1.5.30 2006-03-08 - * Cleaned up error handling in semanage_split_fc based on a patch - by Serge Hallyn (IBM) and suggestions by Ivan Gyurdiev. - -1.5.29 2006-02-21 - * Merged MLS handling fixes from Ivan Gyurdiev. - -1.5.28 2006-02-16 - * Merged bug fix for fcontext validate handler from Ivan Gyurdiev. - -1.5.27 2006-02-16 - * Merged base_merge_components changes from Ivan Gyurdiev. - -1.5.26 2006-02-15 - * Merged paths array patch from Ivan Gyurdiev. - * Merged bug fix patch from Ivan Gyurdiev. - -1.5.25 2006-02-14 - * Merged improve bindings patch from Ivan Gyurdiev. - -1.5.24 2006-02-14 - * Merged use PyList patch from Ivan Gyurdiev. - * Merged memory leak fix patch from Ivan Gyurdiev. - * Merged nodecon support patch from Ivan Gyurdiev. - * Merged cleanups patch from Ivan Gyurdiev. - * Merged split swig patch from Ivan Gyurdiev. - -1.5.23 2006-02-13 - * Merged optionals in base patch from Joshua Brindle. - -1.5.22 2006-02-13 - * Merged treat seusers/users_extra as optional sections patch from - Ivan Gyurdiev. - * Merged parse_optional fixes from Ivan Gyurdiev. - -1.5.21 2006-02-07 - * Merged seuser/user_extra support patch from Joshua Brindle. - * Merged remote system dbase patch from Ivan Gyurdiev. - -1.5.20 2006-02-02 - * Merged clone record on set_con patch from Ivan Gyurdiev. - -1.5.19 2006-01-30 - * Merged fname parameter patch from Ivan Gyurdiev. - * Merged more size_t -> unsigned int fixes from Ivan Gyurdiev. - * Merged seusers.system patch from Ivan Gyurdiev. - * Merged improve port/fcontext API patch from Ivan Gyurdiev. - -1.5.18 2006-01-27 - * Merged seuser -> seuser_local rename patch from Ivan Gyurdiev. - -1.5.17 2006-01-27 - * Merged set_create_store, access_check, and is_connected interfaces - from Joshua Brindle. - -1.5.16 2006-01-19 - * Regenerate python wrappers. - -1.5.15 2006-01-18 - * Merged pywrap Makefile diff from Dan Walsh. - * Merged cache management patch from Ivan Gyurdiev. - * Merged bugfix for dbase_llist_clear from Ivan Gyurdiev. - * Merged remove apply_local function patch from Ivan Gyurdiev. - * Merged only do read locking in direct case patch from Ivan Gyurdiev. - * Merged cache error path memory leak fix from Ivan Gyurdiev. - * Merged auto-generated file header patch from Ivan Gyurdiev. - * Merged pywrap test update from Ivan Gyurdiev. - * Merged hidden defs update from Ivan Gyurdiev. - -1.5.14 2006-01-13 - * Merged disallow port overlap patch from Ivan Gyurdiev. - -1.5.13 2006-01-12 - * Merged join prereq and implementation patches from Ivan Gyurdiev. - * Merged join user extra data part 2 patch from Ivan Gyurdiev. - * Merged bugfix patch from Ivan Gyurdiev. - -1.5.12 2006-01-12 - * Merged remove add_local/set_local patch from Ivan Gyurdiev. - * Merged user extra data part 1 patch from Ivan Gyurdiev. - * Merged size_t -> unsigned int patch from Ivan Gyurdiev. - * Merged calloc check in semanage_store patch from Ivan Gyurdiev, - bug noticed by Steve Grubb. - * Merged cleanups after add/set removal patch from Ivan Gyurdiev. - -1.5.11 2006-01-09 - * Merged fcontext compare fix from Ivan Gyurdiev. - -1.5.10 2006-01-06 - * Fixed commit to return the commit number aka policy sequence number. - -1.5.9 2006-01-06 - * Merged const in APIs patch from Ivan Gyurdiev. - * Merged validation of local file contexts patch from Ivan Gyurdiev. - * Merged compare2 function patch from Ivan Gyurdiev. - * Merged hidden def/proto update patch from Ivan Gyurdiev. - -1.5.8 2006-01-05 - * Re-applied string and file optimization patch from Russell Coker, - with bug fix. - -1.5.7 2006-01-05 - * Reverted string and file optimization patch from Russell Coker. - -1.5.6 2006-01-05 - * Clarified error messages from parse_module_headers and - parse_base_headers for base/module mismatches. - -1.5.5 2006-01-05 - * Merged string and file optimization patch from Russell Coker. - * Merged swig header reordering patch from Ivan Gyurdiev. - * Merged toggle modify on add patch from Ivan Gyurdiev. - * Merged ports parser bugfix patch from Ivan Gyurdiev. - * Merged fcontext swig patch from Ivan Gyurdiev. - * Merged remove add/modify/delete for active booleans patch from Ivan Gyurdiev. - * Merged man pages for dbase functions patch from Ivan Gyurdiev. - * Merged pywrap tests patch from Ivan Gyurdiev. - -1.5.4 2006-01-04 - * Merged patch series from Ivan Gyurdiev. - This includes patches to: - - separate file rw code from linked list - - annotate objects - - fold together internal headers - - support ordering of records in compare function - - add active dbase backend, active booleans - - return commit numbers for ro database calls - - use modified flags to skip rebuild whenever possible - - enable port interfaces - - update swig interfaces and typemaps - - add an API for file_contexts.local and file_contexts - - flip the traversal order in iterate/list - - reorganize sandbox_expand - - add seusers MLS validation - - improve dbase spec/documentation - - clone record on set/add/modify - -1.5.3 2005-12-14 - * Merged further header cleanups from Ivan Gyurdiev. - -1.5.2 2005-12-13 - * Merged toggle modified flag in policydb_modify, fix memory leak - in clear_obsolete, polymorphism vs headers fix, and include guards - for internal headers patches from Ivan Gyurdiev. - -1.5.1 2005-12-12 - * Added file-mode= setting to semanage.conf, default to 0644. - Changed semanage_copy_file and callers to use this mode when - installing policy files to runtime locations. - -1.4 2005-12-07 - * Updated version for release. - -1.3.64 2005-12-06 - * Changed semanage_handle_create() to set do_reload based on - is_selinux_enabled(). This prevents improper attempts to - load policy on a non-SELinux system. - -1.3.63 2005-12-05 - * Dropped handle from user_del_role interface. - -1.3.62 2005-12-05 - * Removed defrole interfaces. - -1.3.61 2005-11-29 - * Merged Makefile python definitions patch from Dan Walsh. - -1.3.60 2005-11-29 - * Removed is_selinux_mls_enabled() conditionals in seusers and users - file parsers. - -1.3.59 2005-11-28 - * Merged wrap char*** for user_get_roles patch from Joshua Brindle. - -1.3.58 2005-11-28 - * Merged remove defrole from sepol patch from Ivan Gyurdiev. - -1.3.57 2005-11-28 - * Merged swig wrappers for modifying users and seusers from Joshua Brindle. - -1.3.56 2005-11-16 - * Fixed free->key_free bug. - -1.3.55 2005-11-16 - * Merged clear obsolete patch from Ivan Gyurdiev. - -1.3.54 2005-11-15 - * Merged modified swigify patch from Dan Walsh - (original patch from Joshua Brindle). - * Merged move genhomedircon call patch from Chad Sellers. - -1.3.53 2005-11-10 - * Merged move seuser validation patch from Ivan Gyurdiev. - * Merged hidden declaration fixes from Ivan Gyurdiev, - with minor corrections. - -1.3.52 2005-11-09 - * Merged cleanup patch from Ivan Gyurdiev. - This renames semanage_module_conn to semanage_direct_handle, - and moves sepol handle create/destroy into semanage handle - create/destroy to allow use even when disconnected (for the - record interfaces). - -1.3.51 2005-11-08 - * Clear modules modified flag upon disconnect and commit. - -1.3.50 2005-11-08 - * Added tracking of module modifications and use it to - determine whether expand-time checks should be applied - on commit. - -1.3.49 2005-11-08 - * Reverted semanage_set_reload_bools() interface. - -1.3.48 2005-11-08 - * Disabled calls to port dbase for merge and commit and stubbed - out calls to sepol_port interfaces since they are not exported. - -1.3.47 2005-11-08 - * Merged rename instead of copy patch from Joshua Brindle (Tresys). - -1.3.46 2005-11-07 - * Added hidden_def/hidden_proto for exported symbols used within - libsemanage to eliminate relocations. Wrapped type definitions - in exported headers as needed to avoid conflicts. Added - src/context_internal.h and src/iface_internal.h. - -1.3.45 2005-11-07 - * Added semanage_is_managed() interface to allow detection of whether - the policy is managed via libsemanage. This enables proper handling - in setsebool for non-managed systems. - -1.3.44 2005-11-07 - * Merged semanage_set_reload_bools() interface from Ivan Gyurdiev, - to enable runtime control over preserving active boolean values - versus reloading their saved settings upon commit. - -1.3.43 2005-11-04 - * Merged seuser parser resync, dbase tracking and cleanup, strtol - bug, copyright, and assert space patches from Ivan Gyurdiev. - -1.3.42 2005-11-04 - * Added src/*_internal.h in preparation for other changes. - * Added hidden/hidden_proto/hidden_def to src/debug.[hc] and - src/seusers.[hc]. - -1.3.41 2005-11-03 - * Merged interface parse/print, context_to_string interface change, - move assert_noeof, and order preserving patches from Ivan Gyurdiev. - * Added src/dso.h in preparation for other changes. - -1.3.40 2005-11-01 - * Merged install seusers, handle/error messages, MLS parsing, - and seusers validation patches from Ivan Gyurdiev. - -1.3.39 2005-10-31 - * Merged record interface, dbase flush, common database code, - and record bugfix patches from Ivan Gyurdiev. - -1.3.38 2005-10-27 - * Merged dbase policydb list and count change from Ivan Gyurdiev. - -1.3.37 2005-10-27 - * Merged enable dbase and set relay patches from Ivan Gyurdiev. - -1.3.36 2005-10-27 - * Merged query APIs and dbase_file_set patches from Ivan Gyurdiev. - -1.3.35 2005-10-26 - * Merged sepol handle passing, seusers support, and policydb cache - patches from Ivan Gyurdiev. - -1.3.34 2005-10-25 - * Merged resync to sepol changes and booleans fixes/improvements - patches from Ivan Gyurdiev. - -1.3.33 2005-10-25 - * Merged support for genhomedircon/homedir template, store selection, - explicit policy reload, and semanage.conf relocation from Joshua - Brindle. - -1.3.32 2005-10-24 - * Merged resync to sepol changes and transaction fix patches from - Ivan Gyurdiev. - -1.3.31 2005-10-21 - * Merged reorganize users patch from Ivan Gyurdiev. - * Merged remove unused relay functions patch from Ivan Gyurdiev. - -1.3.30 2005-10-20 - * Fixed policy file leaks in semanage_load_module and - semanage_write_module. - * Merged further database work from Ivan Gyurdiev. - -1.3.29 2005-10-20 - * Fixed bug in semanage_direct_disconnect. - -1.3.28 2005-10-20 - * Merged interface renaming patch from Ivan Gyurdiev. - * Merged policy component patch from Ivan Gyurdiev. - -1.3.27 2005-10-20 - * Renamed 'check=' configuration value to 'expand-check=' for - clarity. - * Changed semanage_commit_sandbox to check for and report errors - on rename(2) calls performed during rollback. - -1.3.26 2005-10-19 - * Added optional check= configuration value to semanage.conf - and updated call to sepol_expand_module to pass its value - to control assertion and hierarchy checking on module expansion. - -1.3.25 2005-10-19 - * Merged fixes for make DESTDIR= builds from Joshua Brindle. - -1.3.24 2005-10-19 - * Merged default database from Ivan Gyurdiev. - * Merged removal of connect requirement in policydb backend from - Ivan Gyurdiev. - * Merged commit locking fix and lock rename from Joshua Brindle. - * Merged transaction rollback in lock patch from Joshua Brindle. - -1.3.23 2005-10-18 - * Changed default args for load_policy to be null, as it no longer - takes a pathname argument and we want to preserve booleans. - -1.3.22 2005-10-18 - * Merged move local dbase initialization patch from Ivan Gyurdiev. - * Merged acquire/release read lock in databases patch from Ivan Gyurdiev. - * Merged rename direct -> policydb as appropriate patch from Ivan Gyurdiev. - -1.3.21 2005-10-18 - * Added calls to sepol_policy_file_set_handle interface prior - to invoking sepol operations on policy files. - * Updated call to sepol_policydb_from_image to pass the handle. - -1.3.20 2005-10-17 - * Merged user and port APIs - policy database patch from Ivan - Gyurdiev. - -1.3.19 2005-10-17 - * Converted calls to sepol link_packages and expand_module interfaces - from using buffers to using sepol handles for error reporting, and - changed direct_connect/disconnect to create/destroy sepol handles. - -1.3.18 2005-10-14 - * Merged bugfix patch from Ivan Gyurdiev. - -1.3.17 2005-10-14 - * Merged seuser database patch from Ivan Gyurdiev. - Merged direct user/port databases to the handle from Ivan Gyurdiev. - -1.3.16 2005-10-14 - * Removed obsolete include/semanage/commit_api.h (leftover). - Merged seuser record patch from Ivan Gyurdiev. - -1.3.15 2005-10-14 - * Merged boolean and interface databases from Ivan Gyurdiev. - -1.3.14 2005-10-13 - * Updated to use get interfaces for hidden sepol_module_package type. - -1.3.13 2005-10-13 - * Changed semanage_expand_sandbox and semanage_install_active - to generate/install the latest policy version supported by libsepol - by default (unless overridden by semanage.conf), since libselinux - will now downgrade automatically for load_policy. - -1.3.12 2005-10-13 - * Merged new callback-based error reporting system and ongoing - database work from Ivan Gyurdiev. - -1.3.11 2005-10-11 - * Fixed semanage_install_active() to use the same logic for - selecting a policy version as semanage_expand_sandbox(). Dropped - dead code from semanage_install_sandbox(). - -1.3.10 2005-10-07 - * Updated for changes to libsepol, and to only use types and interfaces - provided by the shared libsepol. - -1.3.9 2005-10-06 - * Merged further database work from Ivan Gyurdiev. - -1.3.8 2005-10-04 - * Merged iterate, redistribute, and dbase split patches from - Ivan Gyurdiev. - -1.3.7 2005-09-30 - * Merged patch series from Ivan Gyurdiev. - (pointer typedef elimination, file renames, dbase work, backend - separation) - -1.3.6 2005-09-28 - * Split interfaces from semanage.[hc] into handle.[hc], modules.[hc]. - * Separated handle create from connect interface. - * Added a constructor for initialization. - * Moved up src/include/*.h to src. - * Created a symbol map file; dropped dso.h and hidden markings. - -1.3.5 2005-09-28 - * Merged major update to libsemanage organization and functionality - from Karl MacMillan (Tresys). - -1.3.4 2005-09-23 - * Merged dbase redesign patch from Ivan Gyurdiev. - -1.3.3 2005-09-21 - * Merged boolean record, stub record handler, and status codes - patches from Ivan Gyurdiev. - -1.3.2 2005-09-16 - * Merged stub iterator functionality from Ivan Gyurdiev. - * Merged interface record patch from Ivan Gyurdiev. - -1.3.1 2005-09-14 - * Merged stub functionality for managing user and port records, - and record table code from Ivan Gyurdiev. - -1.2 2005-09-06 - * Updated version for release. - -1.1.6 2005-08-31 - * Merged semod.conf template patch from Dan Walsh (Red Hat), - but restored location to /usr/share/semod/semod.conf. - -1.1.5 2005-08-30 - * Fixed several bugs found by valgrind. - * Fixed bug in prior patch for the semod_build_module_list leak. - -1.1.4 2005-08-25 - * Merged errno fix from Joshua Brindle (Tresys). - * Merged fix for semod_build_modules_list leak on error path - from Serge Hallyn (IBM). Bug found by Coverity. - -1.1.3 2005-08-22 - * Merged several fixes from Serge Hallyn (IBM). Bugs found by - Coverity. - * Fixed several other bugs and warnings. - -1.1.2 2005-08-02 - * Merged patch to move module read/write code from libsemanage - to libsepol from Jason Tang (Tresys). - -1.1.1 2005-08-02 - * Merged relay records patch from Ivan Gyurdiev. - * Merged key extract patch from Ivan Gyurdiev. - -1.0 2005-07-27 - * Initial version. Copied: tags/libsemanage_1_9_2/libsemanage/ChangeLog (from rev 2157, trunk/libsemanage/ChangeLog) =================================================================== --- tags/libsemanage_1_9_2/libsemanage/ChangeLog (rev 0) +++ tags/libsemanage_1_9_2/libsemanage/ChangeLog 2007-01-08 20:44:34 UTC (rev 2159) @@ -0,0 +1,541 @@ +1.9.2 2007-01-08 + * Merged patch to optionally reduce disk usage by removing + the backup module store and linked policy from Karl MacMillan + * Merged patch to correctly propagate return values in libsemanage + +1.9.1 2006-11-27 + * Merged patch to compile wit -fPIC instead of -fpic from + Manoj Srivastava to prevent hitting the global offest table + limit. Patch changed to include libselinux and libsemanage in + addition to libsepol. + +1.8 2006-10-17 + * Updated version for release. + +1.6.17 2006-09-29 + * Merged patch to skip reload if no active store exists and + the store path doesn't match the active store path from Dan Walsh. + * Merged patch to not destroy sepol handle on error path of + connect from James Athey. + * Merged patch to add genhomedircon path to semanage.conf from + James Athey. + +1.6.16 2006-08-14 + * Make most copy errors fatal, but allow exceptions for + file_contexts.local, seusers, and netfilter_contexts if + the source file does not exist in the store. + +1.6.15 2006-08-11 + * Merged separate local file contexts patch from Chris PeBenito. + +1.6.14 2006-08-11 + * Merged patch to make most copy errors non-fatal from Dan Walsh. + +1.6.13 2006-08-03 + * Merged netfilter contexts support from Chris PeBenito. + +1.6.12 2006-07-11 + * Merged support for read operations on read-only fs from + Caleb Case (Tresys Technology). + +1.6.11 2006-06-29 + * Lindent. + +1.6.10 2006-06-26 + * Merged setfiles location check patch from Dan Walsh. + +1.6.9 2006-06-16 + * Merged several fixes from Serge Hallyn: + dbase_file_cache: deref of uninit data on error path. + dbase_policydb_cache: clear fp to avoid double fclose + semanage_fc_sort: destroy temp on error paths + +1.6.8 2006-06-02 + * Updated default location for setfiles to /sbin to + match policycoreutils. This can also be adjusted via + semanage.conf using the syntax: + [setfiles] + path = /path/to/setfiles + args = -q -c $@ $< + [end] + +1.6.7 2006-05-05 + * Merged fix warnings patch from Karl MacMillan. + +1.6.6 2006-04-14 + * Merged updated file context sorting patch from Christopher + Ashworth, with bug fix for escaped character flag. + +1.6.5 2006-04-13 + * Merged file context sorting code from Christopher Ashworth + (Tresys Technology), based on fc_sort.c code in refpolicy. + +1.6.4 2006-04-12 + * Merged python binding t_output_helper removal patch from Dan Walsh. + * Regenerated swig files. + +1.6.3 2006-03-30 + * Merged corrected fix for descriptor leak from Dan Walsh. + +1.6.2 2006-03-20 + * Merged Makefile PYLIBVER definition patch from Dan Walsh. + +1.6.1 2006-03-20 + * Merged man page reorganization from Ivan Gyurdiev. + +1.6 2006-03-14 + * Updated version for release. + +1.5.31 2006-03-09 + * Merged abort early on merge errors patch from Ivan Gyurdiev. + +1.5.30 2006-03-08 + * Cleaned up error handling in semanage_split_fc based on a patch + by Serge Hallyn (IBM) and suggestions by Ivan Gyurdiev. + +1.5.29 2006-02-21 + * Merged MLS handling fixes from Ivan Gyurdiev. + +1.5.28 2006-02-16 + * Merged bug fix for fcontext validate handler from Ivan Gyurdiev. + +1.5.27 2006-02-16 + * Merged base_merge_components changes from Ivan Gyurdiev. + +1.5.26 2006-02-15 + * Merged paths array patch from Ivan Gyurdiev. + * Merged bug fix patch from Ivan Gyurdiev. + +1.5.25 2006-02-14 + * Merged improve bindings patch from Ivan Gyurdiev. + +1.5.24 2006-02-14 + * Merged use PyList patch from Ivan Gyurdiev. + * Merged memory leak fix patch from Ivan Gyurdiev. + * Merged nodecon support patch from Ivan Gyurdiev. + * Merged cleanups patch from Ivan Gyurdiev. + * Merged split swig patch from Ivan Gyurdiev. + +1.5.23 2006-02-13 + * Merged optionals in base patch from Joshua Brindle. + +1.5.22 2006-02-13 + * Merged treat seusers/users_extra as optional sections patch from + Ivan Gyurdiev. + * Merged parse_optional fixes from Ivan Gyurdiev. + +1.5.21 2006-02-07 + * Merged seuser/user_extra support patch from Joshua Brindle. + * Merged remote system dbase patch from Ivan Gyurdiev. + +1.5.20 2006-02-02 + * Merged clone record on set_con patch from Ivan Gyurdiev. + +1.5.19 2006-01-30 + * Merged fname parameter patch from Ivan Gyurdiev. + * Merged more size_t -> unsigned int fixes from Ivan Gyurdiev. + * Merged seusers.system patch from Ivan Gyurdiev. + * Merged improve port/fcontext API patch from Ivan Gyurdiev. + +1.5.18 2006-01-27 + * Merged seuser -> seuser_local rename patch from Ivan Gyurdiev. + +1.5.17 2006-01-27 + * Merged set_create_store, access_check, and is_connected interfaces + from Joshua Brindle. + +1.5.16 2006-01-19 + * Regenerate python wrappers. + +1.5.15 2006-01-18 + * Merged pywrap Makefile diff from Dan Walsh. + * Merged cache management patch from Ivan Gyurdiev. + * Merged bugfix for dbase_llist_clear from Ivan Gyurdiev. + * Merged remove apply_local function patch from Ivan Gyurdiev. + * Merged only do read locking in direct case patch from Ivan Gyurdiev. + * Merged cache error path memory leak fix from Ivan Gyurdiev. + * Merged auto-generated file header patch from Ivan Gyurdiev. + * Merged pywrap test update from Ivan Gyurdiev. + * Merged hidden defs update from Ivan Gyurdiev. + +1.5.14 2006-01-13 + * Merged disallow port overlap patch from Ivan Gyurdiev. + +1.5.13 2006-01-12 + * Merged join prereq and implementation patches from Ivan Gyurdiev. + * Merged join user extra data part 2 patch from Ivan Gyurdiev. + * Merged bugfix patch from Ivan Gyurdiev. + +1.5.12 2006-01-12 + * Merged remove add_local/set_local patch from Ivan Gyurdiev. + * Merged user extra data part 1 patch from Ivan Gyurdiev. + * Merged size_t -> unsigned int patch from Ivan Gyurdiev. + * Merged calloc check in semanage_store patch from Ivan Gyurdiev, + bug noticed by Steve Grubb. + * Merged cleanups after add/set removal patch from Ivan Gyurdiev. + +1.5.11 2006-01-09 + * Merged fcontext compare fix from Ivan Gyurdiev. + +1.5.10 2006-01-06 + * Fixed commit to return the commit number aka policy sequence number. + +1.5.9 2006-01-06 + * Merged const in APIs patch from Ivan Gyurdiev. + * Merged validation of local file contexts patch from Ivan Gyurdiev. + * Merged compare2 function patch from Ivan Gyurdiev. + * Merged hidden def/proto update patch from Ivan Gyurdiev. + +1.5.8 2006-01-05 + * Re-applied string and file optimization patch from Russell Coker, + with bug fix. + +1.5.7 2006-01-05 + * Reverted string and file optimization patch from Russell Coker. + +1.5.6 2006-01-05 + * Clarified error messages from parse_module_headers and + parse_base_headers for base/module mismatches. + +1.5.5 2006-01-05 + * Merged string and file optimization patch from Russell Coker. + * Merged swig header reordering patch from Ivan Gyurdiev. + * Merged toggle modify on add patch from Ivan Gyurdiev. + * Merged ports parser bugfix patch from Ivan Gyurdiev. + * Merged fcontext swig patch from Ivan Gyurdiev. + * Merged remove add/modify/delete for active booleans patch from Ivan Gyurdiev. + * Merged man pages for dbase functions patch from Ivan Gyurdiev. + * Merged pywrap tests patch from Ivan Gyurdiev. + +1.5.4 2006-01-04 + * Merged patch series from Ivan Gyurdiev. + This includes patches to: + - separate file rw code from linked list + - annotate objects + - fold together internal headers + - support ordering of records in compare function + - add active dbase backend, active booleans + - return commit numbers for ro database calls + - use modified flags to skip rebuild whenever possible + - enable port interfaces + - update swig interfaces and typemaps + - add an API for file_contexts.local and file_contexts + - flip the traversal order in iterate/list + - reorganize sandbox_expand + - add seusers MLS validation + - improve dbase spec/documentation + - clone record on set/add/modify + +1.5.3 2005-12-14 + * Merged further header cleanups from Ivan Gyurdiev. + +1.5.2 2005-12-13 + * Merged toggle modified flag in policydb_modify, fix memory leak + in clear_obsolete, polymorphism vs headers fix, and include guards + for internal headers patches from Ivan Gyurdiev. + +1.5.1 2005-12-12 + * Added file-mode= setting to semanage.conf, default to 0644. + Changed semanage_copy_file and callers to use this mode when + installing policy files to runtime locations. + +1.4 2005-12-07 + * Updated version for release. + +1.3.64 2005-12-06 + * Changed semanage_handle_create() to set do_reload based on + is_selinux_enabled(). This prevents improper attempts to + load policy on a non-SELinux system. + +1.3.63 2005-12-05 + * Dropped handle from user_del_role interface. + +1.3.62 2005-12-05 + * Removed defrole interfaces. + +1.3.61 2005-11-29 + * Merged Makefile python definitions patch from Dan Walsh. + +1.3.60 2005-11-29 + * Removed is_selinux_mls_enabled() conditionals in seusers and users + file parsers. + +1.3.59 2005-11-28 + * Merged wrap char*** for user_get_roles patch from Joshua Brindle. + +1.3.58 2005-11-28 + * Merged remove defrole from sepol patch from Ivan Gyurdiev. + +1.3.57 2005-11-28 + * Merged swig wrappers for modifying users and seusers from Joshua Brindle. + +1.3.56 2005-11-16 + * Fixed free->key_free bug. + +1.3.55 2005-11-16 + * Merged clear obsolete patch from Ivan Gyurdiev. + +1.3.54 2005-11-15 + * Merged modified swigify patch from Dan Walsh + (original patch from Joshua Brindle). + * Merged move genhomedircon call patch from Chad Sellers. + +1.3.53 2005-11-10 + * Merged move seuser validation patch from Ivan Gyurdiev. + * Merged hidden declaration fixes from Ivan Gyurdiev, + with minor corrections. + +1.3.52 2005-11-09 + * Merged cleanup patch from Ivan Gyurdiev. + This renames semanage_module_conn to semanage_direct_handle, + and moves sepol handle create/destroy into semanage handle + create/destroy to allow use even when disconnected (for the + record interfaces). + +1.3.51 2005-11-08 + * Clear modules modified flag upon disconnect and commit. + +1.3.50 2005-11-08 + * Added tracking of module modifications and use it to + determine whether expand-time checks should be applied + on commit. + +1.3.49 2005-11-08 + * Reverted semanage_set_reload_bools() interface. + +1.3.48 2005-11-08 + * Disabled calls to port dbase for merge and commit and stubbed + out calls to sepol_port interfaces since they are not exported. + +1.3.47 2005-11-08 + * Merged rename instead of copy patch from Joshua Brindle (Tresys). + +1.3.46 2005-11-07 + * Added hidden_def/hidden_proto for exported symbols used within + libsemanage to eliminate relocations. Wrapped type definitions + in exported headers as needed to avoid conflicts. Added + src/context_internal.h and src/iface_internal.h. + +1.3.45 2005-11-07 + * Added semanage_is_managed() interface to allow detection of whether + the policy is managed via libsemanage. This enables proper handling + in setsebool for non-managed systems. + +1.3.44 2005-11-07 + * Merged semanage_set_reload_bools() interface from Ivan Gyurdiev, + to enable runtime control over preserving active boolean values + versus reloading their saved settings upon commit. + +1.3.43 2005-11-04 + * Merged seuser parser resync, dbase tracking and cleanup, strtol + bug, copyright, and assert space patches from Ivan Gyurdiev. + +1.3.42 2005-11-04 + * Added src/*_internal.h in preparation for other changes. + * Added hidden/hidden_proto/hidden_def to src/debug.[hc] and + src/seusers.[hc]. + +1.3.41 2005-11-03 + * Merged interface parse/print, context_to_string interface change, + move assert_noeof, and order preserving patches from Ivan Gyurdiev. + * Added src/dso.h in preparation for other changes. + +1.3.40 2005-11-01 + * Merged install seusers, handle/error messages, MLS parsing, + and seusers validation patches from Ivan Gyurdiev. + +1.3.39 2005-10-31 + * Merged record interface, dbase flush, common database code, + and record bugfix patches from Ivan Gyurdiev. + +1.3.38 2005-10-27 + * Merged dbase policydb list and count change from Ivan Gyurdiev. + +1.3.37 2005-10-27 + * Merged enable dbase and set relay patches from Ivan Gyurdiev. + +1.3.36 2005-10-27 + * Merged query APIs and dbase_file_set patches from Ivan Gyurdiev. + +1.3.35 2005-10-26 + * Merged sepol handle passing, seusers support, and policydb cache + patches from Ivan Gyurdiev. + +1.3.34 2005-10-25 + * Merged resync to sepol changes and booleans fixes/improvements + patches from Ivan Gyurdiev. + +1.3.33 2005-10-25 + * Merged support for genhomedircon/homedir template, store selection, + explicit policy reload, and semanage.conf relocation from Joshua + Brindle. + +1.3.32 2005-10-24 + * Merged resync to sepol changes and transaction fix patches from + Ivan Gyurdiev. + +1.3.31 2005-10-21 + * Merged reorganize users patch from Ivan Gyurdiev. + * Merged remove unused relay functions patch from Ivan Gyurdiev. + +1.3.30 2005-10-20 + * Fixed policy file leaks in semanage_load_module and + semanage_write_module. + * Merged further database work from Ivan Gyurdiev. + +1.3.29 2005-10-20 + * Fixed bug in semanage_direct_disconnect. + +1.3.28 2005-10-20 + * Merged interface renaming patch from Ivan Gyurdiev. + * Merged policy component patch from Ivan Gyurdiev. + +1.3.27 2005-10-20 + * Renamed 'check=' configuration value to 'expand-check=' for + clarity. + * Changed semanage_commit_sandbox to check for and report errors + on rename(2) calls performed during rollback. + +1.3.26 2005-10-19 + * Added optional check= configuration value to semanage.conf + and updated call to sepol_expand_module to pass its value + to control assertion and hierarchy checking on module expansion. + +1.3.25 2005-10-19 + * Merged fixes for make DESTDIR= builds from Joshua Brindle. + +1.3.24 2005-10-19 + * Merged default database from Ivan Gyurdiev. + * Merged removal of connect requirement in policydb backend from + Ivan Gyurdiev. + * Merged commit locking fix and lock rename from Joshua Brindle. + * Merged transaction rollback in lock patch from Joshua Brindle. + +1.3.23 2005-10-18 + * Changed default args for load_policy to be null, as it no longer + takes a pathname argument and we want to preserve booleans. + +1.3.22 2005-10-18 + * Merged move local dbase initialization patch from Ivan Gyurdiev. + * Merged acquire/release read lock in databases patch from Ivan Gyurdiev. + * Merged rename direct -> policydb as appropriate patch from Ivan Gyurdiev. + +1.3.21 2005-10-18 + * Added calls to sepol_policy_file_set_handle interface prior + to invoking sepol operations on policy files. + * Updated call to sepol_policydb_from_image to pass the handle. + +1.3.20 2005-10-17 + * Merged user and port APIs - policy database patch from Ivan + Gyurdiev. + +1.3.19 2005-10-17 + * Converted calls to sepol link_packages and expand_module interfaces + from using buffers to using sepol handles for error reporting, and + changed direct_connect/disconnect to create/destroy sepol handles. + +1.3.18 2005-10-14 + * Merged bugfix patch from Ivan Gyurdiev. + +1.3.17 2005-10-14 + * Merged seuser database patch from Ivan Gyurdiev. + Merged direct user/port databases to the handle from Ivan Gyurdiev. + +1.3.16 2005-10-14 + * Removed obsolete include/semanage/commit_api.h (leftover). + Merged seuser record patch from Ivan Gyurdiev. + +1.3.15 2005-10-14 + * Merged boolean and interface databases from Ivan Gyurdiev. + +1.3.14 2005-10-13 + * Updated to use get interfaces for hidden sepol_module_package type. + +1.3.13 2005-10-13 + * Changed semanage_expand_sandbox and semanage_install_active + to generate/install the latest policy version supported by libsepol + by default (unless overridden by semanage.conf), since libselinux + will now downgrade automatically for load_policy. + +1.3.12 2005-10-13 + * Merged new callback-based error reporting system and ongoing + database work from Ivan Gyurdiev. + +1.3.11 2005-10-11 + * Fixed semanage_install_active() to use the same logic for + selecting a policy version as semanage_expand_sandbox(). Dropped + dead code from semanage_install_sandbox(). + +1.3.10 2005-10-07 + * Updated for changes to libsepol, and to only use types and interfaces + provided by the shared libsepol. + +1.3.9 2005-10-06 + * Merged further database work from Ivan Gyurdiev. + +1.3.8 2005-10-04 + * Merged iterate, redistribute, and dbase split patches from + Ivan Gyurdiev. + +1.3.7 2005-09-30 + * Merged patch series from Ivan Gyurdiev. + (pointer typedef elimination, file renames, dbase work, backend + separation) + +1.3.6 2005-09-28 + * Split interfaces from semanage.[hc] into handle.[hc], modules.[hc]. + * Separated handle create from connect interface. + * Added a constructor for initialization. + * Moved up src/include/*.h to src. + * Created a symbol map file; dropped dso.h and hidden markings. + +1.3.5 2005-09-28 + * Merged major update to libsemanage organization and functionality + from Karl MacMillan (Tresys). + +1.3.4 2005-09-23 + * Merged dbase redesign patch from Ivan Gyurdiev. + +1.3.3 2005-09-21 + * Merged boolean record, stub record handler, and status codes + patches from Ivan Gyurdiev. + +1.3.2 2005-09-16 + * Merged stub iterator functionality from Ivan Gyurdiev. + * Merged interface record patch from Ivan Gyurdiev. + +1.3.1 2005-09-14 + * Merged stub functionality for managing user and port records, + and record table code from Ivan Gyurdiev. + +1.2 2005-09-06 + * Updated version for release. + +1.1.6 2005-08-31 + * Merged semod.conf template patch from Dan Walsh (Red Hat), + but restored location to /usr/share/semod/semod.conf. + +1.1.5 2005-08-30 + * Fixed several bugs found by valgrind. + * Fixed bug in prior patch for the semod_build_module_list leak. + +1.1.4 2005-08-25 + * Merged errno fix from Joshua Brindle (Tresys). + * Merged fix for semod_build_modules_list leak on error path + from Serge Hallyn (IBM). Bug found by Coverity. + +1.1.3 2005-08-22 + * Merged several fixes from Serge Hallyn (IBM). Bugs found by + Coverity. + * Fixed several other bugs and warnings. + +1.1.2 2005-08-02 + * Merged patch to move module read/write code from libsemanage + to libsepol from Jason Tang (Tresys). + +1.1.1 2005-08-02 + * Merged relay records patch from Ivan Gyurdiev. + * Merged key extract patch from Ivan Gyurdiev. + +1.0 2005-07-27 + * Initial version. Deleted: tags/libsemanage_1_9_2/libsemanage/VERSION =================================================================== --- trunk/libsemanage/VERSION 2007-01-05 19:15:46 UTC (rev 2153) +++ tags/libsemanage_1_9_2/libsemanage/VERSION 2007-01-08 20:44:34 UTC (rev 2159) @@ -1 +0,0 @@ -1.9.1 Copied: tags/libsemanage_1_9_2/libsemanage/VERSION (from rev 2157, trunk/libsemanage/VERSION) =================================================================== --- tags/libsemanage_1_9_2/libsemanage/VERSION (rev 0) +++ tags/libsemanage_1_9_2/libsemanage/VERSION 2007-01-08 20:44:34 UTC (rev 2159) @@ -0,0 +1 @@ +1.9.2 Deleted: tags/libsemanage_1_9_2/libsemanage/src/conf-parse.y =================================================================== --- trunk/libsemanage/src/conf-parse.y 2007-01-05 19:15:46 UTC (rev 2153) +++ tags/libsemanage_1_9_2/libsemanage/src/conf-parse.y 2007-01-08 20:44:34 UTC (rev 2159) @@ -1,358 +0,0 @@ -/* Authors: Jason Tang <jt...@tr...> - * James Athey <ja...@tr...> - * - * Copyright (C) 2004-2006 Tresys Technology, LLC - * - * This library is free software; you can redistribute it and/or - * modify it under the terms of the GNU Lesser General Public - * License as published by the Free Software Foundation; either - * version 2.1 of the License, or (at your option) any later version. - * - * This library is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - * Lesser General Public License for more details. - * - * You should have received a copy of the GNU Lesser General Public - * License along with this library; if not, write to the Free Software - * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA - */ - -%{ - -#include "semanage_conf.h" - -#include <sepol/policydb.h> -#include <selinux/selinux.h> -#include <semanage/handle.h> - -#include <unistd.h> -#include <stdio.h> -#include <stdlib.h> -#include <string.h> - -extern int semanage_lex(); /* defined in conf-scan.c */ -int semanage_error(char *msg); - -extern FILE *semanage_in; -extern char *semanage_text; - -static int parse_module_store(char *arg); -static void semanage_conf_external_prog_destroy(external_prog_t *ep); -static int new_external_prog(external_prog_t **chain); - -static semanage_conf_t *current_conf; -static external_prog_t *new_external; -static int parse_errors; - -#define PASSIGN(p1,p2) { free(p1); p1 = p2; } - -%} - -%name-prefix="semanage_" - -%union { - int d; - char *s; -} - -%token MODULE_STORE VERSION EXPAND_CHECK FILE_MODE -%token LOAD_POLICY_START SETFILES_START GENHOMEDIRCON_START -%token VERIFY_MOD_START VERIFY_LINKED_START VERIFY_KERNEL_START BLOCK_END -%token PROG_PATH PROG_ARGS -%token <s> ARG -%type <d> verify_start_tok - -%% - -config_file: config_line config_file - | /* empty */ - ; - -config_line: single_opt - | command_block - | verify_block - ; - -single_opt: module_store - | version - | expand_check - | file_mode - ; - -module_store: MODULE_STORE '=' ARG { - if (parse_module_store($3) != 0) { - parse_errors++; - YYABORT; - } - } - - ; - -version: VERSION '=' ARG { - current_conf->policyvers = atoi($3); - free($3); - if (current_conf->policyvers < sepol_policy_kern_vers_min() || - current_conf->policyvers > sepol_policy_kern_vers_max()) { - parse_errors++; - YYABORT; - } - } - ; - -expand_check: EXPAND_CHECK '=' ARG { - current_conf->expand_check = atoi($3); - free($3); - } - ; - -file_mode: FILE_MODE '=' ARG { - current_conf->file_mode = strtoul($3, NULL, 8); - free($3); - } - ; - -command_block: - command_start external_opts BLOCK_END { - if (new_external->path == NULL) { - parse_errors++; - YYABORT; - } - } - ; - -command_start: - LOAD_POLICY_START { - semanage_conf_external_prog_destroy(current_conf->load_policy); - current_conf->load_policy = NULL; - if (new_external_prog(¤t_conf->load_policy) == -1) { - parse_errors++; - YYABORT; - } - } - | SETFILES_START { - semanage_conf_external_prog_destroy(current_conf->setfiles); - current_conf->setfiles = NULL; - if (new_external_prog(¤t_conf->setfiles) == -1) { - parse_errors++; - YYABORT; - } - } - | GENHOMEDIRCON_START { - semanage_conf_external_prog_destroy(current_conf->genhomedircon); - current_conf->genhomedircon = NULL; - if (new_external_prog(¤t_conf->genhomedircon) == -1) { - parse_errors++; - YYABORT; - } - } - ; - -verify_block: verify_start external_opts BLOCK_END { - if (new_external->path == NULL) { - parse_errors++; - YYABORT; - } - } - ; - -verify_start: verify_start_tok { - if ($1 == -1) { - parse_errors++; - YYABORT; - } - } - ; - -verify_start_tok: VERIFY_MOD_START {$$ = new_external_prog(¤t_conf->mod_prog);} - | VERIFY_LINKED_START {$$ = new_external_prog(¤t_conf->linked_prog);} - | VERIFY_KERNEL_START {$$ = new_external_prog(¤t_conf->kernel_prog);} - ; - -external_opts: external_opt external_opts - | /* empty */ - ; - -external_opt: PROG_PATH '=' ARG { PASSIGN(new_external->path, $3); } - | PROG_ARGS '=' ARG { PASSIGN(new_external->args, $3); } - ; - -%% - -static int semanage_conf_init(semanage_conf_t * conf) -{ - conf->store_type = SEMANAGE_CON_DIRECT; - conf->store_path = strdup(basename(selinux_policy_root())); - conf->policyvers = sepol_policy_kern_vers_max(); - conf->expand_check = 1; - conf->file_mode = 0644; - - if ((conf->load_policy = - calloc(1, sizeof(*(current_conf->load_policy)))) == NULL) { - return -1; - } - if ((conf->load_policy->path = strdup("/usr/sbin/load_policy")) == NULL) { - return -1; - } - conf->load_policy->args = NULL; - - if ((conf->setfiles = - calloc(1, sizeof(*(current_conf->setfiles)))) == NULL) { - return -1; - } - if (access("/sbin/setfiles", X_OK) == 0) { - conf->setfiles->path = strdup("/sbin/setfiles"); - } else { - conf->setfiles->path = strdup("/usr/sbin/setfiles"); - } - if ((conf->setfiles->path == NULL) || - (conf->setfiles->args = strdup("-q -c $@ $<")) == NULL) { - return -1; - } - - if ((conf->genhomedircon = - calloc(1, sizeof(*(current_conf->genhomedircon)))) == NULL) { - return -1; - } - if ((conf->genhomedircon->path = - strdup("/usr/sbin/genhomedircon")) == NULL - || (conf->genhomedircon->args = strdup("-t $@")) == NULL) { - return -1; - } - - return 0; -} - -/* Parse a libsemanage configuration file. THIS FUNCTION IS NOT - * THREAD-SAFE! Return a newly allocated semanage_conf_t *. If the - * configuration file could be read, parse it; otherwise rely upon - * default values. If the file could not be parsed correctly or if - * out of memory return NULL. - */ -semanage_conf_t *semanage_conf_parse(const char *config_filename) -{ - if ((current_conf = calloc(1, sizeof(*current_conf))) == NULL) { - return NULL; - } - if (semanage_conf_init(current_conf) == -1) { - goto cleanup; - } - if ((semanage_in = fopen(config_filename, "r")) == NULL) { - /* configuration file does not exist or could not be - * read. THIS IS NOT AN ERROR. just rely on the - * defaults. */ - return current_conf; - } - parse_errors = 0; - semanage_parse(); - fclose(semanage_in); - if (parse_errors != 0) { - goto cleanup; - } - return current_conf; - cleanup: - semanage_conf_destroy(current_conf); - return NULL; -} - -static void semanage_conf_external_prog_destroy(external_prog_t * ep) -{ - while (ep != NULL) { - external_prog_t *next = ep->next; - free(ep->path); - free(ep->args); - free(ep); - ep = next; - } -} - -/* Deallocates all space associated with a configuration struct, - * including the pointer itself. */ -void semanage_conf_destroy(semanage_conf_t * conf) -{ - if (conf != NULL) { - free(conf->store_path); - semanage_conf_external_prog_destroy(conf->load_policy); - semanage_conf_external_prog_destroy(conf->setfiles); - semanage_conf_external_prog_destroy(conf->genhomedircon); - semanage_conf_external_prog_destroy(conf->mod_prog); - semanage_conf_external_prog_destroy(conf->linked_prog); - semanage_conf_external_prog_destroy(conf->kernel_prog); - free(conf); - } -} - -int semanage_error(char *msg) -{ - parse_errors++; - return 0; -} - -/* Take the string argument for a module store. If it is exactly the - * word "direct" then have libsemanage directly manipulate the module - * store. The policy path will default to the active policy directory. - * Otherwise if it begins with a forward slash interpret it as - * an absolute path to a named socket, to which a policy server is - * listening on the other end. Otherwise treat it as the host name to - * an external server; if there is a colon in the name then everything - * after gives a port number. The default port number is 4242. - * Returns 0 on success, -1 if out of memory, -2 if a port number is - * illegal. - */ -static int parse_module_store(char *arg) -{ - /* arg is already a strdup()ed copy of yytext */ - if (arg == NULL) { - return -1; - } - free(current_conf->store_path); - if (strcmp(arg, "direct") == 0) { - current_conf->store_type = SEMANAGE_CON_DIRECT; - current_conf->store_path = - strdup(basename(selinux_policy_root())); - current_conf->server_port = -1; - free(arg); - } else if (*arg == '/') { - current_conf->store_type = SEMANAGE_CON_POLSERV_LOCAL; - current_conf->store_path = arg; - current_conf->server_port = -1; - } else { - char *s; - current_conf->store_type = SEMANAGE_CON_POLSERV_REMOTE; - if ((s = strchr(arg, ':')) == NULL) { - current_conf->store_path = arg; - current_conf->server_port = 4242; - } else { - char *endptr; - *s = '\0'; - current_conf->store_path = arg; - current_conf->server_port = strtol(s + 1, &endptr, 10); - if (*(s + 1) == '\0' || *endptr != '\0') { - return -2; - } - } - } - return 0; -} - -/* Helper function; called whenever configuration file specifies - * another external program. Returns 0 on success, -1 if out of - * memory. - */ -static int new_external_prog(external_prog_t ** chain) -{ - if ((new_external = calloc(1, sizeof(*new_external))) == NULL) { - return -1; - } - /* hook this new external program to the end of the chain */ - if (*chain == NULL) { - *chain = new_external; - } else { - external_prog_t *prog = *chain; - while (prog->next != NULL) { - prog = prog->next; - } - prog->next = new_external; - } - return 0; -} Copied: tags/libsemanage_1_9_2/libsemanage/src/conf-parse.y (from rev 2155, trunk/libsemanage/src/conf-parse.y) =================================================================== --- tags/libsemanage_1_9_2/libsemanage/src/conf-parse.y (rev 0) +++ tags/libsemanage_1_9_2/libsemanage/src/conf-parse.y 2007-01-08 20:44:34 UTC (rev 2159) @@ -0,0 +1,388 @@ +/* Authors: Jason Tang <jt...@tr...> + * James Athey <ja...@tr...> + * + * Copyright (C) 2004-2006 Tresys Technology, LLC + * + * This library is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License as published by the Free Software Foundation; either + * version 2.1 of the License, or (at your option) any later version. + * + * This library is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public + * License along with this library; if not, write to the Free Software + * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA + */ + +%{ + +#include "semanage_conf.h" + +#include <sepol/policydb.h> +#include <selinux/selinux.h> +#include <semanage/handle.h> + +#include <unistd.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> + +extern int semanage_lex(); /* defined in conf-scan.c */ +int semanage_error(char *msg); + +extern FILE *semanage_in; +extern char *semanage_text; + +static int parse_module_store(char *arg); +static void semanage_conf_external_prog_destroy(external_prog_t *ep); +static int new_external_prog(external_prog_t **chain); + +static semanage_conf_t *current_conf; +static external_prog_t *new_external; +static int parse_errors; + +#define PASSIGN(p1,p2) { free(p1); p1 = p2; } + +%} + +%name-prefix="semanage_" + +%union { + int d; + char *s; +} + +%token MODULE_STORE VERSION EXPAND_CHECK FILE_MODE SAVE_PREVIOUS SAVE_LINKED +%token LOAD_POLICY_START SETFILES_START GENHOMEDIRCON_START +%token VERIFY_MOD_START VERIFY_LINKED_START VERIFY_KERNEL_START BLOCK_END +%token PROG_PATH PROG_ARGS +%token <s> ARG +%type <d> verify_start_tok + +%% + +config_file: config_line config_file + | /* empty */ + ; + +config_line: single_opt + | command_block + | verify_block + ; + +single_opt: module_store + | version + | expand_check + | file_mode + | save_previous + | save_linked + ; + +module_store: MODULE_STORE '=' ARG { + if (parse_module_store($3) != 0) { + parse_errors++; + YYABORT; + } + } + + ; + +version: VERSION '=' ARG { + current_conf->policyvers = atoi($3); + free($3); + if (current_conf->policyvers < sepol_policy_kern_vers_min() || + current_conf->policyvers > sepol_policy_kern_vers_max()) { + parse_errors++; + YYABORT; + } + } + ; + +expand_check: EXPAND_CHECK '=' ARG { + current_conf->expand_check = atoi($3); + free($3); + } + ; + +file_mode: FILE_MODE '=' ARG { + current_conf->file_mode = strtoul($3, NULL, 8); + free($3); + } + ; + +save_previous: SAVE_PREVIOUS '=' ARG { + if (strcasecmp($3, "true") == 0) + current_conf->save_previous = 1; + else if (strcasecmp($3, "false") == 0) + current_conf->save_previous = 0; + else { + yyerror("save-previous can only be 'true' or 'false'"); + } + } + ; + + +save_linked: SAVE_LINKED '=' ARG { + if (strcasecmp($3, "true") == 0) + current_conf->save_linked = 1; + else if (strcasecmp($3, "false") == 0) + current_conf->save_linked = 0; + else { + yyerror("save-linked can only be 'true' or 'false'"); + } + } + ; + + +command_block: + command_start external_opts BLOCK_END { + if (new_external->path == NULL) { + parse_errors++; + YYABORT; + } + } + ; + +command_start: + LOAD_POLICY_START { + semanage_conf_external_prog_destroy(current_conf->load_policy); + current_conf->load_policy = NULL; + if (new_external_prog(¤t_conf->load_policy) == -1) { + parse_errors++; + YYABORT; + } + } + | SETFILES_START { + semanage_conf_external_prog_destroy(current_conf->setfiles); + current_conf->setfiles = NULL; + if (new_external_prog(¤t_conf->setfiles) == -1) { + parse_errors++; + YYABORT; + } + } + | GENHOMEDIRCON_START { + semanage_conf_external_prog_destroy(current_conf->genhomedircon); + current_conf->genhomedircon = NULL; + if (new_external_prog(¤t_conf->genhomedircon) == -1) { + parse_errors++; + YYABORT; + } + } + ; + +verify_block: verify_start external_opts BLOCK_END { + if (new_external->path == NULL) { + parse_errors++; + YYABORT; + } + } + ; + +verify_start: verify_start_tok { + if ($1 == -1) { + parse_errors++; + YYABORT; + } + } + ; + +verify_start_tok: VERIFY_MOD_START {$$ = new_external_prog(¤t_conf->mod_prog);} + | VERIFY_LINKED_START {$$ = new_external_prog(¤t_conf->linked_prog);} + | VERIFY_KERNEL_START {$$ = new_external_prog(¤t_conf->kernel_prog);} + ; + +external_opts: external_opt external_opts + | /* empty */ + ; + +external_opt: PROG_PATH '=' ARG { PASSIGN(new_external->path, $3); } + | PROG_ARGS '=' ARG { PASSIGN(new_external->args, $3); } + ; + +%% + +static int semanage_conf_init(semanage_conf_t * conf) +{ + conf->store_type = SEMANAGE_CON_DIRECT; + conf->store_path = strdup(basename(selinux_policy_root())); + conf->policyvers = sepol_policy_kern_vers_max(); + conf->expand_check = 1; + conf->file_mode = 0644; + + conf->save_previous = 0; + conf->save_linked = 0; + + if ((conf->load_policy = + calloc(1, sizeof(*(current_conf->load_policy)))) == NULL) { + return -1; + } + if ((conf->load_policy->path = strdup("/usr/sbin/load_policy")) == NULL) { + return -1; + } + conf->load_policy->args = NULL; + + if ((conf->setfiles = + calloc(1, sizeof(*(current_conf->setfiles)))) == NULL) { + return -1; + } + if (access("/sbin/setfiles", X_OK) == 0) { + conf->setfiles->path = strdup("/sbin/setfiles"); + } else { + conf->setfiles->path = strdup("/usr/sbin/setfiles"); + } + if ((conf->setfiles->path == NULL) || + (conf->setfiles->args = strdup("-q -c $@ $<")) == NULL) { + return -1; + } + + if ((conf->genhomedircon = + calloc(1, sizeof(*(current_conf->genhomedircon)))) == NULL) { + return -1; + } + if ((conf->genhomedircon->path = + strdup("/usr/sbin/genhomedircon")) == NULL + || (conf->genhomedircon->args = strdup("-t $@")) == NULL) { + return -1; + } + + return 0; +} + +/* Parse a libsemanage configuration file. THIS FUNCTION IS NOT + * THREAD-SAFE! Return a newly allocated semanage_conf_t *. If the + * configuration file could be read, parse it; otherwise rely upon + * default values. If the file could not be parsed correctly or if + * out of memory return NULL. + */ +semanage_conf_t *semanage_conf_parse(const char *config_filename) +{ + if ((current_conf = calloc(1, sizeof(*current_conf))) == NULL) { + return NULL; + } + if (semanage_conf_init(current_conf) == -1) { + goto cleanup; + } + if ((semanage_in = fopen(config_filename, "r")) == NULL) { + /* configuration file does not exist or could not be + * read. THIS IS NOT AN ERROR. just rely on the + * defaults. */ + return current_conf; + } + parse_errors = 0; + semanage_parse(); + fclose(semanage_in); + if (parse_errors != 0) { + goto cleanup; + } + return current_conf; + cleanup: + semanage_conf_destroy(current_conf); + return NULL; +} + +static void semanage_conf_external_prog_destroy(external_prog_t * ep) +{ + while (ep != NULL) { + external_prog_t *next = ep->next; + free(ep->path); + free(ep->args); + free(ep); + ep = next; + } +} + +/* Deallocates all space associated with a configuration struct, + * including the pointer itself. */ +void semanage_conf_destroy(semanage_conf_t * conf) +{ + if (conf != NULL) { + free(conf->store_path); + semanage_conf_external_prog_destroy(conf->load_policy); + semanage_conf_external_prog_destroy(conf->setfiles); + semanage_conf_external_prog_destroy(conf->genhomedircon); + semanage_conf_external_prog_destroy(conf->mod_prog); + semanage_conf_external_prog_destroy(conf->linked_prog); + semanage_conf_external_prog_destroy(conf->kernel_prog); + free(conf); + } +} + +int semanage_error(char *msg) +{ + fprintf(stderr, "error parsing semanage configuration file: %s\n", msg); + parse_errors++; + return 0; +} + +/* Take the string argument for a module store. If it is exactly the + * word "direct" ... [truncated message content] |
From: <mad...@us...> - 2007-01-08 20:45:20
|
Revision: 2160 http://svn.sourceforge.net/selinux/?rev=2160&view=rev Author: madmethod Date: 2007-01-08 12:45:13 -0800 (Mon, 08 Jan 2007) Log Message: ----------- tag for policycoreutils 1.33.10 Added Paths: ----------- tags/policycoreutils_1_33_10/ tags/policycoreutils_1_33_10/policycoreutils/ tags/policycoreutils_1_33_10/policycoreutils/ChangeLog tags/policycoreutils_1_33_10/policycoreutils/VERSION tags/policycoreutils_1_33_10/policycoreutils/semanage/seobject.py Removed Paths: ------------- tags/policycoreutils_1_33_10/policycoreutils/ChangeLog tags/policycoreutils_1_33_10/policycoreutils/VERSION tags/policycoreutils_1_33_10/policycoreutils/semanage/seobject.py Copied: tags/policycoreutils_1_33_10/policycoreutils (from rev 2153, trunk/policycoreutils) Deleted: tags/policycoreutils_1_33_10/policycoreutils/ChangeLog =================================================================== --- trunk/policycoreutils/ChangeLog 2007-01-05 19:15:46 UTC (rev 2153) +++ tags/policycoreutils_1_33_10/policycoreutils/ChangeLog 2007-01-08 20:45:13 UTC (rev 2160) @@ -1,700 +0,0 @@ -1.33.9 2007-01-05 - * Merged patch to fix seobject role modification from Dan Walsh. - -1.33.8 2007-01-04 - * Merged patches from Dan Walsh to: - - omit the optional name from audit2allow - - use the installed python version in the Makefiles - - re-open the tty with O_RDWR in newrole - -1.33.7 2007-01-03 - * Patch from Dan Walsh to correctly suppress warnings in load_policy. - -1.33.6 2006-11-29 - * Patch from Dan Walsh to add an pam_acct_msg call to run_init - * Patch from Dan Walsh to fix error code returns in newrole - * Patch from Dan Walsh to remove verbose flag from semanage man page - * Patch from Dan Walsh to make audit2allow use refpolicy Makefile - in /usr/share/selinux/<SELINUXTYPE> - -1.33.5 2006-11-27 - * Merged patch from Micheal C Thompson to clean up genhomedircon - error handling. -1.33.4 2006-11-21 - * Merged po file updates from Dan Walsh. - -1.33.3 2006-11-21 - * Merged setsebool patch from Karl MacMillan. - This fixes a bug reported by Yuichi Nakamura with - always setting booleans persistently on an unmanaged system. - -1.33.2 2006-11-20 - * Merged patch from Dan Walsh (via Karl MacMillan): - * Added newrole audit message on login failure - * Add /var/log/wtmp to restorecond.conf watch list - * Fix genhomedircon, semanage, semodule_expand man pages. - -1.33.1 2006-11-13 - * Merged newrole patch set from Michael Thompson. - -1.32 2006-10-17 - * Updated version for release. - -1.30.31 2006-10-17 - * Merged audit2allow -l fix from Yuichi Nakamura. - * Merged restorecon -i and -o - support from Karl MacMillan. - * Merged semanage/seobject fix from Dan Walsh. - * Merged fixfiles -R and verify changes from Dan Walsh. - -1.30.30 2006-09-29 - * Merged newrole auditing of failures due to user actions from - Michael Thompson. - -1.30.29 2006-09-13 - * Man page corrections from Dan Walsh - * Change all python invocations to /usr/bin/python -E - * Add missing getopt flags to genhomedircon - -1.30.28 2006-09-01 - * Merged fix for restorecon // handling from Erich Schubert. - * Merged translations update and fixfiles fix from Dan Walsh. - -1.30.27 2006-08-24 - * Merged fix for restorecon symlink handling from Erich Schubert. - -1.30.26 2006-08-11 - * Merged semanage local file contexts patch from Chris PeBenito. - -1.30.25 2006-08-03 - * Merged patch from Dan Walsh with: - * audit2allow: process MAC_POLICY_LOAD events - * newrole: run shell with - prefix to start a login shell - * po: po file updates - * restorecond: bail if SELinux not enabled - * fixfiles: omit -q - * genhomedircon: fix exit code if non-root - * semodule_deps: install man page - -1.30.24 2006-08-03 - * Merged secon Makefile fix from Joshua Brindle. - -1.30.23 2006-08-03 - * Merged netfilter contexts support patch from Chris PeBenito. - -1.30.22 2006-07-28 - * Merged restorecond size_t fix from Joshua Brindle. - -1.30.21 2006-07-28 - * Merged secon keycreate patch from Michael LeMay. - -1.30.20 2006-07-26 - * Merged restorecond fixes from Dan Walsh. - Merged updated po files from Dan Walsh. - -1.30.19 2006-07-26 - * Merged python gettext patch from Stephen Bennett. - -1.30.18 2006-07-25 - * Merged semodule_deps from Karl MacMillan. - -1.30.17 2006-06-29 - * Lindent. - -1.30.16 2006-06-26 - * Merged patch from Dan Walsh with: - * -p option (progress) for setfiles and restorecon. - * disable context translation for setfiles and restorecon. - * on/off values for setsebool. - -1.30.15 2006-06-26 - * Merged setfiles and semodule_link fixes from Joshua Brindle. - -1.30.14 2006-06-16 - * Merged fix for setsebool error path from Serge Hallyn. - -1.30.13 2006-06-16 - * Merged patch from Dan Walsh with: - * Updated po files. - * Fixes for genhomedircon and seobject. - * Audit message for mass relabel by setfiles. - -1.30.12 2006-06-02 - * Updated fixfiles script for new setfiles location in /sbin. - -1.30.11 2006-05-26 - * Merged more translations from Dan Walsh. - * Merged patch to relocate setfiles to /sbin for early relabel - when /usr might not be mounted from Dan Walsh. - * Merged semanage/seobject patch to preserve fcontext ordering in list. - * Merged secon patch from James Antill. - -1.30.10 2006-05-22 - * Merged patch with updates to audit2allow, secon, genhomedircon, - and semanage from Dan Walsh. - -1.30.9 2006-05-08 - * Fixed audit2allow and po Makefiles for DESTDIR= builds. - * Merged .po file patch from Dan Walsh. - * Merged bug fix for genhomedircon. - -1.30.8 2006-05-08 - * Merged patch from Dan Walsh. - This includes audit2allow changes for analysis plugins, - internationalization support for several additional programs - and added po files, some fixes for semanage, and several cleanups. - It also adds a new secon utility. - -1.30.7 2006-05-05 - * Merged fix warnings patch from Karl MacMillan. - -1.30.6 2006-04-14 - * Merged semanage prefix support from Russell Coker. - -1.30.5 2006-04-11 - * Added a test to setfiles to check that the spec file is - a regular file. - -1.30.4 2006-03-29 - * Merged audit2allow fixes for refpolicy from Dan Walsh. - * Merged fixfiles patch from Dan Walsh. - * Merged restorecond daemon from Dan Walsh. - -1.30.3 2006-03-29 - * Merged semanage non-MLS fixes from Chris PeBenito. - -1.30.2 2006-03-29 - * Merged semanage and semodule man page examples from Thomas Bleher. - -1.30.1 2006-03-20 - * Merged semanage labeling prefix patch from Ivan Gyurdiev. - -1.30 2006-03-14 - * Updated version for release. - -1.29.28 2006-03-13 - * Merged German translations (de.po) by Debian translation team from Manoj Srivastava. - -1.29.27 2006-03-08 - * Merged audit2allow -R support, chcat fix, semanage MLS checks - and semanage audit calls from Dan Walsh. - -1.29.26 2006-02-15 - * Merged semanage bug fix patch from Ivan Gyurdiev. - -1.29.25 2006-02-14 - * Merged improve bindings patch from Ivan Gyurdiev. - -1.29.24 2006-02-14 - * Merged semanage usage patch from Ivan Gyurdiev. - * Merged use PyList patch from Ivan Gyurdiev. - -1.29.23 2006-02-13 - * Merged newrole -V/--version support from Glauber de Oliveira Costa. - -1.29.22 2006-02-13 - * Merged genhomedircon prefix patch from Dan Walsh. - -1.29.21 2006-02-13 - * Merged optionals in base patch from Joshua Brindle. - -1.29.20 2006-02-07 - * Merged seuser/user_extra support patch to semodule_package - from Joshua Brindle. - -1.29.19 2006-02-06 - * Merged getopt type fix for semodule_link/expand and sestatus - from Chris PeBenito. - -1.29.18 2006-02-02 - * Merged clone record on set_con patch from Ivan Gyurdiev. - -1.29.17 2006-01-30 - * Merged genhomedircon fix from Dan Walsh. - -1.29.16 2006-01-30 - * Merged seusers.system patch from Ivan Gyurdiev. - * Merged improve port/fcontext API patch from Ivan Gyurdiev. - * Merged genhomedircon patch from Dan Walsh. - -1.29.15 2006-01-27 - * Merged newrole audit patch from Steve Grubb. - -1.29.14 2006-01-27 - * Merged seuser -> seuser local rename patch from Ivan Gyurdiev. - -1.29.13 2006-01-27 - * Merged semanage and semodule access check patches from Joshua Brindle. - -1.29.12 2006-01-26 - * Merged restorecon, chcat, and semanage patches from Dan Walsh. - -1.29.11 2006-01-25 - * Modified newrole and run_init to use the loginuid when - supported to obtain the Linux user identity to re-authenticate, - and to fall back to real uid. Dropped the use of the SELinux - user identity, as Linux users are now mapped to SELinux users - via seusers and the SELinux user identity space is separate. - -1.29.10 2006-01-20 - * Merged semanage bug fixes from Ivan Gyurdiev. - * Merged semanage fixes from Russell Coker. - * Merged chcat.8 and genhomedircon patches from Dan Walsh. - -1.29.9 2006-01-19 - * Merged chcat, semanage, and setsebool patches from Dan Walsh. - -1.29.8 2006-01-18 - * Merged semanage fixes from Ivan Gyurdiev. - * Merged semanage fixes from Russell Coker. - * Merged chcat, genhomedircon, and semanage diffs from Dan Walsh. - -1.29.7 2006-01-13 - * Merged newrole cleanup patch from Steve Grubb. - * Merged setfiles/restorecon performance patch from Russell Coker. - * Merged genhomedircon and semanage patches from Dan Walsh. - -1.29.6 2006-01-12 - * Merged remove add_local/set_local patch from Ivan Gyurdiev. - -1.29.5 2006-01-05 - * Added filename to semodule error reporting. - -1.29.4 2006-01-05 - * Merged genhomedircon and semanage patch from Dan Walsh. - * Changed semodule error reporting to include argv[0]. - -1.29.3 2006-01-04 - * Merged semanage getpwnam bug fix from Serge Hallyn (IBM). - * Merged patch series from Ivan Gyurdiev. - This includes patches to: - - cleanup setsebool - - update setsebool to apply active booleans through libsemanage - - update semodule to use the new semanage_set_rebuild() interface - - fix various bugs in semanage - * Merged patch from Dan Walsh (Red Hat). - This includes fixes for restorecon, chcat, fixfiles, genhomedircon, - and semanage. - -1.29.2 2005-12-14 - * Merged patch for chcat script from Dan Walsh. - -1.29.1 2005-12-08 - * Merged fix for audit2allow long option list from Dan Walsh. - * Merged -r option for restorecon (alias for -R) from Dan Walsh. - * Merged chcat script and man page from Dan Walsh. - -1.28 2005-12-07 - * Updated version for release. - -1.27.37 2005-12-07 - * Clarified the genhomedircon warning message. - -1.27.36 2005-12-05 - * Changed genhomedircon to warn on use of ROLE in homedir_template - if using managed policy, as libsemanage does not yet support it. - -1.27.35 2005-12-02 - * Merged genhomedircon bug fix from Dan Walsh. - -1.27.34 2005-12-02 - * Revised semodule* man pages to refer to checkmodule and - to include example sections. - -1.27.33 2005-12-01 - * Merged audit2allow --tefile and --fcfile support from Dan Walsh. - * Merged genhomedircon fix from Dan Walsh. - * Merged semodule* man pages from Dan Walsh, and edited them. - -1.27.32 2005-12-01 - * Changed setfiles to set the MATCHPATHCON_VALIDATE flag to - retain validation/canonicalization of contexts during init. - -1.27.31 2005-11-29 - * Changed genhomedircon to always use user_r for the role in the - managed case since user_get_defrole is broken. - -1.27.30 2005-11-29 - * Merged sestatus, audit2allow, and semanage patch from Dan Walsh. - * Fixed semodule -v option. - -1.27.29 2005-11-28 - * Merged audit2allow python script from Dan Walsh. - (old script moved to audit2allow.perl, will be removed later). - * Merged genhomedircon fixes from Dan Walsh. - * Merged semodule quieting patch from Dan Walsh - (inverts default, use -v to restore original behavior). - -1.27.28 2005-11-15 - * Merged genhomedircon rewrite from Dan Walsh. - -1.27.27 2005-11-09 - * Merged setsebool cleanup patch from Ivan Gyurdiev. - -1.27.26 2005-11-09 - * Added -B (--build) option to semodule to force a rebuild. - -1.27.25 2005-11-08 - * Reverted setsebool patch to call semanage_set_reload_bools(). - * Changed setsebool to disable policy reload and to call - security_set_boolean_list to update the runtime booleans. - -1.27.24 2005-11-08 - * Changed setfiles -c to use new flag to set_matchpathcon_flags() - to disable context translation by matchpathcon_init(). - -1.27.23 2005-11-07 - * Changed setfiles for the context canonicalization support. - -1.27.22 2005-11-07 - * Changed setsebool to call semanage_is_managed() interface - and fall back to security_set_boolean_list() if policy is - not managed. - -1.27.21 2005-11-07 - * Merged setsebool memory leak fix from Ivan Gyurdiev. - * Merged setsebool patch to call semanage_set_reload_bools() - interface from Ivan Gyurdiev. - -1.27.20 2005-11-04 - * Merged setsebool patch from Ivan Gyurdiev. - This moves setsebool from libselinux/utils to policycoreutils, - and rewrites it to use libsemanage for permanent boolean changes. - -1.27.19 2005-10-25 - * Merged semodule support for reload, noreload, and store options - from Joshua Brindle. - * Merged semodule_package rewrite from Joshua Brindle. - -1.27.18 2005-10-20 - * Cleaned up usage and error messages and releasing of memory by - semodule_* utilities. - -1.27.17 2005-10-20 - * Corrected error reporting by semodule. - -1.27.16 2005-10-19 - * Updated semodule_expand for change to sepol interface. - -1.27.15 2005-10-19 - * Merged fixes for make DESTDIR= builds from Joshua Brindle. - -1.27.14 2005-10-18 - * Updated semodule_package for sepol interface changes. - -1.27.13 2005-10-17 - * Updated semodule_expand/link for sepol interface changes. - -1.27.12 2005-10-14 - * Merged non-PAM Makefile support for newrole and run_init from Timothy Wood. - -1.27.11 2005-10-13 - * Updated semodule_expand to use get interfaces for hidden sepol_module_package type. - -1.27.10 2005-10-13 - * Merged newrole and run_init pam config patches from Dan Walsh (Red Hat). - -1.27.9 2005-10-13 - * Merged fixfiles patch from Dan Walsh (Red Hat). - -1.27.8 2005-10-13 - * Updated semodule for removal of semanage_strerror. - -1.27.7 2005-10-11 - * Updated semodule_link and semodule_expand to use shared libsepol. - Fixed audit2why to call policydb_init prior to policydb_read (still - uses the static libsepol). - -1.27.6 2005-10-07 - * Updated for changes to libsepol. - Changed semodule and semodule_package to use the shared libsepol. - Disabled build of semodule_link and semodule_expand for now. - Updated audit2why for relocated policydb internal headers, - still needs to be converted to a shared lib interface. - -1.27.5 2005-10-06 - * Fixed warnings in load_policy. - -1.27.4 2005-10-06 - * Rewrote load_policy to use the new selinux_mkload_policy() - interface provided by libselinux. - -1.27.3 2005-09-28 - * Merged patch to update semodule to the new libsemanage API - and improve the user interface from Karl MacMillan (Tresys). - * Modified semodule for the create/connect API split. - -1.27.2 2005-09-20 - * Merged run_init open_init_pty bug fix from Manoj Srivastava - (unblock SIGCHLD). Bug reported by Erich Schubert. - -1.27.1 2005-09-20 - * Merged error shadowing bug fix for restorecon from Dan Walsh. - * Merged setfiles usage/man page update for -r option from Dan Walsh. - * Merged fixfiles -C patch to ignore :s0 addition on update - to a MCS/MLS policy from Dan Walsh. - -1.26 2005-09-06 - * Updated version for release. - -1.25.9 2005-08-31 - * Changed setfiles -c to translate the context to raw format - prior to calling libsepol. - -1.25.8 2005-08-31 - * Changed semodule to report errors even without -v, - to detect extraneous arguments, and corrected usage message. - -1.25.7 2005-08-25 - * Merged patch for fixfiles -C from Dan Walsh. - -1.25.6 2005-08-22 - * Merged fixes for semodule_link and sestatus from Serge Hallyn (IBM). - Bugs found by Coverity. - -1.25.5 2005-08-02 - * Merged patch to move module read/write code from libsemanage - to libsepol from Jason Tang (Tresys). - -1.25.4 2005-07-27 - * Changed semodule* to link with libsemanage. - -1.25.3 2005-07-26 - * Merged restorecon patch from Ivan Gyurdiev. - -1.25.2 2005-07-11 - * Merged load_policy, newrole, and genhomedircon patches from Red Hat. - -1.25.1 2005-07-06 - * Merged loadable module support from Tresys Technology. - -1.24 2005-06-20 - * Updated version for release. - -1.23.11 2005-05-19 - * Merged fixfiles and newrole patch from Dan Walsh. - * Merged audit2why man page from Dan Walsh. - -1.23.10 2005-05-16 - * Extended audit2why to incorporate booleans and local user - settings when analyzing audit messages. - -1.23.9 2005-05-13 - * Updated audit2why for sepol_ prefixes on Flask types to - avoid namespace collision with libselinux, and to - include <selinux/selinux.h> now. - -1.23.8 2005-05-13 - * Added audit2why utility. - -1.23.7 2005-04-29 - * Merged patch for fixfiles from Dan Walsh. - Allow passing -F to force reset of customizable contexts. - -1.23.6 2005-04-13 - * Fixed signed/unsigned pointer bug in load_policy. - * Reverted context validation patch for genhomedircon. - -1.23.5 2005-04-12 - * Reverted load_policy is_selinux_enabled patch from Dan Walsh. - Otherwise, an initial policy load cannot be performed using - load_policy, e.g. for anaconda. - -1.23.4 2005-04-08 - * Merged load_policy is_selinux_enabled patch from Dan Walsh. - * Merged restorecon verbose output patch from Dan Walsh. - * Merged setfiles altroot patch from Chris PeBenito. - -1.23.3 2005-03-17 - * Merged context validation patch for genhomedircon from Eric Paris. - -1.23.2 2005-03-16 - * Changed setfiles -c to call set_matchpathcon_flags(3) to - turn off processing of .homedirs and .local. - -1.23.1 2005-03-14 - * Merged rewrite of genhomedircon by Eric Paris. - * Changed fixfiles to relabel jfs since it now supports security xattrs - (as of 2.6.11). Removed reiserfs until 2.6.12 is released with - fixed support for reiserfs and selinux. - -1.22 2005-03-09 - * Updated version for release. - -1.21.22 2005-03-07 - * Merged restorecon and genhomedircon patch from Dan Walsh. - -1.21.21 2005-02-28 - * Merged load_policy and genhomedircon patch from Dan Walsh. - -1.21.20 2005-02-24 - * Merged fixfiles and genhomedircon patch from Dan Walsh. - -1.21.19 2005-02-22 - * Merged several fixes from Ulrich Drepper. - -1.21.18 2005-02-18 - * Changed load_policy to fall back to the original policy upon - an error from sepol_genusers(). - -1.21.17 2005-02-17 - * Merged new genhomedircon script from Dan Walsh. - -1.21.16 2005-02-17 - * Changed load_policy to call sepol_genusers(). - -1.21.15 2005-02-09 - * Changed relabel Makefile target to use restorecon. - -1.21.14 2005-02-08 - * Merged restorecon patch from Dan Walsh. - -1.21.13 2005-02-07 - * Merged sestatus patch from Dan Walsh. - * Merged further change to fixfiles -C from Dan Walsh. - -1.21.12 2005-02-02 - * Merged further patches for restorecon/setfiles -e and fixfiles -C. - -1.21.11 2005-02-02 - * Merged patch for fixfiles -C option from Dan Walsh. - * Merged patch -e support for restorecon from Dan Walsh. - * Merged updated -e support for setfiles from Dan Walsh. - -1.21.10 2005-01-31 - * Merged patch for open_init_pty from Manoj Srivastava. - -1.21.9 2005-01-28 - * Merged updated fixfiles script from Dan Walsh. - * Merged updated man page for fixfiles from Dan Walsh and re-added unzipped. - * Reverted fixfiles patch for file_contexts.local; - obsoleted by setfiles rewrite. - * Merged error handling patch for restorecon from Dan Walsh. - * Merged semi raw mode for open_init_pty helper from Manoj Srivastava. - -1.21.8 2005-01-28 - * Rewrote setfiles to use matchpathcon and the new interfaces - exported by libselinux (>= 1.21.5). - -1.21.7 2005-01-27 - * Prevent overflow of spec array in setfiles. - -1.21.6 2005-01-27 - * Merged genhomedircon STARTING_UID bug fix from Dan Walsh. - -1.21.5 2005-01-26 - * Merged newrole -l support from Darrel Goeddel (TCS). - -1.21.4 2005-01-25 - * Merged fixfiles patch for file_contexts.local from Dan Walsh. - -1.21.3 2005-01-21 - * Fixed restorecon to not treat errors from is_context_customizable() - as a customizable context. - * Merged setfiles/restorecon patch to not reset user field unless - -F option is specified from Dan Walsh. - -1.21.2 2005-01-21 - * Merged open_init_pty helper for run_init from Manoj Srivastava. - * Merged audit2allow and genhomedircon man pages from Manoj Srivastava. - -1.21.1 2005-01-19 - * Merged customizable contexts patch for restorecon/setfiles from Dan Walsh. - -1.20 2005-01-06 - * Merged fixfiles rewrite from Dan Walsh. - * Merged restorecon patch from Dan Walsh. - * Merged fixfiles and restorecon patches from Dan Walsh. - * Changed restorecon to ignore ENOENT errors from matchpathcon. - * Merged nonls patch from Chris PeBenito. - * Removed fixfiles.cron. - * Merged run_init.8 patch from Dan Walsh. - -1.18 2004-11-01 - * Merged audit2allow patch from Thomas Bleher, with mods by Dan Walsh. - * Merged sestatus patch from Steve Grubb. - * Merged fixfiles patch from Dan Walsh. - * Added -l option to setfiles to log changes via syslog. - * Merged -e option to setfiles to exclude directories. - * Merged -R option to restorecon for recursive descent. - * Merged sestatus patch from Steve Grubb via Dan Walsh. - * Merged load_policy and fixfiles.cron patches from Dan Walsh. - * Merged fix for setfiles context validation patch from Colin Walters. - * Merged setfiles context validation patch from Colin Walters. - * Merged genhomedircon patch from Russell Coker. - * Merged restorecon patch from Russell Coker. - -1.16 2004-08-13 - * Merged audit2allow fix from Tom London. - * Merged load_policy man page from Dan Walsh. - * Merged newrole bug fix from Chad Hanson. - * Changed load_policy to preserve booleans by default. - * Changed load_policy to invoke sepol_genbools() instead. - * Changed load_policy to also invoke security_load_booleans(). - * Merged genhomedircon fixes from Dan Walsh. - * Changed restorecon to use realpath. - * Merged fixfiles patch from Dan Walsh. - * Merged genhomedircon patch from Russell Coker and Dan Walsh. - * Merged fixfiles patch and fixfiles.cron script from Dan Walsh. - * Merged stat fix for setfiles -s from Russell Coker. - -1.14 2004-06-25 - * Merged fix for fixfiles. - * Merged enhancements to setfiles, fixfiles and restorecon from Dan Walsh. - * Merged updated genhomedircon script from Russell Coker. - * Merged run_init patch to find initrc_context from Dan Walsh. - * Merged fixfiles patch for /etc/selinux from Dan Walsh. - * Merged restorecon patch from Dan Walsh. - * Merged fixfiles patch from Dan Walsh. - -1.12 2004-05-10 - * Merged newrole patch from Colin Walters. - * Merged fixfiles from Dan Walsh. - -1.10 2004-04-05 - * Changed setfiles to not abort upon lsetfilecon failures. - * Merged sestatus from Chris PeBenito. - * Merged fixes for restorecon. - * Merged setfiles verbosity patch from Dan Walsh and Stephen Tweedie. - * Merged restorecon patch from Dan Walsh. - * Revert add_assoc change from setfiles. - * Moved restorecon to /sbin. - * Disable add_assoc in setfiles by default, use -a to enable. - * Merged genhomedircon patch from Dan Walsh. - * Merged restorecon patch from Dan Walsh. - * Merged setfiles buffer size change from Dan Walsh. - * Merged genhomedircon fix from Karl MacMillan of Tresys. - This generates separate lines for each prefix. - -1.8 2004-03-09 - * Merged genhomedircon patch from Karl MacMillan of Tresys. - * Removed checkcon script (obsoleted by restorecon -nv). - * Replaced restorecon script with C program from Dan Walsh. - Uses the new matchpathcon function from libselinux. - -1.6 2004-02-18 - * Fixed setfiles sorting problem reported by Colin Walters. - * Merged setfiles patch from Robert Bihlmeyer, amended by Russell Coker. - * Added scripts (checkcon, restorecon, genhomedircon) from Dan Walsh. - * Quiet warning about duplicate same specifications if -q is used. - * Fixed usage message of audit2allow. - -1.4 2003-12-01 - * Merged patch from Russell Coker. - * Added audit2allow (formerly newrules.pl from policy). - * Dropped -lattr from Makefiles. - * Merged setfiles check type first patch by Russell Coker. - -1.2 2003-09-30 - * Merged run_init close file patch from Chris PeBenito. - * Merged setfiles stem compression patch by Russell Coker. - * Merged setfiles usage/getopt/err patch by Russell Coker. - * Merged setfiles altroot patch by Hardened Gentoo team. - * Merged i18n patch by Dan Walsh. - * Changed Makefiles to allow non-root rpm builds. - -1.1 2003-08-13 - * Dropped obsolete psid code from setfiles. - -1.0 2003-07-11 - * Initial public release. - Copied: tags/policycoreutils_1_33_10/policycoreutils/ChangeLog (from rev 2158, trunk/policycoreutils/ChangeLog) =================================================================== --- tags/policycoreutils_1_33_10/policycoreutils/ChangeLog (rev 0) +++ tags/policycoreutils_1_33_10/policycoreutils/ChangeLog 2007-01-08 20:45:13 UTC (rev 2160) @@ -0,0 +1,704 @@ +1.33.10 2007-01-08 + * Merged patch to correctly handle a failure during semanage handle + creation from Karl MacMillan. + +1.33.9 2007-01-05 + * Merged patch to fix seobject role modification from Dan Walsh. + +1.33.8 2007-01-04 + * Merged patches from Dan Walsh to: + - omit the optional name from audit2allow + - use the installed python version in the Makefiles + - re-open the tty with O_RDWR in newrole + +1.33.7 2007-01-03 + * Patch from Dan Walsh to correctly suppress warnings in load_policy. + +1.33.6 2006-11-29 + * Patch from Dan Walsh to add an pam_acct_msg call to run_init + * Patch from Dan Walsh to fix error code returns in newrole + * Patch from Dan Walsh to remove verbose flag from semanage man page + * Patch from Dan Walsh to make audit2allow use refpolicy Makefile + in /usr/share/selinux/<SELINUXTYPE> + +1.33.5 2006-11-27 + * Merged patch from Micheal C Thompson to clean up genhomedircon + error handling. +1.33.4 2006-11-21 + * Merged po file updates from Dan Walsh. + +1.33.3 2006-11-21 + * Merged setsebool patch from Karl MacMillan. + This fixes a bug reported by Yuichi Nakamura with + always setting booleans persistently on an unmanaged system. + +1.33.2 2006-11-20 + * Merged patch from Dan Walsh (via Karl MacMillan): + * Added newrole audit message on login failure + * Add /var/log/wtmp to restorecond.conf watch list + * Fix genhomedircon, semanage, semodule_expand man pages. + +1.33.1 2006-11-13 + * Merged newrole patch set from Michael Thompson. + +1.32 2006-10-17 + * Updated version for release. + +1.30.31 2006-10-17 + * Merged audit2allow -l fix from Yuichi Nakamura. + * Merged restorecon -i and -o - support from Karl MacMillan. + * Merged semanage/seobject fix from Dan Walsh. + * Merged fixfiles -R and verify changes from Dan Walsh. + +1.30.30 2006-09-29 + * Merged newrole auditing of failures due to user actions from + Michael Thompson. + +1.30.29 2006-09-13 + * Man page corrections from Dan Walsh + * Change all python invocations to /usr/bin/python -E + * Add missing getopt flags to genhomedircon + +1.30.28 2006-09-01 + * Merged fix for restorecon // handling from Erich Schubert. + * Merged translations update and fixfiles fix from Dan Walsh. + +1.30.27 2006-08-24 + * Merged fix for restorecon symlink handling from Erich Schubert. + +1.30.26 2006-08-11 + * Merged semanage local file contexts patch from Chris PeBenito. + +1.30.25 2006-08-03 + * Merged patch from Dan Walsh with: + * audit2allow: process MAC_POLICY_LOAD events + * newrole: run shell with - prefix to start a login shell + * po: po file updates + * restorecond: bail if SELinux not enabled + * fixfiles: omit -q + * genhomedircon: fix exit code if non-root + * semodule_deps: install man page + +1.30.24 2006-08-03 + * Merged secon Makefile fix from Joshua Brindle. + +1.30.23 2006-08-03 + * Merged netfilter contexts support patch from Chris PeBenito. + +1.30.22 2006-07-28 + * Merged restorecond size_t fix from Joshua Brindle. + +1.30.21 2006-07-28 + * Merged secon keycreate patch from Michael LeMay. + +1.30.20 2006-07-26 + * Merged restorecond fixes from Dan Walsh. + Merged updated po files from Dan Walsh. + +1.30.19 2006-07-26 + * Merged python gettext patch from Stephen Bennett. + +1.30.18 2006-07-25 + * Merged semodule_deps from Karl MacMillan. + +1.30.17 2006-06-29 + * Lindent. + +1.30.16 2006-06-26 + * Merged patch from Dan Walsh with: + * -p option (progress) for setfiles and restorecon. + * disable context translation for setfiles and restorecon. + * on/off values for setsebool. + +1.30.15 2006-06-26 + * Merged setfiles and semodule_link fixes from Joshua Brindle. + +1.30.14 2006-06-16 + * Merged fix for setsebool error path from Serge Hallyn. + +1.30.13 2006-06-16 + * Merged patch from Dan Walsh with: + * Updated po files. + * Fixes for genhomedircon and seobject. + * Audit message for mass relabel by setfiles. + +1.30.12 2006-06-02 + * Updated fixfiles script for new setfiles location in /sbin. + +1.30.11 2006-05-26 + * Merged more translations from Dan Walsh. + * Merged patch to relocate setfiles to /sbin for early relabel + when /usr might not be mounted from Dan Walsh. + * Merged semanage/seobject patch to preserve fcontext ordering in list. + * Merged secon patch from James Antill. + +1.30.10 2006-05-22 + * Merged patch with updates to audit2allow, secon, genhomedircon, + and semanage from Dan Walsh. + +1.30.9 2006-05-08 + * Fixed audit2allow and po Makefiles for DESTDIR= builds. + * Merged .po file patch from Dan Walsh. + * Merged bug fix for genhomedircon. + +1.30.8 2006-05-08 + * Merged patch from Dan Walsh. + This includes audit2allow changes for analysis plugins, + internationalization support for several additional programs + and added po files, some fixes for semanage, and several cleanups. + It also adds a new secon utility. + +1.30.7 2006-05-05 + * Merged fix warnings patch from Karl MacMillan. + +1.30.6 2006-04-14 + * Merged semanage prefix support from Russell Coker. + +1.30.5 2006-04-11 + * Added a test to setfiles to check that the spec file is + a regular file. + +1.30.4 2006-03-29 + * Merged audit2allow fixes for refpolicy from Dan Walsh. + * Merged fixfiles patch from Dan Walsh. + * Merged restorecond daemon from Dan Walsh. + +1.30.3 2006-03-29 + * Merged semanage non-MLS fixes from Chris PeBenito. + +1.30.2 2006-03-29 + * Merged semanage and semodule man page examples from Thomas Bleher. + +1.30.1 2006-03-20 + * Merged semanage labeling prefix patch from Ivan Gyurdiev. + +1.30 2006-03-14 + * Updated version for release. + +1.29.28 2006-03-13 + * Merged German translations (de.po) by Debian translation team from Manoj Srivastava. + +1.29.27 2006-03-08 + * Merged audit2allow -R support, chcat fix, semanage MLS checks + and semanage audit calls from Dan Walsh. + +1.29.26 2006-02-15 + * Merged semanage bug fix patch from Ivan Gyurdiev. + +1.29.25 2006-02-14 + * Merged improve bindings patch from Ivan Gyurdiev. + +1.29.24 2006-02-14 + * Merged semanage usage patch from Ivan Gyurdiev. + * Merged use PyList patch from Ivan Gyurdiev. + +1.29.23 2006-02-13 + * Merged newrole -V/--version support from Glauber de Oliveira Costa. + +1.29.22 2006-02-13 + * Merged genhomedircon prefix patch from Dan Walsh. + +1.29.21 2006-02-13 + * Merged optionals in base patch from Joshua Brindle. + +1.29.20 2006-02-07 + * Merged seuser/user_extra support patch to semodule_package + from Joshua Brindle. + +1.29.19 2006-02-06 + * Merged getopt type fix for semodule_link/expand and sestatus + from Chris PeBenito. + +1.29.18 2006-02-02 + * Merged clone record on set_con patch from Ivan Gyurdiev. + +1.29.17 2006-01-30 + * Merged genhomedircon fix from Dan Walsh. + +1.29.16 2006-01-30 + * Merged seusers.system patch from Ivan Gyurdiev. + * Merged improve port/fcontext API patch from Ivan Gyurdiev. + * Merged genhomedircon patch from Dan Walsh. + +1.29.15 2006-01-27 + * Merged newrole audit patch from Steve Grubb. + +1.29.14 2006-01-27 + * Merged seuser -> seuser local rename patch from Ivan Gyurdiev. + +1.29.13 2006-01-27 + * Merged semanage and semodule access check patches from Joshua Brindle. + +1.29.12 2006-01-26 + * Merged restorecon, chcat, and semanage patches from Dan Walsh. + +1.29.11 2006-01-25 + * Modified newrole and run_init to use the loginuid when + supported to obtain the Linux user identity to re-authenticate, + and to fall back to real uid. Dropped the use of the SELinux + user identity, as Linux users are now mapped to SELinux users + via seusers and the SELinux user identity space is separate. + +1.29.10 2006-01-20 + * Merged semanage bug fixes from Ivan Gyurdiev. + * Merged semanage fixes from Russell Coker. + * Merged chcat.8 and genhomedircon patches from Dan Walsh. + +1.29.9 2006-01-19 + * Merged chcat, semanage, and setsebool patches from Dan Walsh. + +1.29.8 2006-01-18 + * Merged semanage fixes from Ivan Gyurdiev. + * Merged semanage fixes from Russell Coker. + * Merged chcat, genhomedircon, and semanage diffs from Dan Walsh. + +1.29.7 2006-01-13 + * Merged newrole cleanup patch from Steve Grubb. + * Merged setfiles/restorecon performance patch from Russell Coker. + * Merged genhomedircon and semanage patches from Dan Walsh. + +1.29.6 2006-01-12 + * Merged remove add_local/set_local patch from Ivan Gyurdiev. + +1.29.5 2006-01-05 + * Added filename to semodule error reporting. + +1.29.4 2006-01-05 + * Merged genhomedircon and semanage patch from Dan Walsh. + * Changed semodule error reporting to include argv[0]. + +1.29.3 2006-01-04 + * Merged semanage getpwnam bug fix from Serge Hallyn (IBM). + * Merged patch series from Ivan Gyurdiev. + This includes patches to: + - cleanup setsebool + - update setsebool to apply active booleans through libsemanage + - update semodule to use the new semanage_set_rebuild() interface + - fix various bugs in semanage + * Merged patch from Dan Walsh (Red Hat). + This includes fixes for restorecon, chcat, fixfiles, genhomedircon, + and semanage. + +1.29.2 2005-12-14 + * Merged patch for chcat script from Dan Walsh. + +1.29.1 2005-12-08 + * Merged fix for audit2allow long option list from Dan Walsh. + * Merged -r option for restorecon (alias for -R) from Dan Walsh. + * Merged chcat script and man page from Dan Walsh. + +1.28 2005-12-07 + * Updated version for release. + +1.27.37 2005-12-07 + * Clarified the genhomedircon warning message. + +1.27.36 2005-12-05 + * Changed genhomedircon to warn on use of ROLE in homedir_template + if using managed policy, as libsemanage does not yet support it. + +1.27.35 2005-12-02 + * Merged genhomedircon bug fix from Dan Walsh. + +1.27.34 2005-12-02 + * Revised semodule* man pages to refer to checkmodule and + to include example sections. + +1.27.33 2005-12-01 + * Merged audit2allow --tefile and --fcfile support from Dan Walsh. + * Merged genhomedircon fix from Dan Walsh. + * Merged semodule* man pages from Dan Walsh, and edited them. + +1.27.32 2005-12-01 + * Changed setfiles to set the MATCHPATHCON_VALIDATE flag to + retain validation/canonicalization of contexts during init. + +1.27.31 2005-11-29 + * Changed genhomedircon to always use user_r for the role in the + managed case since user_get_defrole is broken. + +1.27.30 2005-11-29 + * Merged sestatus, audit2allow, and semanage patch from Dan Walsh. + * Fixed semodule -v option. + +1.27.29 2005-11-28 + * Merged audit2allow python script from Dan Walsh. + (old script moved to audit2allow.perl, will be removed later). + * Merged genhomedircon fixes from Dan Walsh. + * Merged semodule quieting patch from Dan Walsh + (inverts default, use -v to restore original behavior). + +1.27.28 2005-11-15 + * Merged genhomedircon rewrite from Dan Walsh. + +1.27.27 2005-11-09 + * Merged setsebool cleanup patch from Ivan Gyurdiev. + +1.27.26 2005-11-09 + * Added -B (--build) option to semodule to force a rebuild. + +1.27.25 2005-11-08 + * Reverted setsebool patch to call semanage_set_reload_bools(). + * Changed setsebool to disable policy reload and to call + security_set_boolean_list to update the runtime booleans. + +1.27.24 2005-11-08 + * Changed setfiles -c to use new flag to set_matchpathcon_flags() + to disable context translation by matchpathcon_init(). + +1.27.23 2005-11-07 + * Changed setfiles for the context canonicalization support. + +1.27.22 2005-11-07 + * Changed setsebool to call semanage_is_managed() interface + and fall back to security_set_boolean_list() if policy is + not managed. + +1.27.21 2005-11-07 + * Merged setsebool memory leak fix from Ivan Gyurdiev. + * Merged setsebool patch to call semanage_set_reload_bools() + interface from Ivan Gyurdiev. + +1.27.20 2005-11-04 + * Merged setsebool patch from Ivan Gyurdiev. + This moves setsebool from libselinux/utils to policycoreutils, + and rewrites it to use libsemanage for permanent boolean changes. + +1.27.19 2005-10-25 + * Merged semodule support for reload, noreload, and store options + from Joshua Brindle. + * Merged semodule_package rewrite from Joshua Brindle. + +1.27.18 2005-10-20 + * Cleaned up usage and error messages and releasing of memory by + semodule_* utilities. + +1.27.17 2005-10-20 + * Corrected error reporting by semodule. + +1.27.16 2005-10-19 + * Updated semodule_expand for change to sepol interface. + +1.27.15 2005-10-19 + * Merged fixes for make DESTDIR= builds from Joshua Brindle. + +1.27.14 2005-10-18 + * Updated semodule_package for sepol interface changes. + +1.27.13 2005-10-17 + * Updated semodule_expand/link for sepol interface changes. + +1.27.12 2005-10-14 + * Merged non-PAM Makefile support for newrole and run_init from Timothy Wood. + +1.27.11 2005-10-13 + * Updated semodule_expand to use get interfaces for hidden sepol_module_package type. + +1.27.10 2005-10-13 + * Merged newrole and run_init pam config patches from Dan Walsh (Red Hat). + +1.27.9 2005-10-13 + * Merged fixfiles patch from Dan Walsh (Red Hat). + +1.27.8 2005-10-13 + * Updated semodule for removal of semanage_strerror. + +1.27.7 2005-10-11 + * Updated semodule_link and semodule_expand to use shared libsepol. + Fixed audit2why to call policydb_init prior to policydb_read (still + uses the static libsepol). + +1.27.6 2005-10-07 + * Updated for changes to libsepol. + Changed semodule and semodule_package to use the shared libsepol. + Disabled build of semodule_link and semodule_expand for now. + Updated audit2why for relocated policydb internal headers, + still needs to be converted to a shared lib interface. + +1.27.5 2005-10-06 + * Fixed warnings in load_policy. + +1.27.4 2005-10-06 + * Rewrote load_policy to use the new selinux_mkload_policy() + interface provided by libselinux. + +1.27.3 2005-09-28 + * Merged patch to update semodule to the new libsemanage API + and improve the user interface from Karl MacMillan (Tresys). + * Modified semodule for the create/connect API split. + +1.27.2 2005-09-20 + * Merged run_init open_init_pty bug fix from Manoj Srivastava + (unblock SIGCHLD). Bug reported by Erich Schubert. + +1.27.1 2005-09-20 + * Merged error shadowing bug fix for restorecon from Dan Walsh. + * Merged setfiles usage/man page update for -r option from Dan Walsh. + * Merged fixfiles -C patch to ignore :s0 addition on update + to a MCS/MLS policy from Dan Walsh. + +1.26 2005-09-06 + * Updated version for release. + +1.25.9 2005-08-31 + * Changed setfiles -c to translate the context to raw format + prior to calling libsepol. + +1.25.8 2005-08-31 + * Changed semodule to report errors even without -v, + to detect extraneous arguments, and corrected usage message. + +1.25.7 2005-08-25 + * Merged patch for fixfiles -C from Dan Walsh. + +1.25.6 2005-08-22 + * Merged fixes for semodule_link and sestatus from Serge Hallyn (IBM). + Bugs found by Coverity. + +1.25.5 2005-08-02 + * Merged patch to move module read/write code from libsemanage + to libsepol from Jason Tang (Tresys). + +1.25.4 2005-07-27 + * Changed semodule* to link with libsemanage. + +1.25.3 2005-07-26 + * Merged restorecon patch from Ivan Gyurdiev. + +1.25.2 2005-07-11 + * Merged load_policy, newrole, and genhomedircon patches from Red Hat. + +1.25.1 2005-07-06 + * Merged loadable module support from Tresys Technology. + +1.24 2005-06-20 + * Updated version for release. + +1.23.11 2005-05-19 + * Merged fixfiles and newrole patch from Dan Walsh. + * Merged audit2why man page from Dan Walsh. + +1.23.10 2005-05-16 + * Extended audit2why to incorporate booleans and local user + settings when analyzing audit messages. + +1.23.9 2005-05-13 + * Updated audit2why for sepol_ prefixes on Flask types to + avoid namespace collision with libselinux, and to + include <selinux/selinux.h> now. + +1.23.8 2005-05-13 + * Added audit2why utility. + +1.23.7 2005-04-29 + * Merged patch for fixfiles from Dan Walsh. + Allow passing -F to force reset of customizable contexts. + +1.23.6 2005-04-13 + * Fixed signed/unsigned pointer bug in load_policy. + * Reverted context validation patch for genhomedircon. + +1.23.5 2005-04-12 + * Reverted load_policy is_selinux_enabled patch from Dan Walsh. + Otherwise, an initial policy load cannot be performed using + load_policy, e.g. for anaconda. + +1.23.4 2005-04-08 + * Merged load_policy is_selinux_enabled patch from Dan Walsh. + * Merged restorecon verbose output patch from Dan Walsh. + * Merged setfiles altroot patch from Chris PeBenito. + +1.23.3 2005-03-17 + * Merged context validation patch for genhomedircon from Eric Paris. + +1.23.2 2005-03-16 + * Changed setfiles -c to call set_matchpathcon_flags(3) to + turn off processing of .homedirs and .local. + +1.23.1 2005-03-14 + * Merged rewrite of genhomedircon by Eric Paris. + * Changed fixfiles to relabel jfs since it now supports security xattrs + (as of 2.6.11). Removed reiserfs until 2.6.12 is released with + fixed support for reiserfs and selinux. + +1.22 2005-03-09 + * Updated version for release. + +1.21.22 2005-03-07 + * Merged restorecon and genhomedircon patch from Dan Walsh. + +1.21.21 2005-02-28 + * Merged load_policy and genhomedircon patch from Dan Walsh. + +1.21.20 2005-02-24 + * Merged fixfiles and genhomedircon patch from Dan Walsh. + +1.21.19 2005-02-22 + * Merged several fixes from Ulrich Drepper. + +1.21.18 2005-02-18 + * Changed load_policy to fall back to the original policy upon + an error from sepol_genusers(). + +1.21.17 2005-02-17 + * Merged new genhomedircon script from Dan Walsh. + +1.21.16 2005-02-17 + * Changed load_policy to call sepol_genusers(). + +1.21.15 2005-02-09 + * Changed relabel Makefile target to use restorecon. + +1.21.14 2005-02-08 + * Merged restorecon patch from Dan Walsh. + +1.21.13 2005-02-07 + * Merged sestatus patch from Dan Walsh. + * Merged further change to fixfiles -C from Dan Walsh. + +1.21.12 2005-02-02 + * Merged further patches for restorecon/setfiles -e and fixfiles -C. + +1.21.11 2005-02-02 + * Merged patch for fixfiles -C option from Dan Walsh. + * Merged patch -e support for restorecon from Dan Walsh. + * Merged updated -e support for setfiles from Dan Walsh. + +1.21.10 2005-01-31 + * Merged patch for open_init_pty from Manoj Srivastava. + +1.21.9 2005-01-28 + * Merged updated fixfiles script from Dan Walsh. + * Merged updated man page for fixfiles from Dan Walsh and re-added unzipped. + * Reverted fixfiles patch for file_contexts.local; + obsoleted by setfiles rewrite. + * Merged error handling patch for restorecon from Dan Walsh. + * Merged semi raw mode for open_init_pty helper from Manoj Srivastava. + +1.21.8 2005-01-28 + * Rewrote setfiles to use matchpathcon and the new interfaces + exported by libselinux (>= 1.21.5). + +1.21.7 2005-01-27 + * Prevent overflow of spec array in setfiles. + +1.21.6 2005-01-27 + * Merged genhomedircon STARTING_UID bug fix from Dan Walsh. + +1.21.5 2005-01-26 + * Merged newrole -l support from Darrel Goeddel (TCS). + +1.21.4 2005-01-25 + * Merged fixfiles patch for file_contexts.local from Dan Walsh. + +1.21.3 2005-01-21 + * Fixed restorecon to not treat errors from is_context_customizable() + as a customizable context. + * Merged setfiles/restorecon patch to not reset user field unless + -F option is specified from Dan Walsh. + +1.21.2 2005-01-21 + * Merged open_init_pty helper for run_init from Manoj Srivastava. + * Merged audit2allow and genhomedircon man pages from Manoj Srivastava. + +1.21.1 2005-01-19 + * Merged customizable contexts patch for restorecon/setfiles from Dan Walsh. + +1.20 2005-01-06 + * Merged fixfiles rewrite from Dan Walsh. + * Merged restorecon patch from Dan Walsh. + * Merged fixfiles and restorecon patches from Dan Walsh. + * Changed restorecon to ignore ENOENT errors from matchpathcon. + * Merged nonls patch from Chris PeBenito. + * Removed fixfiles.cron. + * Merged run_init.8 patch from Dan Walsh. + +1.18 2004-11-01 + * Merged audit2allow patch from Thomas Bleher, with mods by Dan Walsh. + * Merged sestatus patch from Steve Grubb. + * Merged fixfiles patch from Dan Walsh. + * Added -l option to setfiles to log changes via syslog. + * Merged -e option to setfiles to exclude directories. + * Merged -R option to restorecon for recursive descent. + * Merged sestatus patch from Steve Grubb via Dan Walsh. + * Merged load_policy and fixfiles.cron patches from Dan Walsh. + * Merged fix for setfiles context validation patch from Colin Walters. + * Merged setfiles context validation patch from Colin Walters. + * Merged genhomedircon patch from Russell Coker. + * Merged restorecon patch from Russell Coker. + +1.16 2004-08-13 + * Merged audit2allow fix from Tom London. + * Merged load_policy man page from Dan Walsh. + * Merged newrole bug fix from Chad Hanson. + * Changed load_policy to preserve booleans by default. + * Changed load_policy to invoke sepol_genbools() instead. + * Changed load_policy to also invoke security_load_booleans(). + * Merged genhomedircon fixes from Dan Walsh. + * Changed restorecon to use realpath. + * Merged fixfiles patch from Dan Walsh. + * Merged genhomedircon patch from Russell Coker and Dan Walsh. + * Merged fixfiles patch and fixfiles.cron script from Dan Walsh. + * Merged stat fix for setfiles -s from Russell Coker. + +1.14 2004-06-25 + * Merged fix for fixfiles. + * Merged enhancements to setfiles, fixfiles and restorecon from Dan Walsh. + * Merged updated genhomedircon script from Russell Coker. + * Merged run_init patch to find initrc_context from Dan Walsh. + * Merged fixfiles patch for /etc/selinux from Dan Walsh. + * Merged restorecon patch from Dan Walsh. + * Merged fixfiles patch from Dan Walsh. + +1.12 2004-05-10 + * Merged newrole patch from Colin Walters. + * Merged fixfiles from Dan Walsh. + +1.10 2004-04-05 + * Changed setfiles to not abort upon lsetfilecon failures. + * Merged sestatus from Chris PeBenito. + * Merged fixes for restorecon. + * Merged setfiles verbosity patch from Dan Walsh and Stephen Tweedie. + * Merged restorecon patch from Dan Walsh. + * Revert add_assoc change from setfiles. + * Moved restorecon to /sbin. + * Disable add_assoc in setfiles by default, use -a to enable. + * Merged genhomedircon patch from Dan Walsh. + * Merged restorecon patch from Dan Walsh. + * Merged setfiles buffer size change from Dan Walsh. + * Merged genhomedircon fix from Karl MacMillan of Tresys. + This generates separate lines for each prefix. + +1.8 2004-03-09 + * Merged genhomedircon patch from Karl MacMillan of Tresys. + * Removed checkcon script (obsoleted by restorecon -nv). + * Replaced restorecon script with C program from Dan Walsh. + Uses the new matchpathcon function from libselinux. + +1.6 2004-02-18 + * Fixed setfiles sorting problem reported by Colin Walters. + * Merged setfiles patch from Robert Bihlmeyer, amended by Russell Coker. + * Added scripts (checkcon, restorecon, genhomedircon) from Dan Walsh. + * Quiet warning about duplicate same specifications if -q is used. + * Fixed usage message of audit2allow. + +1.4 2003-12-01 + * Merged patch from Russell Coker. + * Added audit2allow (formerly newrules.pl from policy). + * Dropped -lattr from Makefiles. + * Merged setfiles check type first patch by Russell Coker. + +1.2 2003-09-30 + * Merged run_init close file patch from Chris PeBenito. + * Merged setfiles stem compression patch by Russell Coker. + * Merged setfiles usage/getopt/err patch by Russell Coker. + * Merged setfiles altroot patch by Hardened Gentoo team. + * Merged i18n patch by Dan Walsh. + * Changed Makefiles to allow non-root rpm builds. + +1.1 2003-08-13 + * Dropped obsolete psid code from setfiles. + +1.0 2003-07-11 + * Initial public release. + Deleted: tags/policycoreutils_1_33_10/policycoreutils/VERSION =================================================================== --- trunk/policycoreutils/VERSION 2007-01-05 19:15:46 UTC (rev 2153) +++ tags/policycoreutils_1_33_10/policycoreutils/VERSION 2007-01-08 20:45:13 UTC (rev 2160) @@ -1 +0,0 @@ -1.33.9 Copied: tags/policycoreutils_1_33_10/policycoreutils/VERSION (from rev 2158, trunk/policycoreutils/VERSION) =================================================================== --- tags/policycoreutils_1_33_10/policycoreutils/VERSION (rev 0) +++ tags/policycoreutils_1_33_10/policycoreutils/VERSION 2007-01-08 20:45:13 UTC (rev 2160) @@ -0,0 +1 @@ +1.33.10 Deleted: tags/policycoreutils_1_33_10/policycoreutils/semanage/seobject.py =================================================================== --- trunk/policycoreutils/semanage/seobject.py 2007-01-05 19:15:46 UTC (rev 2153) +++ tags/policycoreutils_1_33_10/policycoreutils/semanage/seobject.py 2007-01-08 20:45:13 UTC (rev 2160) @@ -1,1287 +0,0 @@ -#! /usr/bin/python -E -# Copyright (C) 2005 Red Hat -# see file 'COPYING' for use and warranty information -# -# semanage is a tool for managing SELinux configuration files -# -# This program is free software; you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation; either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program; if not, write to the Free Software -# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA -# 02111-1307 USA -# -# - -import pwd, string, selinux, tempfile, os, re, sys -from semanage import *; -import gettext - -try: - t = gettext.translation('policycoreutils', '/usr/share/locale') - _ = t.ugettext -except: - pass - -is_mls_enabled = selinux.is_selinux_mls_enabled() - -import syslog - -file_types = {} -file_types[""] = SEMANAGE_FCONTEXT_ALL; -file_types["all files"] = SEMANAGE_FCONTEXT_ALL; -file_types["--"] = SEMANAGE_FCONTEXT_REG; -file_types["regular file"] = SEMANAGE_FCONTEXT_REG; -file_types["-d"] = SEMANAGE_FCONTEXT_DIR; -file_types["directory"] = SEMANAGE_FCONTEXT_DIR; -file_types["-c"] = SEMANAGE_FCONTEXT_CHAR; -file_types["character device"] = SEMANAGE_FCONTEXT_CHAR; -file_types["-b"] = SEMANAGE_FCONTEXT_BLOCK; -file_types["block device"] = SEMANAGE_FCONTEXT_BLOCK; -file_types["-s"] = SEMANAGE_FCONTEXT_SOCK; -file_types["socket"] = SEMANAGE_FCONTEXT_SOCK; -file_types["-l"] = SEMANAGE_FCONTEXT_LINK; -file_types["symbolic link"] = SEMANAGE_FCONTEXT_LINK; -file_types["-p"] = SEMANAGE_FCONTEXT_PIPE; -file_types["named pipe"] = SEMANAGE_FCONTEXT_PIPE; - -try: - import audit - class logger: - def __init__(self): - self.audit_fd = audit.audit_open() - - def log(self, success, msg, name = "", sename = "", serole = "", serange = "", old_sename = "", old_serole = "", old_serange = ""): - audit.audit_log_semanage_message(self.audit_fd, audit.AUDIT_USER_ROLE_CHANGE, sys.argv[0],msg, name, 0, sename, serole, serange, old_sename, old_serole, old_serange, "", "", "", success); -except: - class logger: - def log(self, success, msg, name = "", sename = "", serole = "", serange = "", old_sename = "", old_serole = "", old_serange = ""): - if success == 1: - message = "Successful: " - else: - message = "Failed: " - message += " %s name=%s" % (msg,name) - if sename != "": - message += " sename=" + sename - if old_sename != "": - message += " old_sename=" + old_sename - if serole != "": - message += " role=" + serole - if old_serole != "": - message += " old_role=" + old_serole - if serange != "" and serange != None: - message += " MLSRange=" + serange - if old_serange != "" and old_serange != None: - message += " old_MLSRange=" + old_serange - syslog.syslog(message); - -mylog = logger() - -def validate_level(raw): - sensitivity = "s[0-9]*" - category = "c[0-9]*" - cat_range = category + "(\." + category +")?" - categories = cat_range + "(\," + cat_range + ")*" - reg = sensitivity + "(-" + sensitivity + ")?" + "(:" + categories + ")?" - return re.search("^" + reg +"$",raw) - -def translate(raw, prepend = 1): - if prepend == 1: - context = "a:b:c:%s" % raw - else: - context = raw - (rc, trans) = selinux.selinux_raw_to_trans_context(context) - if rc != 0: - return raw - if prepend: - trans = trans.strip("a:b:c") - if trans == "": - return raw - else: - return trans - -def untranslate(trans, prepend = 1): - if prepend == 1: - context = "a:b:c:%s" % trans - else: - context = trans - - (rc, raw) = selinux.selinux_trans_to_raw_context(context) - if rc != 0: - return trans - if prepend: - raw = raw.strip("a:b:c") - if raw == "": - return trans - else: - return raw - -class setransRecords: - def __init__(self): - if not is_mls_enabled: - raise ValueError(_("translations not supported on non-MLS machines")) - self.filename = selinux.selinux_translations_path() - try: - fd = open(self.filename, "r") - translations = fd.readlines() - fd.close() - except IOError, e: - raise ValueError(_("Unable to open %s: translations not supported on non-MLS machines") % (self.filename, e) ) - - self.ddict = {} - self.comments = [] - for r in translations: - if len(r) == 0: - continue - i = r.strip() - if i == "" or i[0] == "#": - self.comments.append(r) - continue - i = i.split("=") - if len(i) != 2: - self.comments.append(r) - continue - self.ddict[i[0]] = i[1] - - def get_all(self): - return self.ddict - - def out(self): - rec = "" - for c in self.comments: - rec += c +"\n" - keys = self.ddict.keys() - keys.sort() - for k in keys: - rec += "%s=%s\n" % (k, self.ddict[k]) - return rec - - def list(self,heading = 1): - if heading: - print "\n%-25s %s\n" % ("Level", "Translation") - keys = self.ddict.keys() - keys.sort() - for k in keys: - print "%-25s %s" % (k, self.ddict[k]) - - def add(self, raw, trans): - if trans.find(" ") >= 0: - raise ValueError(_("Translations can not contain spaces '%s' ") % trans) - - if validate_level(raw) == None: - raise ValueError(_("Invalid Level '%s' ") % raw) - - if self.ddict.has_key(raw): - raise ValueError(_("%s already defined in translations") % raw) - else: - self.ddict[raw] = trans - self.save() - - def modify(self, raw, trans): - if trans.find(" ") >= 0: - - raise ValueError(_("Translations can not contain spaces '%s' ") % trans) - if self.ddict.has_key(raw): - self.ddict[raw] = trans - else: - raise ValueError(_("%s not defined in translations") % raw) - self.save() - - def delete(self, raw): - self.ddict.pop(raw) - self.save() - - def save(self): - (fd, newfilename) = tempfile.mkstemp('', self.filename) - os.write(fd, self.out()) - os.close(fd) - os.rename(newfilename, self.filename) - -class semanageRecords: - def __init__(self): - self.sh = semanage_handle_create() - self.semanaged = semanage_is_managed(self.sh) - - if not self.semanaged: - semanage_handle_destroy(self.sh) - raise ValueError(_("SELinux policy is not managed or store cannot be accessed.")) - - rc = semanage_access_check(self.sh) - if rc < SEMANAGE_CAN_READ: - semanage_handle_destroy(self.sh) - raise ValueError(_("Cannot read policy store.")) - - rc = semanage_connect(self.sh) - if rc < 0: - semanage_handle_destroy(self.sh) - raise ValueError(_("Could not establish semanage connection")) - -class loginRecords(semanageRecords): - def __init__(self): - semanageRecords.__init__(self) - - def add(self, name, sename, serange): - if is_mls_enabled == 1: - if serange == "": - serange = "s0" - else: - serange = untranslate(serange) - - if sename == "": - sename = "user_u" - - try: - (rc,k) = semanage_seuser_key_create(self.sh, name) - if rc < 0: - raise ValueError(_("Could not create a key for %s") % name) - - (rc,exists) = semanage_seuser_exists(self.sh, k) - if rc < 0: - raise ValueError(_("Could not check if login mapping for %s is defined") % name) - if exists: - raise ValueError(_("Login mapping for %s is already defined") % name) - try: - pwd.getpwnam(name) - except: - raise ValueError(_("Linux User %s does not exist") % name) - - (rc,u) = semanage_seuser_create(self.sh) - if rc < 0: - raise ValueError(_("Could not create login mapping for %s") % name) - - rc = semanage_seuser_set_name(self.sh, u, name) - if rc < 0: - raise ValueError(_("Could not set name for %s") % name) - - if serange != "": - rc = semanage_seuser_set_mlsrange(self.sh, u, serange) - if rc < 0: - raise ValueError(_("Could not set MLS range for %s") % name) - - rc = semanage_seuser_set_sename(self.sh, u, sename) - if rc < 0: - raise ValueError(_("Could not set SELinux user for %s") % name) - - rc = semanage_begin_transaction(self.sh) - if rc < 0: - raise ValueError(_("Could not start semanage transaction")) - - rc = semanage_seuser_modify_local(self.sh, k, u) - if rc < 0: - raise ValueError(_("Could not add login mapping for %s") % name) - - rc = semanage_commit(self.sh) - if rc < 0: - raise ValueError(_("Could not add login mapping for %s") % name) - - except ValueError, error: - mylog.log(0, "add SELinux user mapping", name, sename, "", serange); - raise error - - mylog.log(1, "add SELinux user mapping", name, sename, "", serange); - semanage_seuser_key_free(k) - semanage_seuser_free(u) - - def modify(self, name, sename = "", serange = ""): - oldsename = "" - oldserange = "" - try: - if sename == "" and serange == "": - raise ValueError(_("Requires seuser or serange")) - - (rc,k) = semanage_seuser_key_create(self.sh, name) - if rc < 0: - raise ValueError(_("Could not create a key for %s") % name) - - (rc,exists) = semanage_seuser_exists(self.sh, k) - if rc < 0: - raise ValueError(_("Could not check if login mapping for %s is defined") % name) - if not exists: - raise ValueError(_("Login mapping for %s is not defined") % name) - - (rc,u) = semanage_seuser_query(self.sh, k) - if rc < 0: - raise ValueError(_("Could not query seuser for %s") % name) - - oldserange = semanage_seuser_get_mlsrange(u) - oldsename = semanage_seuser_get_sename(u) - if serange != "": - semanage_seuser_set_mlsrange(self.sh, u, untranslate(serange)) - else: - serange = oldserange - if sename != "": - semanage_seuser_set_sename(self.sh, u, sename) - else: - sename = oldsename - - rc = semanage_begin_transaction(self.sh) - if rc < 0: - raise ValueError(_("Could not start semanage transaction")) - - rc = semanage_seuser_modify_local(self.sh, k, u) - if rc < 0: - raise ValueError(_("Could not modify login mapping for %s") % name) - - rc = semanage_commit(self.sh) - if rc < 0: - raise ValueError(_("Could not modify login mapping for %s") % name) - - except ValueError, error: - mylog.log(0,"modify selinux user mapping", name, sename,"", serange, oldsename, "", oldserange); - raise error - - mylog.log(1,"modify selinux user mapping", name, sename, "", serange, oldsename, "", oldserange); - semanage_seuser_key_free(k) - semanage_seuser_free(u) - - def delete(self, name): - try: - (rc,k) = semanage_seuser_key_create(self.sh, name) - if rc < 0: - raise ValueError(_("Could not create a key for %s") % name) - - (rc,exists) = semanage_seuser_exists(self.sh, k) - if rc < 0: - raise ValueError(_("Could not check ... [truncated message content] |
From: <ssm...@us...> - 2007-01-24 20:19:02
|
Revision: 2204 http://svn.sourceforge.net/selinux/?rev=2204&view=rev Author: ssmalley Date: 2007-01-24 12:19:00 -0800 (Wed, 24 Jan 2007) Log Message: ----------- Moved old tags for nsa.gov releases. Added Paths: ----------- tags/old/20030711/ tags/old/20030711/checkpolicy_1_0/ tags/old/20030711/libselinux_1_0/ tags/old/20030711/policycoreutils_1_0/ tags/old/20030813/ tags/old/20030813/checkpolicy_1_1/ tags/old/20030813/libselinux_1_1/ tags/old/20030813/policycoreutils_1_1/ tags/old/20031001/ tags/old/20031001/checkpolicy_1_2/ tags/old/20031001/libselinux_1_2/ tags/old/20031001/policycoreutils_1_2/ tags/old/20031001/selinux-doc_1_2/ tags/old/20031205/ tags/old/20031205/checkpolicy_1_4/ tags/old/20031205/libselinux_1_4/ tags/old/20031205/policycoreutils_1_4/ tags/old/20031205/selinux-doc_1_4/ tags/old/20040223/ tags/old/20040223/checkpolicy_1_6/ tags/old/20040223/libselinux_1_6/ tags/old/20040223/policycoreutils_1_6/ tags/old/20040223/selinux-doc_1_6/ tags/old/20040312/ tags/old/20040312/checkpolicy_1_8/ tags/old/20040312/libselinux_1_8/ tags/old/20040312/policycoreutils_1_8/ tags/old/20040312/selinux-doc_1_8/ tags/old/20040408/ tags/old/20040408/libselinux_1_10/ tags/old/20040408/policycoreutils_1_10/ tags/old/20040408/selinux-doc_1_10/ tags/old/20040513/ tags/old/20040513/checkpolicy_1_10/ tags/old/20040513/libselinux_1_12/ tags/old/20040513/policycoreutils_1_12/ tags/old/20040513/selinux-doc_1_12/ tags/old/20040629/ tags/old/20040629/checkpolicy_1_14/ tags/old/20040629/libselinux_1_14/ tags/old/20040629/policycoreutils_1_14/ tags/old/20040819/ tags/old/20040819/checkpolicy_1_16/ tags/old/20040819/libselinux_1_16/ tags/old/20040819/libsepol_1_0/ tags/old/20040819/policycoreutils_1_16/ tags/old/20041102/ tags/old/20041102/checkpolicy_1_18/ tags/old/20041102/libselinux_1_18/ tags/old/20041102/policycoreutils_1_18/ tags/old/20041102/selinux-doc_1_14/ tags/old/20050107/ tags/old/20050107/checkpolicy_1_20/ tags/old/20050107/libselinux_1_20/ tags/old/20050107/libsepol_1_2/ tags/old/20050107/policycoreutils_1_20/ tags/old/20050107/selinux-doc_1_16/ tags/old/20050309/ tags/old/20050309/checkpolicy_1_22/ tags/old/20050309/libselinux_1_22/ tags/old/20050309/libsepol_1_4/ tags/old/20050309/policycoreutils_1_22/ tags/old/20050309/selinux-doc_1_18/ tags/old/20050622/ tags/old/20050622/checkpolicy_1_24/ tags/old/20050622/libselinux_1_24/ tags/old/20050622/libsepol_1_6/ tags/old/20050622/policycoreutils_1_24/ tags/old/20050622/selinux-doc_1_20/ tags/old/20050907/ tags/old/20050907/checkpolicy_1_26/ tags/old/20050907/libselinux_1_26/ tags/old/20050907/libsemanage_1_2/ tags/old/20050907/libsepol_1_8/ tags/old/20050907/policycoreutils_1_26/ tags/old/20050907/selinux-doc_1_22/ tags/old/20051207/ tags/old/20051207/checkpolicy_1_28/ tags/old/20051207/libselinux_1_28/ tags/old/20051207/libsemanage_1_4/ tags/old/20051207/libsepol_1_10/ tags/old/20051207/policycoreutils_1_28/ tags/old/20051207/selinux-doc_1_24/ tags/old/20060315/ tags/old/20060315/checkpolicy_1_30/ tags/old/20060315/libselinux_1_30/ tags/old/20060315/libsemanage_1_6/ tags/old/20060315/libsepol_1_12/ tags/old/20060315/policycoreutils_1_30/ tags/old/20061018/ tags/old/20061018/checkpolicy_1_32/ tags/old/20061018/libselinux_1_32/ tags/old/20061018/libsemanage_1_8/ tags/old/20061018/libsepol_1_14/ tags/old/20061018/policycoreutils_1_32/ tags/old/20061018/selinux-doc_1_26/ Removed Paths: ------------- tags/checkpolicy_1_0/ tags/checkpolicy_1_1/ tags/checkpolicy_1_10/ tags/checkpolicy_1_14/ tags/checkpolicy_1_16/ tags/checkpolicy_1_18/ tags/checkpolicy_1_2/ tags/checkpolicy_1_20/ tags/checkpolicy_1_22/ tags/checkpolicy_1_24/ tags/checkpolicy_1_26/ tags/checkpolicy_1_28/ tags/checkpolicy_1_30/ tags/checkpolicy_1_32/ tags/checkpolicy_1_4/ tags/checkpolicy_1_6/ tags/checkpolicy_1_8/ tags/libselinux_1_0/ tags/libselinux_1_1/ tags/libselinux_1_10/ tags/libselinux_1_12/ tags/libselinux_1_14/ tags/libselinux_1_16/ tags/libselinux_1_18/ tags/libselinux_1_2/ tags/libselinux_1_20/ tags/libselinux_1_22/ tags/libselinux_1_24/ tags/libselinux_1_26/ tags/libselinux_1_28/ tags/libselinux_1_30/ tags/libselinux_1_32/ tags/libselinux_1_4/ tags/libselinux_1_6/ tags/libselinux_1_8/ tags/libsemanage_1_2/ tags/libsemanage_1_4/ tags/libsemanage_1_6/ tags/libsemanage_1_8/ tags/libsepol_1_0/ tags/libsepol_1_10/ tags/libsepol_1_12/ tags/libsepol_1_14/ tags/libsepol_1_2/ tags/libsepol_1_4/ tags/libsepol_1_6/ tags/libsepol_1_8/ tags/policycoreutils_1_0/ tags/policycoreutils_1_1/ tags/policycoreutils_1_10/ tags/policycoreutils_1_12/ tags/policycoreutils_1_14/ tags/policycoreutils_1_16/ tags/policycoreutils_1_18/ tags/policycoreutils_1_2/ tags/policycoreutils_1_20/ tags/policycoreutils_1_22/ tags/policycoreutils_1_24/ tags/policycoreutils_1_26/ tags/policycoreutils_1_28/ tags/policycoreutils_1_30/ tags/policycoreutils_1_32/ tags/policycoreutils_1_4/ tags/policycoreutils_1_6/ tags/policycoreutils_1_8/ tags/selinux-doc_1_10/ tags/selinux-doc_1_12/ tags/selinux-doc_1_14/ tags/selinux-doc_1_16/ tags/selinux-doc_1_18/ tags/selinux-doc_1_2/ tags/selinux-doc_1_20/ tags/selinux-doc_1_22/ tags/selinux-doc_1_24/ tags/selinux-doc_1_26/ tags/selinux-doc_1_4/ tags/selinux-doc_1_6/ tags/selinux-doc_1_8/ Copied: tags/old/20030711/checkpolicy_1_0 (from rev 2203, tags/checkpolicy_1_0) Copied: tags/old/20030711/libselinux_1_0 (from rev 2203, tags/libselinux_1_0) Copied: tags/old/20030711/policycoreutils_1_0 (from rev 2203, tags/policycoreutils_1_0) Copied: tags/old/20030813/checkpolicy_1_1 (from rev 2203, tags/checkpolicy_1_1) Copied: tags/old/20030813/libselinux_1_1 (from rev 2203, tags/libselinux_1_1) Copied: tags/old/20030813/policycoreutils_1_1 (from rev 2203, tags/policycoreutils_1_1) Copied: tags/old/20031001/checkpolicy_1_2 (from rev 2203, tags/checkpolicy_1_2) Copied: tags/old/20031001/libselinux_1_2 (from rev 2203, tags/libselinux_1_2) Copied: tags/old/20031001/policycoreutils_1_2 (from rev 2203, tags/policycoreutils_1_2) Copied: tags/old/20031001/selinux-doc_1_2 (from rev 2203, tags/selinux-doc_1_2) Copied: tags/old/20031205/checkpolicy_1_4 (from rev 2203, tags/checkpolicy_1_4) Copied: tags/old/20031205/libselinux_1_4 (from rev 2203, tags/libselinux_1_4) Copied: tags/old/20031205/policycoreutils_1_4 (from rev 2203, tags/policycoreutils_1_4) Copied: tags/old/20031205/selinux-doc_1_4 (from rev 2203, tags/selinux-doc_1_4) Copied: tags/old/20040223/checkpolicy_1_6 (from rev 2203, tags/checkpolicy_1_6) Copied: tags/old/20040223/libselinux_1_6 (from rev 2203, tags/libselinux_1_6) Copied: tags/old/20040223/policycoreutils_1_6 (from rev 2203, tags/policycoreutils_1_6) Copied: tags/old/20040223/selinux-doc_1_6 (from rev 2203, tags/selinux-doc_1_6) Copied: tags/old/20040312/checkpolicy_1_8 (from rev 2203, tags/checkpolicy_1_8) Copied: tags/old/20040312/libselinux_1_8 (from rev 2203, tags/libselinux_1_8) Copied: tags/old/20040312/policycoreutils_1_8 (from rev 2203, tags/policycoreutils_1_8) Copied: tags/old/20040312/selinux-doc_1_8 (from rev 2203, tags/selinux-doc_1_8) Copied: tags/old/20040408/libselinux_1_10 (from rev 2203, tags/libselinux_1_10) Copied: tags/old/20040408/policycoreutils_1_10 (from rev 2203, tags/policycoreutils_1_10) Copied: tags/old/20040408/selinux-doc_1_10 (from rev 2203, tags/selinux-doc_1_10) Copied: tags/old/20040513/checkpolicy_1_10 (from rev 2203, tags/checkpolicy_1_10) Copied: tags/old/20040513/libselinux_1_12 (from rev 2203, tags/libselinux_1_12) Copied: tags/old/20040513/policycoreutils_1_12 (from rev 2203, tags/policycoreutils_1_12) Copied: tags/old/20040513/selinux-doc_1_12 (from rev 2203, tags/selinux-doc_1_12) Copied: tags/old/20040629/checkpolicy_1_14 (from rev 2203, tags/checkpolicy_1_14) Copied: tags/old/20040629/libselinux_1_14 (from rev 2203, tags/libselinux_1_14) Copied: tags/old/20040629/policycoreutils_1_14 (from rev 2203, tags/policycoreutils_1_14) Copied: tags/old/20040819/checkpolicy_1_16 (from rev 2203, tags/checkpolicy_1_16) Copied: tags/old/20040819/libselinux_1_16 (from rev 2203, tags/libselinux_1_16) Copied: tags/old/20040819/libsepol_1_0 (from rev 2203, tags/libsepol_1_0) Copied: tags/old/20040819/policycoreutils_1_16 (from rev 2203, tags/policycoreutils_1_16) Copied: tags/old/20041102/checkpolicy_1_18 (from rev 2203, tags/checkpolicy_1_18) Copied: tags/old/20041102/libselinux_1_18 (from rev 2203, tags/libselinux_1_18) Copied: tags/old/20041102/policycoreutils_1_18 (from rev 2203, tags/policycoreutils_1_18) Copied: tags/old/20041102/selinux-doc_1_14 (from rev 2203, tags/selinux-doc_1_14) Copied: tags/old/20050107/checkpolicy_1_20 (from rev 2203, tags/checkpolicy_1_20) Copied: tags/old/20050107/libselinux_1_20 (from rev 2203, tags/libselinux_1_20) Copied: tags/old/20050107/libsepol_1_2 (from rev 2203, tags/libsepol_1_2) Copied: tags/old/20050107/policycoreutils_1_20 (from rev 2203, tags/policycoreutils_1_20) Copied: tags/old/20050107/selinux-doc_1_16 (from rev 2203, tags/selinux-doc_1_16) Copied: tags/old/20050309/checkpolicy_1_22 (from rev 2203, tags/checkpolicy_1_22) Copied: tags/old/20050309/libselinux_1_22 (from rev 2203, tags/libselinux_1_22) Copied: tags/old/20050309/libsepol_1_4 (from rev 2203, tags/libsepol_1_4) Copied: tags/old/20050309/policycoreutils_1_22 (from rev 2203, tags/policycoreutils_1_22) Copied: tags/old/20050309/selinux-doc_1_18 (from rev 2203, tags/selinux-doc_1_18) Copied: tags/old/20050622/checkpolicy_1_24 (from rev 2203, tags/checkpolicy_1_24) Copied: tags/old/20050622/libselinux_1_24 (from rev 2203, tags/libselinux_1_24) Copied: tags/old/20050622/libsepol_1_6 (from rev 2203, tags/libsepol_1_6) Copied: tags/old/20050622/policycoreutils_1_24 (from rev 2203, tags/policycoreutils_1_24) Copied: tags/old/20050622/selinux-doc_1_20 (from rev 2203, tags/selinux-doc_1_20) Copied: tags/old/20050907/checkpolicy_1_26 (from rev 2203, tags/checkpolicy_1_26) Copied: tags/old/20050907/libselinux_1_26 (from rev 2203, tags/libselinux_1_26) Copied: tags/old/20050907/libsemanage_1_2 (from rev 2203, tags/libsemanage_1_2) Copied: tags/old/20050907/libsepol_1_8 (from rev 2203, tags/libsepol_1_8) Copied: tags/old/20050907/policycoreutils_1_26 (from rev 2203, tags/policycoreutils_1_26) Copied: tags/old/20050907/selinux-doc_1_22 (from rev 2203, tags/selinux-doc_1_22) Copied: tags/old/20051207/checkpolicy_1_28 (from rev 2203, tags/checkpolicy_1_28) Copied: tags/old/20051207/libselinux_1_28 (from rev 2203, tags/libselinux_1_28) Copied: tags/old/20051207/libsemanage_1_4 (from rev 2203, tags/libsemanage_1_4) Copied: tags/old/20051207/libsepol_1_10 (from rev 2203, tags/libsepol_1_10) Copied: tags/old/20051207/policycoreutils_1_28 (from rev 2203, tags/policycoreutils_1_28) Copied: tags/old/20051207/selinux-doc_1_24 (from rev 2203, tags/selinux-doc_1_24) Copied: tags/old/20060315/checkpolicy_1_30 (from rev 2203, tags/checkpolicy_1_30) Copied: tags/old/20060315/libselinux_1_30 (from rev 2203, tags/libselinux_1_30) Copied: tags/old/20060315/libsemanage_1_6 (from rev 2203, tags/libsemanage_1_6) Copied: tags/old/20060315/libsepol_1_12 (from rev 2203, tags/libsepol_1_12) Copied: tags/old/20060315/policycoreutils_1_30 (from rev 2203, tags/policycoreutils_1_30) Copied: tags/old/20061018/checkpolicy_1_32 (from rev 2203, tags/checkpolicy_1_32) Copied: tags/old/20061018/libselinux_1_32 (from rev 2203, tags/libselinux_1_32) Copied: tags/old/20061018/libsemanage_1_8 (from rev 2203, tags/libsemanage_1_8) Copied: tags/old/20061018/libsepol_1_14 (from rev 2203, tags/libsepol_1_14) Copied: tags/old/20061018/policycoreutils_1_32 (from rev 2203, tags/policycoreutils_1_32) Copied: tags/old/20061018/selinux-doc_1_26 (from rev 2203, tags/selinux-doc_1_26) This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. |
From: <ssm...@us...> - 2007-01-25 11:34:00
|
Revision: 2205 http://svn.sourceforge.net/selinux/?rev=2205&view=rev Author: ssmalley Date: 2007-01-25 03:33:57 -0800 (Thu, 25 Jan 2007) Log Message: ----------- Moved snapshot tags to old/snapshots Added Paths: ----------- tags/old/snapshots/ tags/old/snapshots/checkpolicy_1_25_12/ tags/old/snapshots/checkpolicy_1_25_4/ tags/old/snapshots/checkpolicy_1_25_5/ tags/old/snapshots/checkpolicy_1_25_7/ tags/old/snapshots/checkpolicy_1_25_8/ tags/old/snapshots/checkpolicy_1_25_9/ tags/old/snapshots/checkpolicy_1_27-13/ tags/old/snapshots/checkpolicy_1_27_10/ tags/old/snapshots/checkpolicy_1_27_11/ tags/old/snapshots/checkpolicy_1_27_12/ tags/old/snapshots/checkpolicy_1_27_13/ tags/old/snapshots/checkpolicy_1_27_14/ tags/old/snapshots/checkpolicy_1_27_16/ tags/old/snapshots/checkpolicy_1_27_17/ tags/old/snapshots/checkpolicy_1_27_18/ tags/old/snapshots/checkpolicy_1_27_19/ tags/old/snapshots/checkpolicy_1_27_20/ tags/old/snapshots/checkpolicy_1_27_3/ tags/old/snapshots/checkpolicy_1_27_4/ tags/old/snapshots/checkpolicy_1_27_5/ tags/old/snapshots/checkpolicy_1_27_6/ tags/old/snapshots/checkpolicy_1_27_7/ tags/old/snapshots/checkpolicy_1_27_8/ tags/old/snapshots/checkpolicy_1_27_9/ tags/old/snapshots/checkpolicy_1_29_1/ tags/old/snapshots/checkpolicy_1_29_4/ tags/old/snapshots/checkpolicy_1_29_5/ tags/old/snapshots/checkpolicy_1_30_1/ tags/old/snapshots/checkpolicy_1_30_11/ tags/old/snapshots/checkpolicy_1_30_12/ tags/old/snapshots/checkpolicy_1_30_2/ tags/old/snapshots/checkpolicy_1_30_3/ tags/old/snapshots/checkpolicy_1_30_4/ tags/old/snapshots/checkpolicy_1_30_5/ tags/old/snapshots/checkpolicy_1_30_7/ tags/old/snapshots/checkpolicy_1_30_8/ tags/old/snapshots/checkpolicy_1_33_1/ tags/old/snapshots/libselinux_1_25_1/ tags/old/snapshots/libselinux_1_25_2/ tags/old/snapshots/libselinux_1_25_3/ tags/old/snapshots/libselinux_1_25_4/ tags/old/snapshots/libselinux_1_25_5/ tags/old/snapshots/libselinux_1_25_6/ tags/old/snapshots/libselinux_1_25_7/ tags/old/snapshots/libselinux_1_27_1/ tags/old/snapshots/libselinux_1_27_10/ tags/old/snapshots/libselinux_1_27_11/ tags/old/snapshots/libselinux_1_27_14/ tags/old/snapshots/libselinux_1_27_16/ tags/old/snapshots/libselinux_1_27_17/ tags/old/snapshots/libselinux_1_27_18/ tags/old/snapshots/libselinux_1_27_19/ tags/old/snapshots/libselinux_1_27_2/ tags/old/snapshots/libselinux_1_27_20/ tags/old/snapshots/libselinux_1_27_21/ tags/old/snapshots/libselinux_1_27_22/ tags/old/snapshots/libselinux_1_27_23/ tags/old/snapshots/libselinux_1_27_24/ tags/old/snapshots/libselinux_1_27_25/ tags/old/snapshots/libselinux_1_27_26/ tags/old/snapshots/libselinux_1_27_27/ tags/old/snapshots/libselinux_1_27_3/ tags/old/snapshots/libselinux_1_27_4/ tags/old/snapshots/libselinux_1_27_5/ tags/old/snapshots/libselinux_1_27_6/ tags/old/snapshots/libselinux_1_27_7/ tags/old/snapshots/libselinux_1_27_8/ tags/old/snapshots/libselinux_1_27_9/ tags/old/snapshots/libselinux_1_29_1/ tags/old/snapshots/libselinux_1_29_2/ tags/old/snapshots/libselinux_1_29_3/ tags/old/snapshots/libselinux_1_29_4/ tags/old/snapshots/libselinux_1_29_6/ tags/old/snapshots/libselinux_1_29_8/ tags/old/snapshots/libselinux_1_30_1/ tags/old/snapshots/libselinux_1_30_10/ tags/old/snapshots/libselinux_1_30_11/ tags/old/snapshots/libselinux_1_30_12/ tags/old/snapshots/libselinux_1_30_14/ tags/old/snapshots/libselinux_1_30_15/ tags/old/snapshots/libselinux_1_30_16/ tags/old/snapshots/libselinux_1_30_18/ tags/old/snapshots/libselinux_1_30_2/ tags/old/snapshots/libselinux_1_30_20/ tags/old/snapshots/libselinux_1_30_21/ tags/old/snapshots/libselinux_1_30_22/ tags/old/snapshots/libselinux_1_30_23/ tags/old/snapshots/libselinux_1_30_24/ tags/old/snapshots/libselinux_1_30_25/ tags/old/snapshots/libselinux_1_30_26/ tags/old/snapshots/libselinux_1_30_27/ tags/old/snapshots/libselinux_1_30_28/ tags/old/snapshots/libselinux_1_30_29/ tags/old/snapshots/libselinux_1_30_3/ tags/old/snapshots/libselinux_1_30_30/ tags/old/snapshots/libselinux_1_30_4/ tags/old/snapshots/libselinux_1_30_5/ tags/old/snapshots/libselinux_1_30_6/ tags/old/snapshots/libselinux_1_30_7/ tags/old/snapshots/libselinux_1_30_8/ tags/old/snapshots/libselinux_1_30_9/ tags/old/snapshots/libselinux_1_33_2/ tags/old/snapshots/libselinux_1_33_3/ tags/old/snapshots/libselinux_1_33_4/ tags/old/snapshots/libselinux_1_33_5/ tags/old/snapshots/libselinux_1_33_6/ tags/old/snapshots/libsemanage_1_0/ tags/old/snapshots/libsemanage_1_1_1/ tags/old/snapshots/libsemanage_1_1_2/ tags/old/snapshots/libsemanage_1_1_3/ tags/old/snapshots/libsemanage_1_1_4/ tags/old/snapshots/libsemanage_1_1_5/ tags/old/snapshots/libsemanage_1_1_6/ tags/old/snapshots/libsemanage_1_3_1/ tags/old/snapshots/libsemanage_1_3_10/ tags/old/snapshots/libsemanage_1_3_11/ tags/old/snapshots/libsemanage_1_3_12/ tags/old/snapshots/libsemanage_1_3_14/ tags/old/snapshots/libsemanage_1_3_15/ tags/old/snapshots/libsemanage_1_3_16/ tags/old/snapshots/libsemanage_1_3_17/ tags/old/snapshots/libsemanage_1_3_18/ tags/old/snapshots/libsemanage_1_3_19/ tags/old/snapshots/libsemanage_1_3_2/ tags/old/snapshots/libsemanage_1_3_20/ tags/old/snapshots/libsemanage_1_3_21/ tags/old/snapshots/libsemanage_1_3_22/ tags/old/snapshots/libsemanage_1_3_23/ tags/old/snapshots/libsemanage_1_3_24/ tags/old/snapshots/libsemanage_1_3_26/ tags/old/snapshots/libsemanage_1_3_27/ tags/old/snapshots/libsemanage_1_3_3/ tags/old/snapshots/libsemanage_1_3_30/ tags/old/snapshots/libsemanage_1_3_31/ tags/old/snapshots/libsemanage_1_3_33/ tags/old/snapshots/libsemanage_1_3_34/ tags/old/snapshots/libsemanage_1_3_35/ tags/old/snapshots/libsemanage_1_3_36/ tags/old/snapshots/libsemanage_1_3_37/ tags/old/snapshots/libsemanage_1_3_39/ tags/old/snapshots/libsemanage_1_3_4/ tags/old/snapshots/libsemanage_1_3_40/ tags/old/snapshots/libsemanage_1_3_41/ tags/old/snapshots/libsemanage_1_3_42/ tags/old/snapshots/libsemanage_1_3_43/ tags/old/snapshots/libsemanage_1_3_44/ tags/old/snapshots/libsemanage_1_3_45/ tags/old/snapshots/libsemanage_1_3_46/ tags/old/snapshots/libsemanage_1_3_47/ tags/old/snapshots/libsemanage_1_3_48/ tags/old/snapshots/libsemanage_1_3_49/ tags/old/snapshots/libsemanage_1_3_5/ tags/old/snapshots/libsemanage_1_3_50/ tags/old/snapshots/libsemanage_1_3_51/ tags/old/snapshots/libsemanage_1_3_52/ tags/old/snapshots/libsemanage_1_3_53/ tags/old/snapshots/libsemanage_1_3_54/ tags/old/snapshots/libsemanage_1_3_55/ tags/old/snapshots/libsemanage_1_3_57/ tags/old/snapshots/libsemanage_1_3_58/ tags/old/snapshots/libsemanage_1_3_59/ tags/old/snapshots/libsemanage_1_3_6/ tags/old/snapshots/libsemanage_1_3_60/ tags/old/snapshots/libsemanage_1_3_61/ tags/old/snapshots/libsemanage_1_3_62/ tags/old/snapshots/libsemanage_1_3_63/ tags/old/snapshots/libsemanage_1_3_64/ tags/old/snapshots/libsemanage_1_3_7/ tags/old/snapshots/libsemanage_1_3_8/ tags/old/snapshots/libsemanage_1_3_9/ tags/old/snapshots/libsemanage_1_5_1/ tags/old/snapshots/libsemanage_1_5_10/ tags/old/snapshots/libsemanage_1_5_11/ tags/old/snapshots/libsemanage_1_5_12/ tags/old/snapshots/libsemanage_1_5_13/ tags/old/snapshots/libsemanage_1_5_14/ tags/old/snapshots/libsemanage_1_5_15/ tags/old/snapshots/libsemanage_1_5_16/ tags/old/snapshots/libsemanage_1_5_17/ tags/old/snapshots/libsemanage_1_5_18/ tags/old/snapshots/libsemanage_1_5_19/ tags/old/snapshots/libsemanage_1_5_2/ tags/old/snapshots/libsemanage_1_5_22/ tags/old/snapshots/libsemanage_1_5_24/ tags/old/snapshots/libsemanage_1_5_25/ tags/old/snapshots/libsemanage_1_5_26/ tags/old/snapshots/libsemanage_1_5_27/ tags/old/snapshots/libsemanage_1_5_28/ tags/old/snapshots/libsemanage_1_5_29/ tags/old/snapshots/libsemanage_1_5_3/ tags/old/snapshots/libsemanage_1_5_30/ tags/old/snapshots/libsemanage_1_5_31/ tags/old/snapshots/libsemanage_1_5_4/ tags/old/snapshots/libsemanage_1_5_5/ tags/old/snapshots/libsemanage_1_5_6/ tags/old/snapshots/libsemanage_1_5_8/ tags/old/snapshots/libsemanage_1_5_9/ tags/old/snapshots/libsemanage_1_6_1/ tags/old/snapshots/libsemanage_1_6_10/ tags/old/snapshots/libsemanage_1_6_12/ tags/old/snapshots/libsemanage_1_6_13/ tags/old/snapshots/libsemanage_1_6_15/ tags/old/snapshots/libsemanage_1_6_17/ tags/old/snapshots/libsemanage_1_6_2/ tags/old/snapshots/libsemanage_1_6_3/ tags/old/snapshots/libsemanage_1_6_4/ tags/old/snapshots/libsemanage_1_6_5/ tags/old/snapshots/libsemanage_1_6_6/ tags/old/snapshots/libsemanage_1_6_7/ tags/old/snapshots/libsemanage_1_6_8/ tags/old/snapshots/libsemanage_1_6_9/ tags/old/snapshots/libsemanage_1_9_1/ tags/old/snapshots/libsemanage_1_9_2/ tags/old/snapshots/libsepol_1_11_1/ tags/old/snapshots/libsepol_1_11_10/ tags/old/snapshots/libsepol_1_11_11/ tags/old/snapshots/libsepol_1_11_13/ tags/old/snapshots/libsepol_1_11_15/ tags/old/snapshots/libsepol_1_11_16/ tags/old/snapshots/libsepol_1_11_17/ tags/old/snapshots/libsepol_1_11_18/ tags/old/snapshots/libsepol_1_11_19/ tags/old/snapshots/libsepol_1_11_2/ tags/old/snapshots/libsepol_1_11_20/ tags/old/snapshots/libsepol_1_11_3/ tags/old/snapshots/libsepol_1_11_4/ tags/old/snapshots/libsepol_1_11_5/ tags/old/snapshots/libsepol_1_11_6/ tags/old/snapshots/libsepol_1_11_7/ tags/old/snapshots/libsepol_1_11_8/ tags/old/snapshots/libsepol_1_11_9/ tags/old/snapshots/libsepol_1_12_1/ tags/old/snapshots/libsepol_1_12_10/ tags/old/snapshots/libsepol_1_12_11/ tags/old/snapshots/libsepol_1_12_12/ tags/old/snapshots/libsepol_1_12_13/ tags/old/snapshots/libsepol_1_12_18/ tags/old/snapshots/libsepol_1_12_2/ tags/old/snapshots/libsepol_1_12_20/ tags/old/snapshots/libsepol_1_12_21/ tags/old/snapshots/libsepol_1_12_22/ tags/old/snapshots/libsepol_1_12_23/ tags/old/snapshots/libsepol_1_12_24/ tags/old/snapshots/libsepol_1_12_25/ tags/old/snapshots/libsepol_1_12_26/ tags/old/snapshots/libsepol_1_12_27/ tags/old/snapshots/libsepol_1_12_28/ tags/old/snapshots/libsepol_1_12_3/ tags/old/snapshots/libsepol_1_12_4/ tags/old/snapshots/libsepol_1_12_5/ tags/old/snapshots/libsepol_1_12_6/ tags/old/snapshots/libsepol_1_12_7/ tags/old/snapshots/libsepol_1_12_8/ tags/old/snapshots/libsepol_1_15_1/ tags/old/snapshots/libsepol_1_15_2/ tags/old/snapshots/libsepol_1_15_3/ tags/old/snapshots/libsepol_1_7_10/ tags/old/snapshots/libsepol_1_7_12/ tags/old/snapshots/libsepol_1_7_13/ tags/old/snapshots/libsepol_1_7_16/ tags/old/snapshots/libsepol_1_7_19/ tags/old/snapshots/libsepol_1_7_20/ tags/old/snapshots/libsepol_1_7_21/ tags/old/snapshots/libsepol_1_7_22/ tags/old/snapshots/libsepol_1_7_23/ tags/old/snapshots/libsepol_1_7_4/ tags/old/snapshots/libsepol_1_7_5/ tags/old/snapshots/libsepol_1_7_6/ tags/old/snapshots/libsepol_1_7_7/ tags/old/snapshots/libsepol_1_7_8/ tags/old/snapshots/libsepol_1_7_9/ tags/old/snapshots/libsepol_1_9_1/ tags/old/snapshots/libsepol_1_9_10/ tags/old/snapshots/libsepol_1_9_11/ tags/old/snapshots/libsepol_1_9_12/ tags/old/snapshots/libsepol_1_9_13/ tags/old/snapshots/libsepol_1_9_14/ tags/old/snapshots/libsepol_1_9_15/ tags/old/snapshots/libsepol_1_9_16/ tags/old/snapshots/libsepol_1_9_17/ tags/old/snapshots/libsepol_1_9_18/ tags/old/snapshots/libsepol_1_9_19/ tags/old/snapshots/libsepol_1_9_20/ tags/old/snapshots/libsepol_1_9_21/ tags/old/snapshots/libsepol_1_9_22/ tags/old/snapshots/libsepol_1_9_23/ tags/old/snapshots/libsepol_1_9_24/ tags/old/snapshots/libsepol_1_9_25/ tags/old/snapshots/libsepol_1_9_27/ tags/old/snapshots/libsepol_1_9_28/ tags/old/snapshots/libsepol_1_9_29/ tags/old/snapshots/libsepol_1_9_3/ tags/old/snapshots/libsepol_1_9_30/ tags/old/snapshots/libsepol_1_9_31/ tags/old/snapshots/libsepol_1_9_34/ tags/old/snapshots/libsepol_1_9_35/ tags/old/snapshots/libsepol_1_9_36/ tags/old/snapshots/libsepol_1_9_37/ tags/old/snapshots/libsepol_1_9_38/ tags/old/snapshots/libsepol_1_9_39/ tags/old/snapshots/libsepol_1_9_4/ tags/old/snapshots/libsepol_1_9_40/ tags/old/snapshots/libsepol_1_9_41/ tags/old/snapshots/libsepol_1_9_42/ tags/old/snapshots/libsepol_1_9_5/ tags/old/snapshots/libsepol_1_9_6/ tags/old/snapshots/libsepol_1_9_7/ tags/old/snapshots/libsepol_1_9_8/ tags/old/snapshots/libsepol_1_9_9/ tags/old/snapshots/policycoreutils_1_25_2/ tags/old/snapshots/policycoreutils_1_25_5/ tags/old/snapshots/policycoreutils_1_25_6/ tags/old/snapshots/policycoreutils_1_25_7/ tags/old/snapshots/policycoreutils_1_25_8/ tags/old/snapshots/policycoreutils_1_25_9/ tags/old/snapshots/policycoreutils_1_27_1/ tags/old/snapshots/policycoreutils_1_27_10/ tags/old/snapshots/policycoreutils_1_27_12/ tags/old/snapshots/policycoreutils_1_27_13/ tags/old/snapshots/policycoreutils_1_27_14/ tags/old/snapshots/policycoreutils_1_27_17/ tags/old/snapshots/policycoreutils_1_27_18/ tags/old/snapshots/policycoreutils_1_27_19/ tags/old/snapshots/policycoreutils_1_27_20/ tags/old/snapshots/policycoreutils_1_27_21/ tags/old/snapshots/policycoreutils_1_27_22/ tags/old/snapshots/policycoreutils_1_27_23/ tags/old/snapshots/policycoreutils_1_27_24/ tags/old/snapshots/policycoreutils_1_27_25/ tags/old/snapshots/policycoreutils_1_27_26/ tags/old/snapshots/policycoreutils_1_27_27/ tags/old/snapshots/policycoreutils_1_27_28/ tags/old/snapshots/policycoreutils_1_27_3/ tags/old/snapshots/policycoreutils_1_27_30/ tags/old/snapshots/policycoreutils_1_27_31/ tags/old/snapshots/policycoreutils_1_27_32/ tags/old/snapshots/policycoreutils_1_27_33/ tags/old/snapshots/policycoreutils_1_27_34/ tags/old/snapshots/policycoreutils_1_27_37/ tags/old/snapshots/policycoreutils_1_27_4/ tags/old/snapshots/policycoreutils_1_27_5/ tags/old/snapshots/policycoreutils_1_27_6/ tags/old/snapshots/policycoreutils_1_27_7/ tags/old/snapshots/policycoreutils_1_27_8/ tags/old/snapshots/policycoreutils_1_27_9/ tags/old/snapshots/policycoreutils_1_28_1/ tags/old/snapshots/policycoreutils_1_29_1/ tags/old/snapshots/policycoreutils_1_29_10/ tags/old/snapshots/policycoreutils_1_29_11/ tags/old/snapshots/policycoreutils_1_29_12/ tags/old/snapshots/policycoreutils_1_29_14/ tags/old/snapshots/policycoreutils_1_29_16/ tags/old/snapshots/policycoreutils_1_29_2/ tags/old/snapshots/policycoreutils_1_29_20/ tags/old/snapshots/policycoreutils_1_29_22/ tags/old/snapshots/policycoreutils_1_29_23/ tags/old/snapshots/policycoreutils_1_29_24/ tags/old/snapshots/policycoreutils_1_29_25/ tags/old/snapshots/policycoreutils_1_29_26/ tags/old/snapshots/policycoreutils_1_29_27/ tags/old/snapshots/policycoreutils_1_29_3/ tags/old/snapshots/policycoreutils_1_29_4/ tags/old/snapshots/policycoreutils_1_29_6/ tags/old/snapshots/policycoreutils_1_29_7/ tags/old/snapshots/policycoreutils_1_29_8/ tags/old/snapshots/policycoreutils_1_29_9/ tags/old/snapshots/policycoreutils_1_30_1/ tags/old/snapshots/policycoreutils_1_30_10/ tags/old/snapshots/policycoreutils_1_30_12/ tags/old/snapshots/policycoreutils_1_30_13/ tags/old/snapshots/policycoreutils_1_30_16/ tags/old/snapshots/policycoreutils_1_30_18/ tags/old/snapshots/policycoreutils_1_30_19/ tags/old/snapshots/policycoreutils_1_30_2/ tags/old/snapshots/policycoreutils_1_30_20/ tags/old/snapshots/policycoreutils_1_30_21/ tags/old/snapshots/policycoreutils_1_30_22/ tags/old/snapshots/policycoreutils_1_30_23/ tags/old/snapshots/policycoreutils_1_30_24/ tags/old/snapshots/policycoreutils_1_30_25/ tags/old/snapshots/policycoreutils_1_30_26/ tags/old/snapshots/policycoreutils_1_30_27/ tags/old/snapshots/policycoreutils_1_30_28/ tags/old/snapshots/policycoreutils_1_30_29/ tags/old/snapshots/policycoreutils_1_30_3/ tags/old/snapshots/policycoreutils_1_30_30/ tags/old/snapshots/policycoreutils_1_30_31/ tags/old/snapshots/policycoreutils_1_30_4/ tags/old/snapshots/policycoreutils_1_30_5/ tags/old/snapshots/policycoreutils_1_30_6/ tags/old/snapshots/policycoreutils_1_30_7/ tags/old/snapshots/policycoreutils_1_30_9/ tags/old/snapshots/policycoreutils_1_33_1/ tags/old/snapshots/policycoreutils_1_33_10/ tags/old/snapshots/policycoreutils_1_33_11/ tags/old/snapshots/policycoreutils_1_33_12/ tags/old/snapshots/policycoreutils_1_33_13/ tags/old/snapshots/policycoreutils_1_33_14/ tags/old/snapshots/policycoreutils_1_33_15/ tags/old/snapshots/policycoreutils_1_33_16/ tags/old/snapshots/policycoreutils_1_33_2/ tags/old/snapshots/policycoreutils_1_33_3/ tags/old/snapshots/policycoreutils_1_33_5/ tags/old/snapshots/policycoreutils_1_33_6/ tags/old/snapshots/policycoreutils_1_33_7/ tags/old/snapshots/policycoreutils_1_33_8/ tags/old/snapshots/policycoreutils_1_33_9/ Removed Paths: ------------- tags/checkpolicy_1_25_12/ tags/checkpolicy_1_25_4/ tags/checkpolicy_1_25_5/ tags/checkpolicy_1_25_7/ tags/checkpolicy_1_25_8/ tags/checkpolicy_1_25_9/ tags/checkpolicy_1_27-13/ tags/checkpolicy_1_27_10/ tags/checkpolicy_1_27_11/ tags/checkpolicy_1_27_12/ tags/checkpolicy_1_27_13/ tags/checkpolicy_1_27_14/ tags/checkpolicy_1_27_16/ tags/checkpolicy_1_27_17/ tags/checkpolicy_1_27_18/ tags/checkpolicy_1_27_19/ tags/checkpolicy_1_27_20/ tags/checkpolicy_1_27_3/ tags/checkpolicy_1_27_4/ tags/checkpolicy_1_27_5/ tags/checkpolicy_1_27_6/ tags/checkpolicy_1_27_7/ tags/checkpolicy_1_27_8/ tags/checkpolicy_1_27_9/ tags/checkpolicy_1_29_1/ tags/checkpolicy_1_29_4/ tags/checkpolicy_1_29_5/ tags/checkpolicy_1_30_1/ tags/checkpolicy_1_30_11/ tags/checkpolicy_1_30_12/ tags/checkpolicy_1_30_2/ tags/checkpolicy_1_30_3/ tags/checkpolicy_1_30_4/ tags/checkpolicy_1_30_5/ tags/checkpolicy_1_30_7/ tags/checkpolicy_1_30_8/ tags/checkpolicy_1_33_1/ tags/libselinux_1_25_1/ tags/libselinux_1_25_2/ tags/libselinux_1_25_3/ tags/libselinux_1_25_4/ tags/libselinux_1_25_5/ tags/libselinux_1_25_6/ tags/libselinux_1_25_7/ tags/libselinux_1_27_1/ tags/libselinux_1_27_10/ tags/libselinux_1_27_11/ tags/libselinux_1_27_14/ tags/libselinux_1_27_16/ tags/libselinux_1_27_17/ tags/libselinux_1_27_18/ tags/libselinux_1_27_19/ tags/libselinux_1_27_2/ tags/libselinux_1_27_20/ tags/libselinux_1_27_21/ tags/libselinux_1_27_22/ tags/libselinux_1_27_23/ tags/libselinux_1_27_24/ tags/libselinux_1_27_25/ tags/libselinux_1_27_26/ tags/libselinux_1_27_27/ tags/libselinux_1_27_3/ tags/libselinux_1_27_4/ tags/libselinux_1_27_5/ tags/libselinux_1_27_6/ tags/libselinux_1_27_7/ tags/libselinux_1_27_8/ tags/libselinux_1_27_9/ tags/libselinux_1_29_1/ tags/libselinux_1_29_2/ tags/libselinux_1_29_3/ tags/libselinux_1_29_4/ tags/libselinux_1_29_6/ tags/libselinux_1_29_8/ tags/libselinux_1_30_1/ tags/libselinux_1_30_10/ tags/libselinux_1_30_11/ tags/libselinux_1_30_12/ tags/libselinux_1_30_14/ tags/libselinux_1_30_15/ tags/libselinux_1_30_16/ tags/libselinux_1_30_18/ tags/libselinux_1_30_2/ tags/libselinux_1_30_20/ tags/libselinux_1_30_21/ tags/libselinux_1_30_22/ tags/libselinux_1_30_23/ tags/libselinux_1_30_24/ tags/libselinux_1_30_25/ tags/libselinux_1_30_26/ tags/libselinux_1_30_27/ tags/libselinux_1_30_28/ tags/libselinux_1_30_29/ tags/libselinux_1_30_3/ tags/libselinux_1_30_30/ tags/libselinux_1_30_4/ tags/libselinux_1_30_5/ tags/libselinux_1_30_6/ tags/libselinux_1_30_7/ tags/libselinux_1_30_8/ tags/libselinux_1_30_9/ tags/libselinux_1_33_2/ tags/libselinux_1_33_3/ tags/libselinux_1_33_4/ tags/libselinux_1_33_5/ tags/libselinux_1_33_6/ tags/libsemanage_1_0/ tags/libsemanage_1_1_1/ tags/libsemanage_1_1_2/ tags/libsemanage_1_1_3/ tags/libsemanage_1_1_4/ tags/libsemanage_1_1_5/ tags/libsemanage_1_1_6/ tags/libsemanage_1_3_1/ tags/libsemanage_1_3_10/ tags/libsemanage_1_3_11/ tags/libsemanage_1_3_12/ tags/libsemanage_1_3_14/ tags/libsemanage_1_3_15/ tags/libsemanage_1_3_16/ tags/libsemanage_1_3_17/ tags/libsemanage_1_3_18/ tags/libsemanage_1_3_19/ tags/libsemanage_1_3_2/ tags/libsemanage_1_3_20/ tags/libsemanage_1_3_21/ tags/libsemanage_1_3_22/ tags/libsemanage_1_3_23/ tags/libsemanage_1_3_24/ tags/libsemanage_1_3_26/ tags/libsemanage_1_3_27/ tags/libsemanage_1_3_3/ tags/libsemanage_1_3_30/ tags/libsemanage_1_3_31/ tags/libsemanage_1_3_33/ tags/libsemanage_1_3_34/ tags/libsemanage_1_3_35/ tags/libsemanage_1_3_36/ tags/libsemanage_1_3_37/ tags/libsemanage_1_3_39/ tags/libsemanage_1_3_4/ tags/libsemanage_1_3_40/ tags/libsemanage_1_3_41/ tags/libsemanage_1_3_42/ tags/libsemanage_1_3_43/ tags/libsemanage_1_3_44/ tags/libsemanage_1_3_45/ tags/libsemanage_1_3_46/ tags/libsemanage_1_3_47/ tags/libsemanage_1_3_48/ tags/libsemanage_1_3_49/ tags/libsemanage_1_3_5/ tags/libsemanage_1_3_50/ tags/libsemanage_1_3_51/ tags/libsemanage_1_3_52/ tags/libsemanage_1_3_53/ tags/libsemanage_1_3_54/ tags/libsemanage_1_3_55/ tags/libsemanage_1_3_57/ tags/libsemanage_1_3_58/ tags/libsemanage_1_3_59/ tags/libsemanage_1_3_6/ tags/libsemanage_1_3_60/ tags/libsemanage_1_3_61/ tags/libsemanage_1_3_62/ tags/libsemanage_1_3_63/ tags/libsemanage_1_3_64/ tags/libsemanage_1_3_7/ tags/libsemanage_1_3_8/ tags/libsemanage_1_3_9/ tags/libsemanage_1_5_1/ tags/libsemanage_1_5_10/ tags/libsemanage_1_5_11/ tags/libsemanage_1_5_12/ tags/libsemanage_1_5_13/ tags/libsemanage_1_5_14/ tags/libsemanage_1_5_15/ tags/libsemanage_1_5_16/ tags/libsemanage_1_5_17/ tags/libsemanage_1_5_18/ tags/libsemanage_1_5_19/ tags/libsemanage_1_5_2/ tags/libsemanage_1_5_22/ tags/libsemanage_1_5_24/ tags/libsemanage_1_5_25/ tags/libsemanage_1_5_26/ tags/libsemanage_1_5_27/ tags/libsemanage_1_5_28/ tags/libsemanage_1_5_29/ tags/libsemanage_1_5_3/ tags/libsemanage_1_5_30/ tags/libsemanage_1_5_31/ tags/libsemanage_1_5_4/ tags/libsemanage_1_5_5/ tags/libsemanage_1_5_6/ tags/libsemanage_1_5_8/ tags/libsemanage_1_5_9/ tags/libsemanage_1_6_1/ tags/libsemanage_1_6_10/ tags/libsemanage_1_6_12/ tags/libsemanage_1_6_13/ tags/libsemanage_1_6_15/ tags/libsemanage_1_6_17/ tags/libsemanage_1_6_2/ tags/libsemanage_1_6_3/ tags/libsemanage_1_6_4/ tags/libsemanage_1_6_5/ tags/libsemanage_1_6_6/ tags/libsemanage_1_6_7/ tags/libsemanage_1_6_8/ tags/libsemanage_1_6_9/ tags/libsemanage_1_9_1/ tags/libsemanage_1_9_2/ tags/libsepol_1_11_1/ tags/libsepol_1_11_10/ tags/libsepol_1_11_11/ tags/libsepol_1_11_13/ tags/libsepol_1_11_15/ tags/libsepol_1_11_16/ tags/libsepol_1_11_17/ tags/libsepol_1_11_18/ tags/libsepol_1_11_19/ tags/libsepol_1_11_2/ tags/libsepol_1_11_20/ tags/libsepol_1_11_3/ tags/libsepol_1_11_4/ tags/libsepol_1_11_5/ tags/libsepol_1_11_6/ tags/libsepol_1_11_7/ tags/libsepol_1_11_8/ tags/libsepol_1_11_9/ tags/libsepol_1_12_1/ tags/libsepol_1_12_10/ tags/libsepol_1_12_11/ tags/libsepol_1_12_12/ tags/libsepol_1_12_13/ tags/libsepol_1_12_18/ tags/libsepol_1_12_2/ tags/libsepol_1_12_20/ tags/libsepol_1_12_21/ tags/libsepol_1_12_22/ tags/libsepol_1_12_23/ tags/libsepol_1_12_24/ tags/libsepol_1_12_25/ tags/libsepol_1_12_26/ tags/libsepol_1_12_27/ tags/libsepol_1_12_28/ tags/libsepol_1_12_3/ tags/libsepol_1_12_4/ tags/libsepol_1_12_5/ tags/libsepol_1_12_6/ tags/libsepol_1_12_7/ tags/libsepol_1_12_8/ tags/libsepol_1_15_1/ tags/libsepol_1_15_2/ tags/libsepol_1_15_3/ tags/libsepol_1_7_10/ tags/libsepol_1_7_12/ tags/libsepol_1_7_13/ tags/libsepol_1_7_16/ tags/libsepol_1_7_19/ tags/libsepol_1_7_20/ tags/libsepol_1_7_21/ tags/libsepol_1_7_22/ tags/libsepol_1_7_23/ tags/libsepol_1_7_4/ tags/libsepol_1_7_5/ tags/libsepol_1_7_6/ tags/libsepol_1_7_7/ tags/libsepol_1_7_8/ tags/libsepol_1_7_9/ tags/libsepol_1_9_1/ tags/libsepol_1_9_10/ tags/libsepol_1_9_11/ tags/libsepol_1_9_12/ tags/libsepol_1_9_13/ tags/libsepol_1_9_14/ tags/libsepol_1_9_15/ tags/libsepol_1_9_16/ tags/libsepol_1_9_17/ tags/libsepol_1_9_18/ tags/libsepol_1_9_19/ tags/libsepol_1_9_20/ tags/libsepol_1_9_21/ tags/libsepol_1_9_22/ tags/libsepol_1_9_23/ tags/libsepol_1_9_24/ tags/libsepol_1_9_25/ tags/libsepol_1_9_27/ tags/libsepol_1_9_28/ tags/libsepol_1_9_29/ tags/libsepol_1_9_3/ tags/libsepol_1_9_30/ tags/libsepol_1_9_31/ tags/libsepol_1_9_34/ tags/libsepol_1_9_35/ tags/libsepol_1_9_36/ tags/libsepol_1_9_37/ tags/libsepol_1_9_38/ tags/libsepol_1_9_39/ tags/libsepol_1_9_4/ tags/libsepol_1_9_40/ tags/libsepol_1_9_41/ tags/libsepol_1_9_42/ tags/libsepol_1_9_5/ tags/libsepol_1_9_6/ tags/libsepol_1_9_7/ tags/libsepol_1_9_8/ tags/libsepol_1_9_9/ tags/policycoreutils_1_25_2/ tags/policycoreutils_1_25_5/ tags/policycoreutils_1_25_6/ tags/policycoreutils_1_25_7/ tags/policycoreutils_1_25_8/ tags/policycoreutils_1_25_9/ tags/policycoreutils_1_27_1/ tags/policycoreutils_1_27_10/ tags/policycoreutils_1_27_12/ tags/policycoreutils_1_27_13/ tags/policycoreutils_1_27_14/ tags/policycoreutils_1_27_17/ tags/policycoreutils_1_27_18/ tags/policycoreutils_1_27_19/ tags/policycoreutils_1_27_20/ tags/policycoreutils_1_27_21/ tags/policycoreutils_1_27_22/ tags/policycoreutils_1_27_23/ tags/policycoreutils_1_27_24/ tags/policycoreutils_1_27_25/ tags/policycoreutils_1_27_26/ tags/policycoreutils_1_27_27/ tags/policycoreutils_1_27_28/ tags/policycoreutils_1_27_3/ tags/policycoreutils_1_27_30/ tags/policycoreutils_1_27_31/ tags/policycoreutils_1_27_32/ tags/policycoreutils_1_27_33/ tags/policycoreutils_1_27_34/ tags/policycoreutils_1_27_37/ tags/policycoreutils_1_27_4/ tags/policycoreutils_1_27_5/ tags/policycoreutils_1_27_6/ tags/policycoreutils_1_27_7/ tags/policycoreutils_1_27_8/ tags/policycoreutils_1_27_9/ tags/policycoreutils_1_28_1/ tags/policycoreutils_1_29_1/ tags/policycoreutils_1_29_10/ tags/policycoreutils_1_29_11/ tags/policycoreutils_1_29_12/ tags/policycoreutils_1_29_14/ tags/policycoreutils_1_29_16/ tags/policycoreutils_1_29_2/ tags/policycoreutils_1_29_20/ tags/policycoreutils_1_29_22/ tags/policycoreutils_1_29_23/ tags/policycoreutils_1_29_24/ tags/policycoreutils_1_29_25/ tags/policycoreutils_1_29_26/ tags/policycoreutils_1_29_27/ tags/policycoreutils_1_29_3/ tags/policycoreutils_1_29_4/ tags/policycoreutils_1_29_6/ tags/policycoreutils_1_29_7/ tags/policycoreutils_1_29_8/ tags/policycoreutils_1_29_9/ tags/policycoreutils_1_30_1/ tags/policycoreutils_1_30_10/ tags/policycoreutils_1_30_12/ tags/policycoreutils_1_30_13/ tags/policycoreutils_1_30_16/ tags/policycoreutils_1_30_18/ tags/policycoreutils_1_30_19/ tags/policycoreutils_1_30_2/ tags/policycoreutils_1_30_20/ tags/policycoreutils_1_30_21/ tags/policycoreutils_1_30_22/ tags/policycoreutils_1_30_23/ tags/policycoreutils_1_30_24/ tags/policycoreutils_1_30_25/ tags/policycoreutils_1_30_26/ tags/policycoreutils_1_30_27/ tags/policycoreutils_1_30_28/ tags/policycoreutils_1_30_29/ tags/policycoreutils_1_30_3/ tags/policycoreutils_1_30_30/ tags/policycoreutils_1_30_31/ tags/policycoreutils_1_30_4/ tags/policycoreutils_1_30_5/ tags/policycoreutils_1_30_6/ tags/policycoreutils_1_30_7/ tags/policycoreutils_1_30_9/ tags/policycoreutils_1_33_1/ tags/policycoreutils_1_33_10/ tags/policycoreutils_1_33_11/ tags/policycoreutils_1_33_12/ tags/policycoreutils_1_33_13/ tags/policycoreutils_1_33_14/ tags/policycoreutils_1_33_15/ tags/policycoreutils_1_33_16/ tags/policycoreutils_1_33_2/ tags/policycoreutils_1_33_3/ tags/policycoreutils_1_33_5/ tags/policycoreutils_1_33_6/ tags/policycoreutils_1_33_7/ tags/policycoreutils_1_33_8/ tags/policycoreutils_1_33_9/ Copied: tags/old/snapshots/checkpolicy_1_25_12 (from rev 2204, tags/checkpolicy_1_25_12) Copied: tags/old/snapshots/checkpolicy_1_25_4 (from rev 2204, tags/checkpolicy_1_25_4) Copied: tags/old/snapshots/checkpolicy_1_25_5 (from rev 2204, tags/checkpolicy_1_25_5) Copied: tags/old/snapshots/checkpolicy_1_25_7 (from rev 2204, tags/checkpolicy_1_25_7) Copied: tags/old/snapshots/checkpolicy_1_25_8 (from rev 2204, tags/checkpolicy_1_25_8) Copied: tags/old/snapshots/checkpolicy_1_25_9 (from rev 2204, tags/checkpolicy_1_25_9) Copied: tags/old/snapshots/checkpolicy_1_27-13 (from rev 2204, tags/checkpolicy_1_27-13) Copied: tags/old/snapshots/checkpolicy_1_27_10 (from rev 2204, tags/checkpolicy_1_27_10) Copied: tags/old/snapshots/checkpolicy_1_27_11 (from rev 2204, tags/checkpolicy_1_27_11) Copied: tags/old/snapshots/checkpolicy_1_27_12 (from rev 2204, tags/checkpolicy_1_27_12) Copied: tags/old/snapshots/checkpolicy_1_27_13 (from rev 2204, tags/checkpolicy_1_27_13) Copied: tags/old/snapshots/checkpolicy_1_27_14 (from rev 2204, tags/checkpolicy_1_27_14) Copied: tags/old/snapshots/checkpolicy_1_27_16 (from rev 2204, tags/checkpolicy_1_27_16) Copied: tags/old/snapshots/checkpolicy_1_27_17 (from rev 2204, tags/checkpolicy_1_27_17) Copied: tags/old/snapshots/checkpolicy_1_27_18 (from rev 2204, tags/checkpolicy_1_27_18) Copied: tags/old/snapshots/checkpolicy_1_27_19 (from rev 2204, tags/checkpolicy_1_27_19) Copied: tags/old/snapshots/checkpolicy_1_27_20 (from rev 2204, tags/checkpolicy_1_27_20) Copied: tags/old/snapshots/checkpolicy_1_27_3 (from rev 2204, tags/checkpolicy_1_27_3) Copied: tags/old/snapshots/checkpolicy_1_27_4 (from rev 2204, tags/checkpolicy_1_27_4) Copied: tags/old/snapshots/checkpolicy_1_27_5 (from rev 2204, tags/checkpolicy_1_27_5) Copied: tags/old/snapshots/checkpolicy_1_27_6 (from rev 2204, tags/checkpolicy_1_27_6) Copied: tags/old/snapshots/checkpolicy_1_27_7 (from rev 2204, tags/checkpolicy_1_27_7) Copied: tags/old/snapshots/checkpolicy_1_27_8 (from rev 2204, tags/checkpolicy_1_27_8) Copied: tags/old/snapshots/checkpolicy_1_27_9 (from rev 2204, tags/checkpolicy_1_27_9) Copied: tags/old/snapshots/checkpolicy_1_29_1 (from rev 2204, tags/checkpolicy_1_29_1) Copied: tags/old/snapshots/checkpolicy_1_29_4 (from rev 2204, tags/checkpolicy_1_29_4) Copied: tags/old/snapshots/checkpolicy_1_29_5 (from rev 2204, tags/checkpolicy_1_29_5) Copied: tags/old/snapshots/checkpolicy_1_30_1 (from rev 2204, tags/checkpolicy_1_30_1) Copied: tags/old/snapshots/checkpolicy_1_30_11 (from rev 2204, tags/checkpolicy_1_30_11) Copied: tags/old/snapshots/checkpolicy_1_30_12 (from rev 2204, tags/checkpolicy_1_30_12) Copied: tags/old/snapshots/checkpolicy_1_30_2 (from rev 2204, tags/checkpolicy_1_30_2) Copied: tags/old/snapshots/checkpolicy_1_30_3 (from rev 2204, tags/checkpolicy_1_30_3) Copied: tags/old/snapshots/checkpolicy_1_30_4 (from rev 2204, tags/checkpolicy_1_30_4) Copied: tags/old/snapshots/checkpolicy_1_30_5 (from rev 2204, tags/checkpolicy_1_30_5) Copied: tags/old/snapshots/checkpolicy_1_30_7 (from rev 2204, tags/checkpolicy_1_30_7) Copied: tags/old/snapshots/checkpolicy_1_30_8 (from rev 2204, tags/checkpolicy_1_30_8) Copied: tags/old/snapshots/checkpolicy_1_33_1 (from rev 2204, tags/checkpolicy_1_33_1) Copied: tags/old/snapshots/libselinux_1_25_1 (from rev 2204, tags/libselinux_1_25_1) Copied: tags/old/snapshots/libselinux_1_25_2 (from rev 2204, tags/libselinux_1_25_2) Copied: tags/old/snapshots/libselinux_1_25_3 (from rev 2204, tags/libselinux_1_25_3) Copied: tags/old/snapshots/libselinux_1_25_4 (from rev 2204, tags/libselinux_1_25_4) Copied: tags/old/snapshots/libselinux_1_25_5 (from rev 2204, tags/libselinux_1_25_5) Copied: tags/old/snapshots/libselinux_1_25_6 (from rev 2204, tags/libselinux_1_25_6) Copied: tags/old/snapshots/libselinux_1_25_7 (from rev 2204, tags/libselinux_1_25_7) Copied: tags/old/snapshots/libselinux_1_27_1 (from rev 2204, tags/libselinux_1_27_1) Copied: tags/old/snapshots/libselinux_1_27_10 (from rev 2204, tags/libselinux_1_27_10) Copied: tags/old/snapshots/libselinux_1_27_11 (from rev 2204, tags/libselinux_1_27_11) Copied: tags/old/snapshots/libselinux_1_27_14 (from rev 2204, tags/libselinux_1_27_14) Copied: tags/old/snapshots/libselinux_1_27_16 (from rev 2204, tags/libselinux_1_27_16) Copied: tags/old/snapshots/libselinux_1_27_17 (from rev 2204, tags/libselinux_1_27_17) Copied: tags/old/snapshots/libselinux_1_27_18 (from rev 2204, tags/libselinux_1_27_18) Copied: tags/old/snapshots/libselinux_1_27_19 (from rev 2204, tags/libselinux_1_27_19) Copied: tags/old/snapshots/libselinux_1_27_2 (from rev 2204, tags/libselinux_1_27_2) Copied: tags/old/snapshots/libselinux_1_27_20 (from rev 2204, tags/libselinux_1_27_20) Copied: tags/old/snapshots/libselinux_1_27_21 (from rev 2204, tags/libselinux_1_27_21) Copied: tags/old/snapshots/libselinux_1_27_22 (from rev 2204, tags/libselinux_1_27_22) Copied: tags/old/snapshots/libselinux_1_27_23 (from rev 2204, tags/libselinux_1_27_23) Copied: tags/old/snapshots/libselinux_1_27_24 (from rev 2204, tags/libselinux_1_27_24) Copied: tags/old/snapshots/libselinux_1_27_25 (from rev 2204, tags/libselinux_1_27_25) Copied: tags/old/snapshots/libselinux_1_27_26 (from rev 2204, tags/libselinux_1_27_26) Copied: tags/old/snapshots/libselinux_1_27_27 (from rev 2204, tags/libselinux_1_27_27) Copied: tags/old/snapshots/libselinux_1_27_3 (from rev 2204, tags/libselinux_1_27_3) Copied: tags/old/snapshots/libselinux_1_27_4 (from rev 2204, tags/libselinux_1_27_4) Copied: tags/old/snapshots/libselinux_1_27_5 (from rev 2204, tags/libselinux_1_27_5) Copied: tags/old/snapshots/libselinux_1_27_6 (from rev 2204, tags/libselinux_1_27_6) Copied: tags/old/snapshots/libselinux_1_27_7 (from rev 2204, tags/libselinux_1_27_7) Copied: tags/old/snapshots/libselinux_1_27_8 (from rev 2204, tags/libselinux_1_27_8) Copied: tags/old/snapshots/libselinux_1_27_9 (from rev 2204, tags/libselinux_1_27_9) Copied: tags/old/snapshots/libselinux_1_29_1 (from rev 2204, tags/libselinux_1_29_1) Copied: tags/old/snapshots/libselinux_1_29_2 (from rev 2204, tags/libselinux_1_29_2) Copied: tags/old/snapshots/libselinux_1_29_3 (from rev 2204, tags/libselinux_1_29_3) Copied: tags/old/snapshots/libselinux_1_29_4 (from rev 2204, tags/libselinux_1_29_4) Copied: tags/old/snapshots/libselinux_1_29_6 (from rev 2204, tags/libselinux_1_29_6) Copied: tags/old/snapshots/libselinux_1_29_8 (from rev 2204, tags/libselinux_1_29_8) Copied: tags/old/snapshots/libselinux_1_30_1 (from rev 2204, tags/libselinux_1_30_1) Copied: tags/old/snapshots/libselinux_1_30_10 (from rev 2204, tags/libselinux_1_30_10) Copied: tags/old/snapshots/libselinux_1_30_11 (from rev 2204, tags/libselinux_1_30_11) Copied: tags/old/snapshots/libselinux_1_30_12 (from rev 2204, tags/libselinux_1_30_12) Copied: tags/old/snapshots/libselinux_1_30_14 (from rev 2204, tags/libselinux_1_30_14) Copied: tags/old/snapshots/libselinux_1_30_15 (from rev 2204, tags/libselinux_1_30_15) Copied: tags/old/snapshots/libselinux_1_30_16 (from rev 2204, tags/libselinux_1_30_16) Copied: tags/old/snapshots/libselinux_1_30_18 (from rev 2204, tags/libselinux_1_30_18) Copied: tags/old/snapshots/libselinux_1_30_2 (from rev 2204, tags/libselinux_1_30_2) Copied: tags/old/snapshots/libselinux_1_30_20 (from rev 2204, tags/libselinux_1_30_20) Copied: tags/old/snapshots/libselinux_1_30_21 (from rev 2204, tags/libselinux_1_30_21) Copied: tags/old/snapshots/libselinux_1_30_22 (from rev 2204, tags/libselinux_1_30_22) Copied: tags/old/snapshots/libselinux_1_30_23 (from rev 2204, tags/libselinux_1_30_23) Copied: tags/old/snapshots/libselinux_1_30_24 (from rev 2204, tags/libselinux_1_30_24) Copied: tags/old/snapshots/libselinux_1_30_25 (from rev 2204, tags/libselinux_1_30_25) Copied: tags/old/snapshots/libselinux_1_30_26 (from rev 2204, tags/libselinux_1_30_26) Copied: tags/old/snapshots/libselinux_1_30_27 (from rev 2204, tags/libselinux_1_30_27) Copied: tags/old/snapshots/libselinux_1_30_28 (from rev 2204, tags/libselinux_1_30_28) Copied: tags/old/snapshots/libselinux_1_30_29 (from rev 2204, tags/libselinux_1_30_29) Copied: tags/old/snapshots/libselinux_1_30_3 (from rev 2204, tags/libselinux_1_30_3) Copied: tags/old/snapshots/libselinux_1_30_30 (from rev 2204, tags/libselinux_1_30_30) Copied: tags/old/snapshots/libselinux_1_30_4 (from rev 2204, tags/libselinux_1_30_4) Copied: tags/old/snapshots/libselinux_1_30_5 (from rev 2204, tags/libselinux_1_30_5) Copied: tags/old/snapshots/libselinux_1_30_6 (from rev 2204, tags/libselinux_1_30_6) Copied: tags/old/snapshots/libselinux_1_30_7 (from rev 2204, tags/libselinux_1_30_7) Copied: tags/old/snapshots/libselinux_1_30_8 (from rev 2204, tags/libselinux_1_30_8) Copied: tags/old/snapshots/libselinux_1_30_9 (from rev 2204, tags/libselinux_1_30_9) Copied: tags/old/snapshots/libselinux_1_33_2 (from rev 2204, tags/libselinux_1_33_2) Copied: tags/old/snapshots/libselinux_1_33_3 (from rev 2204, tags/libselinux_1_33_3) Copied: tags/old/snapshots/libselinux_1_33_4 (from rev 2204, tags/libselinux_1_33_4) Copied: tags/old/snapshots/libselinux_1_33_5 (from rev 2204, tags/libselinux_1_33_5) Copied: tags/old/snapshots/libselinux_1_33_6 (from rev 2204, tags/libselinux_1_33_6) Copied: tags/old/snapshots/libsemanage_1_0 (from rev 2204, tags/libsemanage_1_0) Copied: tags/old/snapshots/libsemanage_1_1_1 (from rev 2204, tags/libsemanage_1_1_1) Copied: tags/old/snapshots/libsemanage_1_1_2 (from rev 2204, tags/libsemanage_1_1_2) Copied: tags/old/snapshots/libsemanage_1_1_3 (from rev 2204, tags/libsemanage_1_1_3) Copied: tags/old/snapshots/libsemanage_1_1_4 (from rev 2204, tags/libsemanage_1_1_4) Copied: tags/old/snapshots/libsemanage_1_1_5 (from rev 2204, tags/libsemanage_1_1_5) Copied: tags/old/snapshots/libsemanage_1_1_6 (from rev 2204, tags/libsemanage_1_1_6) Copied: tags/old/snapshots/libsemanage_1_3_1 (from rev 2204, tags/libsemanage_1_3_1) Copied: tags/old/snapshots/libsemanage_1_3_10 (from rev 2204, tags/libsemanage_1_3_10) Copied: tags/old/snapshots/libsemanage_1_3_11 (from rev 2204, tags/libsemanage_1_3_11) Copied: tags/old/snapshots/libsemanage_1_3_12 (from rev 2204, tags/libsemanage_1_3_12) Copied: tags/old/snapshots/libsemanage_1_3_14 (from rev 2204, tags/libsemanage_1_3_14) Copied: tags/old/snapshots/libsemanage_1_3_15 (from rev 2204, tags/libsemanage_1_3_15) Copied: tags/old/snapshots/libsemanage_1_3_16 (from rev 2204, tags/libsemanage_1_3_16) Copied: tags/old/snapshots/libsemanage_1_3_17 (from rev 2204, tags/libsemanage_1_3_17) Copied: tags/old/snapshots/libsemanage_1_3_18 (from rev 2204, tags/libsemanage_1_3_18) Copied: tags/old/snapshots/libsemanage_1_3_19 (from rev 2204, tags/libsemanage_1_3_19) Copied: tags/old/snapshots/libsemanage_1_3_2 (from rev 2204, tags/libsemanage_1_3_2) Copied: tags/old/snapshots/libsemanage_1_3_20 (from rev 2204, tags/libsemanage_1_3_20) Copied: tags/old/snapshots/libsemanage_1_3_21 (from rev 2204, tags/libsemanage_1_3_21) Copied: tags/old/snapshots/libsemanage_1_3_22 (from rev 2204, tags/libsemanage_1_3_22) Copied: tags/old/snapshots/libsemanage_1_3_23 (from rev 2204, tags/libsemanage_1_3_23) Copied: tags/old/snapshots/libsemanage_1_3_24 (from rev 2204, tags/libsemanage_1_3_24) Copied: tags/old/snapshots/libsemanage_1_3_26 (from rev 2204, tags/libsemanage_1_3_26) Copied: tags/old/snapshots/libsemanage_1_3_27 (from rev 2204, tags/libsemanage_1_3_27) Copied: tags/old/snapshots/libsemanage_1_3_3 (from rev 2204, tags/libsemanage_1_3_3) Copied: tags/old/snapshots/libsemanage_1_3_30 (from rev 2204, tags/libsemanage_1_3_30) Copied: tags/old/snapshots/libsemanage_1_3_31 (from rev 2204, tags/libsemanage_1_3_31) Copied: tags/old/snapshots/libsemanage_1_3_33 (from rev 2204, tags/libsemanage_1_3_33) Copied: tags/old/snapshots/libsemanage_1_3_34 (from rev 2204, tags/libsemanage_1_3_34) Copied: tags/old/snapshots/libsemanage_1_3_35 (from rev 2204, tags/libsemanage_1_3_35) Copied: tags/old/snapshots/libsemanage_1_3_36 (from rev 2204, tags/libsemanage_1_3_36) Copied: tags/old/snapshots/libsemanage_1_3_37 (from rev 2204, tags/libsemanage_1_3_37) Copied: tags/old/snapshots/libsemanage_1_3_39 (from rev 2204, tags/libsemanage_1_3_39) Copied: tags/old/snapshots/libsemanage_1_3_4 (from rev 2204, tags/libsemanage_1_3_4) Copied: tags/old/snapshots/libsemanage_1_3_40 (from rev 2204, tags/libsemanage_1_3_40) Copied: tags/old/snapshots/libsemanage_1_3_41 (from rev 2204, tags/libsemanage_1_3_41) Copied: tags/old/snapshots/libsemanage_1_3_42 (from rev 2204, tags/libsemanage_1_3_42) Copied: tags/old/snapshots/libsemanage_1_3_43 (from rev 2204, tags/libsemanage_1_3_43) Copied: tags/old/snapshots/libsemanage_1_3_44 (from rev 2204, tags/libsemanage_1_3_44) Copied: tags/old/snapshots/libsemanage_1_3_45 (from rev 2204, tags/libsemanage_1_3_45) Copied: tags/old/snapshots/libsemanage_1_3_46 (from rev 2204, tags/libsemanage_1_3_46) Copied: tags/old/snapshots/libsemanage_1_3_47 (from rev 2204, tags/libsemanage_1_3_47) Copied: tags/old/snapshots/libsemanage_1_3_48 (from rev 2204, tags/libsemanage_1_3_48) Copied: tags/old/snapshots/libsemanage_1_3_49 (from rev 2204, tags/libsemanage_1_3_49) Copied: tags/old/snapshots/libsemanage_1_3_5 (from rev 2204, tags/libsemanage_1_3_5) Copied: tags/old/snapshots/libsemanage_1_3_50 (from rev 2204, tags/libsemanage_1_3_50) Copied: tags/old/snapshots/libsemanage_1_3_51 (from rev 2204, tags/libsemanage_1_3_51) Copied: tags/old/snapshots/libsemanage_1_3_52 (from rev 2204, tags/libsemanage_1_3_52) Copied: tags/old/snapshots/libsemanage_1_3_53 (from rev 2204, tags/libsemanage_1_3_53) Copied: tags/old/snapshots/libsemanage_1_3_54 (from rev 2204, tags/libsemanage_1_3_54) Copied: tags/old/snapshots/libsemanage_1_3_55 (from rev 2204, tags/libsemanage_1_3_55) Copied: tags/old/snapshots/libsemanage_1_3_57 (from rev 2204, tags/libsemanage_1_3_57) Copied: tags/old/snapshots/libsemanage_1_3_58 (from rev 2204, tags/libsemanage_1_3_58) Copied: tags/old/snapshots/libsemanage_1_3_59 (from rev 2204, tags/libsemanage_1_3_59) Copied: tags/old/snapshots/libsemanage_1_3_6 (from rev 2204, tags/libsemanage_1_3_6) Copied: tags/old/snapshots/libsemanage_1_3_60 (from rev 2204, tags/libsemanage_1_3_60) Copied: tags/old/snapshots/libsemanage_1_3_61 (from rev 2204, tags/libsemanage_1_3_61) Copied: tags/old/snapshots/libsemanage_1_3_62 (from rev 2204, tags/libsemanage_1_3_62) Copied: tags/old/snapshots/libsemanage_1_3_63 (from rev 2204, tags/libsemanage_1_3_63) Copied: tags/old/snapshots/libsemanage_1_3_64 (from rev 2204, tags/libsemanage_1_3_64) Copied: tags/old/snapshots/libsemanage_1_3_7 (from rev 2204, tags/libsemanage_1_3_7) Copied: tags/old/snapshots/libsemanage_1_3_8 (from rev 2204, tags/libsemanage_1_3_8) Copied: tags/old/snapshots/libsemanage_1_3_9 (from rev 2204, tags/libsemanage_1_3_9) Copied: tags/old/snapshots/libsemanage_1_5_1 (from rev 2204, tags/libsemanage_1_5_1) Copied: tags/old/snapshots/libsemanage_1_5_10 (from rev 2204, tags/libsemanage_1_5_10) Copied: tags/old/snapshots/libsemanage_1_5_11 (from rev 2204, tags/libsemanage_1_5_11) Copied: tags/old/snapshots/libsemanage_1_5_12 (from rev 2204, tags/libsemanage_1_5_12) Copied: tags/old/snapshots/libsemanage_1_5_13 (from rev 2204, tags/libsemanage_1_5_13) Copied: tags/old/snapshots/libsemanage_1_5_14 (from rev 2204, tags/libsemanage_1_5_14) Copied: tags/old/snapshots/libsemanage_1_5_15 (from rev 2204, tags/libsemanage_1_5_15) Copied: tags/old/snapshots/libsemanage_1_5_16 (from rev 2204, tags/libsemanage_1_5_16) Copied: tags/old/snapshots/libsemanage_1_5_17 (from rev 2204, tags/libsemanage_1_5_17) Copied: tags/old/snapshots/libsemanage_1_5_18 (from rev 2204, tags/libsemanage_1_5_18) Copied: tags/old/snapshots/libsemanage_1_5_19 (from rev 2204, tags/libsemanage_1_5_19) Copied: tags/old/snapshots/libsemanage_1_5_2 (from rev 2204, tags/libsemanage_1_5_2) Copied: tags/old/snapshots/libsemanage_1_5_22 (from rev 2204, tags/libsemanage_1_5_22) Copied: tags/old/snapshots/libsemanage_1_5_24 (from rev 2204, tags/libsemanage_1_5_24) Copied: tags/old/snapshots/libsemanage_1_5_25 (from rev 2204, tags/libsemanage_1_5_25) Copied: tags/old/snapshots/libsemanage_1_5_26 (from rev 2204, tags/libsemanage_1_5_26) Copied: tags/old/snapshots/libsemanage_1_5_27 (from rev 2204, tags/libsemanage_1_5_27) Copied: tags/old/snapshots/libsemanage_1_5_28 (from rev 2204, tags/libsemanage_1_5_28) Copied: tags/old/snapshots/libsemanage_1_5_29 (from rev 2204, tags/libsemanage_1_5_29) Copied: tags/old/snapshots/libsemanage_1_5_3 (from rev 2204, tags/libsemanage_1_5_3) Copied: tags/old/snapshots/libsemanage_1_5_30 (from rev 2204, tags/libsemanage_1_5_30) Copied: tags/old/snapshots/libsemanage_1_5_31 (from rev 2204, tags/libsemanage_1_5_31) Copied: tags/old/snapshots/libsemanage_1_5_4 (from rev 2204, tags/libsemanage_1_5_4) Copied: tags/old/snapshots/libsemanage_1_5_5 (from rev 2204, tags/libsemanage_1_5_5) Copied: tags/old/snapshots/libsemanage_1_5_6 (from rev 2204, tags/libsemanage_1_5_6) Copied: tags/old/snapshots/libsemanage_1_5_8 (from rev 2204, tags/libsemanage_1_5_8) Copied: tags/old/snapshots/libsemanage_1_5_9 (from rev 2204, tags/libsemanage_1_5_9) Copied: tags/old/snapshots/libsemanage_1_6_1 (from rev 2204, tags/libsemanage_1_6_1) Copied: tags/old/snapshots/libsemanage_1_6_10 (from rev 2204, tags/libsemanage_1_6_10) Copied: tags/old/snapshots/libsemanage_1_6_12 (from rev 2204, tags/libsemanage_1_6_12) Copied: tags/old/snapshots/libsemanage_1_6_13 (from rev 2204, tags/libsemanage_1_6_13) Copied: tags/old/snapshots/libsemanage_1_6_15 (from rev 2204, tags/libsemanage_1_6_15) Copied: tags/old/snapshots/libsemanage_1_6_17 (from rev 2204, tags/libsemanage_1_6_17) Copied: tags/old/snapshots/libsemanage_1_6_2 (from rev 2204, tags/libsemanage_1_6_2) Copied: tags/old/snapshots/libsemanage_1_6_3 (from rev 2204, tags/libsemanage_1_6_3) Copied: tags/old/snapshots/libsemanage_1_6_4 (from rev 2204, tags/libsemanage_1_6_4) Copied: tags/old/snapshots/libsemanage_1_6_5 (from rev 2204, tags/libsemanage_1_6_5) Copied: tags/old/snapshots/libsemanage_1_6_6 (from rev 2204, tags/libsemanage_1_6_6) Copied: tags/old/snapshots/libsemanage_1_6_7 (from rev 2204, tags/libsemanage_1_6_7) Copied: tags/old/snapshots/libsemanage_1_6_8 (from rev 2204, tags/libsemanage_1_6_8) Copied: tags/old/snapshots/libsemanage_1_6_9 (from rev 2204, tags/libsemanage_1_6_9) Copied: tags/old/snapshots/libsemanage_1_9_1 (from rev 2204, tags/libsemanage_1_9_1) Copied: tags/old/snapshots/libsemanage_1_9_2 (from rev 2204, tags/libsemanage_1_9_2) Copied: tags/old/snapshots/libsepol_1_11_1 (from rev 2204, tags/libsepol_1_11_1) Copied: tags/old/snapshots/libsepol_1_11_10 (from rev 2204, tags/libsepol_1_11_10) Copied: tags/old/snapshots/libsepol_1_11_11 (from rev 2204, tags/libsepol_1_11_11) Copied: tags/old/snapshots/libsepol_1_11_13 (from rev 2204, tags/libsepol_1_11_13) Copied: tags/old/snapshots/libsepol_1_11_15 (from rev 2204, tags/libsepol_1_11_15) Copied: tags/old/snapshots/libsepol_1_11_16 (from rev 2204, tags/libsepol_1_11_16) Copied: tags/old/snapshots/libsepol_1_11_17 (from rev 2204, tags/libsepol_1_11_17) Copied: tags/old/snapshots/libsepol_1_11_18 (from rev 2204, tags/libsepol_1_11_18) Copied: tags/old/snapshots/libsepol_1_11_19 (from rev 2204, tags/libsepol_1_11_19) Copied: tags/old/snapshots/libsepol_1_11_2 (from rev 2204, tags/libsepol_1_11_2) Copied: tags/old/snapshots/libsepol_1_11_20 (from rev 2204, tags/libsepol_1_11_20) Copied: tags/old/snapshots/libsepol_1_11_3 (from rev 2204, tags/libsepol_1_11_3) Copied: tags/old/snapshots/libsepol_1_11_4 (from rev 2204, tags/libsepol_1_11_4) Copied: tags/old/snapshots/libsepol_1_11_5 (from rev 2204, tags/libsepol_1_11_5) Copied: tags/old/snapshots/libsepol_1_11_6 (from rev 2204, tags/libsepol_1_11_6) Copied: tags/old/snapshots/libsepol_1_11_7 (from rev 2204, tags/libsepol_1_11_7) Copied: tags/old/snapshots/libsepol_1_11_8 (from rev 2204, tags/libsepol_1_11_8) Copied: tags/old/snapshots/libsepol_1_11_9 (from rev 2204, tags/libsepol_1_11_9) Copied: tags/old/snapshots/libsepol_1_12_1 (from rev 2204, tags/libsepol_1_12_1) Copied: tags/old/snapshots/libsepol_1_12_10 (from rev 2204, tags/libsepol_1_12_10) Copied: tags/old/snapshots/libsepol_1_12_11 (from rev 2204, tags/libsepol_1_12_11) Copied: tags/old/snapshots/libsepol_1_12_12 (from rev 2204, tags/libsepol_1_12_12) Copied: tags/old/snapshots/libsepol_1_12_13 (from rev 2204, tags/libsepol_1_12_13) Copied: tags/old/snapshots/libsepol_1_12_18 (from rev 2204, tags/libsepol_1_12_18) Copied: tags/old/snapshots/libsepol_1_12_2 (from rev 2204, tags/libsepol_1_12_2) Copied: tags/old/snapshots/libsepol_1_12_20 (from rev 2204, tags/libsepol_1_12_20) Copied: tags/old/snapshots/libsepol_1_12_21 (from rev 2204, tags/libsepol_1_12_21) Copied: tags/old/snapshots/libsepol_1_12_22 (from rev 2204, tags/libsepol_1_12_22) Copied: tags/old/snapshots/libsepol_1_12_23 (from rev 2204, tags/libsepol_1_12_23) Copied: tags/old/snapshots/libsepol_1_12_24 (from rev 2204, tags/libsepol_1_12_24) Copied: tags/old/snapshots/libsepol_1_12_25 (from rev 2204, tags/libsepol_1_12_25) Copied: tags/old/snapshots/libsepol_1_12_26 (from rev 2204, tags/libsepol_1_12_26) Copied: tags/old/snapshots/libsepol_1_12_27 (from rev 2204, tags/libsepol_1_12_27) Copied: tags/old/snapshots/libsepol_1_12_28 (from rev 2204, tags/libsepol_1_12_28) Copied: tags/old/snapshots/libsepol_1_12_3 (from rev 2204, tags/libsepol_1_12_3) Copied: tags/old/snapshots/libsepol_1_12_4 (from rev 2204, tags/libsepol_1_12_4) Copied: tags/old/snapshots/libsepol_1_12_5 (from rev 2204, tags/libsepol_1_12_5) Copied: tags/old/snapshots/libsepol_1_12_6 (from rev 2204, tags/libsepol_1_12_6) Copied: tags/old/snapshots/libsepol_1_12_7 (from rev 2204, tags/libsepol_1_12_7) Copied: tags/old/snapshots/libsepol_1_12_8 (from rev 2204, tags/libsepol_1_12_8) Copied: tags/old/snapshots/libsepol_1_15_1 (from rev 2204, tags/libsepol_1_15_1) Copied: tags/old/snapshots/libsepol_1_15_2 (from rev 2204, tags/libsepol_1_15_2) Copied: tags/old/snapshots/libsepol_1_15_3 (from rev 2204, tags/libsepol_1_15_3) Copied: tags/old/snapshots/libsepol_1_7_10 (from rev 2204, tags/libsepol_1_7_10) Copied: tags/old/snapshots/libsepol_1_7_12 (from rev 2204, tags/libsepol_1_7_12) Copied: tags/old/snapshots/libsepol_1_7_13 (from rev 2204, tags/libsepol_1_7_13) Copied: tags/old/snapshots/libsepol_1_7_16 (from rev 2204, tags/libsepol_1_7_16) Copied: tags/old/snapshots/libsepol_1_7_19 (from rev 2204, tags/libsepol_1_7_19) Copied: tags/old/snapshots/libsepol_1_7_20 (from rev 2204, tags/libsepol_1_7_20) Copied: tags/old/snapshots/libsepol_1_7_21 (from rev 2204, tags/libsepol_1_7_21) Copied: tags/old/snapshots/libsepol_1_7_22 (from rev 2204, tags/libsepol_1_7_22) Copied: tags/old/snapshots/libsepol_1_7_23 (from rev 2204, tags/libsepol_1_7_23) Copied: tags/old/snapshots/libsepol_1_7_4 (from rev 2204, tags/libsepol_1_7_4) Copied: tags/old/snapshots/libsepol_1_7_5 (from rev 2204, tags/libsepol_1_7_5) Copied: tags/old/snapshots/libsepol_1_7_6 (from rev 2204, tags/libsepol_1_7_6) Copied: tags/old/snapshots/libsepol_1_7_7 (from rev 2204, tags/libsepol_1_7_7) Copied: tags/old/snapshots/libsepol_1_7_8 (from rev 2204, tags/libsepol_1_7_8) Copied: tags/old/snapshots/libsepol_1_7_9 (from rev 2204, tags/libsepol_1_7_9) Copied: tags/old/snapshots/libsepol_1_9_1 (from rev 2204, tags/libsepol_1_9_1) Copied: tags/old/snapshots/libsepol_1_9_10 (from rev 2204, tags/libsepol_1_9_10) Copied: tags/old/snapshots/libsepol_1_9_11 (from rev 2204, tags/libsepol_1_9_11) Copied: tags/old/snapshots/libsepol_1_9_12 (from rev 2204, tags/libsepol_1_9_12) Copied: tags/old/snapshots/libsepol_1_9_13 (from rev 2204, tags/libsepol_1_9_13) Copied: tags/old/snapshots/libsepol_1_9_14 (from rev 2204, tags/libsepol_1_9_14) Copied: tags/old/snapshots/libsepol_1_9_15 (from rev 2204, tags/libsepol_1_9_15) Copied: tags/old/snapshots/libsepol_1_9_16 (from rev 2204, tags/libsepol_1_9_16) Copied: tags/old/snapshots/libsepol_1_9_17 (from rev 2204, tags/libsepol_1_9_17) Copied: tags/old/snapshots/libsepol_1_9_18 (from rev 2204, tags/libsepol_1_9_18) Copied: tags/old/snapshots/libsepol_1_9_19 (from rev 2204, tags/libsepol_1_9_19) Copied: tags/old/snapshots/libsepol_1_9_20 (from rev 2204, tags/libsepol_1_9_20) Copied: tags/old/snapshots/libsepol_1_9_21 (from rev 2204, tags/libsepol_1_9_21) Copied: tags/old/snapshots/libsepol_1_9_22 (from rev 2204, tags/libsepol_1_9_22) Copied: tags/old/snapshots/libsepol_1_9_23 (from rev 2204, tags/libsepol_1_9_23) Copied: tags/old/snapshots/libsepol_1_9_24 (from rev 2204, tags/libsepol_1_9_24) Copied: tags/old/snapshots/libsepol_1_9_25 (from rev 2204, tags/libsepol_1_9_25) Copied: tags/old/snapshots/libsepol_1_9_27 (from rev 2204, tags/libsepol_1_9_27) Copied: tags/old/snapshots/libsepol_1_9_28 (from rev 2204, tags/libsepol_1_9_28) Copied: tags/old/snapshots/libsepol_1_9_29 (from rev 2204, tags/libsepol_1_9_29) Copied: tags/old/snapshots/libsepol_1_9_3 (from rev 2204, tags/libsepol_1_9_3) Copied: tags/old/snapshots/libsepol_1_9_30 (from rev 2204, tags/libsepol_1_9_30) Copied: tags/old/snapshots/libsepol_1_9_31 (from rev 2204, tags/libsepol_1_9_31) Copied: tags/old/snapshots/libsepol_1_9_34 (from rev 2204, tags/libsepol_1_9_34) Copied: tags/old/snapshots/libsepol_1_9_35 (from rev 2204, tags/libsepol_1_9_35) Copied: tags/old/snapshots/libsepol_1_9_36 (from rev 2204, tags/libsepol_1_9_36) Copied: tags/old/snapshots/libsepol_1_9_37 (from rev 2204, tags/libsepol_1_9_37) Copied: tags/old/snapshots/libsepol_1_9_38 (from rev 2204, tags/libsepol_1_9_38) Copied: tags/old/snapshots/libsepol_1_9_39 (from rev 2204, tags/libsepol_1_9_39) Copied: tags/old/snapshots/libsepol_1_9_4 (from rev 2204, tags/libsepol_1_9_4) Copied: tags/old/snapshots/libsepol_1_9_40 (from rev 2204, tags/libsepol_1_9_40) Copied: tags/old/snapshots/libsepol_1_9_41 (from rev 2204, tags/libsepol_1_9_41) Copied: tags/old/snapshots/libsepol_1_9_42 (from rev 2204, tags/libsepol_1_9_42) Copied: tags/old/snapshots/libsepol_1_9_5 (from rev 2204, tags/libsepol_1_9_5) Copied: tags/old/snapshots/libsepol_1_9_6 (from rev 2204, tags/libsepol_1_9_6) Copied: tags/old/snapshots/libsepol_1_9_7 (from rev 2204, tags/libsepol_1_9_7) Copied: tags/old/snapshots/libsepol_1_9_8 (from rev 2204, tags/libsepol_1_9_8) Copied: tags/old/snapshots/libsepol_1_9_9 (from rev 2204, tags/libsepol_1_9_9) Copied: tags/old/snapshots/policycoreutils_1_25_2 (from rev 2204, tags/policycoreutils_1_25_2) Copied: tags/old/snapshots/policycoreutils_1_25_5 (from rev 2204, tags/policycoreutils_1_25_5) Copied: tags/old/snapshots/policycoreutils_1_25_6 (from rev 2204, tags/policycoreutils_1_25_6) Copied: tags/old/snapshots/policycoreutils_1_25_7 (from rev 2204, tags/policycoreutils_1_25_7) Copied: tags/old/snapshots/policycoreutils_1_25_8 (from rev 2204, tags/policycoreutils_1_25_8) Copied: tags/old/snapshots/policycoreutils_1_25_9 (from rev 2204, tags/policycoreutils_1_25_9) Copied: tags/old/snapshots/policycoreutils_1_27_1 (from rev 2204, tags/policycoreutils_1_27_1) Copied: tags/old/snapshots/policycoreutils_1_27_10 (from rev 2204, tags/policycoreutils_1_27_10) Copied: tags/old/snapshots/policycoreutils_1_27_12 (from rev 2204, tags/policycoreutils_1_27_12) Copied: tags/old/snapshots/policycoreutils_1_27_13 (from rev 2204, tags/policycoreutils_1_27_13) Copied: tags/old/snapshots/policycoreutils_1_27_14 (from rev 2204, tags/policycoreutils_1_27_14) Copied: tags/old/snapshots/policycoreutils_1_27_17 (from rev 2204, tags/policycoreutils_1_27_17) Copied: tags/old/snapshots/policycoreutils_1_27_18 (from rev 2204, tags/policycoreutils_1_27_18) Copied: tags/old/snapshots/policycoreutils_1_27_19 (from rev 2204, tags/policycoreutils_1_27_19) Copied: tags/old/snapshots/policycoreutils_1_27_20 (from rev 2204, tags/policycoreutils_1_27_20) Copied: tags/old/snapshots/policycoreutils_1_27_21 (from rev 2204, tags/policycoreutils_1_27_21) Copied: tags/old/snapshots/policycoreutils_1_27_22 (from rev 2204, tags/policycoreutils_1_27_22) Copied: tags/old/snapshots/policycoreutils_1_27_23 (from rev 2204, tags/policycoreutils_1_27_23) Copied: tags/old/snapshots/policycoreutils_1_27_24 (from rev 2204, tags/policycoreutils_1_27_24) Copied: tags/old/snapshots/policycoreutils_1_27_25 (from rev 2204, tags/policycoreutils_1_27_25) Copied: tags/old/snapshots/policycoreutils_1_27_26 (from rev 2204, tags/policycoreutils_1_27_26) Copied: tags/old/snapshots/policycoreutils_1_27_27 (from rev 2204, tags/policycoreutils_1_27_27) Copied: tags/old/snapshots/policycoreutils_1_27_28 (from rev 2204, tags/policycoreutils_1_27_28) Copied: tags/old/snapshots/policycoreutils_1_27_3 (from rev 2204, tags/policycoreutils_1_27_3) Copied: tags/old/snapshots/policycoreutils_1_27_30 (from rev 2204, tags/policycoreutils_1_27_30) Copied: tags/old/snapshots/policycoreutils_1_27_31 (from rev 2204, tags/policycoreutils_1_27_31) Copied: tags/old/snapshots/policycoreutils_1_27_32 (from rev 2204, tags/policycoreutils_1_27_32) Copied: tags/old/snapshots/policycoreutils_1_27_33 (from rev 2204, tags/policycoreutils_1_27_33) Copied: tags/old/snapshots/policycoreutils_1_27_34 (from rev 2204, tags/policycoreutils_1_27_34) Copied: tags/old/snapshots/policycoreutils_1_27_37 (from rev 2204, tags/policycoreutils_1_27_37) Copied: tags/old/snapshots/policycoreutils_1_27_4 (from rev 2204, tags/policycoreutils_1_27_4) Copied: tags/old/snapshots/policycoreutils_1_27_5 (from rev 2204, tags/policycoreutils_1_27_5) Copied: tags/old/snapshots/policycoreutils_1_27_6 (from rev 2204, tags/policycoreutils_1_27_6) Copied: tags/old/snapshots/policycoreutils_1_27_7 (from rev 2204, tags/policycoreutils_1_27_7) Copied: tags/old/snapshots/policycoreutils_1_27_8 (from rev 2204, tags/policycoreutils_1_27_8) Copied: tags/old/snapshots/policycoreutils_1_27_9 (from rev 2204, tags/policycoreutils_1_27_9) Copied: tags/old/snapshots/policycoreutils_1_28_1 (from rev 2204, tags/policycoreutils_1_28_1) Copied: tags/old/snapshots/policycoreutils_1_29_1 (from rev 2204, tags/policycoreutils_1_29_1) Copied: tags/old/snapshots/policycoreutils_1_29_10 (from rev 2204, tags/policycoreutils_1_29_10) Copied: tags/old/snapshots/policycoreutils_1_29_11 (from rev 2204, tags/policycoreutils_1_29_11) Copied: tags/old/snapshots/policycoreutils_1_29_12 (from rev 2204, tags/policycoreutils_1_29_12) Copied: tags/old/snapshots/policycoreutils_1_29_14 (from rev 2204, tags/policycoreutils_1_29_14) Copied: tags/old/snapshots/policycoreutils_1_29_16 (from rev 2204, tags/policycoreutils_1_29_16) Copied: tags/old/snapshots/policycoreutils_1_29_2 (from rev 2204, tags/policycoreutils_1_29_2) Copied: tags/old/snapshots/policycoreutils_1_29_20 (from rev 2204, tags/policycoreutils_1_29_20) C... [truncated message content] |