| 
      
      
      From: <ssm...@us...> - 2006-08-24 16:16:52
       | 
| Revision: 1999 Author: ssmalley Date: 2006-08-24 09:16:46 -0700 (Thu, 24 Aug 2006) ViewCVS: http://svn.sourceforge.net/selinux/?rev=1999&view=rev Log Message: ----------- policycoreutils 1.30.27 Modified Paths: -------------- trunk/policycoreutils/ChangeLog trunk/policycoreutils/VERSION Modified: trunk/policycoreutils/ChangeLog =================================================================== --- trunk/policycoreutils/ChangeLog 2006-08-24 16:14:17 UTC (rev 1998) +++ trunk/policycoreutils/ChangeLog 2006-08-24 16:16:46 UTC (rev 1999) @@ -1,3 +1,6 @@ +1.30.27 2006-08-24 + * Merged fix for restorecon symlink handling from Erich Schubert. + 1.30.26 2006-08-11 * Merged semanage local file contexts patch from Chris PeBenito. Modified: trunk/policycoreutils/VERSION =================================================================== --- trunk/policycoreutils/VERSION 2006-08-24 16:14:17 UTC (rev 1998) +++ trunk/policycoreutils/VERSION 2006-08-24 16:16:46 UTC (rev 1999) @@ -1 +1 @@ -1.30.26 +1.30.27 This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. | 
| 
      
      
      From: <ssm...@us...> - 2006-09-01 19:22:50
       | 
| Revision: 2011
          http://svn.sourceforge.net/selinux/?rev=2011&view=rev
Author:   ssmalley
Date:     2006-09-01 12:22:21 -0700 (Fri, 01 Sep 2006)
Log Message:
-----------
Author: Daniel J Walsh
Email: dw...@re...
Subject: policycoreutils translations patch
Date: Thu, 24 Aug 2006 14:40:01 -0400
Updates to translation files and bug fix for fixfiles.
Acked-by:  Stephen Smalley <sd...@ty...>
Acked-by: Darrel Goeddel <dgo...@tr...>
Modified Paths:
--------------
    trunk/policycoreutils/po/af.po
    trunk/policycoreutils/po/am.po
    trunk/policycoreutils/po/ar.po
    trunk/policycoreutils/po/be.po
    trunk/policycoreutils/po/bg.po
    trunk/policycoreutils/po/bn.po
    trunk/policycoreutils/po/bn_IN.po
    trunk/policycoreutils/po/ca.po
    trunk/policycoreutils/po/cs.po
    trunk/policycoreutils/po/cy.po
    trunk/policycoreutils/po/da.po
    trunk/policycoreutils/po/de.po
    trunk/policycoreutils/po/el.po
    trunk/policycoreutils/po/en_GB.po
    trunk/policycoreutils/po/es.po
    trunk/policycoreutils/po/et.po
    trunk/policycoreutils/po/eu_ES.po
    trunk/policycoreutils/po/fa.po
    trunk/policycoreutils/po/fi.po
    trunk/policycoreutils/po/fr.po
    trunk/policycoreutils/po/gl.po
    trunk/policycoreutils/po/gu.po
    trunk/policycoreutils/po/he.po
    trunk/policycoreutils/po/hi.po
    trunk/policycoreutils/po/hr.po
    trunk/policycoreutils/po/hu.po
    trunk/policycoreutils/po/hy.po
    trunk/policycoreutils/po/id.po
    trunk/policycoreutils/po/is.po
    trunk/policycoreutils/po/it.po
    trunk/policycoreutils/po/ja.po
    trunk/policycoreutils/po/ka.po
    trunk/policycoreutils/po/kn.po
    trunk/policycoreutils/po/ko.po
    trunk/policycoreutils/po/ku.po
    trunk/policycoreutils/po/lo.po
    trunk/policycoreutils/po/lt.po
    trunk/policycoreutils/po/lv.po
    trunk/policycoreutils/po/mk.po
    trunk/policycoreutils/po/ml.po
    trunk/policycoreutils/po/mr.po
    trunk/policycoreutils/po/ms.po
    trunk/policycoreutils/po/my.po
    trunk/policycoreutils/po/nb.po
    trunk/policycoreutils/po/nl.po
    trunk/policycoreutils/po/nn.po
    trunk/policycoreutils/po/no.po
    trunk/policycoreutils/po/nso.po
    trunk/policycoreutils/po/or.po
    trunk/policycoreutils/po/pa.po
    trunk/policycoreutils/po/pl.po
    trunk/policycoreutils/po/pt.po
    trunk/policycoreutils/po/pt_BR.po
    trunk/policycoreutils/po/ro.po
    trunk/policycoreutils/po/ru.po
    trunk/policycoreutils/po/si.po
    trunk/policycoreutils/po/sk.po
    trunk/policycoreutils/po/sl.po
    trunk/policycoreutils/po/sq.po
    trunk/policycoreutils/po/sr.po
    trunk/policycoreutils/po/sr...@La...
    trunk/policycoreutils/po/sv.po
    trunk/policycoreutils/po/ta.po
    trunk/policycoreutils/po/te.po
    trunk/policycoreutils/po/th.po
    trunk/policycoreutils/po/tr.po
    trunk/policycoreutils/po/uk.po
    trunk/policycoreutils/po/ur.po
    trunk/policycoreutils/po/vi.po
    trunk/policycoreutils/po/zh_CN.po
    trunk/policycoreutils/po/zh_TW.po
    trunk/policycoreutils/po/zu.po
    trunk/policycoreutils/scripts/fixfiles
Modified: trunk/policycoreutils/po/af.po
===================================================================
--- trunk/policycoreutils/po/af.po	2006-09-01 19:20:50 UTC (rev 2010)
+++ trunk/policycoreutils/po/af.po	2006-09-01 19:22:21 UTC (rev 2011)
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: PACKAGE VERSION\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2006-05-26 13:48-0400\n"
+"POT-Creation-Date: 2006-06-29 15:53-0400\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL...@li...>\n"
@@ -21,7 +21,7 @@
 msgid "usage:  %s [-bq]\n"
 msgstr ""
 
-#: ../load_policy/load_policy.c:62
+#: ../load_policy/load_policy.c:66
 #, c-format
 msgid "%s:  Can't load policy:  %s\n"
 msgstr ""
@@ -31,26 +31,26 @@
 msgid "Out of memory!\n"
 msgstr ""
 
-#: ../newrole/newrole.c:201 ../run_init/run_init.c:126
+#: ../newrole/newrole.c:199 ../run_init/run_init.c:126
 #, c-format
 msgid "failed to initialize PAM\n"
 msgstr ""
 
-#: ../newrole/newrole.c:212
+#: ../newrole/newrole.c:210
 #, c-format
 msgid "failed to set PAM_TTY\n"
 msgstr ""
 
-#: ../newrole/newrole.c:250 ../run_init/run_init.c:155
+#: ../newrole/newrole.c:246 ../run_init/run_init.c:154
 msgid "Password:"
 msgstr ""
 
-#: ../newrole/newrole.c:282 ../run_init/run_init.c:187
+#: ../newrole/newrole.c:281 ../run_init/run_init.c:189
 #, c-format
 msgid "Cannot find your entry in the shadow passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:288 ../run_init/run_init.c:193
+#: ../newrole/newrole.c:287 ../run_init/run_init.c:195
 #, c-format
 msgid "getpass cannot open /dev/tty\n"
 msgstr ""
@@ -60,187 +60,187 @@
 msgid "Error initing capabilities, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:367
+#: ../newrole/newrole.c:368
 #, c-format
 msgid "Error dropping capabilities, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:374
+#: ../newrole/newrole.c:375
 #, c-format
 msgid "Error changing uid, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:380
+#: ../newrole/newrole.c:382
 #, c-format
 msgid "Error resetting KEEPCAPS, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:386
+#: ../newrole/newrole.c:390
 #, c-format
 msgid "Error dropping SETUID capability, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:459
+#: ../newrole/newrole.c:463
 #, c-format
 msgid "Sorry, newrole may be used only on a SELinux kernel.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:464
+#: ../newrole/newrole.c:468
 #, c-format
 msgid "Could not determine enforcing mode.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:481
+#: ../newrole/newrole.c:488
 #, c-format
 msgid "Error: multiple roles specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:490
+#: ../newrole/newrole.c:498
 #, c-format
 msgid "Error: multiple types specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:498
+#: ../newrole/newrole.c:508
 #, c-format
 msgid "Sorry, -l may be used with SELinux MLS support.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:503
+#: ../newrole/newrole.c:515
 #, c-format
 msgid "Error: multiple levels specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:527
+#: ../newrole/newrole.c:537
 #, c-format
 msgid "Couldn't get default type.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:549
+#: ../newrole/newrole.c:559
 #, c-format
 msgid "failed to get old_context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:563
+#: ../newrole/newrole.c:572
 #, c-format
 msgid "failed to get new context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:586
+#: ../newrole/newrole.c:596
 #, c-format
 msgid "cannot find your entry in the passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:596
+#: ../newrole/newrole.c:606
 #, c-format
 msgid "Error!  Shell is not valid.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:603
+#: ../newrole/newrole.c:614
 #, c-format
 msgid "Error!  Could not retrieve tty information.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:607
+#: ../newrole/newrole.c:618
 #, c-format
 msgid "Authenticating %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:621
+#: ../newrole/newrole.c:632
 #, c-format
 msgid "newrole: incorrect password for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:645
+#: ../newrole/newrole.c:657
 #, c-format
 msgid "failed to set new role %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:657
+#: ../newrole/newrole.c:671
 #, c-format
 msgid "failed to set new type %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:670
+#: ../newrole/newrole.c:688
 #, c-format
 msgid "failed to build new range with level %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:674
+#: ../newrole/newrole.c:693
 #, c-format
 msgid "failed to set new range %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:688
+#: ../newrole/newrole.c:708
 #, c-format
 msgid "failed to convert new context to string\n"
 msgstr ""
 
-#: ../newrole/newrole.c:698
+#: ../newrole/newrole.c:717
 #, c-format
 msgid "%s is not a valid context\n"
 msgstr ""
 
-#: ../newrole/newrole.c:711
+#: ../newrole/newrole.c:730
 #, c-format
 msgid "Error!  Could not open %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:717
+#: ../newrole/newrole.c:738
 #, c-format
 msgid "%s!  Could not get current context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:728
+#: ../newrole/newrole.c:757
 #, c-format
 msgid "%s!  Could not get new context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:740
+#: ../newrole/newrole.c:771
 #, c-format
 msgid "%s!  Could not set new context for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:752
+#: ../newrole/newrole.c:784
 #, c-format
 msgid "newrole: failure forking: %s"
 msgstr ""
 
-#: ../newrole/newrole.c:754
+#: ../newrole/newrole.c:789
 #, c-format
 msgid "Warning!  Could not restore context for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:774
+#: ../newrole/newrole.c:810
 #, c-format
 msgid "%s changed labels.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:798
+#: ../newrole/newrole.c:834
 #, c-format
 msgid "Could not close descriptors.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:832 ../run_init/run_init.c:390
+#: ../newrole/newrole.c:869 ../run_init/run_init.c:397
 #, c-format
 msgid "Could not set exec context to %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:842
+#: ../newrole/newrole.c:881
 #, c-format
 msgid "Error connecting to audit system.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:847
+#: ../newrole/newrole.c:886
 #, c-format
 msgid "Error allocating memory.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:853
+#: ../newrole/newrole.c:892
 #, c-format
 msgid "Error sending audit message.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:864
+#: ../newrole/newrole.c:903
 msgid "failed to exec shell\n"
 msgstr ""
 
@@ -251,27 +251,27 @@
 "         <args ...> are the arguments to that script."
 msgstr ""
 
-#: ../run_init/run_init.c:264
+#: ../run_init/run_init.c:267
 #, c-format
 msgid "run_init: incorrect password for %s\n"
 msgstr ""
 
-#: ../run_init/run_init.c:295
+#: ../run_init/run_init.c:301
 #, c-format
 msgid "Could not open file %s\n"
 msgstr ""
 
-#: ../run_init/run_init.c:322
+#: ../run_init/run_init.c:328
 #, c-format
 msgid "No context in file %s\n"
 msgstr ""
 
-#: ../run_init/run_init.c:345
+#: ../run_init/run_init.c:353
 #, c-format
 msgid "Sorry, run_init may be used only on a SELinux kernel.\n"
 msgstr ""
 
-#: ../run_init/run_init.c:364
+#: ../run_init/run_init.c:372
 #, c-format
 msgid "authentication failed.\n"
 msgstr ""
Modified: trunk/policycoreutils/po/am.po
===================================================================
--- trunk/policycoreutils/po/am.po	2006-09-01 19:20:50 UTC (rev 2010)
+++ trunk/policycoreutils/po/am.po	2006-09-01 19:22:21 UTC (rev 2011)
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: PACKAGE VERSION\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2006-05-26 13:48-0400\n"
+"POT-Creation-Date: 2006-06-29 15:53-0400\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL...@li...>\n"
@@ -21,7 +21,7 @@
 msgid "usage:  %s [-bq]\n"
 msgstr ""
 
-#: ../load_policy/load_policy.c:62
+#: ../load_policy/load_policy.c:66
 #, c-format
 msgid "%s:  Can't load policy:  %s\n"
 msgstr ""
@@ -31,26 +31,26 @@
 msgid "Out of memory!\n"
 msgstr ""
 
-#: ../newrole/newrole.c:201 ../run_init/run_init.c:126
+#: ../newrole/newrole.c:199 ../run_init/run_init.c:126
 #, c-format
 msgid "failed to initialize PAM\n"
 msgstr ""
 
-#: ../newrole/newrole.c:212
+#: ../newrole/newrole.c:210
 #, c-format
 msgid "failed to set PAM_TTY\n"
 msgstr ""
 
-#: ../newrole/newrole.c:250 ../run_init/run_init.c:155
+#: ../newrole/newrole.c:246 ../run_init/run_init.c:154
 msgid "Password:"
 msgstr ""
 
-#: ../newrole/newrole.c:282 ../run_init/run_init.c:187
+#: ../newrole/newrole.c:281 ../run_init/run_init.c:189
 #, c-format
 msgid "Cannot find your entry in the shadow passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:288 ../run_init/run_init.c:193
+#: ../newrole/newrole.c:287 ../run_init/run_init.c:195
 #, c-format
 msgid "getpass cannot open /dev/tty\n"
 msgstr ""
@@ -60,187 +60,187 @@
 msgid "Error initing capabilities, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:367
+#: ../newrole/newrole.c:368
 #, c-format
 msgid "Error dropping capabilities, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:374
+#: ../newrole/newrole.c:375
 #, c-format
 msgid "Error changing uid, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:380
+#: ../newrole/newrole.c:382
 #, c-format
 msgid "Error resetting KEEPCAPS, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:386
+#: ../newrole/newrole.c:390
 #, c-format
 msgid "Error dropping SETUID capability, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:459
+#: ../newrole/newrole.c:463
 #, c-format
 msgid "Sorry, newrole may be used only on a SELinux kernel.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:464
+#: ../newrole/newrole.c:468
 #, c-format
 msgid "Could not determine enforcing mode.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:481
+#: ../newrole/newrole.c:488
 #, c-format
 msgid "Error: multiple roles specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:490
+#: ../newrole/newrole.c:498
 #, c-format
 msgid "Error: multiple types specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:498
+#: ../newrole/newrole.c:508
 #, c-format
 msgid "Sorry, -l may be used with SELinux MLS support.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:503
+#: ../newrole/newrole.c:515
 #, c-format
 msgid "Error: multiple levels specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:527
+#: ../newrole/newrole.c:537
 #, c-format
 msgid "Couldn't get default type.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:549
+#: ../newrole/newrole.c:559
 #, c-format
 msgid "failed to get old_context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:563
+#: ../newrole/newrole.c:572
 #, c-format
 msgid "failed to get new context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:586
+#: ../newrole/newrole.c:596
 #, c-format
 msgid "cannot find your entry in the passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:596
+#: ../newrole/newrole.c:606
 #, c-format
 msgid "Error!  Shell is not valid.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:603
+#: ../newrole/newrole.c:614
 #, c-format
 msgid "Error!  Could not retrieve tty information.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:607
+#: ../newrole/newrole.c:618
 #, c-format
 msgid "Authenticating %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:621
+#: ../newrole/newrole.c:632
 #, c-format
 msgid "newrole: incorrect password for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:645
+#: ../newrole/newrole.c:657
 #, c-format
 msgid "failed to set new role %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:657
+#: ../newrole/newrole.c:671
 #, c-format
 msgid "failed to set new type %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:670
+#: ../newrole/newrole.c:688
 #, c-format
 msgid "failed to build new range with level %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:674
+#: ../newrole/newrole.c:693
 #, c-format
 msgid "failed to set new range %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:688
+#: ../newrole/newrole.c:708
 #, c-format
 msgid "failed to convert new context to string\n"
 msgstr ""
 
-#: ../newrole/newrole.c:698
+#: ../newrole/newrole.c:717
 #, c-format
 msgid "%s is not a valid context\n"
 msgstr ""
 
-#: ../newrole/newrole.c:711
+#: ../newrole/newrole.c:730
 #, c-format
 msgid "Error!  Could not open %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:717
+#: ../newrole/newrole.c:738
 #, c-format
 msgid "%s!  Could not get current context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:728
+#: ../newrole/newrole.c:757
 #, c-format
 msgid "%s!  Could not get new context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:740
+#: ../newrole/newrole.c:771
 #, c-format
 msgid "%s!  Could not set new context for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:752
+#: ../newrole/newrole.c:784
 #, c-format
 msgid "newrole: failure forking: %s"
 msgstr ""
 
-#: ../newrole/newrole.c:754
+#: ../newrole/newrole.c:789
 #, c-format
 msgid "Warning!  Could not restore context for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:774
+#: ../newrole/newrole.c:810
 #, c-format
 msgid "%s changed labels.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:798
+#: ../newrole/newrole.c:834
 #, c-format
 msgid "Could not close descriptors.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:832 ../run_init/run_init.c:390
+#: ../newrole/newrole.c:869 ../run_init/run_init.c:397
 #, c-format
 msgid "Could not set exec context to %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:842
+#: ../newrole/newrole.c:881
 #, c-format
 msgid "Error connecting to audit system.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:847
+#: ../newrole/newrole.c:886
 #, c-format
 msgid "Error allocating memory.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:853
+#: ../newrole/newrole.c:892
 #, c-format
 msgid "Error sending audit message.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:864
+#: ../newrole/newrole.c:903
 msgid "failed to exec shell\n"
 msgstr ""
 
@@ -251,27 +251,27 @@
 "         <args ...> are the arguments to that script."
 msgstr ""
 
-#: ../run_init/run_init.c:264
+#: ../run_init/run_init.c:267
 #, c-format
 msgid "run_init: incorrect password for %s\n"
 msgstr ""
 
-#: ../run_init/run_init.c:295
+#: ../run_init/run_init.c:301
 #, c-format
 msgid "Could not open file %s\n"
 msgstr ""
 
-#: ../run_init/run_init.c:322
+#: ../run_init/run_init.c:328
 #, c-format
 msgid "No context in file %s\n"
 msgstr ""
 
-#: ../run_init/run_init.c:345
+#: ../run_init/run_init.c:353
 #, c-format
 msgid "Sorry, run_init may be used only on a SELinux kernel.\n"
 msgstr ""
 
-#: ../run_init/run_init.c:364
+#: ../run_init/run_init.c:372
 #, c-format
 msgid "authentication failed.\n"
 msgstr ""
Modified: trunk/policycoreutils/po/ar.po
===================================================================
--- trunk/policycoreutils/po/ar.po	2006-09-01 19:20:50 UTC (rev 2010)
+++ trunk/policycoreutils/po/ar.po	2006-09-01 19:22:21 UTC (rev 2011)
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: PACKAGE VERSION\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2006-05-26 13:48-0400\n"
+"POT-Creation-Date: 2006-06-29 15:53-0400\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL...@li...>\n"
@@ -21,7 +21,7 @@
 msgid "usage:  %s [-bq]\n"
 msgstr ""
 
-#: ../load_policy/load_policy.c:62
+#: ../load_policy/load_policy.c:66
 #, c-format
 msgid "%s:  Can't load policy:  %s\n"
 msgstr ""
@@ -31,26 +31,26 @@
 msgid "Out of memory!\n"
 msgstr ""
 
-#: ../newrole/newrole.c:201 ../run_init/run_init.c:126
+#: ../newrole/newrole.c:199 ../run_init/run_init.c:126
 #, c-format
 msgid "failed to initialize PAM\n"
 msgstr ""
 
-#: ../newrole/newrole.c:212
+#: ../newrole/newrole.c:210
 #, c-format
 msgid "failed to set PAM_TTY\n"
 msgstr ""
 
-#: ../newrole/newrole.c:250 ../run_init/run_init.c:155
+#: ../newrole/newrole.c:246 ../run_init/run_init.c:154
 msgid "Password:"
 msgstr ""
 
-#: ../newrole/newrole.c:282 ../run_init/run_init.c:187
+#: ../newrole/newrole.c:281 ../run_init/run_init.c:189
 #, c-format
 msgid "Cannot find your entry in the shadow passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:288 ../run_init/run_init.c:193
+#: ../newrole/newrole.c:287 ../run_init/run_init.c:195
 #, c-format
 msgid "getpass cannot open /dev/tty\n"
 msgstr ""
@@ -60,187 +60,187 @@
 msgid "Error initing capabilities, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:367
+#: ../newrole/newrole.c:368
 #, c-format
 msgid "Error dropping capabilities, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:374
+#: ../newrole/newrole.c:375
 #, c-format
 msgid "Error changing uid, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:380
+#: ../newrole/newrole.c:382
 #, c-format
 msgid "Error resetting KEEPCAPS, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:386
+#: ../newrole/newrole.c:390
 #, c-format
 msgid "Error dropping SETUID capability, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:459
+#: ../newrole/newrole.c:463
 #, c-format
 msgid "Sorry, newrole may be used only on a SELinux kernel.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:464
+#: ../newrole/newrole.c:468
 #, c-format
 msgid "Could not determine enforcing mode.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:481
+#: ../newrole/newrole.c:488
 #, c-format
 msgid "Error: multiple roles specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:490
+#: ../newrole/newrole.c:498
 #, c-format
 msgid "Error: multiple types specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:498
+#: ../newrole/newrole.c:508
 #, c-format
 msgid "Sorry, -l may be used with SELinux MLS support.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:503
+#: ../newrole/newrole.c:515
 #, c-format
 msgid "Error: multiple levels specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:527
+#: ../newrole/newrole.c:537
 #, c-format
 msgid "Couldn't get default type.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:549
+#: ../newrole/newrole.c:559
 #, c-format
 msgid "failed to get old_context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:563
+#: ../newrole/newrole.c:572
 #, c-format
 msgid "failed to get new context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:586
+#: ../newrole/newrole.c:596
 #, c-format
 msgid "cannot find your entry in the passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:596
+#: ../newrole/newrole.c:606
 #, c-format
 msgid "Error!  Shell is not valid.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:603
+#: ../newrole/newrole.c:614
 #, c-format
 msgid "Error!  Could not retrieve tty information.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:607
+#: ../newrole/newrole.c:618
 #, c-format
 msgid "Authenticating %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:621
+#: ../newrole/newrole.c:632
 #, c-format
 msgid "newrole: incorrect password for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:645
+#: ../newrole/newrole.c:657
 #, c-format
 msgid "failed to set new role %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:657
+#: ../newrole/newrole.c:671
 #, c-format
 msgid "failed to set new type %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:670
+#: ../newrole/newrole.c:688
 #, c-format
 msgid "failed to build new range with level %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:674
+#: ../newrole/newrole.c:693
 #, c-format
 msgid "failed to set new range %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:688
+#: ../newrole/newrole.c:708
 #, c-format
 msgid "failed to convert new context to string\n"
 msgstr ""
 
-#: ../newrole/newrole.c:698
+#: ../newrole/newrole.c:717
 #, c-format
 msgid "%s is not a valid context\n"
 msgstr ""
 
-#: ../newrole/newrole.c:711
+#: ../newrole/newrole.c:730
 #, c-format
 msgid "Error!  Could not open %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:717
+#: ../newrole/newrole.c:738
 #, c-format
 msgid "%s!  Could not get current context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:728
+#: ../newrole/newrole.c:757
 #, c-format
 msgid "%s!  Could not get new context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:740
+#: ../newrole/newrole.c:771
 #, c-format
 msgid "%s!  Could not set new context for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:752
+#: ../newrole/newrole.c:784
 #, c-format
 msgid "newrole: failure forking: %s"
 msgstr ""
 
-#: ../newrole/newrole.c:754
+#: ../newrole/newrole.c:789
 #, c-format
 msgid "Warning!  Could not restore context for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:774
+#: ../newrole/newrole.c:810
 #, c-format
 msgid "%s changed labels.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:798
+#: ../newrole/newrole.c:834
 #, c-format
 msgid "Could not close descriptors.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:832 ../run_init/run_init.c:390
+#: ../newrole/newrole.c:869 ../run_init/run_init.c:397
 #, c-format
 msgid "Could not set exec context to %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:842
+#: ../newrole/newrole.c:881
 #, c-format
 msgid "Error connecting to audit system.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:847
+#: ../newrole/newrole.c:886
 #, c-format
 msgid "Error allocating memory.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:853
+#: ../newrole/newrole.c:892
 #, c-format
 msgid "Error sending audit message.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:864
+#: ../newrole/newrole.c:903
 msgid "failed to exec shell\n"
 msgstr ""
 
@@ -251,27 +251,27 @@
 "         <args ...> are the arguments to that script."
 msgstr ""
 
-#: ../run_init/run_init.c:264
+#: ../run_init/run_init.c:267
 #, c-format
 msgid "run_init: incorrect password for %s\n"
 msgstr ""
 
-#: ../run_init/run_init.c:295
+#: ../run_init/run_init.c:301
 #, c-format
 msgid "Could not open file %s\n"
 msgstr ""
 
-#: ../run_init/run_init.c:322
+#: ../run_init/run_init.c:328
 #, c-format
 msgid "No context in file %s\n"
 msgstr ""
 
-#: ../run_init/run_init.c:345
+#: ../run_init/run_init.c:353
 #, c-format
 msgid "Sorry, run_init may be used only on a SELinux kernel.\n"
 msgstr ""
 
-#: ../run_init/run_init.c:364
+#: ../run_init/run_init.c:372
 #, c-format
 msgid "authentication failed.\n"
 msgstr ""
Modified: trunk/policycoreutils/po/be.po
===================================================================
--- trunk/policycoreutils/po/be.po	2006-09-01 19:20:50 UTC (rev 2010)
+++ trunk/policycoreutils/po/be.po	2006-09-01 19:22:21 UTC (rev 2011)
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: PACKAGE VERSION\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2006-05-26 13:48-0400\n"
+"POT-Creation-Date: 2006-06-29 15:53-0400\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL...@li...>\n"
@@ -21,7 +21,7 @@
 msgid "usage:  %s [-bq]\n"
 msgstr ""
 
-#: ../load_policy/load_policy.c:62
+#: ../load_policy/load_policy.c:66
 #, c-format
 msgid "%s:  Can't load policy:  %s\n"
 msgstr ""
@@ -31,26 +31,26 @@
 msgid "Out of memory!\n"
 msgstr ""
 
-#: ../newrole/newrole.c:201 ../run_init/run_init.c:126
+#: ../newrole/newrole.c:199 ../run_init/run_init.c:126
 #, c-format
 msgid "failed to initialize PAM\n"
 msgstr ""
 
-#: ../newrole/newrole.c:212
+#: ../newrole/newrole.c:210
 #, c-format
 msgid "failed to set PAM_TTY\n"
 msgstr ""
 
-#: ../newrole/newrole.c:250 ../run_init/run_init.c:155
+#: ../newrole/newrole.c:246 ../run_init/run_init.c:154
 msgid "Password:"
 msgstr ""
 
-#: ../newrole/newrole.c:282 ../run_init/run_init.c:187
+#: ../newrole/newrole.c:281 ../run_init/run_init.c:189
 #, c-format
 msgid "Cannot find your entry in the shadow passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:288 ../run_init/run_init.c:193
+#: ../newrole/newrole.c:287 ../run_init/run_init.c:195
 #, c-format
 msgid "getpass cannot open /dev/tty\n"
 msgstr ""
@@ -60,187 +60,187 @@
 msgid "Error initing capabilities, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:367
+#: ../newrole/newrole.c:368
 #, c-format
 msgid "Error dropping capabilities, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:374
+#: ../newrole/newrole.c:375
 #, c-format
 msgid "Error changing uid, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:380
+#: ../newrole/newrole.c:382
 #, c-format
 msgid "Error resetting KEEPCAPS, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:386
+#: ../newrole/newrole.c:390
 #, c-format
 msgid "Error dropping SETUID capability, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:459
+#: ../newrole/newrole.c:463
 #, c-format
 msgid "Sorry, newrole may be used only on a SELinux kernel.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:464
+#: ../newrole/newrole.c:468
 #, c-format
 msgid "Could not determine enforcing mode.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:481
+#: ../newrole/newrole.c:488
 #, c-format
 msgid "Error: multiple roles specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:490
+#: ../newrole/newrole.c:498
 #, c-format
 msgid "Error: multiple types specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:498
+#: ../newrole/newrole.c:508
 #, c-format
 msgid "Sorry, -l may be used with SELinux MLS support.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:503
+#: ../newrole/newrole.c:515
 #, c-format
 msgid "Error: multiple levels specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:527
+#: ../newrole/newrole.c:537
 #, c-format
 msgid "Couldn't get default type.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:549
+#: ../newrole/newrole.c:559
 #, c-format
 msgid "failed to get old_context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:563
+#: ../newrole/newrole.c:572
 #, c-format
 msgid "failed to get new context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:586
+#: ../newrole/newrole.c:596
 #, c-format
 msgid "cannot find your entry in the passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:596
+#: ../newrole/newrole.c:606
 #, c-format
 msgid "Error!  Shell is not valid.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:603
+#: ../newrole/newrole.c:614
 #, c-format
 msgid "Error!  Could not retrieve tty information.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:607
+#: ../newrole/newrole.c:618
 #, c-format
 msgid "Authenticating %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:621
+#: ../newrole/newrole.c:632
 #, c-format
 msgid "newrole: incorrect password for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:645
+#: ../newrole/newrole.c:657
 #, c-format
 msgid "failed to set new role %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:657
+#: ../newrole/newrole.c:671
 #, c-format
 msgid "failed to set new type %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:670
+#: ../newrole/newrole.c:688
 #, c-format
 msgid "failed to build new range with level %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:674
+#: ../newrole/newrole.c:693
 #, c-format
 msgid "failed to set new range %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:688
+#: ../newrole/newrole.c:708
 #, c-format
 msgid "failed to convert new context to string\n"
 msgstr ""
 
-#: ../newrole/newrole.c:698
+#: ../newrole/newrole.c:717
 #, c-format
 msgid "%s is not a valid context\n"
 msgstr ""
 
-#: ../newrole/newrole.c:711
+#: ../newrole/newrole.c:730
 #, c-format
 msgid "Error!  Could not open %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:717
+#: ../newrole/newrole.c:738
 #, c-format
 msgid "%s!  Could not get current context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:728
+#: ../newrole/newrole.c:757
 #, c-format
 msgid "%s!  Could not get new context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:740
+#: ../newrole/newrole.c:771
 #, c-format
 msgid "%s!  Could not set new context for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:752
+#: ../newrole/newrole.c:...
 
[truncated message content] | 
| 
      
      
      From: <ssm...@us...> - 2006-09-01 19:25:46
       | 
| Revision: 2012
          http://svn.sourceforge.net/selinux/?rev=2012&view=rev
Author:   ssmalley
Date:     2006-09-01 12:25:42 -0700 (Fri, 01 Sep 2006)
Log Message:
-----------
policycoreutils 1.30.28
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-09-01 19:22:21 UTC (rev 2011)
+++ trunk/policycoreutils/ChangeLog	2006-09-01 19:25:42 UTC (rev 2012)
@@ -1,3 +1,7 @@
+1.30.28 2006-09-01
+	* Merged fix for restorecon // handling from Erich Schubert.
+	* Merged translations update and fixfiles fix from Dan Walsh.
+
 1.30.27 2006-08-24
 	* Merged fix for restorecon symlink handling from Erich Schubert.
 
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2006-09-01 19:22:21 UTC (rev 2011)
+++ trunk/policycoreutils/VERSION	2006-09-01 19:25:42 UTC (rev 2012)
@@ -1 +1 @@
-1.30.27
+1.30.28
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <mad...@us...> - 2006-09-13 21:30:12
       | 
| Revision: 2030
          http://svn.sourceforge.net/selinux/?rev=2030&view=rev
Author:   madmethod
Date:     2006-09-13 14:29:58 -0700 (Wed, 13 Sep 2006)
Log Message:
-----------
Author: Daniel J Walsh
Email: dw...@re...
Subject: Latest policycoreutils.patch
Date: Wed, 13 Sep 2006 13:54:48 -0400
This patch include simple man page fixes and changes the way python 
scripts run to make the somewhat more secure.
Also fixes some missing getopt flags.
Acked-By: Joshua Brindle <jbr...@tr...>
Acked-by:  Stephen Smalley <sd...@ty...>
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
    trunk/policycoreutils/audit2allow/audit2allow
    trunk/policycoreutils/audit2allow/avc.py
    trunk/policycoreutils/restorecond/restorecond.init
    trunk/policycoreutils/scripts/chcat
    trunk/policycoreutils/scripts/genhomedircon
    trunk/policycoreutils/secon/Makefile
    trunk/policycoreutils/semanage/semanage
    trunk/policycoreutils/semanage/semanage.8
    trunk/policycoreutils/semanage/seobject.py
    trunk/policycoreutils/semodule_link/semodule_link.8
    trunk/policycoreutils/semodule_package/semodule_package.8
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/ChangeLog	2006-09-13 21:29:58 UTC (rev 2030)
@@ -1,3 +1,8 @@
+1.30.29 2006-09-13
+	* Man page corrections from Dan Walsh
+	* Change all python invocations to /usr/bin/python -E
+	* Add missing getopt flags to genhomedircon
+
 1.30.28 2006-09-01
 	* Merged fix for restorecon // handling from Erich Schubert.
 	* Merged translations update and fixfiles fix from Dan Walsh.
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/VERSION	2006-09-13 21:29:58 UTC (rev 2030)
@@ -1 +1 @@
-1.30.28
+1.30.29
Modified: trunk/policycoreutils/audit2allow/audit2allow
===================================================================
--- trunk/policycoreutils/audit2allow/audit2allow	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/audit2allow/audit2allow	2006-09-13 21:29:58 UTC (rev 2030)
@@ -1,4 +1,4 @@
-#! /usr/bin/env python
+#! /usr/bin/python -E
 # Copyright (C) 2005 Red Hat 
 # see file 'COPYING' for use and warranty information
 #
Modified: trunk/policycoreutils/audit2allow/avc.py
===================================================================
--- trunk/policycoreutils/audit2allow/avc.py	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/audit2allow/avc.py	2006-09-13 21:29:58 UTC (rev 2030)
@@ -1,4 +1,4 @@
-#! /usr/bin/env python
+#! /usr/bin/python -E
 # Copyright (C) 2006 Red Hat 
 # see file 'COPYING' for use and warranty information
 #
Modified: trunk/policycoreutils/restorecond/restorecond.init
===================================================================
--- trunk/policycoreutils/restorecond/restorecond.init	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/restorecond/restorecond.init	2006-09-13 21:29:58 UTC (rev 2030)
@@ -3,9 +3,9 @@
 # restorecond:		Daemo used to maintain path file context
 #
 # chkconfig:	2345 10 90
-# description:	restorecond uses inotify to look for creation of new files listed in the 
-#               /etc/selinux/POLICYTYPE/restorefiles.conf file, and sets the correct security 
-#               context.
+# description:	restorecond uses inotify to look for creation of new files \
+# listed in the /etc/selinux/restorecond.conf file, and restores the \
+# correct security context.
 #
 
 # Source function library.
Modified: trunk/policycoreutils/scripts/chcat
===================================================================
--- trunk/policycoreutils/scripts/chcat	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/scripts/chcat	2006-09-13 21:29:58 UTC (rev 2030)
@@ -1,4 +1,4 @@
-#! /usr/bin/env python
+#! /usr/bin/python -E
 # Copyright (C) 2005 Red Hat 
 # see file 'COPYING' for use and warranty information
 #
Modified: trunk/policycoreutils/scripts/genhomedircon
===================================================================
--- trunk/policycoreutils/scripts/genhomedircon	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/scripts/genhomedircon	2006-09-13 21:29:58 UTC (rev 2030)
@@ -1,4 +1,4 @@
-#! /usr/bin/python
+#! /usr/bin/python -E
 # Copyright (C) 2004 Tresys Technology, LLC
 # see file 'COPYING' for use and warranty information
 #
@@ -356,7 +356,7 @@
 	usepwd = 1
 	directory = "/etc/selinux"
 	type = None
-	gopts, cmds = getopt.getopt(sys.argv[1:], 'nd:t:', ['help',
+	gopts, cmds = getopt.getopt(sys.argv[1:], 'hnd:t:', ['help',
 						'type=',
 						'nopasswd',
 						'dir='])
@@ -367,7 +367,7 @@
 			usepwd = 0
 		if o == '--dir'  or o == "-d":
 			directory = a
-		if o == '--help':
+		if o == '--help'  or o == "-h":
 			usage()
 
 
Modified: trunk/policycoreutils/secon/Makefile
===================================================================
--- trunk/policycoreutils/secon/Makefile	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/secon/Makefile	2006-09-13 21:29:58 UTC (rev 2030)
@@ -20,8 +20,8 @@
 install: all
 	install -m 755 secon $(BINDIR);
 
-#	test -d $(MANDIR)/man1 || install -m 755 -d $(MANDIR)/man1
-#	install -m 644 ../man/secon.1 $(MANDIR)/man1
+	test -d $(MANDIR)/man1 || install -m 755 -d $(MANDIR)/man1
+	install -m 644 secon.1 $(MANDIR)/man1
 
 relabel:
 	/sbin/restorecon $(BINDIR)/secon
Modified: trunk/policycoreutils/semanage/semanage
===================================================================
--- trunk/policycoreutils/semanage/semanage	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/semanage/semanage	2006-09-13 21:29:58 UTC (rev 2030)
@@ -1,4 +1,4 @@
-#! /usr/bin/env python
+#! /usr/bin/python -E
 # Copyright (C) 2005 Red Hat 
 # see file 'COPYING' for use and warranty information
 #
Modified: trunk/policycoreutils/semanage/semanage.8
===================================================================
--- trunk/policycoreutils/semanage/semanage.8	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/semanage/semanage.8	2006-09-13 21:29:58 UTC (rev 2030)
@@ -88,9 +88,9 @@
 # View SELinux user mappings
 $ semanage user -l
 # Allow joe to login as staff_u
-$ semanage login -a -s staff_u
+$ semanage login -a -s staff_u joe
 # Add file-context for everything under /web (used by restorecon)
-$ semanage fcontext -a -t httpd_sys_content_t '/web(/.*)?'
+$ semanage fcontext -a -t httpd_sys_content_t "/web(/.*)?"
 # Allow Apache to listen on port 81
 $ semanage port -a -t http_port_t -p tcp 81
 .fi
Modified: trunk/policycoreutils/semanage/seobject.py
===================================================================
--- trunk/policycoreutils/semanage/seobject.py	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/semanage/seobject.py	2006-09-13 21:29:58 UTC (rev 2030)
@@ -1,4 +1,4 @@
-#! /usr/bin/env python
+#! /usr/bin/python -E
 # Copyright (C) 2005 Red Hat 
 # see file 'COPYING' for use and warranty information
 #
Modified: trunk/policycoreutils/semodule_link/semodule_link.8
===================================================================
--- trunk/policycoreutils/semodule_link/semodule_link.8	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/semodule_link/semodule_link.8	2006-09-13 21:29:58 UTC (rev 2030)
@@ -3,7 +3,7 @@
 semodule_link \- Link SELinux policy module packages together
 
 .SH SYNOPSIS
-.B semodule_link [-V] [-o outfile] basemodpkg modpkg1 [modpkg2]...
+.B semodule_link [-Vv] [-o outfile] basemodpkg modpkg1 [modpkg2]...
 .br
 .SH DESCRIPTION
 .PP
@@ -17,9 +17,12 @@
 .SH "OPTIONS"
 .TP
 .B \-V
+show version
+.TP
+.B \-v
 verbose mode
 .TP
-.B \-o \-\-outfile <output file> 
+.B \-o <output file> 
 Linked policy module package generated by this tool.
 
 
Modified: trunk/policycoreutils/semodule_package/semodule_package.8
===================================================================
--- trunk/policycoreutils/semodule_package/semodule_package.8	2006-09-13 15:14:00 UTC (rev 2029)
+++ trunk/policycoreutils/semodule_package/semodule_package.8	2006-09-13 21:29:58 UTC (rev 2030)
@@ -28,11 +28,20 @@
 .B \-o \-\-outfile <output file> 
 Policy module package file generated by this tool.
 .TP
+.B  \-s \-\-seuser <seuser file>
+seuser file to be included in the package.
+.TP
+.B  \-u \-\-user_extra <user extra file>
+user_extra file to be included in the package.
+.TP
 .B  \-m \-\-module <Module file>
 Policy module file to be included in the package.
 .TP
 .B  \-f \-\-fc	<File context file>
 File contexts file for the module (optional).
+.TP
+.B  \-n \-\-nc <netfilter context file>
+netfilter context file to be included in the package.
 
 .SH SEE ALSO
 .B checkmodule(8), semodule(8)
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2006-09-29 15:27:31
       | 
| Revision: 2043
          http://svn.sourceforge.net/selinux/?rev=2043&view=rev
Author:   ssmalley
Date:     2006-09-29 08:27:26 -0700 (Fri, 29 Sep 2006)
Log Message:
-----------
Author: Michael C Thompson
Email: tho...@us...
Subject: -v3 newrole auditing of failures due to user actions
Date: Thu, 28 Sep 2006 16:50:26 -0500
This patch introduces two new point in the code where audit records are 
generated for newrole. Both points are when the attempt to newrole fails.
The first point is when the default type could not be determine for the 
specified role - this is audited because, as sgrubb pointed out, it is 
currently non-tracked path to probe the policy.
The second point is when the desired context to change to is invalid.
There record format remains unchanged. Failing to validate the desired 
context will result in the old and new contexts being recorded intact to 
the log. For the default type, the old and new contexts have not yet 
been obtained, so they are recorded in the log as XXX_context=?
Changes since version 2 of the patch:
  * Added __attribute__((unused)) to "no-op" inline
Changes since version 1 of the patch:
  * removed wrapping #ifdefs around send_audit_message()
  * provided a "no-op" style function
  * removed -D_GNU_SOURCE from the Makefile (as its defined in the code)
  * fixed the error path of the send_audit_message function
The solution that I have for the "no-op" function is not that pretty, 
but the Makefile is configured with -Werror and a function which doesn't 
use its parameters causes warnings. Is there a better solution to this 
problem?
Signed-off-by: Michael Thompson <tho...@us...>
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/newrole/Makefile
    trunk/policycoreutils/newrole/newrole.c
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-09-29 15:00:58 UTC (rev 2042)
+++ trunk/policycoreutils/ChangeLog	2006-09-29 15:27:26 UTC (rev 2043)
@@ -1,3 +1,6 @@
+	* Merged newrole auditing of failures due to user actions from
+	  Michael Thompson.
+
 1.30.29 2006-09-13
 	* Man page corrections from Dan Walsh
 	* Change all python invocations to /usr/bin/python -E
Modified: trunk/policycoreutils/newrole/Makefile
===================================================================
--- trunk/policycoreutils/newrole/Makefile	2006-09-29 15:00:58 UTC (rev 2042)
+++ trunk/policycoreutils/newrole/Makefile	2006-09-29 15:27:26 UTC (rev 2043)
@@ -27,7 +27,7 @@
 	LDLIBS += -laudit
 endif
 ifeq (${LOG_AUDIT_PRIV},y)
-	override CFLAGS += -DLOG_AUDIT_PRIV -D_GNU_SOURCE
+	override CFLAGS += -DLOG_AUDIT_PRIV
 	LDLIBS += -lcap
 	MODE := 4555
 else
Modified: trunk/policycoreutils/newrole/newrole.c
===================================================================
--- trunk/policycoreutils/newrole/newrole.c	2006-09-29 15:00:58 UTC (rev 2042)
+++ trunk/policycoreutils/newrole/newrole.c	2006-09-29 15:27:26 UTC (rev 2043)
@@ -396,6 +396,51 @@
 }
 #endif
 
+#ifdef LOG_AUDIT_PRIV
+/* Send audit message */
+static
+int send_audit_message(int success, security_context_t old_context,
+		       security_context_t new_context, const char *ttyn)
+{
+	char *msg = NULL;
+	int rc;
+	int audit_fd = audit_open();
+
+	if (audit_fd < 0) {
+		fprintf(stderr, _("Error connecting to audit system.\n"));
+		return -1;
+	}
+	if (asprintf(&msg, "newrole: old-context=%s new-context=%s",
+				old_context ? old_context : "?",
+				new_context ? new_context : "?") < 0) {
+		fprintf(stderr, _("Error allocating memory.\n"));
+		rc = -1;
+		goto out;
+	}
+	rc = audit_log_user_message(audit_fd, AUDIT_USER_ROLE_CHANGE,
+			msg, NULL, NULL, ttyn, success);
+	if (rc <= 0) {
+		fprintf(stderr, _("Error sending audit message.\n"));
+		rc = -1;
+		goto out;
+	}
+	rc = 0;
+out:
+	free(msg);
+	close(audit_fd);
+	return rc;
+}
+#else
+static inline
+int send_audit_message(int success __attribute__((unused)),
+		       security_context_t old_context __attribute__((unused)),
+		       security_context_t new_context __attribute__((unused)),
+		       const char *ttyn __attribute__((unused)))
+{
+	return 0;
+}
+#endif
+
 /************************************************************************
  *
  * All code used for both PAM and shadow passwd goes in this section.
@@ -536,6 +581,7 @@
 	if (role_s && !type_s) {
 		if (get_default_type(role_s, &type_s)) {
 			fprintf(stderr, _("Couldn't get default type.\n"));
+			send_audit_message(0, old_context, new_context, ttyn);
 			exit(-1);
 		}
 #ifdef CANTSPELLGDB
@@ -715,6 +761,7 @@
 
 	if (security_check_context(new_context) < 0) {
 		fprintf(stderr, _("%s is not a valid context\n"), new_context);
+		send_audit_message(0, old_context, new_context, ttyn);
 		exit(-1);
 	}
 
@@ -873,32 +920,8 @@
 			new_context);
 		exit(-1);
 	}
-#ifdef LOG_AUDIT_PRIV
-	/* Send audit message */
-	{
-		char *msg;
-		int rc;
-		int audit_fd = audit_open();
-		if (audit_fd < 0) {
-			fprintf(stderr,
-				_("Error connecting to audit system.\n"));
-			exit(-1);
-		}
-		if (asprintf(&msg, "newrole: old-context=%s new-context=%s",
-			     old_context, new_context) < 0) {
-			fprintf(stderr, _("Error allocating memory.\n"));
-			exit(-1);
-		}
-		rc = audit_log_user_message(audit_fd, AUDIT_USER_ROLE_CHANGE,
-					    msg, NULL, NULL, ttyn, 1);
-		if (rc <= 0) {
-			fprintf(stderr, _("Error sending audit message.\n"));
-			exit(-1);
-		}
-		free(msg);
-		close(audit_fd);
-	}
-#endif
+	if (send_audit_message(1, old_context, new_context, ttyn))
+		exit(-1);
 	freecon(old_context);
 	execv(pw->pw_shell, argv + optind - 1);
 
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2006-10-17 15:10:12
       | 
| Revision: 2056
          http://svn.sourceforge.net/selinux/?rev=2056&view=rev
Author:   ssmalley
Date:     2006-10-17 08:10:06 -0700 (Tue, 17 Oct 2006)
Log Message:
-----------
Bump version
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-10-17 15:03:32 UTC (rev 2055)
+++ trunk/policycoreutils/ChangeLog	2006-10-17 15:10:06 UTC (rev 2056)
@@ -1,3 +1,9 @@
+1.30.31 2006-10-17
+	* Merged audit2allow -l fix from Yuichi Nakamura.
+	* Merged restorecon -i and -o - support from Karl MacMillan.
+	* Merged semanage/seobject fix from Dan Walsh.
+	* Merged fixfiles -R and verify changes from Dan Walsh.
+
 1.30.30 2006-09-29
 	* Merged newrole auditing of failures due to user actions from
 	  Michael Thompson.
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2006-10-17 15:03:32 UTC (rev 2055)
+++ trunk/policycoreutils/VERSION	2006-10-17 15:10:06 UTC (rev 2056)
@@ -1 +1 @@
-1.30.30
+1.30.31
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2006-11-14 00:08:41
       | 
| Revision: 2085
          http://svn.sourceforge.net/selinux/?rev=2085&view=rev
Author:   ssmalley
Date:     2006-11-13 16:08:39 -0800 (Mon, 13 Nov 2006)
Log Message:
-----------
policycoreutils 1.33.1
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-11-13 23:59:04 UTC (rev 2084)
+++ trunk/policycoreutils/ChangeLog	2006-11-14 00:08:39 UTC (rev 2085)
@@ -1,3 +1,6 @@
+1.33.1 2006-11-13
+	* Merged newrole patch set from Michael Thompson.
+
 1.32 2006-10-17
 	* Updated version for release.
 
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2006-11-13 23:59:04 UTC (rev 2084)
+++ trunk/policycoreutils/VERSION	2006-11-14 00:08:39 UTC (rev 2085)
@@ -1 +1 @@
-1.32
+1.33.1
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <kma...@us...> - 2006-11-20 17:06:21
       | 
| Revision: 2093
          http://svn.sourceforge.net/selinux/?rev=2093&view=rev
Author:   kmacmillan
Date:     2006-11-20 09:05:57 -0800 (Mon, 20 Nov 2006)
Log Message:
-----------
Author: Karl MacMillan
Email: kma...@me...
Subject: Multiple small fixes to policycoreutils
Date: Thu, 16 Nov 2006 17:15:15 -0500
Joshua Brindle wrote:
>> From: Karl MacMillan [mailto:kma...@me...] 
>>
>> Daniel J Walsh wrote:
>>> Joshua Brindle wrote:
>>>> Karl MacMillan wrote:
>> <snip>
>>
>>>>> What about a top-level USE_PIE makefile variable that directs all 
>>>>> sub-Makefiles to set PIE flags if appropriate for that module? By 
>>>>> default it would be off. This gets the behavior you want without 
>>>>> having to carry a patch and keeps the current behavior.
>>>>>
>>>> No patch necessary, like Chris said make CFLAGS="-fPIE -02 -Werror 
>>>> -Wall" LDFLAGS="-pie"
>>>>
>>>> done and done.
>>>>
>>> No, because then all compiled apps become -pie.  We only 
>> want this on 
>>> the daemons.
>>>
>> What about this instead?
> 
> Why doesn't make CFLAGS="-fPIE -02 -Werror -Wall" LDFLAGS="-pie" work? 
> Why does it matter if everything is built pie?
> 
There are performance costs associated with pie, particularly at 
startup. Talking to Dan though, he doesn't think it is enough to not 
just build everything as pie.
Resend below that I will apply unless there are other objections.
> This is distro specific (gentoo completely overrides the CFLAGS and
> LDFLAGS, I'm not sure what debian does). I don't think whether or not to
> override the user CFLAGS with non-critical things (e.g., things
> necessary to build the app like -I($PREFIX)/include) is appropriate for
> the upstream makefiles.
> 
> For that matter, anyone know why -D_FILE_OFFSET_BITS=64 is in the
> override?
> 
I wondered that as well - Dan?
Karl
Signed-off by: Karl MacMillan <kma...@me...> 
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/newrole/newrole.c
    trunk/policycoreutils/restorecond/restorecond.conf
    trunk/policycoreutils/scripts/genhomedircon.8
    trunk/policycoreutils/semanage/semanage.8
    trunk/policycoreutils/semodule_expand/semodule_expand.8
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-11-14 00:25:28 UTC (rev 2092)
+++ trunk/policycoreutils/ChangeLog	2006-11-20 17:05:57 UTC (rev 2093)
@@ -1,3 +1,9 @@
+1.33.2 2006-11-20
+	* Merged patch from Dan Walsh (via Karl MacMillan):
+	  * Added newrole audit message on login failure
+	  * Add /var/log/wtmp to restorecond.conf watch list
+	  * Fix genhomedircon, semanage, semodule_expand man pages.
+	
 1.33.1 2006-11-13
 	* Merged newrole patch set from Michael Thompson.
 
Modified: trunk/policycoreutils/newrole/newrole.c
===================================================================
--- trunk/policycoreutils/newrole/newrole.c	2006-11-14 00:25:28 UTC (rev 2092)
+++ trunk/policycoreutils/newrole/newrole.c	2006-11-20 17:05:57 UTC (rev 2093)
@@ -1028,6 +1028,7 @@
 	{
 		fprintf(stderr, _("newrole: incorrect password for %s\n"),
 			pw.pw_name);
+		send_audit_message(0, old_context, new_context, ttyn);
 		goto err_close_pam;
 	}
 
Modified: trunk/policycoreutils/restorecond/restorecond.conf
===================================================================
--- trunk/policycoreutils/restorecond/restorecond.conf	2006-11-14 00:25:28 UTC (rev 2092)
+++ trunk/policycoreutils/restorecond/restorecond.conf	2006-11-20 17:05:57 UTC (rev 2093)
@@ -2,5 +2,6 @@
 /etc/samba/secrets.tdb
 /etc/mtab
 /var/run/utmp
+/var/log/wtmp
 ~/public_html
 ~/.mozilla/plugins/libflashplayer.so
Modified: trunk/policycoreutils/scripts/genhomedircon.8
===================================================================
--- trunk/policycoreutils/scripts/genhomedircon.8	2006-11-14 00:25:28 UTC (rev 2092)
+++ trunk/policycoreutils/scripts/genhomedircon.8	2006-11-20 17:05:57 UTC (rev 2093)
@@ -45,35 +45,30 @@
 .SH DESCRIPTION
 .PP
 This utility is used to generate file context configuration entries for 
-user home directories based on their default roles and is run when building 
-the policy. It can also be run when ever the 
-.I /etc/selinux/<<SELINUXTYPE>>/users/local.users
-file is changed 
+user home directories based on their 
+.B prefix 
+entry in the the 
+.B semanage user record.  
+genhomedircon is run when building 
+the policy. It is also run automaticaly when ever the 
+.B semanage 
+utility modifies 
+.B user
+or
+.B login
+records.
 Specifically, we replace HOME_ROOT, HOME_DIR, and ROLE macros in the 
 .I /etc/selinux/<<SELINUXTYPE>>/contexts/files/homedir_template 
-file with generic and user-specific values.
-.I local.users
-file. If a user has more than one role in 
-.I local.users,
-.B genhomedircon
-uses the first role in the list. 
+file with generic and user-specific values.  HOME_ROOT and HOME_DIR is replaced with each distinct location where login users homedirectories are located.  Defaults to /home. ROLE is replaced based on the prefix entry in the 
+.B user
+record.
 .PP 
-If a user is not listed in 
-.I local.users,
-.B genhomedircon
-assumes that the user's home dir will be found in one of the
-HOME_ROOTs. 
-When looking for these users, 
-.B genhomedircon
-only considers real users. "Real" users (as opposed
-to system users) are those whose UID is greater than or equal 
+genhomedircon searches through all password entires for all "login" user home directories, (as opposed
+to system users).  Login users are those whose UID is greater than or equal 
 .I STARTING_UID
 (default 500) and whose login shell is not "/sbin/nologin", or
 "/bin/false". 
 .PP 
-Users who are explicitly defined in 
-.I local.users,
-are always "real" (including root, in the default configuration).
 .SH AUTHOR
 This manual page was originally written by 
 .I Manoj Srivastava <sri...@de...>,
Modified: trunk/policycoreutils/semanage/semanage.8
===================================================================
--- trunk/policycoreutils/semanage/semanage.8	2006-11-14 00:25:28 UTC (rev 2092)
+++ trunk/policycoreutils/semanage/semanage.8	2006-11-20 17:05:57 UTC (rev 2093)
@@ -7,7 +7,7 @@
 .br
 .B semanage login \-{a|d|m} [\-sr] login_name
 .br
-.B semanage user \-{a|d|m} [\-LrR] selinux_name
+.B semanage user \-{a|d|m} [\-LrRP] selinux_name
 .br
 .B semanage port \-{a|d|m} [\-tr] [\-p protocol] port | port_range
 .br
@@ -71,6 +71,9 @@
 .I                \-R, \-\-role
 SELinux Roles.  You must enclose multiple roles within quotes, separate by spaces. Or specify \-R multiple times.
 .TP
+.I                \-P, \-\-prefix
+SELinux Prefix.  Prefix added to home_dir_t and home_t for labeling users home directories.
+.TP
 .I                \-s, \-\-seuser     
 SELinux user name
 .TP
Modified: trunk/policycoreutils/semodule_expand/semodule_expand.8
===================================================================
--- trunk/policycoreutils/semodule_expand/semodule_expand.8	2006-11-14 00:25:28 UTC (rev 2092)
+++ trunk/policycoreutils/semodule_expand/semodule_expand.8	2006-11-20 17:05:57 UTC (rev 2093)
@@ -18,7 +18,7 @@
 .SH "OPTIONS"
 .TP
 .B \-V
-verbose mode
+show version
 .TP
 .B \-c [version]
 policy version to create
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2006-11-21 20:53:19
       | 
| Revision: 2096
          http://svn.sourceforge.net/selinux/?rev=2096&view=rev
Author:   ssmalley
Date:     2006-11-21 12:52:25 -0800 (Tue, 21 Nov 2006)
Log Message:
-----------
Author: Karl MacMillan
Email: kma...@me...
Subject: Question about setsebool.c
Date: Mon, 20 Nov 2006 15:04:10 -0500
Joshua Brindle wrote:
> Karl MacMillan wrote:
>> Yuichi Nakamura wrote:
>>> Hi, I looked at the latest policycoreutils code.
>>> (policycoreutils-1.33.1-9.fc7.src.rpm)
>>>
>>> And found strange code, in setsebool.c.
>>>
>>>     94  /* Apply (permanent) boolean changes to policy via 
>>> libsemanage */
>>>     95  static int semanage_set_boolean_list(size_t boolcnt,
>>>     96                                       SELboolean * boollist, 
>>> int perm)
>>>     97  {
>>>    <snip>
>>>    117          } else if (managed == 0) {
>>>    118                  if (selinux_set_boolean_list(boolcnt, 
>>> boollist, 1) < 0)
>>>    119                          goto err;
>>>    120                  goto out;
>>>    121          }
>>>
>>> Why 3rd arg for selinux_set_boolean_list is "1"?
>>> Should it be "perm"?
>>>
>>
>> Looks that way to me. Additionally, is it even possible to make 
>> non-permanent change to a boolean via semanage? If not, then this code 
>> path should check for that. Josh?
>>
> libsemanage is only responsible for the persistent changes,
That is not how the current setsebool.c code works - see:
if (perm
     && semanage_bool_modify_local(handle, bool_key, boolean) < 0)
	goto err;
Testing confirms that this allows setting non-persistent booleans via 
semanage using setsebool.
  sesetbool
> sets the non-persistent directly, in fact demonstrated by the code 
> snippet above. This does look like a bug and if someone uses setsebool 
> to set a non-persistent boolean on an unmanaged system it appears that 
> it will indeed make it permanent.
> 
What about this:
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
    trunk/policycoreutils/setsebool/setsebool.c
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-11-20 17:09:13 UTC (rev 2095)
+++ trunk/policycoreutils/ChangeLog	2006-11-21 20:52:25 UTC (rev 2096)
@@ -1,3 +1,8 @@
+1.33.3 2006-11-21
+	* Merged setsebool patch from Karl MacMillan. 
+	  This fixes a bug reported by Yuichi Nakamura with
+	  always setting booleans persistently on an unmanaged system.
+
 1.33.2 2006-11-20
 	* Merged patch from Dan Walsh (via Karl MacMillan):
 	  * Added newrole audit message on login failure
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2006-11-20 17:09:13 UTC (rev 2095)
+++ trunk/policycoreutils/VERSION	2006-11-21 20:52:25 UTC (rev 2096)
@@ -1 +1 @@
-1.33.2
+1.33.3
Modified: trunk/policycoreutils/setsebool/setsebool.c
===================================================================
--- trunk/policycoreutils/setsebool/setsebool.c	2006-11-20 17:09:13 UTC (rev 2095)
+++ trunk/policycoreutils/setsebool/setsebool.c	2006-11-21 20:52:25 UTC (rev 2096)
@@ -115,7 +115,7 @@
 		goto err;
 
 	} else if (managed == 0) {
-		if (selinux_set_boolean_list(boolcnt, boollist, 1) < 0)
+		if (selinux_set_boolean_list(boolcnt, boollist, perm) < 0)
 			goto err;
 		goto out;
 	}
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2006-11-21 21:12:55
       | 
| Revision: 2099
          http://svn.sourceforge.net/selinux/?rev=2099&view=rev
Author:   ssmalley
Date:     2006-11-21 13:12:54 -0800 (Tue, 21 Nov 2006)
Log Message:
-----------
po file updates from Dan Walsh
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
    trunk/policycoreutils/po/af.po
    trunk/policycoreutils/po/am.po
    trunk/policycoreutils/po/ar.po
    trunk/policycoreutils/po/be.po
    trunk/policycoreutils/po/bg.po
    trunk/policycoreutils/po/bn.po
    trunk/policycoreutils/po/bn_IN.po
    trunk/policycoreutils/po/ca.po
    trunk/policycoreutils/po/cs.po
    trunk/policycoreutils/po/cy.po
    trunk/policycoreutils/po/da.po
    trunk/policycoreutils/po/de.po
    trunk/policycoreutils/po/el.po
    trunk/policycoreutils/po/en_GB.po
    trunk/policycoreutils/po/es.po
    trunk/policycoreutils/po/et.po
    trunk/policycoreutils/po/eu_ES.po
    trunk/policycoreutils/po/fa.po
    trunk/policycoreutils/po/fi.po
    trunk/policycoreutils/po/fr.po
    trunk/policycoreutils/po/gl.po
    trunk/policycoreutils/po/gu.po
    trunk/policycoreutils/po/he.po
    trunk/policycoreutils/po/hi.po
    trunk/policycoreutils/po/hr.po
    trunk/policycoreutils/po/hu.po
    trunk/policycoreutils/po/hy.po
    trunk/policycoreutils/po/id.po
    trunk/policycoreutils/po/is.po
    trunk/policycoreutils/po/it.po
    trunk/policycoreutils/po/ja.po
    trunk/policycoreutils/po/ka.po
    trunk/policycoreutils/po/kn.po
    trunk/policycoreutils/po/ko.po
    trunk/policycoreutils/po/ku.po
    trunk/policycoreutils/po/lo.po
    trunk/policycoreutils/po/lt.po
    trunk/policycoreutils/po/lv.po
    trunk/policycoreutils/po/mk.po
    trunk/policycoreutils/po/ml.po
    trunk/policycoreutils/po/mr.po
    trunk/policycoreutils/po/ms.po
    trunk/policycoreutils/po/my.po
    trunk/policycoreutils/po/nb.po
    trunk/policycoreutils/po/nl.po
    trunk/policycoreutils/po/nn.po
    trunk/policycoreutils/po/no.po
    trunk/policycoreutils/po/nso.po
    trunk/policycoreutils/po/or.po
    trunk/policycoreutils/po/pa.po
    trunk/policycoreutils/po/pl.po
    trunk/policycoreutils/po/policycoreutils.pot
    trunk/policycoreutils/po/pt.po
    trunk/policycoreutils/po/pt_BR.po
    trunk/policycoreutils/po/ro.po
    trunk/policycoreutils/po/ru.po
    trunk/policycoreutils/po/si.po
    trunk/policycoreutils/po/sk.po
    trunk/policycoreutils/po/sl.po
    trunk/policycoreutils/po/sq.po
    trunk/policycoreutils/po/sr.po
    trunk/policycoreutils/po/sr...@La...
    trunk/policycoreutils/po/sv.po
    trunk/policycoreutils/po/ta.po
    trunk/policycoreutils/po/te.po
    trunk/policycoreutils/po/th.po
    trunk/policycoreutils/po/tr.po
    trunk/policycoreutils/po/uk.po
    trunk/policycoreutils/po/ur.po
    trunk/policycoreutils/po/vi.po
    trunk/policycoreutils/po/zh_CN.po
    trunk/policycoreutils/po/zh_TW.po
    trunk/policycoreutils/po/zu.po
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-11-21 20:58:12 UTC (rev 2098)
+++ trunk/policycoreutils/ChangeLog	2006-11-21 21:12:54 UTC (rev 2099)
@@ -1,3 +1,6 @@
+1.33.4 2006-11-21
+	* Merged po file updates from Dan Walsh.
+
 1.33.3 2006-11-21
 	* Merged setsebool patch from Karl MacMillan. 
 	  This fixes a bug reported by Yuichi Nakamura with
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2006-11-21 20:58:12 UTC (rev 2098)
+++ trunk/policycoreutils/VERSION	2006-11-21 21:12:54 UTC (rev 2099)
@@ -1 +1 @@
-1.33.3
+1.33.4
Modified: trunk/policycoreutils/po/af.po
===================================================================
--- trunk/policycoreutils/po/af.po	2006-11-21 20:58:12 UTC (rev 2098)
+++ trunk/policycoreutils/po/af.po	2006-11-21 21:12:54 UTC (rev 2099)
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: PACKAGE VERSION\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2006-06-29 15:53-0400\n"
+"POT-Creation-Date: 2006-10-20 09:14-0400\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL...@li...>\n"
@@ -26,221 +26,226 @@
 msgid "%s:  Can't load policy:  %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:97
+#: ../newrole/newrole.c:98
 #, c-format
 msgid "Out of memory!\n"
 msgstr ""
 
-#: ../newrole/newrole.c:199 ../run_init/run_init.c:126
+#: ../newrole/newrole.c:200 ../run_init/run_init.c:126
 #, c-format
 msgid "failed to initialize PAM\n"
 msgstr ""
 
-#: ../newrole/newrole.c:210
+#: ../newrole/newrole.c:211
 #, c-format
 msgid "failed to set PAM_TTY\n"
 msgstr ""
 
-#: ../newrole/newrole.c:246 ../run_init/run_init.c:154
+#: ../newrole/newrole.c:247 ../run_init/run_init.c:154
 msgid "Password:"
 msgstr ""
 
-#: ../newrole/newrole.c:281 ../run_init/run_init.c:189
+#: ../newrole/newrole.c:282 ../run_init/run_init.c:189
 #, c-format
 msgid "Cannot find your entry in the shadow passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:287 ../run_init/run_init.c:195
+#: ../newrole/newrole.c:288 ../run_init/run_init.c:195
 #, c-format
 msgid "getpass cannot open /dev/tty\n"
 msgstr ""
 
-#: ../newrole/newrole.c:354
+#: ../newrole/newrole.c:355
 #, c-format
 msgid "Error initing capabilities, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:368
+#: ../newrole/newrole.c:369
 #, c-format
 msgid "Error dropping capabilities, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:375
+#: ../newrole/newrole.c:376
 #, c-format
 msgid "Error changing uid, aborting.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:382
+#: ../newrole/newrole.c:383
 #, c-format
 msgid "Error resetting KEEPCAPS, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:390
+#: ../newrole/newrole.c:391
 #, c-format
 msgid "Error dropping SETUID capability, aborting\n"
 msgstr ""
 
-#: ../newrole/newrole.c:463
+#: ../newrole/newrole.c:410
 #, c-format
+msgid "Error connecting to audit system.\n"
+msgstr ""
+
+#: ../newrole/newrole.c:416
+#, c-format
+msgid "Error allocating memory.\n"
+msgstr ""
+
+#: ../newrole/newrole.c:423
+#, c-format
+msgid "Error sending audit message.\n"
+msgstr ""
+
+#: ../newrole/newrole.c:511
+#, c-format
 msgid "Sorry, newrole may be used only on a SELinux kernel.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:468
+#: ../newrole/newrole.c:516
 #, c-format
 msgid "Could not determine enforcing mode.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:488
+#: ../newrole/newrole.c:536
 #, c-format
 msgid "Error: multiple roles specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:498
+#: ../newrole/newrole.c:546
 #, c-format
 msgid "Error: multiple types specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:508
+#: ../newrole/newrole.c:556
 #, c-format
 msgid "Sorry, -l may be used with SELinux MLS support.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:515
+#: ../newrole/newrole.c:563
 #, c-format
 msgid "Error: multiple levels specified\n"
 msgstr ""
 
-#: ../newrole/newrole.c:537
+#: ../newrole/newrole.c:585
 #, c-format
 msgid "Couldn't get default type.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:559
+#: ../newrole/newrole.c:608
 #, c-format
 msgid "failed to get old_context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:572
+#: ../newrole/newrole.c:621
 #, c-format
 msgid "failed to get new context.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:596
+#: ../newrole/newrole.c:645
 #, c-format
 msgid "cannot find your entry in the passwd file.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:606
+#: ../newrole/newrole.c:655
 #, c-format
 msgid "Error!  Shell is not valid.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:614
+#: ../newrole/newrole.c:663
 #, c-format
 msgid "Error!  Could not retrieve tty information.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:618
+#: ../newrole/newrole.c:667
 #, c-format
 msgid "Authenticating %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:632
+#: ../newrole/newrole.c:681
 #, c-format
 msgid "newrole: incorrect password for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:657
+#: ../newrole/newrole.c:707
 #, c-format
 msgid "failed to set new role %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:671
+#: ../newrole/newrole.c:721
 #, c-format
 msgid "failed to set new type %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:688
+#: ../newrole/newrole.c:738
 #, c-format
 msgid "failed to build new range with level %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:693
+#: ../newrole/newrole.c:743
 #, c-format
 msgid "failed to set new range %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:708
+#: ../newrole/newrole.c:758
 #, c-format
 msgid "failed to convert new context to string\n"
 msgstr ""
 
-#: ../newrole/newrole.c:717
+#: ../newrole/newrole.c:766
 #, c-format
 msgid "%s is not a valid context\n"
 msgstr ""
 
-#: ../newrole/newrole.c:730
+#: ../newrole/newrole.c:780
 #, c-format
 msgid "Error!  Could not open %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:738
+#: ../newrole/newrole.c:788
 #, c-format
 msgid "%s!  Could not get current context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:757
+#: ../newrole/newrole.c:807
 #, c-format
 msgid "%s!  Could not get new context for %s, not relabeling tty.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:771
+#: ../newrole/newrole.c:821
 #, c-format
 msgid "%s!  Could not set new context for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:784
+#: ../newrole/newrole.c:834
 #, c-format
 msgid "newrole: failure forking: %s"
 msgstr ""
 
-#: ../newrole/newrole.c:789
+#: ../newrole/newrole.c:839
 #, c-format
 msgid "Warning!  Could not restore context for %s\n"
 msgstr ""
 
-#: ../newrole/newrole.c:810
+#: ../newrole/newrole.c:860
 #, c-format
 msgid "%s changed labels.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:834
+#: ../newrole/newrole.c:884
 #, c-format
 msgid "Could not close descriptors.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:869 ../run_init/run_init.c:397
+#: ../newrole/newrole.c:909
 #, c-format
-msgid "Could not set exec context to %s.\n"
+msgid "Error allocating shell.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:881
+#: ../newrole/newrole.c:922 ../run_init/run_init.c:397
 #, c-format
-msgid "Error connecting to audit system.\n"
+msgid "Could not set exec context to %s.\n"
 msgstr ""
 
-#: ../newrole/newrole.c:886
-#, c-format
-msgid "Error allocating memory.\n"
-msgstr ""
-
-#: ../newrole/newrole.c:892
-#, c-format
-msgid "Error sending audit message.\n"
-msgstr ""
-
-#: ../newrole/newrole.c:903
+#: ../newrole/newrole.c:932
 msgid "failed to exec shell\n"
 msgstr ""
 
@@ -276,674 +281,683 @@
 msgid "authentication failed.\n"
 msgstr ""
 
-#: ../scripts/chcat:70 ../scripts/chcat:140
+#: ../scripts/chcat:75 ../scripts/chcat:145
 msgid "Requires at least one category"
 msgstr ""
 
-#: ../scripts/chcat:84 ../scripts/chcat:154
+#: ../scripts/chcat:89 ../scripts/chcat:159
 #, c-format
 msgid "Can not modify sensitivity levels using '+' on %s"
 msgstr ""
 
-#: ../scripts/chcat:88
+#: ../scripts/chcat:93
 #, c-format
 msgid "%s is already in %s"
 msgstr ""
 
-#: ../scripts/chcat:159 ../scripts/chcat:169
+#: ../scripts/chcat:164 ../scripts/chcat:174
 #, c-format
 msgid "%s is not in %s"
 msgstr ""
 
-#: ../scripts/chcat:232 ../scripts/chcat:237
+#: ../scripts/chcat:237 ../scripts/chcat:242
 msgid "Can not combine +/- with other types of categories"
 msgstr ""
 
-#: ../scripts/chcat:282
+#: ../scripts/chcat:287
 msgid "Can not have multiple sensitivities"
 msgstr ""
 
-#: ../scripts/chcat:288
+#: ../scripts/chcat:293
 #, c-format
 msgid "Usage %s CATEGORY File ..."
 msgstr ""
 
-#: ../scripts/chcat:289
+#: ../scripts/chcat:294
 #, c-format
 msgid "Usage %s -l CATEGORY user ..."
 msgstr ""
 
-#: ../scripts/chcat:290
+#: ../scripts/chcat:295
 #, c-format
 msgid "Usage %s [[+|-]CATEGORY],...]q File ..."
 msgstr ""
 
-#: ../scripts/chcat:291
+#: ../scripts/chcat:296
 #, c-format
 msgid "Usage %s -l [[+|-]CATEGORY],...]q user ..."
 msgstr ""
 
-#: ../scripts/chcat:292
+#: ../scripts/chcat:297
 #, c-format
 msgid "Usage %s -d File ..."
 msgstr ""
 
-#: ../scripts/chcat:293
+#: ../scripts/chcat:298
 #, c-format
 msgid "Usage %s -l -d user ..."
 msgstr ""
 
-#: ../scripts/chcat:294
+#: ../scripts/chcat:299
 #, c-format
 msgid "Usage %s -L"
 msgstr ""
 
-#: ../scripts/chcat:295
+#: ../scripts/chcat:300
 #, c-format
 msgid "Usage %s -L -l user"
 msgstr ""
 
-#: ../scripts/chcat:296
+#: ../scripts/chcat:301
 msgid "Use -- to end option list.  For example"
 msgstr ""
 
-#: ../scripts/chcat:297
+#: ../scripts/chcat:302
 msgid "chcat -- -CompanyConfidential /docs/businessplan.odt"
 msgstr ""
 
-#: ../scripts/chcat:298
+#: ../scripts/chcat:303
 msgid "chcat -l +CompanyConfidential juser"
 msgstr ""
 
-#: ../semanage/semanage:122
+#: ../semanage/semanage:127
 msgid "Requires 2 or more arguments"
 msgstr ""
 
-#: ../semanage/semanage:127
+#: ../semanage/semanage:132
 #, c-format
 msgid "%s not defined"
 msgstr ""
 
-#: ../semanage/semanage:151
+#: ../semanage/semanage:156
 #, c-format
 msgid "%s not valid for %s objects\n"
 msgstr ""
 
-#: ../semanage/semanage:178 ../semanage/semanage:186
+#: ../semanage/semanage:183 ../semanage/semanage:191
 msgid "range not supported on Non MLS machines"
 msgstr ""
 
-#: ../semanage/semanage:244
+#: ../semanage/semanage:249
 msgid "You must specify a role"
 msgstr ""
 
-#: ../semanage/semanage:246
+#: ../semanage/semanage:251
 msgid "You must specify a prefix"
 msgstr ""
 
-#: ../semanage/semanage:295
+#: ../semanage/semanage:300
 #, c-format
 msgid "Options Error %s "
 msgstr ""
 
-#: ../semanage/semanage:299
+#: ../semanage/semanage:304
 #, c-format
 msgid "Invalid value %s"
 msgstr ""
 
-#: ../semanage/seobject.py:124
+#: ../semanage/seobject.py:130
 msgid "translations not supported on non-MLS machines"
 msgstr ""
 
-#: ../semanage/seobject.py:131
+#: ../semanage/seobject.py:137
 #, python-format
 msgid "Unable to open %s: translations not supported on non-MLS machines"
 msgstr ""
 
-#: ../semanage/seobject.py:171 ../semanage/seobject.py:185
+#: ../semanage/seobject.py:177 ../semanage/seobject.py:191
 #, python-format
 msgid "Translations can not contain spaces '%s' "
 msgstr ""
 
-#: ../semanage/seobject.py:174
+#: ../semanage/seobject.py:180
 #, python-format
 msgid "Invalid Level '%s' "
 msgstr ""
 
-#: ../semanage/seobject.py:177
+#: ../semanage/seobject.py:183
 #, python-format
 msgid "%s already defined in translations"
 msgstr ""
 
-#: ../semanage/seobject.py:189
+#: ../semanage/seobject.py:195
 #, python-format
 msgid "%s not defined in translations"
 msgstr ""
 
-#: ../semanage/seobject.py:209
+#: ../semanage/seobject.py:215
 msgid "SELinux policy is not managed or store cannot be accessed."
 msgstr ""
 
-#: ../semanage/seobject.py:214
+#: ../semanage/seobject.py:220
 msgid "Cannot read policy store."
 msgstr ""
 
-#: ../semanage/seobject.py:219
+#: ../semanage/seobject.py:225
 msgid "Could not establish semanage connection"
 msgstr ""
 
-#: ../semanage/seobject.py:238 ../semanage/seobject.py:296
-#: ../semanage/seobject.py:343 ../semanage/seobject.py:424
-#: ../semanage/seobject.py:493 ../semanage/seobject.py:549
-#: ../semanage/seobject.py:1080 ../semanage/seobject.py:1119
-#: ../semanage/seobject.py:1188 ../semanage/seobject.py:1222
+#: ../semanage/seobject.py:244 ../semanage/seobject.py:302
+#: ../semanage/seobject.py:349 ../semanage/seobject.py:430
+#: ../semanage/seobject.py:501 ../semanage/seobject.py:559
+#: ../semanage/seobject.py:1090 ../semanage/seobject.py:1129
+#: ../semanage/seobject.py:1204 ../semanage/seobject.py:1238
 #, python-format
 msgid "Could not create a key for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:242 ../semanage/seobject.py:300
-#: ../semanage/seobject.py:347 ../semanage/seobject.py:353
+#: ../semanage/seobject.py:248 ../semanage/seobject.py:306
+#: ../semanage/seobject.py:353 ../semanage/seobject.py:359
 #, python-format
 msgid "Could not check if login mapping for %s is defined"
 msgstr ""
 
-#: ../semanage/seobject.py:244
+#: ../semanage/seobject.py:250
 #, python-format
 msgid "Login mapping for %s is already defined"
 msgstr ""
 
-#: ../semanage/seobject.py:248
+#: ../semanage/seobject.py:254
 #, python-format
 msgid "Linux User %s does not exist"
 msgstr ""
 
-#: ../semanage/seobject.py:252
+#: ../semanage/seobject.py:258
 #, python-format
 msgid "Could not create login mapping for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:256 ../semanage/seobject.py:438
+#: ../semanage/seobject.py:262 ../semanage/seobject.py:444
 #, python-format
 msgid "Could not set name for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:261 ../semanage/seobject.py:448
+#: ../semanage/seobject.py:267 ../semanage/seobject.py:454
 #, python-format
 msgid "Could not set MLS range for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:265
+#: ../semanage/seobject.py:271
 #, python-format
 msgid "Could not set SELinux user for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:269 ../semanage/seobject.py:321
-#: ../semanage/seobject.py:359 ../semanage/seobject.py:463
-#: ../semanage/seobject.py:526 ../semanage/seobject.py:565
-#: ../semanage/seobject.py:692 ../semanage/seobject.py:734
-#: ../semanage/seobject.py:763 ../semanage/seobject.py:890
-#: ../semanage/seobject.py:931 ../semanage/seobject.py:963
-#: ../semanage/seobject.py:1060 ../semanage/seobject.py:1103
-#: ../semanage/seobject.py:1135 ../semanage/seobject.py:1206
-#: ../semanage/seobject.py:1238
+#: ../semanage/seobject.py:275 ../semanage/seobject.py:327
+#: ../semanage/seobject.py:365 ../semanage/seobject.py:470
+#: ../semanage/seobject.py:536 ../semanage/seobject.py:575
+#: ../semanage/seobject.py:702 ../semanage/seobject.py:744
+#: ../semanage/seobject.py:773 ../semanage/seobject.py:900
+#: ../semanage/seobject.py:941 ../semanage/seobject.py:973
+#: ../semanage/seobject.py:1070 ../semanage/seobject.py:1113
+#: ../semanage/seobject.py:1145 ../semanage/seobject.py:1222
+#: ../semanage/seobject.py:1254
 msgid "Could not start semanage transaction"
 msgstr ""
 
-#: ../semanage/seobject.py:273 ../semanage/seobject.py:277
+#: ../semanage/seobject.py:279 ../semanage/seobject.py:283
 #, python-format
 msgid "Could not add login mapping for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:292
+#: ../semanage/seobject.py:298
 msgid "Requires seuser or serange"
 msgstr ""
 
-#: ../semanage/seobject.py:302 ../semanage/seobject.py:349
+#: ../semanage/seobject.py:308 ../semanage/seobject.py:355
 #, python-format
 msgid "Login mapping for %s is not defined"
 msgstr ""
 
-#: ../semanage/seobject.py:306
+#: ../semanage/seobject.py:312
 #, python-format
 msgid "Could not query seuser for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:325 ../semanage/seobject.py:329
+#: ../semanage/seobject.py:331 ../semanage/seobject.py:335
 #, python-format
 msgid "Could not modify login mapping for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:355
+#: ../semanage/seobject.py:361
 #, python-format
 msgid "Login mapping for %s is defined in policy, cannot be deleted"
 msgstr ""
 
-#: ../semanage/seobject.py:364 ../semanage/seobject.py:368
+#: ../semanage/seobject.py:370 ../semanage/seobject.py:374
 #, python-format
 msgid "Could not delete login mapping for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:382
+#: ../semanage/seobject.py:388
 msgid "Could not list login mappings"
 msgstr ""
 
-#: ../semanage/seobject.py:428 ../semanage/seobject.py:497
-#: ../semanage/seobject.py:553 ../semanage/seobject.py:559
+#: ../semanage/seobject.py:434 ../semanage/seobject.py:505
+#: ../semanage/seobject.py:563 ../semanage/seobject.py:569
 #, python-format
 msgid "Could not check if SELinux user %s is defined"
 msgstr ""
 
-#: ../semanage/seobject.py:430
+#: ../semanage/seobject.py:436
 #, python-format
 msgid "SELinux user %s is already defined"
 msgstr ""
 
-#: ../semanage/seobject.py:434
+#: ../semanage/seobject.py:440
 #, python-format
 msgid "Could not create SELinux user for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:443
+#: ../semanage/seobject.py:449
 #, python-format
 msgid "Could not add role %s for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:452
+#: ../semanage/seobject.py:458
 #, python-format
 msgid "Could not set MLS level for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:456
+#: ../semanage/seobject.py:460 ../semanage/seobject.py:527
 #, python-format
+msgid "Invalid prefix %s"
+msgstr ""
+
+#: ../semanage/seobject.py:463
+#, python-format
 msgid "Could not add prefix %s for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:459
+#: ../semanage/seobject.py:466
 #, python-format
 msgid "Could not extract key for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:467 ../semanage/seobject.py:471
+#: ../semanage/seobject.py:474 ../semanage/seobject.py:478
 #, python-format
 msgid "Could not add SELinux user %s"
 msgstr ""
 
-#: ../semanage/seobject.py:487
+#: ../semanage/seobject.py:495
 msgid "Requires prefix, roles, level or range"
 msgstr ""
 
-#: ../semanage/seobject.py:489
+#: ../semanage/seobject.py:497
 msgid "Requires prefix or roles"
 msgstr ""
 
-#: ../semanage/seobject.py:499 ../semanage/seobject.py:555
+#: ../semanage/seobject.py:507 ../semanage/seobject.py:565
 #, python-format
 msgid "SELinux user %s is not defined"
 msgstr ""
 
-#: ../semanage/seobject.py:503
+#: ../semanage/seobject.py:511
 #, python-format
 msgid "Could not query user for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:530 ../semanage/seobject.py:534
+#: ../semanage/seobject.py:540 ../semanage/seobject.py:544
 #, python-format
 msgid "Could not modify SELinux user %s"
 msgstr ""
 
-#: ../semanage/seobject.py:561
+#: ../semanage/seobject.py:571
 #, python-format
 msgid "SELinux user %s is defined in policy, cannot be deleted"
 msgstr ""
 
-#: ../semanage/seobject.py:569 ../semanage/seobject.py:573
+#: ../semanage/seobject.py:579 ../semanage/seobject.py:583
 #, python-format
 msgid "Could not delete SELinux user %s"
 msgstr ""
 
-#: ../semanage/seobject.py:585
+#: ../semanage/seobject.py:595
 msgid "Could not list SELinux users"
 msgstr ""
 
-#: ../semanage/seobject.py:591
+#: ../semanage/seobject.py:601
 #, python-format
 msgid "Could not list roles for user %s"
 msgstr ""
 
-#: ../semanage/seobject.py:625
+#: ../semanage/seobject.py:635
 msgid "Protocol udp or tcp is required"
 msgstr ""
 
-#: ../semanage/seobject.py:627
+#: ../semanage/seobject.py:637
 msgid "Port is required"
 msgstr ""
 
-#: ../semanage/seobject.py:638
+#: ../semanage/seobject.py:648
 #, python-format
 msgid "Could not create a key for %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:649
+#: ../semanage/seobject.py:659
 msgid "Type is required"
 msgstr ""
 
-#: ../semanage/seobject.py:655 ../semanage/seobject.py:717
-#: ../semanage/seobject.py:751 ../semanage/seobject.py:757
+#: ../semanage/seobject.py:665 ../semanage/seobject.py:727
+#: ../semanage/seobject.py:761 ../semanage/seobject.py:767
 #, python-format
 msgid "Could not check if port %s/%s is defined"
 msgstr ""
 
-#: ../semanage/seobject.py:657
+#: ../semanage/seobject.py:667
 #, python-format
 msgid "Port %s/%s already defined"
 msgstr ""
 
-#: ../semanage/seobject.py:661
+#: ../semanage/seobject.py:671
 #, python-format
 msgid "Could not create port for %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:667
+#: ../semanage/seobject.py:677
 #, python-format
 msgid "Could not create context for %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:671
+#: ../semanage/seobject.py:681
 #, python-format
 msgid "Could not set user in port context for %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:675
+#: ../semanage/seobject.py:685
 #, python-format
 msgid "Could not set role in port context for %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:679
+#: ../semanage/seobject.py:689
 #, python-format
 msgid "Could not set type in port context for %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:684
+#: ../semanage/seobject.py:694
 #, python-format
 msgid "Could not set mls fields in port context for %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:688
+#: ../semanage/seobject.py:698
 #, python-format
 msgid "Could not set port context for %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:696 ../semanage/seobject.py:700
+#: ../semanage/seobject.py:706 ../semanage/seobject.py:710
 #, python-format
 msgid "Could not add port %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:709 ../semanage/seobject.py:906
+#: ../semanage/seobject.py:719 ../semanage/seobject.py:916
 msgid "Requires setype or serange"
 msgstr ""
 
-#: ../semanage/seobject.py:711
+#: ../semanage/seobject.py:721
 msgid "Requires setype"
 msgstr ""
 
-#: ../semanage/seobject.py:719 ../semanage/seobject.py:753
+#: ../semanage/seobject.py:729 ../semanage/seobject.py:763
 #, python-format
 msgid "Port %s/%s is not defined"
 msgstr ""
 
-#: ../semanage/seobject.py:723
+#: ../semanage/seobject.py:733
 #, python-format
 msgid "Could not query port %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:738 ../semanage/seobject.py:742
+#: ../semanage/seobject.py:748 ../semanage/seobject.py:752
 #, python-format
 msgid "Could not modify port %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:759
+#: ../semanage/seobject.py:769
 #, python-format
 msgid "Port %s/%s is defined in policy, cannot be deleted"
 msgstr ""
 
-#: ../semanage/seobject.py:767 ../semanage/seobject.py:771
+#: ../semanage/seobject.py:777 ../semanage/seobject.py:781
 #, python-format
 msgid "Could not delete port %s/%s"
 msgstr ""
 
-#: ../semanage/seobject.py:779 ../semanage/seobject.py:798
+#: ../semanage/seobject.py:789 ../semanage/seobject.py:808
 msgid "Could not list ports"
 msgstr ""
 
-#: ../semanage/seobject.py:842 ../semanage/seobject.py:1014
+#: ../semanage/seobject.py:852 ../semanage/seobject.py:1024
 msgid "SELinux Type is required"
 msgstr ""
 
-#: ../semanage/seobject.py:846 ../semanage/seobject.py:910
-#: ../semanage/seobject.py:947 ../semanage/seobject.py:1018
+#: ../semanage/seobject.py:856 ../semanage/seobject.py:920
+#: ../semanage/seobject.py:957 ../semanage/seobject.py:1028
 #, python-format
 msgid "Could not create key for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:850 ../semanage/seobject.py:914
-#: ../semanage/seobject.py:951 ../semanage/seobject.py:957
+#: ../semanage/seobject.py:860 ../semanage/seobject.py:924
+#: ../semanage/seobject.py:961 ../semanage/seobject.py:967
 #, python-format
 msgid "Could not check if interface %s is defined"
 msgstr ""
 
-#: ../semanage/seobject.py:852
+#: ../semanage/seobject.py:862
 #, python-format
 msgid "Interface %s already defined"
 msgstr ""
 
-#: ../semanage/seobject.py:856
+#: ../semanage/seobject.py:866
 #, python-format
 msgid "Could not create interface for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:861 ../semanage/seobject.py:1033
+#: ../semanage/seobject.py:871 ../semanage/seobject.py:1043
 #, python-format
 msgid "Could not create context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:865
+#: ../semanage/seobject.py:875
 #, python-format
 msgid "Could not set user in interface context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:869
+#: ../semanage/seobject.py:879
 #, python-format
 msgid "Could not set role in interface context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:873
+#: ../semanage/seobject.py:883
 #, python-format
 msgid "Could not set type in interface context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:878
+#: ../semanage/seobject.py:888
 #, python-format
 msgid "Could not set mls fields in interface context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:882
+#: ../semanage/seobject.py:892
 #, python-format
 msgid "Could not set interface context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:886
+#: ../semanage/seobject.py:896
 #, python-format
 msgid "Could not set message context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:894 ../semanage/seobject.py:898
+#: ../semanage/seobject.py:904 ../semanage/seobject.py:908
 #, python-format
 msgid "Could not add interface %s"
 msgstr ""
 
-#: ../semanage/seobject.py:916 ../semanage/seobject.py:953
+#: ../semanage/seobject.py:926 ../semanage/seobject.py:963
 #, python-format
 msgid "Interface %s is not defined"
 msgstr ""
 
-#: ../semanage/seobject.py:920
+#: ../semanage/seobject.py:930
 #, python-format
 msgid "Could not query interface %s"
 msgstr ""
 
-#: ../semanage/seobject.py:935 ../semanage/seobject.py:939
+#: ../semanage/seobject.py:945 ../semanage/seobject.py:949
 #, python-format
 msgid "Could not modify interface %s"
 msgstr ""
 
-#: ../semanage/seobject.py:959
+#: ../semanage/seobject.py:969
 #, python-format
 msgid "Interface %s is defined in policy, cannot be deleted"
 msgstr ""
 
-#: ../semanage/seobject.py:967 ../semanage/seobject.py:971
+#: ../semanage/seobject.py:977 ../semanage/seobject.py:981
 #, python-format
 msgid "Could not delete interface %s"
 msgstr ""
 
-#: ../semanage/seobject.py:979
+#: ../semanage/seobject.py:989
 msgid "Could not list interfaces"
 msgstr ""
 
-#: ../semanage/seobject.py:1022 ../semanage/seobject.py:1084
-#: ../semanage/seobject.py:1123 ../semanage/seobject.py:1129
+#: ../semanage/seobject.py:1032 ../semanage/seobject.py:1094
+#: ../semanage/seobject.py:1133 ../semanage/seobject.py:1137
 #, python-format
 msgid "Could not check if file context for %s is defined"
 msgstr ""
 
-#: ../semanage/seobject.py:1024
+#: ../semanage/seobject.py:1034
 #, python-format
 msgid "File context for %s already defined"
 msgstr ""
 
-#: ../semanage/seobject.py:1028
+#: ../semanage/seobject.py:1038
 #, python-format
 msgid "Could not create file context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:1037
+#: ../semanage/seobject.py:1047
 #, python-format
 msgid "Could not set user in file context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:1041
+#: ../semanage/seobject.py:1051
 #, python-format
 msgid "Could not set role in file context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:1045
+#: ../semanage/seobject.py:1055
 #, python-format
 msgid "Could not set type in file context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:1050
+#: ../semanage/seobject.py:1060
 #, python-format
 msgid "Could not set mls fields in file context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:1056
+#: ../semanage/seobject.py:1066
 #, python-format
 msgid "Could not set file context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:1064 ../semanage/seobject.py:1068
+#: ../semanage/seobject.py:1074 ../semanage/seobject.py:1078
 #, python-format
 msgid "Could not add file context for %s"
 msgstr ""
 
-#: ../semanage/seobject.py:1076
+#: ../semanage/seobject.py:1086
 msgid "Requires setype...
 
[truncated message content] | 
| 
      
      
      From: <kma...@us...> - 2006-11-27 19:17:14
       | 
| Revision: 2106
          http://svn.sourceforge.net/selinux/?rev=2106&view=rev
Author:   kmacmillan
Date:     2006-11-27 11:17:08 -0800 (Mon, 27 Nov 2006)
Log Message:
-----------
Author: Michael C Thompson
Email: tho...@us...
Subject: genhomedircon
Date: Thu, 16 Nov 2006 11:24:03 -0600
I've noticed that genhomedircon does not have the proper return codes on 
some error and success paths. This patch addresses these return codes as 
follow:
* usage function by default returns 0, and the desired return code can 
be specified via a parameter. This facilitates the fix to the current 
behaviour that 1 is returned on 'genhomedircon -h'.
* I have noticed that as secadm (this is a bug? will start a separate 
thread) fails to successfully call semanage_connect(). The result of 
this operation is now checked, and the script will exit on error.
* If the attempt to write the homedir contexts out fails, a proper error 
code will be returned (previously, 1 would be returned).
This also moves the parsing of /etc/shells to after the uid check for a 
minimal time savings.
Thanks,
Mike
Signed-of-by: Michael Thompson <mct...@us...>
Acked-by: Karl MacMillan <kma...@me...>
Acked-by:  Stephen Smalley <sd...@ty...>
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/scripts/genhomedircon
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-11-27 19:11:08 UTC (rev 2105)
+++ trunk/policycoreutils/ChangeLog	2006-11-27 19:17:08 UTC (rev 2106)
@@ -1,3 +1,6 @@
+1.33.5 2006-11-27
+	* Merged patch from Micheal C Thompson to clean up genhomedircon
+	  error handling.
 1.33.4 2006-11-21
 	* Merged po file updates from Dan Walsh.
 
Modified: trunk/policycoreutils/scripts/genhomedircon
===================================================================
--- trunk/policycoreutils/scripts/genhomedircon	2006-11-27 19:11:08 UTC (rev 2105)
+++ trunk/policycoreutils/scripts/genhomedircon	2006-11-27 19:17:08 UTC (rev 2106)
@@ -29,17 +29,6 @@
 import gettext
 gettext.install('policycoreutils')
 
-try:
-	fd = open("/etc/shells", 'r')
-	VALID_SHELLS = fd.read().split("\n")
-	fd.close()
-	if "/sbin/nologin" in VALID_SHELLS:
-		VALID_SHELLS.remove("/sbin/nologin")
-	if "" in VALID_SHELLS:
-		VALID_SHELLS.remove("")
-except:
-	VALID_SHELLS = ['/bin/sh', '/bin/bash', '/bin/ash', '/bin/bsh', '/bin/ksh', '/usr/bin/ksh', '/usr/bin/pdksh', '/bin/tcsh', '/bin/csh', '/bin/zsh']
-
 def grep(file, var):
 	ret = ""
 	fd = open(file, 'r')
@@ -114,12 +103,13 @@
 		return val
 	return "targeted"
 
-def usage(error = ""):
+def usage(rc=0, error = ""):
 	if error != "":
 		sys.stderr.write("%s\n" % error)
+		rc = 1
 	sys.stderr.write("Usage: %s [ -d selinuxdir ] [-n | --nopasswd] [-t selinuxtype ]\n" % sys.argv[0])
 	sys.stderr.flush()
-	sys.exit(1)
+	sys.exit(rc)
 
 def warning(warning = ""):
 	sys.stderr.write("%s\n" % warning)
@@ -136,7 +126,9 @@
 		self.semanageHandle = semanage_handle_create()
 		self.semanaged = semanage_is_managed(self.semanageHandle)
 		if self.semanaged:
-			semanage_connect(self.semanageHandle)
+			rc = semanage_connect(self.semanageHandle)
+			if rc:
+				errorExit("Unable to connect to semanage")
 			(status, self.ulist) = semanage_user_list(self.semanageHandle)
 		self.type = type
 		self.selinuxdir = selinuxdir +"/"
@@ -336,18 +328,25 @@
 		print self.genoutput()
 
 	def write(self):
-		try:
-			fd = open(self.getFileContextDir()+"/file_contexts.homedirs", "w")
-			fd.write(self.genoutput())
-			fd.close()
-		except IOError, error:
-			sys.stderr.write("%s: %s\n" % ( sys.argv[0], error ))
+		fd = open(self.getFileContextDir()+"/file_contexts.homedirs", "w")
+		fd.write(self.genoutput())
+		fd.close()
 
-
 if os.getuid() > 0 or os.geteuid() > 0:
 	print _("You must be root to run %s.") % sys.argv[0]
 	sys.exit(1)
 
+try:
+	fd = open("/etc/shells", 'r')
+	VALID_SHELLS = fd.read().split("\n")
+	fd.close()
+	if "/sbin/nologin" in VALID_SHELLS:
+		VALID_SHELLS.remove("/sbin/nologin")
+	if "" in VALID_SHELLS:
+		VALID_SHELLS.remove("")
+except:
+	VALID_SHELLS = ['/bin/sh', '/bin/bash', '/bin/ash', '/bin/bsh', '/bin/ksh', '/usr/bin/ksh', '/usr/bin/pdksh', '/bin/tcsh', '/bin/csh', '/bin/zsh']
+
 #
 # This script will generate home dir file context
 # based off the homedir_template file, entries in the password file, and
@@ -369,15 +368,19 @@
 			directory = a
 		if o == '--help'  or o == "-h":
 			usage()
+except getopt.error, error:
+	errorExit(_("Options Error %s ") % error)
 
+if type == None:
+	type = getSELinuxType(directory)
 
-	if type == None:
-		type = getSELinuxType(directory)
+if len(cmds) != 0:
+	usage(1)
 
-	if len(cmds) != 0:
-		usage()
-	selconf = selinuxConfig(directory, type, usepwd)
+selconf = selinuxConfig(directory, type, usepwd)
+try:
 	selconf.write()
+except IOError, error:
+	sys.stderr.write("%s: %s\n" % ( sys.argv[0], error ))
+	sys.exit(1)
 
-except getopt.error, error:
-	errorExit(_("Options Error %s ") % error)
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <mad...@us...> - 2006-11-29 21:15:33
       | 
| Revision: 2116
          http://svn.sourceforge.net/selinux/?rev=2116&view=rev
Author:   madmethod
Date:     2006-11-29 13:15:32 -0800 (Wed, 29 Nov 2006)
Log Message:
-----------
Changelog and version for policycoreutils 1.33.6
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-11-29 21:12:43 UTC (rev 2115)
+++ trunk/policycoreutils/ChangeLog	2006-11-29 21:15:32 UTC (rev 2116)
@@ -1,3 +1,10 @@
+1.33.6 2006-11-29
+	* Patch from Dan Walsh to add an pam_acct_msg call to run_init
+	* Patch from Dan Walsh to fix error code returns in newrole
+	* Patch from Dan Walsh to remove verbose flag from semanage man page
+	* Patch from Dan Walsh to make audit2allow use refpolicy Makefile
+	  in /usr/share/selinux/<SELINUXTYPE>
+
 1.33.5 2006-11-27
 	* Merged patch from Micheal C Thompson to clean up genhomedircon
 	  error handling.
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2006-11-29 21:12:43 UTC (rev 2115)
+++ trunk/policycoreutils/VERSION	2006-11-29 21:15:32 UTC (rev 2116)
@@ -1 +1 @@
-1.33.5
+1.33.6
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <kma...@us...> - 2007-01-03 16:11:32
       | 
| Revision: 2121
          http://svn.sourceforge.net/selinux/?rev=2121&view=rev
Author:   kmacmillan
Date:     2007-01-03 08:11:29 -0800 (Wed, 03 Jan 2007)
Log Message:
-----------
Author: Daniel J Walsh
Email: dw...@re...
Subject: Patch to load_policy to enforce quiet option
Date: Wed, 29 Nov 2006 17:16:30 -0500
Acked-by: Karl MacMillan <kma...@me...>
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
    trunk/policycoreutils/load_policy/load_policy.c
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2006-12-01 14:11:55 UTC (rev 2120)
+++ trunk/policycoreutils/ChangeLog	2007-01-03 16:11:29 UTC (rev 2121)
@@ -1,3 +1,6 @@
+1.33.7 2007-1-3
+	* Patch from Dan Walsh to correctly suppress warnings in load_policy.
+	
 1.33.6 2006-11-29
 	* Patch from Dan Walsh to add an pam_acct_msg call to run_init
 	* Patch from Dan Walsh to fix error code returns in newrole
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2006-12-01 14:11:55 UTC (rev 2120)
+++ trunk/policycoreutils/VERSION	2007-01-03 16:11:29 UTC (rev 2121)
@@ -1 +1 @@
-1.33.6
+1.33.7
Modified: trunk/policycoreutils/load_policy/load_policy.c
===================================================================
--- trunk/policycoreutils/load_policy/load_policy.c	2006-12-01 14:11:55 UTC (rev 2120)
+++ trunk/policycoreutils/load_policy/load_policy.c	2007-01-03 16:11:29 UTC (rev 2121)
@@ -50,12 +50,12 @@
 	nargs = argc - optind;
 	if (nargs > 2)
 		usage(argv[0]);
-	if (nargs >= 1) {
-		fprintf(stderr,
-			"%s:  Warning!  Policy file argument (%s) is no longer supported, installed policy is always loaded.  Continuing...\n",
-			argv[0], argv[optind++]);
+	if (nargs >= 1 && !quiet) {
+			fprintf(stderr,
+				"%s:  Warning!  Policy file argument (%s) is no longer supported, installed policy is always loaded.  Continuing...\n",
+				argv[0], argv[optind++]);
 	}
-	if (nargs == 2) {
+	if (nargs == 2 && ! quiet) {
 		fprintf(stderr,
 			"%s:  Warning!  Boolean file argument (%s) is no longer supported, installed booleans file is always used.  Continuing...\n",
 			argv[0], argv[optind++]);
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2007-01-04 16:57:23
       | 
| Revision: 2124
          http://svn.sourceforge.net/selinux/?rev=2124&view=rev
Author:   ssmalley
Date:     2007-01-04 08:57:22 -0800 (Thu, 04 Jan 2007)
Log Message:
-----------
Author: Daniel J Walsh
Email: dw...@re...
Subject: Policycoreutils patches
Date: Wed, 03 Jan 2007 13:05:22 -0500
Bunch of patches separated so you can approve/deny them separately.
avc patch Removes optional_policy name from audit2allow
pyver patch removes hardcoding of python version from makefile.  Will 
use version of installed python version.
newrole patch to use O_RDWR for terminals to fix more problem.
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
    trunk/policycoreutils/audit2allow/Makefile
    trunk/policycoreutils/audit2allow/avc.py
    trunk/policycoreutils/newrole/newrole.c
    trunk/policycoreutils/semanage/Makefile
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-04 16:50:14 UTC (rev 2123)
+++ trunk/policycoreutils/ChangeLog	2007-01-04 16:57:22 UTC (rev 2124)
@@ -1,4 +1,10 @@
-1.33.7 2007-1-3
+1.33.8 2007-01-04
+	* Merged patches from Dan Walsh to:
+	  - omit the optional name from audit2allow
+	  - use the installed python version in the Makefiles
+	  - re-open the tty with O_RDWR in newrole
+
+1.33.7 2007-01-03
 	* Patch from Dan Walsh to correctly suppress warnings in load_policy.
 	
 1.33.6 2006-11-29
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-01-04 16:50:14 UTC (rev 2123)
+++ trunk/policycoreutils/VERSION	2007-01-04 16:57:22 UTC (rev 2124)
@@ -1 +1 @@
-1.33.7
+1.33.8
Modified: trunk/policycoreutils/audit2allow/Makefile
===================================================================
--- trunk/policycoreutils/audit2allow/Makefile	2007-01-04 16:50:14 UTC (rev 2123)
+++ trunk/policycoreutils/audit2allow/Makefile	2007-01-04 16:57:22 UTC (rev 2124)
@@ -4,7 +4,7 @@
 LIBDIR ?= $(PREFIX)/lib
 MANDIR ?= $(PREFIX)/share/man
 LOCALEDIR ?= /usr/share/locale
-PYLIBVER ?= python2.4
+PYLIBVER ?= $(shell python -c 'import sys;print "python%d.%d" % sys.version_info[0:2]')
 PYTHONLIBDIR ?= $(LIBDIR)/$(PYLIBVER)
 
 TARGETS=audit2allow
Modified: trunk/policycoreutils/audit2allow/avc.py
===================================================================
--- trunk/policycoreutils/audit2allow/avc.py	2007-01-04 16:50:14 UTC (rev 2123)
+++ trunk/policycoreutils/audit2allow/avc.py	2007-01-04 16:57:22 UTC (rev 2124)
@@ -231,7 +231,7 @@
 		else:
 			file = m[0][1]
 			ret = "\n#%s\n"% self.out()
-			ret += "optional_policy(`%s', `\n" % m[0][1]
+			ret += "optional_policy(`\n" 
 			first = True
 			for i in m:
 				if file != i[1]:
Modified: trunk/policycoreutils/newrole/newrole.c
===================================================================
--- trunk/policycoreutils/newrole/newrole.c	2007-01-04 16:50:14 UTC (rev 2123)
+++ trunk/policycoreutils/newrole/newrole.c	2007-01-04 16:57:22 UTC (rev 2124)
@@ -1120,10 +1120,10 @@
 	fd = open(ttyn, O_RDONLY);
 	if (fd != 0)
 		goto err_close_pam;
-	fd = open(ttyn, O_WRONLY);
+	fd = open(ttyn, O_RDWR);
 	if (fd != 1)
 		goto err_close_pam;
-	fd = open(ttyn, O_WRONLY);
+	fd = open(ttyn, O_RDWR);
 	if (fd != 2)
 		goto err_close_pam;
 
Modified: trunk/policycoreutils/semanage/Makefile
===================================================================
--- trunk/policycoreutils/semanage/Makefile	2007-01-04 16:50:14 UTC (rev 2123)
+++ trunk/policycoreutils/semanage/Makefile	2007-01-04 16:57:22 UTC (rev 2124)
@@ -3,7 +3,7 @@
 LIBDIR ?= $(PREFIX)/lib
 SBINDIR ?= $(PREFIX)/sbin
 MANDIR = $(PREFIX)/share/man
-PYLIBVER ?= python2.4
+PYLIBVER ?= $(shell python -c 'import sys;print "python%d.%d" % sys.version_info[0:2]')
 PYTHONLIBDIR ?= $(LIBDIR)/$(PYLIBVER)
 
 TARGETS=semanage
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2007-01-05 19:14:02
       | 
| Revision: 2151
          http://svn.sourceforge.net/selinux/?rev=2151&view=rev
Author:   ssmalley
Date:     2007-01-05 11:13:58 -0800 (Fri, 05 Jan 2007)
Log Message:
-----------
Author: Daniel J Walsh
Email: dw...@re...
Subject: Policycoreutils patches
Date: Thu, 04 Jan 2007 17:07:56 -0500
Ok this part of the seobject patch should not be controversial.
This patch fixes modification of roles.
>   
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
    trunk/policycoreutils/semanage/seobject.py
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-05 14:46:02 UTC (rev 2150)
+++ trunk/policycoreutils/ChangeLog	2007-01-05 19:13:58 UTC (rev 2151)
@@ -1,3 +1,6 @@
+1.33.9 2007-01-05
+	* Merged patch to fix seobject role modification from Dan Walsh.
+
 1.33.8 2007-01-04
 	* Merged patches from Dan Walsh to:
 	  - omit the optional name from audit2allow
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-01-05 14:46:02 UTC (rev 2150)
+++ trunk/policycoreutils/VERSION	2007-01-05 19:13:58 UTC (rev 2151)
@@ -1 +1 @@
-1.33.8
+1.33.9
Modified: trunk/policycoreutils/semanage/seobject.py
===================================================================
--- trunk/policycoreutils/semanage/seobject.py	2007-01-05 14:46:02 UTC (rev 2150)
+++ trunk/policycoreutils/semanage/seobject.py	2007-01-05 19:13:58 UTC (rev 2151)
@@ -525,8 +525,12 @@
 				semanage_user_set_prefix(self.sh, u, prefix)
 
 			if len(roles) != 0:
-				for r in roles:
-					semanage_user_add_role(self.sh, u, r)
+                               for r in rlist:
+                                      if r not in roles:
+                                             semanage_user_del_role(u, r)
+                               for r in roles:
+                                      if r not in rlist:
+                                             semanage_user_add_role(self.sh, u, r)
 
 			rc = semanage_begin_transaction(self.sh)
 			if rc < 0:
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <mad...@us...> - 2007-01-08 20:36:40
       | 
| Revision: 2158
          http://svn.sourceforge.net/selinux/?rev=2158&view=rev
Author:   madmethod
Date:     2007-01-08 12:36:39 -0800 (Mon, 08 Jan 2007)
Log Message:
-----------
version bump for policycoreutils 1.33.10
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-08 20:35:21 UTC (rev 2157)
+++ trunk/policycoreutils/ChangeLog	2007-01-08 20:36:39 UTC (rev 2158)
@@ -1,3 +1,7 @@
+1.33.10 2007-01-08
+	* Merged patch to correctly handle a failure during semanage handle
+	  creation from Karl MacMillan.
+
 1.33.9 2007-01-05
 	* Merged patch to fix seobject role modification from Dan Walsh.
 
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-01-08 20:35:21 UTC (rev 2157)
+++ trunk/policycoreutils/VERSION	2007-01-08 20:36:39 UTC (rev 2158)
@@ -1 +1 @@
-1.33.9
+1.33.10
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2007-01-09 20:50:27
       | 
| Revision: 2164
          http://svn.sourceforge.net/selinux/?rev=2164&view=rev
Author:   ssmalley
Date:     2007-01-09 12:50:22 -0800 (Tue, 09 Jan 2007)
Log Message:
-----------
policycoreutils 1.33.11
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-09 20:47:51 UTC (rev 2163)
+++ trunk/policycoreutils/ChangeLog	2007-01-09 20:50:22 UTC (rev 2164)
@@ -1,3 +1,7 @@
+1.33.11 2007-01-09
+	* Merged fixfiles and seobject fixes from Dan Walsh.
+	* Merged semodule support for list of modules after -i from Karl MacMillan. 
+
 1.33.10 2007-01-08
 	* Merged patch to correctly handle a failure during semanage handle
 	  creation from Karl MacMillan.
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-01-09 20:47:51 UTC (rev 2163)
+++ trunk/policycoreutils/VERSION	2007-01-09 20:50:22 UTC (rev 2164)
@@ -1 +1 @@
-1.33.10
+1.33.11
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2007-01-11 17:28:04
       | 
| Revision: 2168
          http://svn.sourceforge.net/selinux/?rev=2168&view=rev
Author:   ssmalley
Date:     2007-01-11 09:28:00 -0800 (Thu, 11 Jan 2007)
Log Message:
-----------
Author: Daniel J Walsh
Email: dw...@re...
Subject: newrole patch
Date: Tue, 09 Jan 2007 10:10:28 -0500
Update newrole to call selinux_check_securetty_context()
for -l and refuse to change levels if the tty is not "secure".
[sds:  Update for new return value convention of the function.]
Acked-by:  Stephen Smalley <sd...@ty...>
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/newrole/newrole.c
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-11 17:19:04 UTC (rev 2167)
+++ trunk/policycoreutils/ChangeLog	2007-01-11 17:28:00 UTC (rev 2168)
@@ -1,3 +1,5 @@
+	* Merged newrole securetty check from Dan Walsh.
+
 1.33.11 2007-01-09
 	* Merged fixfiles and seobject fixes from Dan Walsh.
 	* Merged semodule support for list of modules after -i from Karl MacMillan. 
Modified: trunk/policycoreutils/newrole/newrole.c
===================================================================
--- trunk/policycoreutils/newrole/newrole.c	2007-01-11 17:19:04 UTC (rev 2167)
+++ trunk/policycoreutils/newrole/newrole.c	2007-01-11 17:28:00 UTC (rev 2168)
@@ -741,6 +741,7 @@
 	char *level_s = NULL;	/* level spec'd by user in argv[] */
 	char *range_ptr = NULL;
 	security_context_t new_con = NULL;
+	security_context_t tty_con = NULL;
 	context_t context = NULL; /* manipulatable form of new_context */
 	const struct option long_options[] = {
 		{"role", 1, 0, 'r'},
@@ -793,6 +794,15 @@
 					"specified\n"));
 				return -1;
 			}
+			if (fgetfilecon(0,&tty_con) >= 0) {
+				if (selinux_check_securetty_context(tty_con) < 0) {
+					fprintf(stderr, _("Error: you are not allowed to change levels on a non secure terminal\n"));
+					freecon(tty_con);
+					return -1;
+				}
+				freecon(tty_con);
+			}
+
 			level_s = optarg;
 			break;
 		default:
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2007-01-11 17:37:32
       | 
| Revision: 2169
          http://svn.sourceforge.net/selinux/?rev=2169&view=rev
Author:   ssmalley
Date:     2007-01-11 09:37:31 -0800 (Thu, 11 Jan 2007)
Log Message:
-----------
Author: Karl MacMillan
Email: kma...@me...
Subject: allow semodule -i to accept list of modules
Date: Tue, 09 Jan 2007 16:52:40 -0500
On Tue, 2007-01-09 at 15:43 -0500, Stephen Smalley wrote:
> On Tue, 2007-01-09 at 15:17 -0500, Stephen Smalley wrote:
> > On Tue, 2007-01-09 at 11:17 -0500, Joshua Brindle wrote:
> > > Karl MacMillan wrote:
> > > > The following patch allows semodule to handle a list of modules for
> > > > installation (i.e., semodule -i *.pp now works).
> > > >
> > > > Signed-off-by: Karl MacMillan <kma...@me...>
> > > >
> > > >   
> > > Acked-By: Joshua Brindle <jbr...@tr...>
> > 
> > Acked-by:  Stephen Smalley <sd...@ty...>
> > 
> > This means we can also update the semodule man page to remove the gross
> > hack we came up with to workaround the absence of such support,
> >        # Replace all modules with the ones in the current directory
> >        $ semodule -b base.pp ?\226?\128?\152semodule -l | awk ?\226?\128?\153{print "-i " $1
> > ".pp"}?\226?\128?\153?\226?\128?\152
> 
> BTW, any reason we wouldn't support the same thing for -u or -r?
> 
Patch below. It is less useful for -r, but still potentially easier. As
for the man page, that is updated but the command for updating
from /usr/share/selinux/policyname still sucks. I came up with:
ls *.pp | grep -Ev "base.pp|enableaudit.pp" | xargs /usr/sbin/semodule
-i
Gets rid of awk (so it is potentially easier for many), but it is
longer. At some point someone should make semodule just do the right
thing for a mixed list of modules and base modules. Of course, even that
wouldn't work for the /usr/share/selinux directories because of
enableaudit, so I give up.
Signed-off-by: Karl MacMillan <kma...@me...>
[sds:  Modified the man page.]
Acked-by:  Stephen Smalley <sd...@ty...>
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/po/kn.po
    trunk/policycoreutils/semodule/semodule.8
    trunk/policycoreutils/semodule/semodule.c
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-11 17:28:00 UTC (rev 2168)
+++ trunk/policycoreutils/ChangeLog	2007-01-11 17:37:31 UTC (rev 2169)
@@ -1,4 +1,5 @@
 	* Merged newrole securetty check from Dan Walsh.
+	* Merged semodule patch to generalize list support from Karl MacMillan.
 
 1.33.11 2007-01-09
 	* Merged fixfiles and seobject fixes from Dan Walsh.
Modified: trunk/policycoreutils/po/kn.po
===================================================================
(Binary files differ)
Modified: trunk/policycoreutils/semodule/semodule.8
===================================================================
--- trunk/policycoreutils/semodule/semodule.8	2007-01-11 17:28:00 UTC (rev 2168)
+++ trunk/policycoreutils/semodule/semodule.8	2007-01-11 17:37:31 UTC (rev 2169)
@@ -52,14 +52,16 @@
 
 .SH EXAMPLE
 .nf
-# Install a base policy package.
+# Install or replace a base policy package.
 $ semodule -b base.pp
-# Install a non-base policy package.
+# Install or replace a non-base policy package.
 $ semodule -i httpd.pp
 # List non-base modules.
 $ semodule -l
-# Replace all modules with the ones in the current directory
-$ semodule -b base.pp `semodule -l | awk '{print "-i " $1 ".pp"}'`
+# Install or replace all non-base modules in the current directory.
+$ semodule -i *.pp
+# Install or replace all modules in the current directory.
+$ ls *.pp | grep -Ev "base.pp|enableaudit.pp" | xargs /usr/sbin/semodule -b base.pp -i
 .fi
 
 .SH SEE ALSO
Modified: trunk/policycoreutils/semodule/semodule.c
===================================================================
--- trunk/policycoreutils/semodule/semodule.c	2007-01-11 17:28:00 UTC (rev 2168)
+++ trunk/policycoreutils/semodule/semodule.c	2007-01-11 17:37:31 UTC (rev 2169)
@@ -238,13 +238,17 @@
 	}
 
 	if (optind < argc) {
-		/* if -i was the last command treat any remaining
-		 * arguments as modules to allow 'semodule -i *.pp' to
+		int mode;
+		/* if -i/u/r was the last command treat any remaining
+		 * arguments as args. Will allow 'semodule -i *.pp' to
 		 * work as expected.
 		 */
 		if (commands[num_commands - 1].mode == INSTALL_M) {
-			while (optind < argc)
-				set_mode(INSTALL_M, argv[optind++]);
+			mode = INSTALL_M;
+		} else if (commands[num_commands - 1].mode == UPGRADE_M) {
+			mode = UPGRADE_M;
+		} else if (commands[num_commands - 1].mode == REMOVE_M) {
+			mode = REMOVE_M;
 		} else {
 			fprintf(stderr, "unknown additional arguments:\n");
 			while (optind < argc)
@@ -253,6 +257,8 @@
 			usage(argv[0]);
 			exit(1);
 		}
+		while (optind < argc)
+			set_mode(mode, argv[optind++]);
 	}
 }
 
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2007-01-11 17:42:46
       | 
| Revision: 2170
          http://svn.sourceforge.net/selinux/?rev=2170&view=rev
Author:   ssmalley
Date:     2007-01-11 09:42:45 -0800 (Thu, 11 Jan 2007)
Log Message:
-----------
1.33.12
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-11 17:37:31 UTC (rev 2169)
+++ trunk/policycoreutils/ChangeLog	2007-01-11 17:42:45 UTC (rev 2170)
@@ -1,3 +1,4 @@
+1.33.12 2007-01-11
 	* Merged newrole securetty check from Dan Walsh.
 	* Merged semodule patch to generalize list support from Karl MacMillan.
 
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-01-11 17:37:31 UTC (rev 2169)
+++ trunk/policycoreutils/VERSION	2007-01-11 17:42:45 UTC (rev 2170)
@@ -1 +1 @@
-1.33.11
+1.33.12
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <kma...@us...> - 2007-01-16 15:39:31
       | 
| Revision: 2176
          http://svn.sourceforge.net/selinux/?rev=2176&view=rev
Author:   kmacmillan
Date:     2007-01-16 07:39:25 -0800 (Tue, 16 Jan 2007)
Log Message:
-----------
policycoreutils 1.33.13
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-16 15:36:53 UTC (rev 2175)
+++ trunk/policycoreutils/ChangeLog	2007-01-16 15:39:25 UTC (rev 2176)
@@ -1,3 +1,6 @@
+1.33.13 2007-01-16
+	* Merged patch to fix python unicode problem from Dan Walsh.
+	
 1.33.12 2007-01-11
 	* Merged newrole securetty check from Dan Walsh.
 	* Merged semodule patch to generalize list support from Karl MacMillan.
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-01-16 15:36:53 UTC (rev 2175)
+++ trunk/policycoreutils/VERSION	2007-01-16 15:39:25 UTC (rev 2176)
@@ -1 +1 @@
-1.33.12
+1.33.13
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2007-01-16 19:06:45
       | 
| Revision: 2179
          http://svn.sourceforge.net/selinux/?rev=2179&view=rev
Author:   ssmalley
Date:     2007-01-16 11:06:25 -0800 (Tue, 16 Jan 2007)
Log Message:
-----------
Author: Michael C Thompson
Email: tho...@us...
Subject: clarifications for -l to newrole.1
Date: Sun, 14 Jan 2007 14:02:42 -0600
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
    trunk/policycoreutils/newrole/newrole.1
    trunk/policycoreutils/newrole/newrole.c
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-16 15:45:51 UTC (rev 2178)
+++ trunk/policycoreutils/ChangeLog	2007-01-16 19:06:25 UTC (rev 2179)
@@ -1,3 +1,6 @@
+1.33.14 2007-01-16
+	* Merged newrole man page patch from Michael Thompson.
+
 1.33.13 2007-01-16
 	* Merged patch to fix python unicode problem from Dan Walsh.
 	
@@ -33,7 +36,7 @@
 	  in /usr/share/selinux/<SELINUXTYPE>
 
 1.33.5 2006-11-27
-	* Merged patch from Micheal C Thompson to clean up genhomedircon
+	* Merged patch from Michael C Thompson to clean up genhomedircon
 	  error handling.
 1.33.4 2006-11-21
 	* Merged po file updates from Dan Walsh.
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-01-16 15:45:51 UTC (rev 2178)
+++ trunk/policycoreutils/VERSION	2007-01-16 19:06:25 UTC (rev 2179)
@@ -1 +1 @@
-1.33.13
+1.33.14
Modified: trunk/policycoreutils/newrole/newrole.1
===================================================================
--- trunk/policycoreutils/newrole/newrole.1	2007-01-16 15:45:51 UTC (rev 2178)
+++ trunk/policycoreutils/newrole/newrole.1	2007-01-16 19:06:25 UTC (rev 2179)
@@ -57,16 +57,46 @@
 .B --version
 shows the current version of newrole
 .PP
+.SH EXAMPLE
+.br
+Changing role:
+   # id -Z
+   staff_u:staff_r:staff_t:SystemLow-SystemHigh
+   # newrole -r sysadm_r
+   # id -Z
+   staff_u:sysadm_r:sysadm_t:SystemLow-SystemHigh
+
+Changing sensitivity only:
+   # id -Z
+   staff_u:sysadm_r:sysadm_t:Unclassified-SystemHigh
+   # newrole -l Secret
+   # id -Z
+   staff_u:sysadm_r:sysadm_t:Secret-SystemHigh
+
+.PP
+Changing sensitivity and clearance:
+   # id -Z
+   staff_u:sysadm_r:sysadm_t:Unclassified-SystemHigh
+   # newrole -l Secret-Secret
+   # id -Z
+   staff_u:sysadm_r:sysadm_t:Secret
+
 .SH FILES
 /etc/passwd - user account information
 .br
 /etc/shadow - encrypted passwords and age information
+.br
+/etc/selinux/<policy>/contexts/default_type - default types for roles
+/etc/selinux/<policy>/contexts/securetty_types - securetty types for level changes
+.br
 .SH SEE ALSO
-.B su
-(1),
-.B runas
+.B runcon
 (1)
 .SH AUTHORS
 .nf
-Tim Fraser (tf...@ti...) 
-Anthony Colatrella (am...@ep...)
+Anthony Colatrella
+Tim Fraser
+Steve Grubb <sg...@re...>
+Darrel Goeddel <DGo...@tr...>
+Michael Thompson <mct...@us...>
+Dan Walsh <dw...@re...>
Modified: trunk/policycoreutils/newrole/newrole.c
===================================================================
--- trunk/policycoreutils/newrole/newrole.c	2007-01-16 15:45:51 UTC (rev 2178)
+++ trunk/policycoreutils/newrole/newrole.c	2007-01-16 19:06:25 UTC (rev 2179)
@@ -36,9 +36,13 @@
  * setuid root, so that it can read the shadow passwd file.
  * 
  *
- * Authors:  Tim Fraser , 
- *           Anthony Colatrella <am...@ep...>
- * Various bug fixes by Stephen Smalley <sd...@ep...>
+ * Authors:
+ *      Anthony Colatrella
+ *	Tim Fraser
+ *	Steve Grubb <sg...@re...>
+ *	Darrel Goeddel <DGo...@tr...>
+ *	Michael Thompson <mct...@us...>
+ *	Dan Walsh <dw...@re...>
  *
  *************************************************************************/
 
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2007-01-18 14:53:15
       | 
| Revision: 2194
          http://svn.sourceforge.net/selinux/?rev=2194&view=rev
Author:   ssmalley
Date:     2007-01-18 06:53:11 -0800 (Thu, 18 Jan 2007)
Log Message:
-----------
policycoreutils 1.33.16
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-18 14:49:39 UTC (rev 2193)
+++ trunk/policycoreutils/ChangeLog	2007-01-18 14:53:11 UTC (rev 2194)
@@ -1,3 +1,7 @@
+1.33.16 2007-01-18
+	* Merged po file updates from Dan Walsh.
+	* Removed update-po from all target in po/Makefile.
+
 1.33.15 2007-01-17
 	* Merged unicode-to-string fix for seobject audit from Dan Walsh.
 	* Merged man page updates to make "apropos selinux" work from Dan Walsh.
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-01-18 14:49:39 UTC (rev 2193)
+++ trunk/policycoreutils/VERSION	2007-01-18 14:53:11 UTC (rev 2194)
@@ -1 +1 @@
-1.33.15
+1.33.16
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <ssm...@us...> - 2007-01-22 18:35:06
       | 
| Revision: 2199
          http://svn.sourceforge.net/selinux/?rev=2199&view=rev
Author:   ssmalley
Date:     2007-01-22 10:34:12 -0800 (Mon, 22 Jan 2007)
Log Message:
-----------
Fixed newrole non-pam build.
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
    trunk/policycoreutils/newrole/newrole.c
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-01-18 15:09:00 UTC (rev 2198)
+++ trunk/policycoreutils/ChangeLog	2007-01-22 18:34:12 UTC (rev 2199)
@@ -1,3 +1,6 @@
+1.34.1 2007-01-22
+	* Fixed newrole non-pam build.
+
 1.34.0 2007-01-18
 	* Updated version for stable branch.
 
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-01-18 15:09:00 UTC (rev 2198)
+++ trunk/policycoreutils/VERSION	2007-01-22 18:34:12 UTC (rev 2199)
@@ -1 +1 @@
-1.34.0
+1.34.1
Modified: trunk/policycoreutils/newrole/newrole.c
===================================================================
--- trunk/policycoreutils/newrole/newrole.c	2007-01-18 15:09:00 UTC (rev 2198)
+++ trunk/policycoreutils/newrole/newrole.c	2007-01-22 18:34:12 UTC (rev 2199)
@@ -944,11 +944,11 @@
 	int preserve_environment;
 
 	int fd;
-	int rc;
 	pid_t childPid = 0;
 	char *shell_argv0 = NULL;
 
 #ifdef USE_PAM
+	int rc;
 	int pam_status;		   /* pam return code */
 	pam_handle_t *pam_handle;  /* opaque handle used by all PAM functions */
 
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 | 
| 
      
      
      From: <kma...@us...> - 2007-02-08 21:00:46
       | 
| Revision: 2232
          http://svn.sourceforge.net/selinux/?rev=2232&view=rev
Author:   kmacmillan
Date:     2007-02-08 13:00:40 -0800 (Thu, 08 Feb 2007)
Log Message:
-----------
changelog and 2.0.1 of policycoreutils
Modified Paths:
--------------
    trunk/policycoreutils/ChangeLog
    trunk/policycoreutils/VERSION
Modified: trunk/policycoreutils/ChangeLog
===================================================================
--- trunk/policycoreutils/ChangeLog	2007-02-08 20:56:25 UTC (rev 2231)
+++ trunk/policycoreutils/ChangeLog	2007-02-08 21:00:40 UTC (rev 2232)
@@ -1,3 +1,6 @@
+2.0.1 2007-02-08
+	* Merged small fix to correct include of errcodes.h in semodule_deps from Dan Walsh.
+
 2.0.0 2007-02-05
 	* Merged new audit2allow from Karl MacMillan.
 	  This audit2allow depends on the new sepolgen python module.
Modified: trunk/policycoreutils/VERSION
===================================================================
--- trunk/policycoreutils/VERSION	2007-02-08 20:56:25 UTC (rev 2231)
+++ trunk/policycoreutils/VERSION	2007-02-08 21:00:40 UTC (rev 2232)
@@ -1 +1 @@
-2.0.0
+2.0.1
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
 |