Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: policycoreutils-lang | Distribution: SUSE Linux Framework One |
Version: 3.5 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: slfo.1.1.25 | Build date: Wed Oct 25 12:00:36 2023 |
Group: System/Localization | Build host: reproducible |
Size: 387612 | Source RPM: policycoreutils-3.5-slfo.1.1.25.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://github.com/SELinuxProject/selinux | |
Summary: Translations for package policycoreutils |
Provides translations for the "policycoreutils" package.
GPL-2.0-or-later
* Wed Oct 25 2023 cathy.hu@suse.com - Add reproducible-build.patch to make the output of "sepolicy manpage" deterministic (bsc#1216452) * Tue May 09 2023 daniel.garcia@suse.com - Add python-wheel build dependency to build correctly with latest python-pip version. * Fri Feb 24 2023 jsegitz@suse.com - Update to version 3.5 * fixfiles: Unmount temporary bind mounts on SIGINT * Lots of smaller changes - Refreshed get_os_version.patch - Drop chcat_handle_missing_translations.patch, is upstream - Add additional BuildRequires for python - Added additional developer key (Jason Zaman) - Add requires for python3-distro for the devel package * Mon Dec 19 2022 gmbr3@opensuse.org - Use %_pam_vendordir * Fri Dec 16 2022 schubi@suse.com - Error in spec file: No "config" tag in "/usr/ should be used. * Fri Dec 09 2022 schubi@suse.com - Migration PAM settings to /usr/etc: Saving user changed configuration files in /etc and restoring them while an RPM update. * Mon Jul 25 2022 jsegitz@suse.com - Add recommends for ausearch binary (bsc#1201043) * Wed Jun 22 2022 jsegitz@suse.com - Handle missing translations properly in chcat. Added chcat_handle_missing_translations.patch (bsc#1200752) * Tue Jun 21 2022 dimstar@opensuse.org - Build and package translations for python-utils (boo#1200752). * Mon May 09 2022 jsegitz@suse.com - Update to version 3.4 * fixfiles: Use parallel relabeling - Refreshed patches * get_os_version.patch * run_init.pamd.patch * Wed Apr 20 2022 dimstar@opensuse.org - Fix file list: package ru/man8/sepolgen.8 only in the devel package (was in devel and main). * Thu Nov 25 2021 jsegitz@suse.com - finish UsrMerge (bsc#1191089) * Wed Nov 24 2021 jsegitz@suse.com - Add run_init.pamd.patch to adjust to SUSE pam setup. Removed run_init_use_pam_keyinit.patch and included it in the new patch (bsc#1190098) * Thu Nov 11 2021 jsegitz@suse.com - Update to version 3.3 * Lots of fuzzing fixes * `fixfiles -C` doesn't exclude /dev and /run anymore Refreshed get_os_version.patch * Tue Mar 09 2021 jsegitz@suse.com - Update to version 3.2 * Tools using sepolgen, e.g. audit2allow, print extended permissions in hexadecimal * sepolgen sorts extended rules like normal ones * `setfiles` doesn't abort on labeling errors - Refreshed get_os_version.patch * Thu Sep 10 2020 jsegitz@suse.com - Add get_os_version.patch get_os_version is implemented in a very RH/Fedora specific way. Ensure that it returns a valid string for SUSE by changing the default. Also remove the RH specific logic when generating HTML versions of the SELinux documentation * Wed Jul 29 2020 kukuk@suse.com - Align more with Fedora spec file to get rid of python dependencies in the core system - create new python-utils sub-package - move some tools to devel sub-package - Cleanup dependencies * Fri Jul 17 2020 jsegitz@suse.com - Proper default permissions for newrole (4755) * Tue Jul 14 2020 jsegitz@suse.com - Update to version 3.1 * New `setfiles -E` option - treat conflicting specifications as errors, such as where two hardlinks for the same inode have different contexts. * `setsebool -V` reports errors from commit phase * matchpathcon related interfaces are deprecated * New `restorecon -x` option which prevents it from crossing file system * boundaries. * `sepolgen-ifgen` parses a gen_tunable statement as bool * Removed Requires for python3-ipy as the ipaddress module is used. No requires for python-ipaddress as it's assumed this is used only on recent systems * Drop chcat_join.patch, is upstream * Thu Jun 04 2020 dimstar@opensuse.org - Pass the right value for LIBEXECDIR to make / make install instead of trying to move the file around post install. This caters for the planned change of libexecdir to change from /usr/lib to /usr/libexec by injecting the right value no matter what. * Fri May 29 2020 jsegitz@suse.de - Move pp binary to libexec directory instead of lib * Mon Mar 09 2020 jsegitz@suse.de - Dropped Recommends: for %{name}-lang and %{name}-devel. Not allowed by openSUSE guidelines * Tue Mar 03 2020 jsegitz@suse.de - Update to version 3.0 * fixfiles: Fix "verify" option * fixfiles: Fix [-B] [-F] onboot * fixfiles: Force full relabel when SELinux is disabled * semodule: Enable CIL logging * semanage: Add support for DCCP and SCTP protocols * semanage: Do not use default s0 range in "semanage login -a" * semanage: Document DCCP and SCTP support * semanage: Improve handling of "permissive" statements * semanage: fix moduleRecords.customized() Refreshed chcat_join.patch * Thu Feb 27 2020 jsegitz@suse.de - Ship working pam config for newrole (bsc#1163020) - Recommend policycoreutils-devel to have perm_map file available * Wed Feb 19 2020 jsegitz@suse.de - Package perm_map as it's used by audit2* tools * Tue Dec 17 2019 jsegitz@suse.de - Added chcat_join.patch to prevent joining non-existing categories (bsc#1159262) * Wed Sep 18 2019 jsegitz@suse.de - Added run_init_use_pam_keyinit.patch Added pam_keyinit to the run_init pam config (bsc#1144052) * Wed Mar 20 2019 jsegitz@suse.com - Update to version 2.9 * secon: free scon_trans before returning * audit2allow/sepolgen-ifgen: show errors on stderr * audit2allow: allow using audit2why as non-root user * chcat: use check_call instead of getstatusoutput * restorecon: add force option * semanage module: Fix handling of -a/-e/-d/-r options * semanage/seobject: Fix listing boolean values * semanage: Drop python shebang from seobject.py * semanage: Fix logger class definition * semanage: Include MCS/MLS range when exporting local customizations * semanage: Load a store policy and set the store SELinux policy root * semanage: Start exporting "ibendport" and "ibpkey" entries * semanage: Stop logging loginRecords changes * semanage: Stop rejecting aliases in semanage commands * semanage: Use standard argparse.error() method in handlePermissive * semanage: do not show "None" levels when using a non-MLS policy * semanage: import sepolicy only when it's needed * semanage: move valid_types initialisations to class constructors * sepolgen: close /etc/selinux/sepolgen.conf after parsing it * sepolgen: fix access vector initialization * sepolgen: fix refpolicy parsing of "permissive" * sepolgen: print all AV rules correctly * sepolgen: refpolicy installs its Makefile in include/Makefile * sepolgen: return NotImplemented instead of raising it * sepolgen: silence linter warning about has_key * sepolgen: use self when accessing members in FilesystemUse * sepolicy: Add sepolicy.load_store_policy(store) * sepolicy: Make policy files sorting more robust * sepolicy: Stop rejecting aliases in sepolicy commands * sepolicy: Update to work with setools-4.2.0 * sepolicy: add missing % in network tab help text * sepolicy: initialize mislabeled_files in __init__() * sepolicy: search() also for dontaudit rules * add xperms support to audit2allow * replace aliases with corresponding type names - Dropped python3.patch, upstream now * Wed Feb 13 2019 jsegitz@suse.com - Make sure current devel package conflicts with old policycoreutils-python (bsc#1124437) * Tue Feb 05 2019 jengelh@inai.de - Replace overly complicated %setup calls. * Mon Feb 04 2019 jsegitz@suse.com - Removed hardcoded python 3.6 path from spec file * Thu Jan 31 2019 bwiedemann@suse.com - Fix build with python 3.7 * Fri Jan 11 2019 jsegitz@suse.com - Required python3-policycoreutils instead of just recommending it for policycoreutils (bsc#1121455) - Added requires for python3-setuptools to python3-policycoreutils (bsc#1121455) - Removed requires for audit-libs-python from policycoreutils (bsc#1121455) * Mon Jan 07 2019 mrueckert@suse.de - properly obsolete/provides for policycoreutils-python - remove unneeded obsolete from the devel package * Fri Dec 07 2018 jsegitz@suse.com - Don't require selinux-policy-devel for the devel package * Fri Dec 07 2018 jsegitz@suse.com - Obsolete policycoreutils-python in policycoreutils and policycoreutils-devel to prevent file conflicts * Wed Nov 21 2018 jsegitz@suse.com - Included content of selinux-python-2.8 and semodule-utils-2.8. I think it's easier to have all the relevant binaries in the policycoreutils package (bsc#1116596). Added make_targets.patch for this - Removed restorecond, is now a separate package - Added python3.patch to use python3 interpreter - New runtime requires: * libsepol1 * python3-ipy * python3-networkx * python3-semanage - Provides and obsolete policycoreutils-python * Thu Nov 08 2018 jsegitz@suse.com - Adjusted source urls (bsc#1115052) * Wed Oct 17 2018 jsegitz@suse.com - Update to version 2.8 (bsc#1111732) For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt * Wed May 16 2018 mcepl@suse.com - Rebase to 2.7 * Rather large rewrite of the SPEC file * Significantly, support for python2 removed For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt - Dropped patches: * policycoreutils-initscript.patch * policycoreutils-pam-common.patch * loadpolicy_path.patch * CVE-2018-1063.patch * Mon Apr 30 2018 dimstar@opensuse.org - Don't build policycoreutils-gui for anything suse_version >= 1500: there is no reason te believe that SLE16 will have those old, depreacted dependencies back. Fixes also the issues for Tumbleweed, where -gui was not installable. * Thu Apr 26 2018 jsegitz@suse.com - SLE 15 doesn't have the necessary files for policycoreutils-gui, don't build it there * Wed Apr 25 2018 jsegitz@suse.com - Drop the requirement for selinux-policy for the gui tools. * Tue Mar 27 2018 tchvatal@suse.com - Drop SLE11 support, needs the audit that is not present on SLE11 - Fix service link to actually work on current releases - Drop SUSE_ASNEEDED=0 as it seems to build fine without it - Do not depend on systemd, just systemd-rpm-macros * Wed Mar 21 2018 jsegitz@suse.com - Added CVE-2018-1063.patch to prevent chcon from following symlinks in /tmp, /var/tmp, /var/run and /var/lib/debug (bsc#1083624, CVE-2018-1063) * Tue Mar 20 2018 jsegitz@suse.com - Remove BuildRequires for libcgroup-devel (bsc#1085837) * Thu Dec 21 2017 jsegitz@suse.com - Removed BuildRequires for setools-devel and added new runtime requirement for python2-networkx * Mon Nov 27 2017 rbrown@suse.com - Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468) * Fri Nov 24 2017 jsegitz@suse.com - Update to policycoreutils version 2.6. Notable changes: * setfiles: reverse the sense of -D option * sandbox: Use dbus-run-session instead of dbus-launch when available * setfiles: Utility to find security.restorecon_last entries * setfiles: Add option to stop setting the digest * hll/pp: Change warning for module name not matching filename to match new behavior * sepolicy: convert to setools4 * sandbox: create a new session for sandboxed processes * sandbox: do not try to setup directories without -X or -M * sandbox: do not run xmodmap in a new X session * sandbox: fix file labels on copied files * semanage: Fix semanage fcontext -D * semanage: Default serange to "s0" for port modify * semanage: Use socket.getprotobyname for protocol * semanage: Add auditing of changes in records * Improve compatibility with Python 3 * Update sandbox types in sandbox manual * hll/pp: Warn if module name different than output filename - Update to sepolgen version 2.6. Notable changes: * Add support for TYPEBOUNDS statement in INTERFACE policy files - Dropped CVE-2016-7545_sandbox_escape.patch * Mon Dec 19 2016 jsegitz@novell.com - Added CVE-2016-7545_sandbox_escape.patch to fix CVE-2016-7545, bsc#1000998 Sandboxed session could have escaped to the parent session * Sat Jul 23 2016 jengelh@inai.de - Trim description in line with other selinux packages * Thu Jul 14 2016 jsegitz@novell.com - Changes submitted by MargueriteSu: Update to version 2.5 * sepolicy: Do not overwrite CFLAGS, from Nicolas Iooss. * sepolicy: Rename policy global variable conflict, from Nicolas Iooss. * newrole: Add missing defined in #if, from Nicolas Iooss. * newrole: Add description of missing parameter -p in newrole man page, from Lukas Vrabec. * secon: Add missing descriptions for --*-key params in secon man page, from Lukas Vrabec * semanage: List reserve_port_t in semanage port -l, from Petr Lautrbach. * chcat: Add a fallback in case os.getlogin() returns nothing, from Laurent Bigonville. * semanage: fix 'semanage permissions -l' subcommand, from Petr Lautrbach. * semanage: replace string.join() with str.join(), from Petr Lautrbach. * Man page warning fixes, from Ville Skyttä. * sandbox: Fix sandbox to propagate specified MCS/MLS Security Level, from Miroslav Grepl. * semanage: Require at least one argument for 'semanage permissive -d', from Petr Lautrbach. * sepolicy: Improve sepolicy command line interface, from Petr Lautrbach. * audit2allow/why: ignore setlocale errors, from Petr Lautrbach. * semodule: Add --extract/-E, --cil/-c, and --hll/-H to extract modules, from Yuli Khodorkovskiy. * audit2allow: Comment constraint rules in output, from Miroslav Grepl via Petr Lautrbach. * Fix PEP8 issues, from Jason Zaman. * semanage: fix moduleRecords deleteall method, from Stephen Smalley. * Improve compatibility with Python 3, from Michal Srb. * semanage: Set self.sename to sename after calling semanage_seuser_set_sename(), from Laurent Bigonville. * semanage: Fix typo in semanage args for minimium policy store, from Petr Lautrbach. * sepolicy: Only invoke RPM on RPM-enabled Linux distributions, from Sven Vermeulen. * mcstransd: don't reinvent getpeercon, from Stephen Smalley. * setfiles/restorecon: fix -r/-R option, from Petr Lautrbach. * org.selinux.policy: Require auth_admin_keep for all actions, from Stephen Smalley. * hll: Move core functions of pp to libsepol, from James Carter * run_init: Use a ring buffer in open_init_pty, from Jason Zaman. * run_init: fix open_init_pty availability check, from Nicolas Iooss. * Widen Xen IOMEM context entries, from Daniel De Graaf. * Fix -Wformat errors with gcc-5.0.0, from Petr Lautrbach. * Fixed typo/grammatical error, from Christopher Peterson. * Fix typo in semanage-port man page, from Andrew Spiers. Update to version 2.4 * Fix bugs found by hardened gcc flags, from Nicolas Iooss. * Improve support for building with different versions of python from Nicolas Iooss. * Ensure XDG_RUNTIME_DIR is passed through to the sandbox in seunshare, from Dan Walsh * Remove cgroups from sandbox, from Dan Walsh * Try to use setcurrent before setexec in seunshare, from Andy Lutomirski * Stop using the now deprecated flask.h and av_permissions.h, from Stephen Smalley * Add a store root path in semodule, from Yuli Khodorkovskiy * Add a flag to ignore cached CIL files and recompile HLL modules, from Yuli Khodorkovskiy * Add and install HLL compiler for policy packages to CIL. The compiler is installed in /var/libexec/selinux/hll/ by default, from Steve Lawrence * Fixes to pp compiler to better support roles and type attributes, from Yuli Khodorkovskiy * Deprecate base/upgrade/version in semodule. Calling these commands will now call --install on the backend, from Yuli Khodorkovskiy * Add ability to install modules with a specified priority, from Caleb Case * Use /tmp for permissive module creation, by Caleb Case * Update semanage to use new source policy infrastructure, from Jason Dana * Add RuntimeDirectory to mcstrans systemd unit file, from Laurent Bigonville * Wed Nov 05 2014 jsegitz@novell.com - added Requires: python-yum, yum-metadata-parser to fix sepolicy (bnc#903841) * Mon Sep 08 2014 jsegitz@suse.com - removed execute permission from systemd unit file * Sun May 18 2014 crrodriguez@opensuse.org - Version 2.3 sepolgen: Add back attributes flag to fix exception crash from Dan Walsh. (drop policycoreutils-sepolgen_missing_attributes.patch) * Add -P semodule option to man page from Dan Walsh. * selinux_current_policy_path will return none on a disabled SELinux system * Add new icons for sepolicy gui from Dan Walsh. * Only return writeable files that are enabled from Dan Walsh. * Add domain to short list of domains, when -t and -d from Dan Walsh. * Fix up desktop files to match current standards from Dan Walsh. * Add support to return sensitivities and categories for python from Dan Walsh. * Cleanup whitespace from Dan Walsh. * Add message to tell user to install sandbox policy from Dan Walsh. * Add systemd unit file for mcstrans from Laurent Bigonville. * Improve restorecond systemd unit file from Laurent Bigonville. * Minor man pages improvements from Laurent Bigonville. * Ignore selevel/serange if MLS is disabled from Sven Vermeulen. * Revert automatic setting of serange and seuser in seobject; was breaking non-MLS systems. * Apply polkit check on all dbus interfaces and restrict to active user from Dan Walsh. * Fix typo in sepolicy gui dbus.relabel_on_boot call from Dan Walsh. * Remove import policycoreutils.default_encoding_utf8 from semanage from Dan Walsh. * Make yum/extract_rpms optional for sepolicy generate from Dan Walsh. * Add test suite for audit2allow and sepolgen-ifgen from Dan Walsh. * Fri Dec 13 2013 vcizek@suse.com - sepolgen: add back attributes * fixes build of selinux-policy * policycoreutils-sepolgen_missing_attributes.patch * Mon Dec 09 2013 vcizek@suse.com - fix issues which prevented accepting to Factory * mention the dropped patches (merged upstream): - policycoreutils-rhat.patch - policycoreutils-sepolgen.patch * Thu Oct 31 2013 p.drouand@gmail.com - update to version 2.2 * Properly build the swig exception file * Fix man pages * Support overriding PATH and INITDIR in Makefile * Fix LDFLAGS usage * Fix init_policy warning * Fix semanage logging * Open newrole stdin as read/write * Fix sepolicy transition * Support overriding CFLAGS * Create correct man directory for run_init * restorecon GLOB_BRACE change * Extend audit2why to report additional constraint information. * Catch IOError errors within audit2allow * semanage export/import fixes * Improve setfiles progress reporting * Document setfiles -o option in usage * Change setfiles to always return -1 on failure * Improve setsebool error r eporting * Major overhaul of gui * Fix sepolicy handling of non-MLS policy * Support returning type aliases * Add sepolicy tests * Add org.selinux.config.policy * Improve range and user input checking by semanage * Prevent source or target arguments that end with / for substitutions * Allow use of <<none>> for semanage fcontext * Report customized user levels * Support deleteall for restoring disabled modules * Improve semanage error reporting * Only list disabled modules for module locallist * Fix logging * Define new constants for file type character codes * Improve bash completions * Convert semanage to argparse * Add semanage tests * Split semanage man pages * Move bash completion scripts * Replace genhomedircon script with a link to semodule * Fix fixfiles * Add support for systemd service for restorecon * Spelling corrections * Improve sandbox support for home dir symlinks and file caps * Switch sandbox to openbox window manager * Coalesce audit2why and audit2allow * Change audit2allow to append to output file * Update translations * Change audit2why to use selinux_current_policy_path - Update sepolgen to version 1.2 * Return additional constraint information. * Fix bug in calls to attributes * Add support for filename transitions * Fix sepolgen tests - Remove restorecond.service; use upstream service file - Don't provide support for sysvinit and systemd on a same system Use either one or the other * Thu Jun 27 2013 vcizek@suse.com - change the source url to the official release tarballs * Wed Apr 03 2013 vcizek@suse.com - fixed source url - removed old tarball * Fri Mar 29 2013 vcizek@suse.com - update to 2.1.14 * setfiles: estimate percent progress * load_policy: make link at the destination directory * Rebuild polgen.glade with glade-3 * sepolicy: new command to unite small utilities * sepolicy: Update Makefiles and po files * sandbox: use sepolicy to look for sandbox_t * gui: switch to use sepolicy * gui: sepolgen: use sepolicy to generate * semanage: use sepolicy for boolean dictionary * add po file configuration information * po: stop running update-po on all * semanage: seobject verify policy types before allowing you to assign them. * gui: Start using Popen, instead of os.spawnl * sandbox: Copy /var/tmp to /tmp as they are the same inside * qualifier to shred content * semanage: Fix handling of boolean_sub names when using the -F flag * semanage: man: roles instead of role * gui: system-config-selinux: Catch no DISPLAY= error * setfiles: print error if no default label found * semanage: list logins file entries in semanage login -l * semanage: good error message is sepolgen python module missing * gui: system-config-selinux: do not use lokkit * secon: add support for setrans color information in prompt output * restorecond: remove /etc/mtab from default list * gui: If you are not able to read enforcemode set it to False * genhomedircon: regenerate genhomedircon more often * restorecond: Add /etc/udpatedb.conf to restorecond.conf * genhomedircon generation to allow spec file to pass in SEMODULE_PATH * fixfiles: relabel only after specific date * po: update translations * sandbox: seunshare: do not reassign realloc value * seunshare: do checking on setfsuid * sestatus: rewrite to shut up coverity - removed policycoreutils-glibc217.patch (upstream fix) - added patches: * policycoreutils-rhat.patch * policycoreutils-sepolgen.patch * loadpolicy_path.patch * Wed Jan 30 2013 vcizek@suse.com - update to 2.1.13 - drop policycoreutils-po.patch.bz2 (updated upstream) - drop policycoreutils-gui.patch.bz2 (added to upstream) - drop sandbox init scripts (shouldn't be needed anymore) - numerous other changes * Tue Dec 11 2012 vcizek@suse.com - added service unit for restorecond * Wed Dec 05 2012 vcizek@suse.com - semanage needs python-xml and python-ipy to run * Sat Nov 17 2012 aj@suse.de - Fix compilation with glibc 2.17 (add patch policycoreutils-glibc217.patch extracted from Fedora) * Tue Aug 07 2012 meissner@suse.com - updated policycoreutils to 2.1.10 - adapated patches - updated sepolgen to 1.1.5 * Tue Feb 14 2012 mvyskocil@suse.cz - fix seceral rpmlint errors and warnings * use /var/adm/fillup-template for sandbox * don't use /var/lock/subsys in any of init script * use set_permissions macro and add correct Requires(pre) * fix the languages to new -lang package * fix policycoreutils-sandbox Group * remove runlevel 4 from inint scripts * Mon Feb 13 2012 coolo@suse.com - patch license to follow spdx.org standard * Mon Mar 14 2011 prusnak@opensuse.org - updated to 2.0.85 * changes too numerous to list * Fri Feb 04 2011 toddrme2178@gmail.com - fix a typo in the package group * Fri Jun 04 2010 prusnak@opensuse.org - remove usermode-gtk from Requires of -gui subpackage * Fri May 07 2010 meissner@suse.de - remove incorrect and unnecessary rpmlintrc. * Mon Mar 22 2010 prusnak@suse.cz - fix build by moving _GNU_SOURCE define (gnusource.patch), thx darix * Thu Feb 25 2010 prusnak@suse.cz - updated to 2.0.79 * changes too numerous to list * Wed Jul 15 2009 prusnak@suse.cz - disable Requires usermode-gtk * Fri Jun 19 2009 prusnak@suse.cz - added libsepol-static-devel to BuildRequires * Wed May 27 2009 prusnak@suse.cz - updated to 2.0.62 * Add btrfs to fixfiles from Dan Walsh. * Remove restorecond error for matching globs with multiple hard links and fix some error messages from Dan Walsh. * Make removing a non-existant module a warning rather than an error from Dan Walsh. * Man page fixes from Dan Walsh. * Wed Feb 11 2009 ro@suse.de - use sr@latin instead of sr@Latn * Wed Jan 14 2009 prusnak@suse.cz - updated to 2.0.61 * semanage: use semanage_mls_enabled() from Stephen Smalley * fix error checking in restorecond, for inotify_add_watch * change md5 to hashlib.md5 in sepolgen * fix Japanese translations * fix audit2allow man page * don't error out when removing a non existing module * chcat: cut categories at arbitrary point (25) from Dan Walsh * semodule: use new interfaces in libsemanage for compressed files from Dan Walsh * audit2allow: string changes for usage * Mon Dec 01 2008 prusnak@suse.cz - updated to 2.0.59 * Fix text in newrole * Fix revertbutton on booleans page in system-config-selinux * Fix system-config-selinux booleanspage throwing and exception * Allow addition of local modifications of fcontext policy * Handle selinux disabled correctly * Handle manipulation of fcontext file correctly * Fix traceback in audit2why * Mon Nov 10 2008 ro@suse.de - package "newrole" with permissions matching "secure" permissions mode * Fri Nov 07 2008 ro@suse.de - buildfix: prevent regeneration of policycoreutils.pot * Fri Oct 31 2008 prusnak@suse.cz - use permissions for newrole * Mon Oct 20 2008 prusnak@suse.cz - updated to 2.0.57 * Update po files from Dan Walsh. - updated to 2.0.56 * fixfiles will now remove all files in /tmp and will check for unlabeled_t in /tmp and /var/tmp from Dan Walsh. * add glob support to restorecond from Dan Walsh. * allow semanage to handle multi-line commands in a single transaction from Dan Walsh. * Mon Sep 08 2008 prusnak@suse.cz - fix scriptlets * Tue Sep 02 2008 prusnak@suse.cz - updated to 2.0.55 * Merged semanage node support from Christian Kuester. - updated to 2.0.54 * Add support for boolean files and group support for seusers from Dan Walsh. * Ensure that setfiles -p output is newline terminated from Russell Coker. - updated to 2.0.53 * Change setfiles to validate all file_contexts files when using -c from Stephen Smalley. - updated sepolgen to 1.0.13 * Only append s0 suffix if MLS is enabled from Karl MacMillan. - added missing preun/post/postun scriptlets * Sun Aug 03 2008 ro@suse.de - add directory to filelist to fix build * Tue Jul 15 2008 prusnak@suse.cz - initial version 2.0.52 * based on Fedora package by Dan Walsh <dwalsh@redhat.com>
/usr/share/locale/af/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ar/LC_MESSAGES/policycoreutils.mo /usr/share/locale/as/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ast/LC_MESSAGES/policycoreutils.mo /usr/share/locale/az/LC_MESSAGES/policycoreutils.mo /usr/share/locale/be/LC_MESSAGES/policycoreutils.mo /usr/share/locale/bg/LC_MESSAGES/policycoreutils.mo /usr/share/locale/bn/LC_MESSAGES/policycoreutils.mo /usr/share/locale/bn_IN/LC_MESSAGES/policycoreutils.mo /usr/share/locale/br/LC_MESSAGES/policycoreutils.mo /usr/share/locale/bs/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ca/LC_MESSAGES/policycoreutils.mo /usr/share/locale/cs/LC_MESSAGES/policycoreutils.mo /usr/share/locale/cy/LC_MESSAGES/policycoreutils.mo /usr/share/locale/da/LC_MESSAGES/policycoreutils.mo /usr/share/locale/de/LC_MESSAGES/policycoreutils.mo /usr/share/locale/de_CH/LC_MESSAGES/policycoreutils.mo /usr/share/locale/dz/LC_MESSAGES/policycoreutils.mo /usr/share/locale/el/LC_MESSAGES/policycoreutils.mo /usr/share/locale/en_GB/LC_MESSAGES/policycoreutils.mo /usr/share/locale/eo/LC_MESSAGES/policycoreutils.mo /usr/share/locale/es/LC_MESSAGES/policycoreutils.mo /usr/share/locale/es_MX/LC_MESSAGES/policycoreutils.mo /usr/share/locale/et/LC_MESSAGES/policycoreutils.mo /usr/share/locale/eu/LC_MESSAGES/policycoreutils.mo /usr/share/locale/fa/LC_MESSAGES/policycoreutils.mo /usr/share/locale/fi/LC_MESSAGES/policycoreutils.mo /usr/share/locale/fr/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ga/LC_MESSAGES/policycoreutils.mo /usr/share/locale/gl/LC_MESSAGES/policycoreutils.mo /usr/share/locale/gu/LC_MESSAGES/policycoreutils.mo /usr/share/locale/he/LC_MESSAGES/policycoreutils.mo /usr/share/locale/hi/LC_MESSAGES/policycoreutils.mo /usr/share/locale/hr/LC_MESSAGES/policycoreutils.mo /usr/share/locale/hu/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ia/LC_MESSAGES/policycoreutils.mo /usr/share/locale/id/LC_MESSAGES/policycoreutils.mo /usr/share/locale/is/LC_MESSAGES/policycoreutils.mo /usr/share/locale/it/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ja/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ka/LC_MESSAGES/policycoreutils.mo /usr/share/locale/kk/LC_MESSAGES/policycoreutils.mo /usr/share/locale/km/LC_MESSAGES/policycoreutils.mo /usr/share/locale/kn/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ko/LC_MESSAGES/policycoreutils.mo /usr/share/locale/lt/LC_MESSAGES/policycoreutils.mo /usr/share/locale/lv/LC_MESSAGES/policycoreutils.mo /usr/share/locale/mai/LC_MESSAGES/policycoreutils.mo /usr/share/locale/mk/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ml/LC_MESSAGES/policycoreutils.mo /usr/share/locale/mr/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ms/LC_MESSAGES/policycoreutils.mo /usr/share/locale/nb/LC_MESSAGES/policycoreutils.mo /usr/share/locale/nds/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ne/LC_MESSAGES/policycoreutils.mo /usr/share/locale/nl/LC_MESSAGES/policycoreutils.mo /usr/share/locale/nn/LC_MESSAGES/policycoreutils.mo /usr/share/locale/or/LC_MESSAGES/policycoreutils.mo /usr/share/locale/pa/LC_MESSAGES/policycoreutils.mo /usr/share/locale/pl/LC_MESSAGES/policycoreutils.mo /usr/share/locale/pt/LC_MESSAGES/policycoreutils.mo /usr/share/locale/pt_BR/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ro/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ru/LC_MESSAGES/policycoreutils.mo /usr/share/locale/si/LC_MESSAGES/policycoreutils.mo /usr/share/locale/sk/LC_MESSAGES/policycoreutils.mo /usr/share/locale/sl/LC_MESSAGES/policycoreutils.mo /usr/share/locale/sq/LC_MESSAGES/policycoreutils.mo /usr/share/locale/sr/LC_MESSAGES/policycoreutils.mo /usr/share/locale/sr@latin/LC_MESSAGES/policycoreutils.mo /usr/share/locale/sv/LC_MESSAGES/policycoreutils.mo /usr/share/locale/ta/LC_MESSAGES/policycoreutils.mo /usr/share/locale/te/LC_MESSAGES/policycoreutils.mo /usr/share/locale/th/LC_MESSAGES/policycoreutils.mo /usr/share/locale/tr/LC_MESSAGES/policycoreutils.mo /usr/share/locale/uk/LC_MESSAGES/policycoreutils.mo /usr/share/locale/vi/LC_MESSAGES/policycoreutils.mo /usr/share/locale/zh_CN/LC_MESSAGES/policycoreutils.mo /usr/share/locale/zh_HK/LC_MESSAGES/policycoreutils.mo /usr/share/locale/zh_TW/LC_MESSAGES/policycoreutils.mo
Generated by rpm2html 1.8.1
Fabrice Bellet, Mon Sep 30 23:56:35 2024