1 |
commit: c79cf001c99e55a498a841438929dd5317aef10a |
2 |
Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
3 |
AuthorDate: Thu Mar 1 20:29:07 2012 +0000 |
4 |
Commit: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
5 |
CommitDate: Thu Mar 1 20:29:07 2012 +0000 |
6 |
URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-dev.git;a=commit;h=c79cf001 |
7 |
|
8 |
Release of r4 patchset |
9 |
|
10 |
--- |
11 |
sec-policy/selinux-base-policy/ChangeLog | 5 + |
12 |
.../selinux-base-policy-2.20120215-r4.ebuild | 122 +++++++++++++++ |
13 |
sec-policy/selinux-base/ChangeLog | 5 + |
14 |
.../selinux-base/selinux-base-2.20120215-r4.ebuild | 162 ++++++++++++++++++++ |
15 |
sec-policy/selinux-clamav/ChangeLog | 7 +- |
16 |
.../selinux-clamav-2.20120215-r1.ebuild | 14 ++ |
17 |
sec-policy/selinux-dhcp/ChangeLog | 5 + |
18 |
.../selinux-dhcp/selinux-dhcp-2.20120215-r1.ebuild | 14 ++ |
19 |
sec-policy/selinux-gorg/ChangeLog | 5 + |
20 |
.../selinux-gorg/selinux-gorg-2.20120215-r1.ebuild | 13 ++ |
21 |
sec-policy/selinux-mozilla/ChangeLog | 5 + |
22 |
.../selinux-mozilla-2.20120215-r1.ebuild | 13 ++ |
23 |
12 files changed, 369 insertions(+), 1 deletions(-) |
24 |
|
25 |
diff --git a/sec-policy/selinux-base-policy/ChangeLog b/sec-policy/selinux-base-policy/ChangeLog |
26 |
index 1b0ab15..1a8074b 100644 |
27 |
--- a/sec-policy/selinux-base-policy/ChangeLog |
28 |
+++ b/sec-policy/selinux-base-policy/ChangeLog |
29 |
@@ -2,6 +2,11 @@ |
30 |
# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2 |
31 |
# $Header: $ |
32 |
|
33 |
+*selinux-base-policy-2.20120215-r4 (01 Mar 2012) |
34 |
+ |
35 |
+ 01 Mar 2012; <swift@g.o> +selinux-base-policy-2.20120215-r4.ebuild: |
36 |
+ Increase to r4 |
37 |
+ |
38 |
*selinux-base-policy-2.20120215-r3 (27 Feb 2012) |
39 |
|
40 |
27 Feb 2012; <swift@g.o> +selinux-base-policy-2.20120215-r3.ebuild: |
41 |
|
42 |
diff --git a/sec-policy/selinux-base-policy/selinux-base-policy-2.20120215-r4.ebuild b/sec-policy/selinux-base-policy/selinux-base-policy-2.20120215-r4.ebuild |
43 |
new file mode 100644 |
44 |
index 0000000..723ff58 |
45 |
--- /dev/null |
46 |
+++ b/sec-policy/selinux-base-policy/selinux-base-policy-2.20120215-r4.ebuild |
47 |
@@ -0,0 +1,122 @@ |
48 |
+# Copyright 1999-2012 Gentoo Foundation |
49 |
+# Distributed under the terms of the GNU General Public License v2 |
50 |
+# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-dcc/selinux-dcc-2.20110726.ebuild,v 1.2 2011/10/23 12:42:45 swift Exp $ |
51 |
+EAPI="4" |
52 |
+ |
53 |
+HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/" |
54 |
+DESCRIPTION="SELinux policy for core modules" |
55 |
+ |
56 |
+IUSE="" |
57 |
+BASEPOL="2.20120215-r4" |
58 |
+ |
59 |
+inherit eutils |
60 |
+ |
61 |
+RDEPEND=">=sec-policy/selinux-base-2.20120215-r4" |
62 |
+DEPEND="" |
63 |
+SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2 |
64 |
+ http://dev.gentoo.org/~swift/patches/${PN}/patchbundle-${PN}-${BASEPOL}.tar.bz2" |
65 |
+KEYWORDS="~amd64 ~x86" |
66 |
+ |
67 |
+MODS="application authlogin bootloader clock consoletype cron dmesg fstools getty hostname hotplug init iptables libraries locallogin logging lvm miscfiles modutils mount mta netutils nscd portage raid rsync selinuxutil ssh staff storage su sysadm sysnetwork udev userdomain usermanage unprivuser xdg unconfined" |
68 |
+LICENSE="GPL-2" |
69 |
+SLOT="0" |
70 |
+S="${WORKDIR}/" |
71 |
+PATCHBUNDLE="${DISTDIR}/patchbundle-selinux-base-policy-${BASEPOL}.tar.bz2" |
72 |
+ |
73 |
+# Code entirely copied from selinux-eclass (cannot inherit due to dependency on |
74 |
+# itself), when reworked reinclude it. Only postinstall (where -b base.pp is |
75 |
+# added) needs to remain then. |
76 |
+ |
77 |
+src_prepare() { |
78 |
+ local modfiles |
79 |
+ |
80 |
+ # Patch the sources with the base patchbundle |
81 |
+ if [[ -n ${BASEPOL} ]]; |
82 |
+ then |
83 |
+ cd "${S}" |
84 |
+ EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \ |
85 |
+ EPATCH_SUFFIX="patch" \ |
86 |
+ EPATCH_SOURCE="${WORKDIR}" \ |
87 |
+ EPATCH_FORCE="yes" \ |
88 |
+ epatch |
89 |
+ fi |
90 |
+ |
91 |
+ # Apply the additional patches refered to by the module ebuild. |
92 |
+ # But first some magic to differentiate between bash arrays and strings |
93 |
+ if [[ "$(declare -p POLICY_PATCH 2>/dev/null 2>&1)" == "declare -a"* ]]; |
94 |
+ then |
95 |
+ cd "${S}/refpolicy/policy/modules" |
96 |
+ for POLPATCH in "${POLICY_PATCH[@]}"; |
97 |
+ do |
98 |
+ epatch "${POLPATCH}" |
99 |
+ done |
100 |
+ else |
101 |
+ if [[ -n ${POLICY_PATCH} ]]; |
102 |
+ then |
103 |
+ cd "${S}/refpolicy/policy/modules" |
104 |
+ for POLPATCH in ${POLICY_PATCH}; |
105 |
+ do |
106 |
+ epatch "${POLPATCH}" |
107 |
+ done |
108 |
+ fi |
109 |
+ fi |
110 |
+ |
111 |
+ # Collect only those files needed for this particular module |
112 |
+ for i in ${MODS}; do |
113 |
+ modfiles="$(find ${S}/refpolicy/policy/modules -iname $i.te) $modfiles" |
114 |
+ modfiles="$(find ${S}/refpolicy/policy/modules -iname $i.fc) $modfiles" |
115 |
+ done |
116 |
+ |
117 |
+ for i in ${POLICY_TYPES}; do |
118 |
+ mkdir "${S}"/${i} || die "Failed to create directory ${S}/${i}" |
119 |
+ cp "${S}"/refpolicy/doc/Makefile.example "${S}"/${i}/Makefile \ |
120 |
+ || die "Failed to copy Makefile.example to ${S}/${i}/Makefile" |
121 |
+ |
122 |
+ cp ${modfiles} "${S}"/${i} \ |
123 |
+ || die "Failed to copy the module files to ${S}/${i}" |
124 |
+ done |
125 |
+} |
126 |
+ |
127 |
+src_compile() { |
128 |
+ for i in ${POLICY_TYPES}; do |
129 |
+ # Parallel builds are broken, so we need to force -j1 here |
130 |
+ emake -j1 NAME=$i -C "${S}"/${i} || die "${i} compile failed" |
131 |
+ done |
132 |
+} |
133 |
+ |
134 |
+src_install() { |
135 |
+ local BASEDIR="/usr/share/selinux" |
136 |
+ |
137 |
+ for i in ${POLICY_TYPES}; do |
138 |
+ for j in ${MODS}; do |
139 |
+ einfo "Installing ${i} ${j} policy package" |
140 |
+ insinto ${BASEDIR}/${i} |
141 |
+ doins "${S}"/${i}/${j}.pp || die "Failed to add ${j}.pp to ${i}" |
142 |
+ done |
143 |
+ done |
144 |
+} |
145 |
+ |
146 |
+pkg_postinst() { |
147 |
+ # Override the command from the eclass, we need to load in base as well here |
148 |
+ local COMMAND |
149 |
+ for i in ${MODS}; do |
150 |
+ COMMAND="-i ${i}.pp ${COMMAND}" |
151 |
+ done |
152 |
+ |
153 |
+ for i in ${POLICY_TYPES}; do |
154 |
+ local LOCCOMMAND |
155 |
+ local LOCMODS |
156 |
+ if [[ "${i}" != "targeted" ]]; then |
157 |
+ LOCCOMMAND=$(echo "${COMMAND}" | sed -e 's:-i unconfined.pp::g'); |
158 |
+ LOCMODS=$(echo "${MODS}" | sed -e 's: unconfined::g'); |
159 |
+ else |
160 |
+ LOCCOMMAND="${COMMAND}" |
161 |
+ LOCMODS="${MODS}" |
162 |
+ fi |
163 |
+ einfo "Inserting the following modules, with base, into the $i module store: ${LOCMODS}" |
164 |
+ |
165 |
+ cd /usr/share/selinux/${i} || die "Could not enter /usr/share/selinux/${i}" |
166 |
+ |
167 |
+ semodule -s ${i} -b base.pp ${LOCCOMMAND} || die "Failed to load in base and modules ${LOCMODS} in the $i policy store" |
168 |
+ done |
169 |
+} |
170 |
|
171 |
diff --git a/sec-policy/selinux-base/ChangeLog b/sec-policy/selinux-base/ChangeLog |
172 |
index 4b9e30c..bb0bb58 100644 |
173 |
--- a/sec-policy/selinux-base/ChangeLog |
174 |
+++ b/sec-policy/selinux-base/ChangeLog |
175 |
@@ -2,6 +2,11 @@ |
176 |
# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2 |
177 |
# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base-policy/ChangeLog,v 1.95 2012/01/29 13:08:48 swift Exp $ |
178 |
|
179 |
+*selinux-base-2.20120215-r4 (01 Mar 2012) |
180 |
+ |
181 |
+ 01 Mar 2012; <swift@g.o> +selinux-base-2.20120215-r4.ebuild: |
182 |
+ Increase to r4 |
183 |
+ |
184 |
*selinux-base-2.20120215-r3 (27 Feb 2012) |
185 |
|
186 |
27 Feb 2012; <swift@g.o> +selinux-base-2.20120215-r3.ebuild: |
187 |
|
188 |
diff --git a/sec-policy/selinux-base/selinux-base-2.20120215-r4.ebuild b/sec-policy/selinux-base/selinux-base-2.20120215-r4.ebuild |
189 |
new file mode 100644 |
190 |
index 0000000..866e80f |
191 |
--- /dev/null |
192 |
+++ b/sec-policy/selinux-base/selinux-base-2.20120215-r4.ebuild |
193 |
@@ -0,0 +1,162 @@ |
194 |
+# Copyright 1999-2012 Gentoo Foundation |
195 |
+# Distributed under the terms of the GNU General Public License v2 |
196 |
+# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base-policy/selinux-base-policy-2.20110726-r13.ebuild,v 1.1 2012/02/23 18:17:40 swift Exp $ |
197 |
+ |
198 |
+EAPI="4" |
199 |
+IUSE="+peer_perms +open_perms +ubac doc" |
200 |
+ |
201 |
+inherit eutils |
202 |
+ |
203 |
+DESCRIPTION="Gentoo base policy for SELinux" |
204 |
+HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/" |
205 |
+SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2 |
206 |
+ http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2" |
207 |
+LICENSE="GPL-2" |
208 |
+SLOT="0" |
209 |
+ |
210 |
+KEYWORDS="~amd64 ~x86" |
211 |
+ |
212 |
+RDEPEND=">=sys-apps/policycoreutils-2.1.10 |
213 |
+ >=sys-fs/udev-151 |
214 |
+ !<=sec-policy/selinux-base-policy-2.20120215" |
215 |
+DEPEND="${RDEPEND} |
216 |
+ sys-devel/m4 |
217 |
+ >=sys-apps/checkpolicy-2.1.8" |
218 |
+ |
219 |
+S=${WORKDIR}/ |
220 |
+ |
221 |
+src_prepare() { |
222 |
+ # Apply the gentoo patches to the policy. These patches are only necessary |
223 |
+ # for base policies, or for interface changes on modules. |
224 |
+ EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \ |
225 |
+ EPATCH_SUFFIX="patch" \ |
226 |
+ EPATCH_SOURCE="${WORKDIR}" \ |
227 |
+ EPATCH_FORCE="yes" \ |
228 |
+ epatch |
229 |
+ |
230 |
+ cd "${S}/refpolicy" |
231 |
+ # Fix bug 257111 - Correct the initial sid for cron-started jobs in the |
232 |
+ # system_r role |
233 |
+ sed -i -e 's:system_crond_t:system_cronjob_t:g' \ |
234 |
+ "${S}/refpolicy/config/appconfig-standard/default_contexts" |
235 |
+ sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ |
236 |
+ "${S}/refpolicy/config/appconfig-mls/default_contexts" |
237 |
+ sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ |
238 |
+ "${S}/refpolicy/config/appconfig-mcs/default_contexts" |
239 |
+} |
240 |
+ |
241 |
+src_configure() { |
242 |
+ [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" |
243 |
+ |
244 |
+ # Update the SELinux refpolicy capabilities based on the users' USE flags. |
245 |
+ |
246 |
+ if ! use peer_perms; then |
247 |
+ sed -i -e '/network_peer_controls/d' \ |
248 |
+ "${S}/refpolicy/policy/policy_capabilities" |
249 |
+ fi |
250 |
+ |
251 |
+ if ! use open_perms; then |
252 |
+ sed -i -e '/open_perms/d' \ |
253 |
+ "${S}/refpolicy/policy/policy_capabilities" |
254 |
+ fi |
255 |
+ |
256 |
+ if ! use ubac; then |
257 |
+ sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \ |
258 |
+ || die "Failed to disable User Based Access Control" |
259 |
+ fi |
260 |
+ |
261 |
+ echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf" |
262 |
+ |
263 |
+ # Setup the policies based on the types delivered by the end user. |
264 |
+ # These types can be "targeted", "strict", "mcs" and "mls". |
265 |
+ for i in ${POLICY_TYPES}; do |
266 |
+ cp -a "${S}/refpolicy" "${S}/${i}" |
267 |
+ |
268 |
+ cd "${S}/${i}"; |
269 |
+ make conf || die "Make conf in ${i} failed" |
270 |
+ |
271 |
+ #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf" |
272 |
+ sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf" |
273 |
+ |
274 |
+ sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \ |
275 |
+ "${S}/${i}/build.conf" || die "build.conf setup failed." |
276 |
+ |
277 |
+ if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]]; |
278 |
+ then |
279 |
+ # MCS/MLS require additional settings |
280 |
+ sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \ |
281 |
+ || die "failed to set type to mls" |
282 |
+ fi |
283 |
+ |
284 |
+ if [ "${i}" == "targeted" ]; then |
285 |
+ sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \ |
286 |
+ "${S}/${i}/config/appconfig-standard/seusers" \ |
287 |
+ || die "targeted seusers setup failed." |
288 |
+ fi |
289 |
+ done |
290 |
+} |
291 |
+ |
292 |
+src_compile() { |
293 |
+ [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" |
294 |
+ |
295 |
+ for i in ${POLICY_TYPES}; do |
296 |
+ cd "${S}/${i}" |
297 |
+ make base || die "${i} compile failed" |
298 |
+ if use doc; then |
299 |
+ make html || die |
300 |
+ fi |
301 |
+ done |
302 |
+} |
303 |
+ |
304 |
+src_install() { |
305 |
+ [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" |
306 |
+ |
307 |
+ for i in ${POLICY_TYPES}; do |
308 |
+ cd "${S}/${i}" |
309 |
+ |
310 |
+ make DESTDIR="${D}" install \ |
311 |
+ || die "${i} install failed." |
312 |
+ |
313 |
+ make DESTDIR="${D}" install-headers \ |
314 |
+ || die "${i} headers install failed." |
315 |
+ |
316 |
+ echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type" |
317 |
+ |
318 |
+ echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types" |
319 |
+ |
320 |
+ # libsemanage won't make this on its own |
321 |
+ keepdir "/etc/selinux/${i}/policy" |
322 |
+ |
323 |
+ if use doc; then |
324 |
+ dohtml doc/html/*; |
325 |
+ fi |
326 |
+ done |
327 |
+ |
328 |
+ dodoc doc/Makefile.example doc/example.{te,fc,if} |
329 |
+ |
330 |
+ insinto /etc/selinux |
331 |
+ doins "${FILESDIR}/config" |
332 |
+} |
333 |
+ |
334 |
+pkg_preinst() { |
335 |
+ has_version "<${CATEGORY}/${PN}-2.20101213-r13" |
336 |
+ previous_less_than_r13=$? |
337 |
+} |
338 |
+ |
339 |
+pkg_postinst() { |
340 |
+ [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" |
341 |
+ |
342 |
+ for i in ${POLICY_TYPES}; do |
343 |
+ einfo "Trying to insert base module into ${i} module store." |
344 |
+ |
345 |
+ cd "${ROOT}/usr/share/selinux/${i}" |
346 |
+ semodule -s "${i}" -b base.pp |
347 |
+ if [[ $? -ne 0 ]]; then |
348 |
+ ewarn "Base policy failed loading. However, this can be ignored if" |
349 |
+ ewarn "you still have to install (or update) selinux-core." |
350 |
+ fi |
351 |
+ done |
352 |
+ elog "Updates on policies might require you to relabel files. If you, after" |
353 |
+ elog "installing new SELinux policies, get 'permission denied' errors," |
354 |
+ elog "relabelling your system using 'rlpkg -a -r' might resolve the issues." |
355 |
+} |
356 |
|
357 |
diff --git a/sec-policy/selinux-clamav/ChangeLog b/sec-policy/selinux-clamav/ChangeLog |
358 |
index fddea88..39f7574 100644 |
359 |
--- a/sec-policy/selinux-clamav/ChangeLog |
360 |
+++ b/sec-policy/selinux-clamav/ChangeLog |
361 |
@@ -1,7 +1,12 @@ |
362 |
# ChangeLog for sec-policy/selinux-clamav |
363 |
-# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2 |
364 |
+# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2 |
365 |
# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-clamav/ChangeLog,v 1.28 2011/11/12 20:53:29 swift Exp $ |
366 |
|
367 |
+*selinux-clamav-2.20120215-r1 (01 Mar 2012) |
368 |
+ |
369 |
+ 01 Mar 2012; <swift@g.o> +selinux-clamav-2.20120215-r1.ebuild: |
370 |
+ Correct type def |
371 |
+ |
372 |
12 Nov 2011; <swift@g.o> -selinux-clamav-2.20101213.ebuild: |
373 |
Removing old policies |
374 |
|
375 |
|
376 |
diff --git a/sec-policy/selinux-clamav/selinux-clamav-2.20120215-r1.ebuild b/sec-policy/selinux-clamav/selinux-clamav-2.20120215-r1.ebuild |
377 |
new file mode 100644 |
378 |
index 0000000..daeadfd |
379 |
--- /dev/null |
380 |
+++ b/sec-policy/selinux-clamav/selinux-clamav-2.20120215-r1.ebuild |
381 |
@@ -0,0 +1,14 @@ |
382 |
+# Copyright 1999-2012 Gentoo Foundation |
383 |
+# Distributed under the terms of the GNU General Public License v2 |
384 |
+# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-clamav/selinux-clamav-2.20110726.ebuild,v 1.2 2011/10/23 12:42:29 swift Exp $ |
385 |
+EAPI="4" |
386 |
+ |
387 |
+IUSE="" |
388 |
+MODS="clamav" |
389 |
+BASEPOL="2.20120215-r4" |
390 |
+ |
391 |
+inherit selinux-policy-2 |
392 |
+ |
393 |
+DESCRIPTION="SELinux policy for clamav" |
394 |
+ |
395 |
+KEYWORDS="~amd64 ~x86" |
396 |
|
397 |
diff --git a/sec-policy/selinux-dhcp/ChangeLog b/sec-policy/selinux-dhcp/ChangeLog |
398 |
index 45e37fc..d015cb6 100644 |
399 |
--- a/sec-policy/selinux-dhcp/ChangeLog |
400 |
+++ b/sec-policy/selinux-dhcp/ChangeLog |
401 |
@@ -2,6 +2,11 @@ |
402 |
# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2 |
403 |
# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-dhcp/ChangeLog,v 1.40 2012/01/29 13:08:48 swift Exp $ |
404 |
|
405 |
+*selinux-dhcp-2.20120215-r1 (01 Mar 2012) |
406 |
+ |
407 |
+ 01 Mar 2012; <swift@g.o> +selinux-dhcp-2.20120215-r1.ebuild: |
408 |
+ Update patch on LDAP backend support |
409 |
+ |
410 |
29 Jan 2012; <swift@g.o> Manifest: |
411 |
Updating manifest |
412 |
|
413 |
|
414 |
diff --git a/sec-policy/selinux-dhcp/selinux-dhcp-2.20120215-r1.ebuild b/sec-policy/selinux-dhcp/selinux-dhcp-2.20120215-r1.ebuild |
415 |
new file mode 100644 |
416 |
index 0000000..bdc2d0a |
417 |
--- /dev/null |
418 |
+++ b/sec-policy/selinux-dhcp/selinux-dhcp-2.20120215-r1.ebuild |
419 |
@@ -0,0 +1,14 @@ |
420 |
+# Copyright 1999-2012 Gentoo Foundation |
421 |
+# Distributed under the terms of the GNU General Public License v2 |
422 |
+# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-dhcp/selinux-dhcp-2.20110726.ebuild,v 1.2 2011/10/23 12:42:44 swift Exp $ |
423 |
+EAPI="4" |
424 |
+ |
425 |
+IUSE="" |
426 |
+MODS="dhcp" |
427 |
+BASEPOL="2.20120215-r4" |
428 |
+ |
429 |
+inherit selinux-policy-2 |
430 |
+ |
431 |
+DESCRIPTION="SELinux policy for dhcp" |
432 |
+ |
433 |
+KEYWORDS="~amd64 ~x86" |
434 |
|
435 |
diff --git a/sec-policy/selinux-gorg/ChangeLog b/sec-policy/selinux-gorg/ChangeLog |
436 |
index 1f45a25..12b90ec 100644 |
437 |
--- a/sec-policy/selinux-gorg/ChangeLog |
438 |
+++ b/sec-policy/selinux-gorg/ChangeLog |
439 |
@@ -2,6 +2,11 @@ |
440 |
# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2 |
441 |
# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-gorg/ChangeLog,v 1.8 2012/01/29 13:08:48 swift Exp $ |
442 |
|
443 |
+*selinux-gorg-2.20120215-r1 (01 Mar 2012) |
444 |
+ |
445 |
+ 01 Mar 2012; <swift@g.o> +selinux-gorg-2.20120215-r1.ebuild: |
446 |
+ Update on gorg, allow to signal itself |
447 |
+ |
448 |
29 Jan 2012; <swift@g.o> Manifest: |
449 |
Updating manifest |
450 |
|
451 |
|
452 |
diff --git a/sec-policy/selinux-gorg/selinux-gorg-2.20120215-r1.ebuild b/sec-policy/selinux-gorg/selinux-gorg-2.20120215-r1.ebuild |
453 |
new file mode 100644 |
454 |
index 0000000..f78397b |
455 |
--- /dev/null |
456 |
+++ b/sec-policy/selinux-gorg/selinux-gorg-2.20120215-r1.ebuild |
457 |
@@ -0,0 +1,13 @@ |
458 |
+# Copyright 1999-2012 Gentoo Foundation |
459 |
+# Distributed under the terms of the GNU General Public License v2 |
460 |
+# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-gorg/selinux-gorg-2.20110726.ebuild,v 1.2 2011/10/23 12:42:55 swift Exp $ |
461 |
+EAPI="4" |
462 |
+ |
463 |
+IUSE="" |
464 |
+MODS="gorg" |
465 |
+BASEPOL="2.20120215-r4" |
466 |
+ |
467 |
+inherit selinux-policy-2 |
468 |
+ |
469 |
+DESCRIPTION="SELinux policy for gorg" |
470 |
+KEYWORDS="~amd64 ~x86" |
471 |
|
472 |
diff --git a/sec-policy/selinux-mozilla/ChangeLog b/sec-policy/selinux-mozilla/ChangeLog |
473 |
index 29cd815..256b133 100644 |
474 |
--- a/sec-policy/selinux-mozilla/ChangeLog |
475 |
+++ b/sec-policy/selinux-mozilla/ChangeLog |
476 |
@@ -2,6 +2,11 @@ |
477 |
# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2 |
478 |
# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-mozilla/ChangeLog,v 1.16 2012/01/29 13:08:49 swift Exp $ |
479 |
|
480 |
+*selinux-mozilla-2.20120215-r1 (01 Mar 2012) |
481 |
+ |
482 |
+ 01 Mar 2012; <swift@g.o> +selinux-mozilla-2.20120215-r1.ebuild: |
483 |
+ Allow mozilla_plugin_t to be used by suers |
484 |
+ |
485 |
29 Jan 2012; <swift@g.o> Manifest: |
486 |
Updating manifest |
487 |
|
488 |
|
489 |
diff --git a/sec-policy/selinux-mozilla/selinux-mozilla-2.20120215-r1.ebuild b/sec-policy/selinux-mozilla/selinux-mozilla-2.20120215-r1.ebuild |
490 |
new file mode 100644 |
491 |
index 0000000..158e37a |
492 |
--- /dev/null |
493 |
+++ b/sec-policy/selinux-mozilla/selinux-mozilla-2.20120215-r1.ebuild |
494 |
@@ -0,0 +1,13 @@ |
495 |
+# Copyright 1999-2012 Gentoo Foundation |
496 |
+# Distributed under the terms of the GNU General Public License v2 |
497 |
+# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-mozilla/selinux-mozilla-2.20110726-r5.ebuild,v 1.1 2012/01/14 19:59:59 swift Exp $ |
498 |
+EAPI="4" |
499 |
+ |
500 |
+IUSE="" |
501 |
+MODS="mozilla" |
502 |
+BASEPOL="2.20120215-r4" |
503 |
+ |
504 |
+inherit selinux-policy-2 |
505 |
+ |
506 |
+DESCRIPTION="SELinux policy for mozilla" |
507 |
+KEYWORDS="~amd64 ~x86" |