Gentoo Archives: gentoo-commits

From: Sven Vermeulen <sven.vermeulen@××××××.be>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-dev:master commit in: sec-policy/selinux-dhcp/, sec-policy/selinux-base/, sec-policy/selinux-clamav/, ...
Date: Thu, 01 Mar 2012 20:30:47
Message-Id: 1330633747.c79cf001c99e55a498a841438929dd5317aef10a.SwifT@gentoo
1 commit: c79cf001c99e55a498a841438929dd5317aef10a
2 Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
3 AuthorDate: Thu Mar 1 20:29:07 2012 +0000
4 Commit: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
5 CommitDate: Thu Mar 1 20:29:07 2012 +0000
6 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-dev.git;a=commit;h=c79cf001
7
8 Release of r4 patchset
9
10 ---
11 sec-policy/selinux-base-policy/ChangeLog | 5 +
12 .../selinux-base-policy-2.20120215-r4.ebuild | 122 +++++++++++++++
13 sec-policy/selinux-base/ChangeLog | 5 +
14 .../selinux-base/selinux-base-2.20120215-r4.ebuild | 162 ++++++++++++++++++++
15 sec-policy/selinux-clamav/ChangeLog | 7 +-
16 .../selinux-clamav-2.20120215-r1.ebuild | 14 ++
17 sec-policy/selinux-dhcp/ChangeLog | 5 +
18 .../selinux-dhcp/selinux-dhcp-2.20120215-r1.ebuild | 14 ++
19 sec-policy/selinux-gorg/ChangeLog | 5 +
20 .../selinux-gorg/selinux-gorg-2.20120215-r1.ebuild | 13 ++
21 sec-policy/selinux-mozilla/ChangeLog | 5 +
22 .../selinux-mozilla-2.20120215-r1.ebuild | 13 ++
23 12 files changed, 369 insertions(+), 1 deletions(-)
24
25 diff --git a/sec-policy/selinux-base-policy/ChangeLog b/sec-policy/selinux-base-policy/ChangeLog
26 index 1b0ab15..1a8074b 100644
27 --- a/sec-policy/selinux-base-policy/ChangeLog
28 +++ b/sec-policy/selinux-base-policy/ChangeLog
29 @@ -2,6 +2,11 @@
30 # Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2
31 # $Header: $
32
33 +*selinux-base-policy-2.20120215-r4 (01 Mar 2012)
34 +
35 + 01 Mar 2012; <swift@g.o> +selinux-base-policy-2.20120215-r4.ebuild:
36 + Increase to r4
37 +
38 *selinux-base-policy-2.20120215-r3 (27 Feb 2012)
39
40 27 Feb 2012; <swift@g.o> +selinux-base-policy-2.20120215-r3.ebuild:
41
42 diff --git a/sec-policy/selinux-base-policy/selinux-base-policy-2.20120215-r4.ebuild b/sec-policy/selinux-base-policy/selinux-base-policy-2.20120215-r4.ebuild
43 new file mode 100644
44 index 0000000..723ff58
45 --- /dev/null
46 +++ b/sec-policy/selinux-base-policy/selinux-base-policy-2.20120215-r4.ebuild
47 @@ -0,0 +1,122 @@
48 +# Copyright 1999-2012 Gentoo Foundation
49 +# Distributed under the terms of the GNU General Public License v2
50 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-dcc/selinux-dcc-2.20110726.ebuild,v 1.2 2011/10/23 12:42:45 swift Exp $
51 +EAPI="4"
52 +
53 +HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/"
54 +DESCRIPTION="SELinux policy for core modules"
55 +
56 +IUSE=""
57 +BASEPOL="2.20120215-r4"
58 +
59 +inherit eutils
60 +
61 +RDEPEND=">=sec-policy/selinux-base-2.20120215-r4"
62 +DEPEND=""
63 +SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2
64 + http://dev.gentoo.org/~swift/patches/${PN}/patchbundle-${PN}-${BASEPOL}.tar.bz2"
65 +KEYWORDS="~amd64 ~x86"
66 +
67 +MODS="application authlogin bootloader clock consoletype cron dmesg fstools getty hostname hotplug init iptables libraries locallogin logging lvm miscfiles modutils mount mta netutils nscd portage raid rsync selinuxutil ssh staff storage su sysadm sysnetwork udev userdomain usermanage unprivuser xdg unconfined"
68 +LICENSE="GPL-2"
69 +SLOT="0"
70 +S="${WORKDIR}/"
71 +PATCHBUNDLE="${DISTDIR}/patchbundle-selinux-base-policy-${BASEPOL}.tar.bz2"
72 +
73 +# Code entirely copied from selinux-eclass (cannot inherit due to dependency on
74 +# itself), when reworked reinclude it. Only postinstall (where -b base.pp is
75 +# added) needs to remain then.
76 +
77 +src_prepare() {
78 + local modfiles
79 +
80 + # Patch the sources with the base patchbundle
81 + if [[ -n ${BASEPOL} ]];
82 + then
83 + cd "${S}"
84 + EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \
85 + EPATCH_SUFFIX="patch" \
86 + EPATCH_SOURCE="${WORKDIR}" \
87 + EPATCH_FORCE="yes" \
88 + epatch
89 + fi
90 +
91 + # Apply the additional patches refered to by the module ebuild.
92 + # But first some magic to differentiate between bash arrays and strings
93 + if [[ "$(declare -p POLICY_PATCH 2>/dev/null 2>&1)" == "declare -a"* ]];
94 + then
95 + cd "${S}/refpolicy/policy/modules"
96 + for POLPATCH in "${POLICY_PATCH[@]}";
97 + do
98 + epatch "${POLPATCH}"
99 + done
100 + else
101 + if [[ -n ${POLICY_PATCH} ]];
102 + then
103 + cd "${S}/refpolicy/policy/modules"
104 + for POLPATCH in ${POLICY_PATCH};
105 + do
106 + epatch "${POLPATCH}"
107 + done
108 + fi
109 + fi
110 +
111 + # Collect only those files needed for this particular module
112 + for i in ${MODS}; do
113 + modfiles="$(find ${S}/refpolicy/policy/modules -iname $i.te) $modfiles"
114 + modfiles="$(find ${S}/refpolicy/policy/modules -iname $i.fc) $modfiles"
115 + done
116 +
117 + for i in ${POLICY_TYPES}; do
118 + mkdir "${S}"/${i} || die "Failed to create directory ${S}/${i}"
119 + cp "${S}"/refpolicy/doc/Makefile.example "${S}"/${i}/Makefile \
120 + || die "Failed to copy Makefile.example to ${S}/${i}/Makefile"
121 +
122 + cp ${modfiles} "${S}"/${i} \
123 + || die "Failed to copy the module files to ${S}/${i}"
124 + done
125 +}
126 +
127 +src_compile() {
128 + for i in ${POLICY_TYPES}; do
129 + # Parallel builds are broken, so we need to force -j1 here
130 + emake -j1 NAME=$i -C "${S}"/${i} || die "${i} compile failed"
131 + done
132 +}
133 +
134 +src_install() {
135 + local BASEDIR="/usr/share/selinux"
136 +
137 + for i in ${POLICY_TYPES}; do
138 + for j in ${MODS}; do
139 + einfo "Installing ${i} ${j} policy package"
140 + insinto ${BASEDIR}/${i}
141 + doins "${S}"/${i}/${j}.pp || die "Failed to add ${j}.pp to ${i}"
142 + done
143 + done
144 +}
145 +
146 +pkg_postinst() {
147 + # Override the command from the eclass, we need to load in base as well here
148 + local COMMAND
149 + for i in ${MODS}; do
150 + COMMAND="-i ${i}.pp ${COMMAND}"
151 + done
152 +
153 + for i in ${POLICY_TYPES}; do
154 + local LOCCOMMAND
155 + local LOCMODS
156 + if [[ "${i}" != "targeted" ]]; then
157 + LOCCOMMAND=$(echo "${COMMAND}" | sed -e 's:-i unconfined.pp::g');
158 + LOCMODS=$(echo "${MODS}" | sed -e 's: unconfined::g');
159 + else
160 + LOCCOMMAND="${COMMAND}"
161 + LOCMODS="${MODS}"
162 + fi
163 + einfo "Inserting the following modules, with base, into the $i module store: ${LOCMODS}"
164 +
165 + cd /usr/share/selinux/${i} || die "Could not enter /usr/share/selinux/${i}"
166 +
167 + semodule -s ${i} -b base.pp ${LOCCOMMAND} || die "Failed to load in base and modules ${LOCMODS} in the $i policy store"
168 + done
169 +}
170
171 diff --git a/sec-policy/selinux-base/ChangeLog b/sec-policy/selinux-base/ChangeLog
172 index 4b9e30c..bb0bb58 100644
173 --- a/sec-policy/selinux-base/ChangeLog
174 +++ b/sec-policy/selinux-base/ChangeLog
175 @@ -2,6 +2,11 @@
176 # Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2
177 # $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base-policy/ChangeLog,v 1.95 2012/01/29 13:08:48 swift Exp $
178
179 +*selinux-base-2.20120215-r4 (01 Mar 2012)
180 +
181 + 01 Mar 2012; <swift@g.o> +selinux-base-2.20120215-r4.ebuild:
182 + Increase to r4
183 +
184 *selinux-base-2.20120215-r3 (27 Feb 2012)
185
186 27 Feb 2012; <swift@g.o> +selinux-base-2.20120215-r3.ebuild:
187
188 diff --git a/sec-policy/selinux-base/selinux-base-2.20120215-r4.ebuild b/sec-policy/selinux-base/selinux-base-2.20120215-r4.ebuild
189 new file mode 100644
190 index 0000000..866e80f
191 --- /dev/null
192 +++ b/sec-policy/selinux-base/selinux-base-2.20120215-r4.ebuild
193 @@ -0,0 +1,162 @@
194 +# Copyright 1999-2012 Gentoo Foundation
195 +# Distributed under the terms of the GNU General Public License v2
196 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base-policy/selinux-base-policy-2.20110726-r13.ebuild,v 1.1 2012/02/23 18:17:40 swift Exp $
197 +
198 +EAPI="4"
199 +IUSE="+peer_perms +open_perms +ubac doc"
200 +
201 +inherit eutils
202 +
203 +DESCRIPTION="Gentoo base policy for SELinux"
204 +HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/"
205 +SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2
206 + http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2"
207 +LICENSE="GPL-2"
208 +SLOT="0"
209 +
210 +KEYWORDS="~amd64 ~x86"
211 +
212 +RDEPEND=">=sys-apps/policycoreutils-2.1.10
213 + >=sys-fs/udev-151
214 + !<=sec-policy/selinux-base-policy-2.20120215"
215 +DEPEND="${RDEPEND}
216 + sys-devel/m4
217 + >=sys-apps/checkpolicy-2.1.8"
218 +
219 +S=${WORKDIR}/
220 +
221 +src_prepare() {
222 + # Apply the gentoo patches to the policy. These patches are only necessary
223 + # for base policies, or for interface changes on modules.
224 + EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \
225 + EPATCH_SUFFIX="patch" \
226 + EPATCH_SOURCE="${WORKDIR}" \
227 + EPATCH_FORCE="yes" \
228 + epatch
229 +
230 + cd "${S}/refpolicy"
231 + # Fix bug 257111 - Correct the initial sid for cron-started jobs in the
232 + # system_r role
233 + sed -i -e 's:system_crond_t:system_cronjob_t:g' \
234 + "${S}/refpolicy/config/appconfig-standard/default_contexts"
235 + sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
236 + "${S}/refpolicy/config/appconfig-mls/default_contexts"
237 + sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
238 + "${S}/refpolicy/config/appconfig-mcs/default_contexts"
239 +}
240 +
241 +src_configure() {
242 + [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
243 +
244 + # Update the SELinux refpolicy capabilities based on the users' USE flags.
245 +
246 + if ! use peer_perms; then
247 + sed -i -e '/network_peer_controls/d' \
248 + "${S}/refpolicy/policy/policy_capabilities"
249 + fi
250 +
251 + if ! use open_perms; then
252 + sed -i -e '/open_perms/d' \
253 + "${S}/refpolicy/policy/policy_capabilities"
254 + fi
255 +
256 + if ! use ubac; then
257 + sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \
258 + || die "Failed to disable User Based Access Control"
259 + fi
260 +
261 + echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf"
262 +
263 + # Setup the policies based on the types delivered by the end user.
264 + # These types can be "targeted", "strict", "mcs" and "mls".
265 + for i in ${POLICY_TYPES}; do
266 + cp -a "${S}/refpolicy" "${S}/${i}"
267 +
268 + cd "${S}/${i}";
269 + make conf || die "Make conf in ${i} failed"
270 +
271 + #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf"
272 + sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf"
273 +
274 + sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \
275 + "${S}/${i}/build.conf" || die "build.conf setup failed."
276 +
277 + if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]];
278 + then
279 + # MCS/MLS require additional settings
280 + sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \
281 + || die "failed to set type to mls"
282 + fi
283 +
284 + if [ "${i}" == "targeted" ]; then
285 + sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \
286 + "${S}/${i}/config/appconfig-standard/seusers" \
287 + || die "targeted seusers setup failed."
288 + fi
289 + done
290 +}
291 +
292 +src_compile() {
293 + [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
294 +
295 + for i in ${POLICY_TYPES}; do
296 + cd "${S}/${i}"
297 + make base || die "${i} compile failed"
298 + if use doc; then
299 + make html || die
300 + fi
301 + done
302 +}
303 +
304 +src_install() {
305 + [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
306 +
307 + for i in ${POLICY_TYPES}; do
308 + cd "${S}/${i}"
309 +
310 + make DESTDIR="${D}" install \
311 + || die "${i} install failed."
312 +
313 + make DESTDIR="${D}" install-headers \
314 + || die "${i} headers install failed."
315 +
316 + echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type"
317 +
318 + echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types"
319 +
320 + # libsemanage won't make this on its own
321 + keepdir "/etc/selinux/${i}/policy"
322 +
323 + if use doc; then
324 + dohtml doc/html/*;
325 + fi
326 + done
327 +
328 + dodoc doc/Makefile.example doc/example.{te,fc,if}
329 +
330 + insinto /etc/selinux
331 + doins "${FILESDIR}/config"
332 +}
333 +
334 +pkg_preinst() {
335 + has_version "<${CATEGORY}/${PN}-2.20101213-r13"
336 + previous_less_than_r13=$?
337 +}
338 +
339 +pkg_postinst() {
340 + [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
341 +
342 + for i in ${POLICY_TYPES}; do
343 + einfo "Trying to insert base module into ${i} module store."
344 +
345 + cd "${ROOT}/usr/share/selinux/${i}"
346 + semodule -s "${i}" -b base.pp
347 + if [[ $? -ne 0 ]]; then
348 + ewarn "Base policy failed loading. However, this can be ignored if"
349 + ewarn "you still have to install (or update) selinux-core."
350 + fi
351 + done
352 + elog "Updates on policies might require you to relabel files. If you, after"
353 + elog "installing new SELinux policies, get 'permission denied' errors,"
354 + elog "relabelling your system using 'rlpkg -a -r' might resolve the issues."
355 +}
356
357 diff --git a/sec-policy/selinux-clamav/ChangeLog b/sec-policy/selinux-clamav/ChangeLog
358 index fddea88..39f7574 100644
359 --- a/sec-policy/selinux-clamav/ChangeLog
360 +++ b/sec-policy/selinux-clamav/ChangeLog
361 @@ -1,7 +1,12 @@
362 # ChangeLog for sec-policy/selinux-clamav
363 -# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2
364 +# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2
365 # $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-clamav/ChangeLog,v 1.28 2011/11/12 20:53:29 swift Exp $
366
367 +*selinux-clamav-2.20120215-r1 (01 Mar 2012)
368 +
369 + 01 Mar 2012; <swift@g.o> +selinux-clamav-2.20120215-r1.ebuild:
370 + Correct type def
371 +
372 12 Nov 2011; <swift@g.o> -selinux-clamav-2.20101213.ebuild:
373 Removing old policies
374
375
376 diff --git a/sec-policy/selinux-clamav/selinux-clamav-2.20120215-r1.ebuild b/sec-policy/selinux-clamav/selinux-clamav-2.20120215-r1.ebuild
377 new file mode 100644
378 index 0000000..daeadfd
379 --- /dev/null
380 +++ b/sec-policy/selinux-clamav/selinux-clamav-2.20120215-r1.ebuild
381 @@ -0,0 +1,14 @@
382 +# Copyright 1999-2012 Gentoo Foundation
383 +# Distributed under the terms of the GNU General Public License v2
384 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-clamav/selinux-clamav-2.20110726.ebuild,v 1.2 2011/10/23 12:42:29 swift Exp $
385 +EAPI="4"
386 +
387 +IUSE=""
388 +MODS="clamav"
389 +BASEPOL="2.20120215-r4"
390 +
391 +inherit selinux-policy-2
392 +
393 +DESCRIPTION="SELinux policy for clamav"
394 +
395 +KEYWORDS="~amd64 ~x86"
396
397 diff --git a/sec-policy/selinux-dhcp/ChangeLog b/sec-policy/selinux-dhcp/ChangeLog
398 index 45e37fc..d015cb6 100644
399 --- a/sec-policy/selinux-dhcp/ChangeLog
400 +++ b/sec-policy/selinux-dhcp/ChangeLog
401 @@ -2,6 +2,11 @@
402 # Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2
403 # $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-dhcp/ChangeLog,v 1.40 2012/01/29 13:08:48 swift Exp $
404
405 +*selinux-dhcp-2.20120215-r1 (01 Mar 2012)
406 +
407 + 01 Mar 2012; <swift@g.o> +selinux-dhcp-2.20120215-r1.ebuild:
408 + Update patch on LDAP backend support
409 +
410 29 Jan 2012; <swift@g.o> Manifest:
411 Updating manifest
412
413
414 diff --git a/sec-policy/selinux-dhcp/selinux-dhcp-2.20120215-r1.ebuild b/sec-policy/selinux-dhcp/selinux-dhcp-2.20120215-r1.ebuild
415 new file mode 100644
416 index 0000000..bdc2d0a
417 --- /dev/null
418 +++ b/sec-policy/selinux-dhcp/selinux-dhcp-2.20120215-r1.ebuild
419 @@ -0,0 +1,14 @@
420 +# Copyright 1999-2012 Gentoo Foundation
421 +# Distributed under the terms of the GNU General Public License v2
422 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-dhcp/selinux-dhcp-2.20110726.ebuild,v 1.2 2011/10/23 12:42:44 swift Exp $
423 +EAPI="4"
424 +
425 +IUSE=""
426 +MODS="dhcp"
427 +BASEPOL="2.20120215-r4"
428 +
429 +inherit selinux-policy-2
430 +
431 +DESCRIPTION="SELinux policy for dhcp"
432 +
433 +KEYWORDS="~amd64 ~x86"
434
435 diff --git a/sec-policy/selinux-gorg/ChangeLog b/sec-policy/selinux-gorg/ChangeLog
436 index 1f45a25..12b90ec 100644
437 --- a/sec-policy/selinux-gorg/ChangeLog
438 +++ b/sec-policy/selinux-gorg/ChangeLog
439 @@ -2,6 +2,11 @@
440 # Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2
441 # $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-gorg/ChangeLog,v 1.8 2012/01/29 13:08:48 swift Exp $
442
443 +*selinux-gorg-2.20120215-r1 (01 Mar 2012)
444 +
445 + 01 Mar 2012; <swift@g.o> +selinux-gorg-2.20120215-r1.ebuild:
446 + Update on gorg, allow to signal itself
447 +
448 29 Jan 2012; <swift@g.o> Manifest:
449 Updating manifest
450
451
452 diff --git a/sec-policy/selinux-gorg/selinux-gorg-2.20120215-r1.ebuild b/sec-policy/selinux-gorg/selinux-gorg-2.20120215-r1.ebuild
453 new file mode 100644
454 index 0000000..f78397b
455 --- /dev/null
456 +++ b/sec-policy/selinux-gorg/selinux-gorg-2.20120215-r1.ebuild
457 @@ -0,0 +1,13 @@
458 +# Copyright 1999-2012 Gentoo Foundation
459 +# Distributed under the terms of the GNU General Public License v2
460 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-gorg/selinux-gorg-2.20110726.ebuild,v 1.2 2011/10/23 12:42:55 swift Exp $
461 +EAPI="4"
462 +
463 +IUSE=""
464 +MODS="gorg"
465 +BASEPOL="2.20120215-r4"
466 +
467 +inherit selinux-policy-2
468 +
469 +DESCRIPTION="SELinux policy for gorg"
470 +KEYWORDS="~amd64 ~x86"
471
472 diff --git a/sec-policy/selinux-mozilla/ChangeLog b/sec-policy/selinux-mozilla/ChangeLog
473 index 29cd815..256b133 100644
474 --- a/sec-policy/selinux-mozilla/ChangeLog
475 +++ b/sec-policy/selinux-mozilla/ChangeLog
476 @@ -2,6 +2,11 @@
477 # Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2
478 # $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-mozilla/ChangeLog,v 1.16 2012/01/29 13:08:49 swift Exp $
479
480 +*selinux-mozilla-2.20120215-r1 (01 Mar 2012)
481 +
482 + 01 Mar 2012; <swift@g.o> +selinux-mozilla-2.20120215-r1.ebuild:
483 + Allow mozilla_plugin_t to be used by suers
484 +
485 29 Jan 2012; <swift@g.o> Manifest:
486 Updating manifest
487
488
489 diff --git a/sec-policy/selinux-mozilla/selinux-mozilla-2.20120215-r1.ebuild b/sec-policy/selinux-mozilla/selinux-mozilla-2.20120215-r1.ebuild
490 new file mode 100644
491 index 0000000..158e37a
492 --- /dev/null
493 +++ b/sec-policy/selinux-mozilla/selinux-mozilla-2.20120215-r1.ebuild
494 @@ -0,0 +1,13 @@
495 +# Copyright 1999-2012 Gentoo Foundation
496 +# Distributed under the terms of the GNU General Public License v2
497 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-mozilla/selinux-mozilla-2.20110726-r5.ebuild,v 1.1 2012/01/14 19:59:59 swift Exp $
498 +EAPI="4"
499 +
500 +IUSE=""
501 +MODS="mozilla"
502 +BASEPOL="2.20120215-r4"
503 +
504 +inherit selinux-policy-2
505 +
506 +DESCRIPTION="SELinux policy for mozilla"
507 +KEYWORDS="~amd64 ~x86"