Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ruby-selinux-3.5-150600.1.7 RPM for s390x

From OpenSuSE Leap 15.6 for s390x

Name: ruby-selinux Distribution: SUSE Linux Enterprise 15
Version: 3.5 Vendor: SUSE LLC <https://www.suse.com/>
Release: 150600.1.7 Build date: Thu May 2 15:22:10 2024
Group: Development/Languages/Ruby Build host: s390zl31
Size: 207768 Source RPM: libselinux-bindings-3.5-150600.1.7.src.rpm
Packager: https://www.suse.com/
Url: https://github.com/SELinuxProject/selinux/wiki/Releases
Summary: Ruby bindings for the SELinux runtime library
libselinux provides an interface to get and set process and file
security contexts and to obtain security policy decisions.

This subpackage contains Ruby extensions to use SELinux from that
language.

Provides

Requires

License

SUSE-Public-Domain

Changelog

* Thu Nov 30 2023 [email protected]
  - Also build python3-selinux for toolchain compability on SLE
* Fri Aug 04 2023 [email protected]
  - (bsc#1212618) Divide libselinux and libselinux-bindings again.
    libselinux itself is in Ring0 so it has to have absolutely
    minimal dependencies, so it is better to separate
    libselinux-bindings into a separate pacakge.
* Tue Jun 20 2023 [email protected]
  - Add explicit BuildRequires for python3-pip and python3-wheel on
    15.5, currently the macros don't do the right thing
* Thu Jun 01 2023 [email protected]
  - allow building this with different python versions, to make this
    usable for the new sle15 macro (using python3.11)
* Fri May 05 2023 [email protected]
  - Add python-wheel build dependency to build correctly with latest
    python-pip version.
* Thu May 04 2023 [email protected]
  - Add _multibuild to define additional spec files as additional
    flavors.
    Eliminates the need for source package links in OBS.
* Thu Mar 23 2023 [email protected]
  - Enable LTO as it works fine now.
* Fri Feb 24 2023 [email protected]
  - Update to version 3.5:
    * check for truncations
    * avoid newline in avc message
    * bail out on path truncations
    * add getpidprevcon to gather the previous context before the last
      exec of a given process
    * Workaround for heap overhead of pcre
    * fix memory leaks on the audit2why module init
    * ignore invalid class name lookup
  - Drop restorecon_pin_file.patch, is upstream
  - Refreshed python3.8-compat.patch
  - Added additional developer key (Jason Zaman)
* Mon May 09 2022 [email protected]
  - Update to version 3.4:
    * Use PCRE2 by default
    * Make selinux_log() and is_context_customizable() thread-safe
    * Prevent leakeing file descriptors
    * Correctly hash specfiles larger than 4G
  - Refreshed skip_cycles.patch
* Thu Nov 11 2021 [email protected]
  - Update to version 3.3:
    * Lots of smaller issues fixed found by fuzzing
* Wed Mar 17 2021 [email protected]
  - Switch to pcre2:
    + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8)
    + Pass USE_PCRE2=y to make.
* Tue Mar 09 2021 [email protected]
  - Update to version 3.2:
    * Use mmap()'ed kernel status page instead of netlink by default.
      See "KERNEL STATUS PAGE" section in avc_init(3) for more details.
    * New log callback levels for enforcing and policy load notices -
      SELINUX_POLICYLOAD, SELINUX_SETENFORCE
    * Changed userspace AVC setenforce and policy load messages to audit
      format.
* Tue Jul 14 2020 [email protected]
  - Update to version 3.1:
    * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were
      removed. All userspace object managers should have been updated to use the
      dynamic class/perm mapping support.
      Use string_to_security_class(3) and string_to_av_perm(3) to map the class
      and permission names to their policy values, or selinux_set_mapping(3) to
      create a mapping from class and permission index values used by the
      application to the policy values.
    * Removed restrictions in libsepol and checkpolicy that required all declared
      initial SIDs to be assigned a context.
    * Support for new policy capability genfs_seclabel_symlinks
    * selinuxfs is mounted with noexec and nosuid
    * `security_compute_user()` was deprecated
    * Refreshed python3.8-compat.patch
* Tue Mar 03 2020 [email protected]
  - Update to version 3.0
    * Ignore the stem when looking up all matches in file context
    * Save digest of all partial matches for directory
    * Use Python distutils to install SELinux python bindings
    * ensure that digest_len is not zero
    * fix string conversion of unknown perms
    * mark all exported function "extern"
* Mon Dec 16 2019 [email protected]
  - Added swig4_moduleimport.patch to prevent import errors due to
    SWIG 4
* Wed Oct 30 2019 [email protected]
  - Add python3.8-compat.patch which makes build possible even with
    Python 3.8, which doesn’t automatically adds -lpython<ver>
* Tue May 28 2019 [email protected]
  - Disable LTO (boo#1133244).
* Fri May 24 2019 [email protected]
  - Set License: to correct value (bsc#1135710)
* Wed Mar 20 2019 [email protected]
  - Update to version 2.9
    * Add security_reject_unknown(3) man page
    * Change matchpathcon usage to match with matchpathcon manpage
    * Do not define gettid() if glibc >= 2.30 is used
    * Fix RESOURCE_LEAK defects reported by coverity scan
    * Fix line wrapping in selabel_file.5
    * Do not dereference symlink with statfs in selinux_restorecon
    * Fix overly strict validation of file_contexts.bin
    * Fix selinux_restorecon() on non-SELinux hosts
    * Fix the whatis line for the selinux_boolean_sub.3 manpage
    * Fix printf format string specifier for uint64_t
    * Fix handling of unknown classes/perms
    * Set an appropriate errno in booleans.c
  - Dropped python3.patch, is now upstream
* Wed Oct 17 2018 [email protected]
  - Update to version 2.8 (bsc#1111732).
    For changes please see
    https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt
  - ran spec-cleaner on spec files
* Mon May 14 2018 [email protected]
  - Update to version 2.7.
    * %files needed to be heavily modified
    * Based expressly on python3, not just python
    For changes please see
    https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt
* Fri Mar 16 2018 [email protected]
  - Updated spec file to use python3. Added python3.patch to fix
    build
* Fri Nov 24 2017 [email protected]
  - Update to version 2.6. Notable changes:
    * selinux_restorecon: fix realpath logic
    * sefcontext_compile: invert semantics of "-r" flag
    * sefcontext_compile: Add "-i" flag
    * Introduce configurable backends
    * Add function to find security.restorecon_last entries
    * Add openrc_contexts functions
    * Add support for pcre2
    * Handle NULL pcre study data
    * Add setfiles support to selinux_restorecon(3)
    * Evaluate inodes in selinux_restorecon(3)
    * Change the location of _selinux.so
    * Explain how to free policy type from selinux_getpolicytype()
    * Compare absolute pathname in matchpathcon -V
    * Add selinux_snapperd_contexts_path()
    * Modify audit2why analyze function to use loaded policy
    * Avoid mounting /proc outside of selinux_init_load_policy()
    * Fix location of selinuxfs mount point
    * Only mount /proc if necessary
    * procattr: return einval for <= 0 pid args
    * procattr: return error on invalid pid_t input
  - Dropped
    * libselinux-2.2-ruby.patch
    * libselinux-proc-mount-only-if-needed.patch
    * python-selinux-swig-3.10.patch
* Wed Jul 05 2017 [email protected]
  - readv-proto.patch: include <sys/uio.h> for readv prototype
* Sun Jul 17 2016 [email protected]
  - Update RPM groups, trim description and combine filelist entries.
* Thu Jul 14 2016 [email protected]
  - Adjusted source link
* Tue Jul 05 2016 [email protected]
  - add patch: python-selinux-swig-3.10.patch, fixed boo#985368
    * swig-3.10 in Factory use importlib instead of imp to find
      _selinux.so. imp searched the same directory as __init__.py
      is while importlib searchs only standard paths. so we have
      to move _selinux.so. fixed by upstream
  - update version 2.5
    * Add selinux_restorecon function
    * read_spec_entry: fail on non-ascii
    * Add man information about thread specific functions
    * Don't wrap rpm_execcon with DISABLE_RPM with SWIG
    * Correct line count for property and service context files
    * label_file: fix memory leaks and uninitialized jump
    * Replace selabel_digest hash function
    * Fix selabel_open(3) services if no digest requested
    * Add selabel_digest function
    * Flush the class/perm string mapping cache on policy reload
    * Fix restorecon when path has no context
    * Free memory when processing media and x specfiles
    * Fix mmap memory release for file labeling
    * Add policy context validation to sefcontext_compile
    * Do not treat an empty file_contexts(.local) as an error
    * Fail hard on invalid property_contexts entries
    * Fail hard on invalid file_contexts entries
    * Support context validation on file_contexts.bin
    * Add selabel_cmp interface and label_file backend
    * Support specifying file_contexts.bin file path
    * Support file_contexts.bin without file_contexts
    * Simplify procattr cache
    * Use /proc/thread-self when available
    * Add const to selinux_opt for label backends
    * Fix binary file labels for regexes with metachars
    * Fix file labels for regexes with metachars
    * Fix if file_contexts not '\n' terminated
    * Enhance file context support
    * Fix property processing and cleanup formatting
    * Add read_spec_entries function to replace sscanf
    * Support consistent mode size for bin files
    * Fix more bin file processing core dumps
    * add selinux_openssh_contexts_path()
    * setrans_client: minimize overhead when mcstransd is not present
    * Ensure selabel_lookup_best_match links NULL terminated
    * Fix core dumps with corrupt *.bin files
    * Add selabel partial and best match APIs
    * Use os.walk() instead of the deprecated os.path.walk()
    * Remove deprecated mudflap option
    * Mount procfs before checking /proc/filesystems
    * Fix -Wformat errors with gcc-5.0.0
    * label_file:  handle newlines in file names
    * Fix audit2why error handling if SELinux is disabled
    * pcre_study can return NULL without error
    * Only check SELinux enabled status once in selinux_check_access
  - changes in 2.4
    * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR
    * Fix bugs found by hardened gcc flags
    * Set the system to permissive if failing to disable SELinux because
      policy has already been loaded
    * Add db_exception and db_datatype support to label_db backend
    * Log an error on unknown classes and permissions
    * Add pcre version string to the compiled file_contexts format
    * Deprecate use of flask.h and av_permissions.h
    * Compiled file_context files and the original should have the same DAC
      permissions
* Wed May 27 2015 [email protected]
  - Update libselinux-2.2-ruby.patch: use RbConfig instead of
    deprecated Config.

Files

/usr/lib64/ruby/vendor_ruby/2.5.0/s390x-linux-gnu/selinux.so


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 20:22:04 2024