Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package yast2-security for openSUSE:Factory 
checked in at 2022-01-11 00:01:40
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/yast2-security (Old)
 and      /work/SRC/openSUSE:Factory/.yast2-security.new.1892 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "yast2-security"

Tue Jan 11 00:01:40 2022 rev:109 rq:945256 version:4.4.6

Changes:
--------
--- /work/SRC/openSUSE:Factory/yast2-security/yast2-security.changes    
2022-01-05 13:40:07.077542817 +0100
+++ /work/SRC/openSUSE:Factory/.yast2-security.new.1892/yast2-security.changes  
2022-01-11 00:01:57.069243365 +0100
@@ -1,0 +2,14 @@
+Mon Jan 10 10:08:44 UTC 2022 - Knut Anderssen <kanders...@suse.com>
+
+- Fix security_auto client selinux requirement (bsc#1194449)
+- 4.4.6
+
+-------------------------------------------------------------------
+Fri Jan  7 12:37:08 UTC 2022 - Knut Anderssen <kanders...@suse.com>
+
+- Do not use the 'lsm' kernel boot parameter by now as it could
+  need other modules to be pecified like the integrity one
+  (bsc#1194332).
+- 4.4.5
+
+-------------------------------------------------------------------

Old:
----
  yast2-security-4.4.4.tar.bz2

New:
----
  yast2-security-4.4.6.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ yast2-security.spec ++++++
--- /var/tmp/diff_new_pack.Bx60vu/_old  2022-01-11 00:01:57.629243855 +0100
+++ /var/tmp/diff_new_pack.Bx60vu/_new  2022-01-11 00:01:57.633243859 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           yast2-security
-Version:        4.4.4
+Version:        4.4.6
 Release:        0
 Summary:        YaST2 - Security Configuration
 License:        GPL-2.0-only

++++++ yast2-security-4.4.4.tar.bz2 -> yast2-security-4.4.6.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/yast2-security-4.4.4/package/yast2-security.changes 
new/yast2-security-4.4.6/package/yast2-security.changes
--- old/yast2-security-4.4.4/package/yast2-security.changes     2022-01-05 
07:43:22.000000000 +0100
+++ new/yast2-security-4.4.6/package/yast2-security.changes     2022-01-10 
11:15:21.000000000 +0100
@@ -1,4 +1,18 @@
 -------------------------------------------------------------------
+Mon Jan 10 10:08:44 UTC 2022 - Knut Anderssen <kanders...@suse.com>
+
+- Fix security_auto client selinux requirement (bsc#1194449)
+- 4.4.6
+
+-------------------------------------------------------------------
+Fri Jan  7 12:37:08 UTC 2022 - Knut Anderssen <kanders...@suse.com>
+
+- Do not use the 'lsm' kernel boot parameter by now as it could
+  need other modules to be pecified like the integrity one
+  (bsc#1194332).
+- 4.4.5
+
+-------------------------------------------------------------------
 Tue Jan  4 12:06:48 UTC 2022 - Knut Anderssen <kanders...@suse.com>
 
 - Related to jsc#SLE-22069:
@@ -17,7 +31,7 @@
 -------------------------------------------------------------------
 Wed Dec 22 23:06:57 UTC 2021 - Knut Anderssen <kanders...@suse.com>
 
-- Add support for selecting and configuring the desired Linux 
+- Add support for selecting and configuring the desired Linux
   Security Module (jsc#SLE-22069)
 - 4.4.2
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/yast2-security-4.4.4/package/yast2-security.spec 
new/yast2-security-4.4.6/package/yast2-security.spec
--- old/yast2-security-4.4.4/package/yast2-security.spec        2022-01-05 
07:43:22.000000000 +0100
+++ new/yast2-security-4.4.6/package/yast2-security.spec        2022-01-10 
11:15:21.000000000 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           yast2-security
-Version:        4.4.4
+Version:        4.4.6
 Release:        0
 Group:          System/YaST
 License:        GPL-2.0-only
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/yast2-security-4.4.4/src/clients/security_auto.rb 
new/yast2-security-4.4.6/src/clients/security_auto.rb
--- old/yast2-security-4.4.4/src/clients/security_auto.rb       2022-01-05 
07:43:22.000000000 +0100
+++ new/yast2-security-4.4.6/src/clients/security_auto.rb       2022-01-10 
11:15:21.000000000 +0100
@@ -30,7 +30,7 @@
 # goes through the configuration and return the setting.
 # Does not do any changes to the configuration.
 
-require "y2security/selinux"
+require "y2security/lsm"
 
 # @param function to execute
 # @param map/list of security settings
@@ -86,7 +86,7 @@
 
         # Checking value semantic
         if @param.key?("selinux_mode")
-          selinux_values = Y2Security::Selinux.new.modes.map { |m| m.id.to_s }
+          selinux_values = Y2Security::LSM::Selinux.new.modes.map { |m| 
m.id.to_s }
           if !selinux_values.include?(@param["selinux_mode"])
             Yast::AutoInstall.issues_list.add(
               :invalid_value,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/yast2-security-4.4.4/src/lib/y2security/lsm/app_armor.rb 
new/yast2-security-4.4.6/src/lib/y2security/lsm/app_armor.rb
--- old/yast2-security-4.4.4/src/lib/y2security/lsm/app_armor.rb        
2022-01-05 07:43:22.000000000 +0100
+++ new/yast2-security-4.4.6/src/lib/y2security/lsm/app_armor.rb        
2022-01-10 11:15:21.000000000 +0100
@@ -40,7 +40,7 @@
 
       # @see Base#kernel_params
       def kernel_params
-        { "lsm" => "apparmor" }
+        { "security" => "apparmor" }
       end
     end
   end
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/yast2-security-4.4.4/src/lib/y2security/lsm/selinux.rb 
new/yast2-security-4.4.6/src/lib/y2security/lsm/selinux.rb
--- old/yast2-security-4.4.4/src/lib/y2security/lsm/selinux.rb  2022-01-05 
07:43:22.000000000 +0100
+++ new/yast2-security-4.4.6/src/lib/y2security/lsm/selinux.rb  2022-01-10 
11:15:21.000000000 +0100
@@ -401,7 +401,7 @@
           @id = id.to_sym
           @name = name
           @options = {
-            "lsm"       => "selinux",
+            "security"  => "selinux",
             "selinux"   => disable   ? "0" : "1",
             "enforcing" => enforcing ? "1" : :missing
           }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/yast2-security-4.4.4/test/y2security/lsm/app_armor_test.rb 
new/yast2-security-4.4.6/test/y2security/lsm/app_armor_test.rb
--- old/yast2-security-4.4.4/test/y2security/lsm/app_armor_test.rb      
2022-01-05 07:43:22.000000000 +0100
+++ new/yast2-security-4.4.6/test/y2security/lsm/app_armor_test.rb      
2022-01-10 11:15:21.000000000 +0100
@@ -39,8 +39,8 @@
       expect(subject.kernel_params).to be_a(Hash)
     end
 
-    it "includes the key 'lsm' with the 'apparmor' value" do
-      expect(subject.kernel_params).to include("lsm" => "apparmor")
+    it "includes the key 'security' with the 'apparmor' value" do
+      expect(subject.kernel_params).to include("security" => "apparmor")
     end
   end
 end
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/yast2-security-4.4.4/test/y2security/lsm/selinux_test.rb 
new/yast2-security-4.4.6/test/y2security/lsm/selinux_test.rb
--- old/yast2-security-4.4.4/test/y2security/lsm/selinux_test.rb        
2022-01-05 07:43:22.000000000 +0100
+++ new/yast2-security-4.4.6/test/y2security/lsm/selinux_test.rb        
2022-01-10 11:15:21.000000000 +0100
@@ -678,7 +678,7 @@
     let(:mode) { described_class.find(:disabled) }
 
     it "returns the mode options" do
-      expect(mode.options).to a_hash_including("lsm", "selinux", "enforcing")
+      expect(mode.options).to a_hash_including("security", "selinux", 
"enforcing")
     end
   end
 end

Reply via email to