Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package yast2-security for openSUSE:Factory checked in at 2022-01-11 00:01:40 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/yast2-security (Old) and /work/SRC/openSUSE:Factory/.yast2-security.new.1892 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "yast2-security" Tue Jan 11 00:01:40 2022 rev:109 rq:945256 version:4.4.6 Changes: -------- --- /work/SRC/openSUSE:Factory/yast2-security/yast2-security.changes 2022-01-05 13:40:07.077542817 +0100 +++ /work/SRC/openSUSE:Factory/.yast2-security.new.1892/yast2-security.changes 2022-01-11 00:01:57.069243365 +0100 @@ -1,0 +2,14 @@ +Mon Jan 10 10:08:44 UTC 2022 - Knut Anderssen <kanders...@suse.com> + +- Fix security_auto client selinux requirement (bsc#1194449) +- 4.4.6 + +------------------------------------------------------------------- +Fri Jan 7 12:37:08 UTC 2022 - Knut Anderssen <kanders...@suse.com> + +- Do not use the 'lsm' kernel boot parameter by now as it could + need other modules to be pecified like the integrity one + (bsc#1194332). +- 4.4.5 + +------------------------------------------------------------------- Old: ---- yast2-security-4.4.4.tar.bz2 New: ---- yast2-security-4.4.6.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ yast2-security.spec ++++++ --- /var/tmp/diff_new_pack.Bx60vu/_old 2022-01-11 00:01:57.629243855 +0100 +++ /var/tmp/diff_new_pack.Bx60vu/_new 2022-01-11 00:01:57.633243859 +0100 @@ -17,7 +17,7 @@ Name: yast2-security -Version: 4.4.4 +Version: 4.4.6 Release: 0 Summary: YaST2 - Security Configuration License: GPL-2.0-only ++++++ yast2-security-4.4.4.tar.bz2 -> yast2-security-4.4.6.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-security-4.4.4/package/yast2-security.changes new/yast2-security-4.4.6/package/yast2-security.changes --- old/yast2-security-4.4.4/package/yast2-security.changes 2022-01-05 07:43:22.000000000 +0100 +++ new/yast2-security-4.4.6/package/yast2-security.changes 2022-01-10 11:15:21.000000000 +0100 @@ -1,4 +1,18 @@ ------------------------------------------------------------------- +Mon Jan 10 10:08:44 UTC 2022 - Knut Anderssen <kanders...@suse.com> + +- Fix security_auto client selinux requirement (bsc#1194449) +- 4.4.6 + +------------------------------------------------------------------- +Fri Jan 7 12:37:08 UTC 2022 - Knut Anderssen <kanders...@suse.com> + +- Do not use the 'lsm' kernel boot parameter by now as it could + need other modules to be pecified like the integrity one + (bsc#1194332). +- 4.4.5 + +------------------------------------------------------------------- Tue Jan 4 12:06:48 UTC 2022 - Knut Anderssen <kanders...@suse.com> - Related to jsc#SLE-22069: @@ -17,7 +31,7 @@ ------------------------------------------------------------------- Wed Dec 22 23:06:57 UTC 2021 - Knut Anderssen <kanders...@suse.com> -- Add support for selecting and configuring the desired Linux +- Add support for selecting and configuring the desired Linux Security Module (jsc#SLE-22069) - 4.4.2 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-security-4.4.4/package/yast2-security.spec new/yast2-security-4.4.6/package/yast2-security.spec --- old/yast2-security-4.4.4/package/yast2-security.spec 2022-01-05 07:43:22.000000000 +0100 +++ new/yast2-security-4.4.6/package/yast2-security.spec 2022-01-10 11:15:21.000000000 +0100 @@ -17,7 +17,7 @@ Name: yast2-security -Version: 4.4.4 +Version: 4.4.6 Release: 0 Group: System/YaST License: GPL-2.0-only diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-security-4.4.4/src/clients/security_auto.rb new/yast2-security-4.4.6/src/clients/security_auto.rb --- old/yast2-security-4.4.4/src/clients/security_auto.rb 2022-01-05 07:43:22.000000000 +0100 +++ new/yast2-security-4.4.6/src/clients/security_auto.rb 2022-01-10 11:15:21.000000000 +0100 @@ -30,7 +30,7 @@ # goes through the configuration and return the setting. # Does not do any changes to the configuration. -require "y2security/selinux" +require "y2security/lsm" # @param function to execute # @param map/list of security settings @@ -86,7 +86,7 @@ # Checking value semantic if @param.key?("selinux_mode") - selinux_values = Y2Security::Selinux.new.modes.map { |m| m.id.to_s } + selinux_values = Y2Security::LSM::Selinux.new.modes.map { |m| m.id.to_s } if !selinux_values.include?(@param["selinux_mode"]) Yast::AutoInstall.issues_list.add( :invalid_value, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-security-4.4.4/src/lib/y2security/lsm/app_armor.rb new/yast2-security-4.4.6/src/lib/y2security/lsm/app_armor.rb --- old/yast2-security-4.4.4/src/lib/y2security/lsm/app_armor.rb 2022-01-05 07:43:22.000000000 +0100 +++ new/yast2-security-4.4.6/src/lib/y2security/lsm/app_armor.rb 2022-01-10 11:15:21.000000000 +0100 @@ -40,7 +40,7 @@ # @see Base#kernel_params def kernel_params - { "lsm" => "apparmor" } + { "security" => "apparmor" } end end end diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-security-4.4.4/src/lib/y2security/lsm/selinux.rb new/yast2-security-4.4.6/src/lib/y2security/lsm/selinux.rb --- old/yast2-security-4.4.4/src/lib/y2security/lsm/selinux.rb 2022-01-05 07:43:22.000000000 +0100 +++ new/yast2-security-4.4.6/src/lib/y2security/lsm/selinux.rb 2022-01-10 11:15:21.000000000 +0100 @@ -401,7 +401,7 @@ @id = id.to_sym @name = name @options = { - "lsm" => "selinux", + "security" => "selinux", "selinux" => disable ? "0" : "1", "enforcing" => enforcing ? "1" : :missing } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-security-4.4.4/test/y2security/lsm/app_armor_test.rb new/yast2-security-4.4.6/test/y2security/lsm/app_armor_test.rb --- old/yast2-security-4.4.4/test/y2security/lsm/app_armor_test.rb 2022-01-05 07:43:22.000000000 +0100 +++ new/yast2-security-4.4.6/test/y2security/lsm/app_armor_test.rb 2022-01-10 11:15:21.000000000 +0100 @@ -39,8 +39,8 @@ expect(subject.kernel_params).to be_a(Hash) end - it "includes the key 'lsm' with the 'apparmor' value" do - expect(subject.kernel_params).to include("lsm" => "apparmor") + it "includes the key 'security' with the 'apparmor' value" do + expect(subject.kernel_params).to include("security" => "apparmor") end end end diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-security-4.4.4/test/y2security/lsm/selinux_test.rb new/yast2-security-4.4.6/test/y2security/lsm/selinux_test.rb --- old/yast2-security-4.4.4/test/y2security/lsm/selinux_test.rb 2022-01-05 07:43:22.000000000 +0100 +++ new/yast2-security-4.4.6/test/y2security/lsm/selinux_test.rb 2022-01-10 11:15:21.000000000 +0100 @@ -678,7 +678,7 @@ let(:mode) { described_class.find(:disabled) } it "returns the mode options" do - expect(mode.options).to a_hash_including("lsm", "selinux", "enforcing") + expect(mode.options).to a_hash_including("security", "selinux", "enforcing") end end end