Hello community, here is the log from the commit of package libselinux for openSUSE:Factory checked in at 2018-12-10 22:42:31 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/libselinux (Old) and /work/SRC/openSUSE:Factory/.libselinux.new.19453 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "libselinux" Mon Dec 10 22:42:31 2018 rev:51 rq:656944 version:2.6 Changes: -------- New Changes file: --- /dev/null 2018-10-29 14:05:42.522318975 +0100 +++ /work/SRC/openSUSE:Factory/.libselinux.new.19453/libselinux-bindings.changes 2018-12-10 22:42:33.886643001 +0100 @@ -0,0 +1,313 @@ +------------------------------------------------------------------- +Fri Mar 16 15:25:10 UTC 2018 - jseg...@suse.com + +- Updated spec file to use python3. Added python3.patch to fix + build + +------------------------------------------------------------------- +Fri Nov 24 09:09:02 UTC 2017 - jseg...@suse.com + +- Update to version 2.6. Notable changes: + * selinux_restorecon: fix realpath logic + * sefcontext_compile: invert semantics of "-r" flag + * sefcontext_compile: Add "-i" flag + * Introduce configurable backends + * Add function to find security.restorecon_last entries + * Add openrc_contexts functions + * Add support for pcre2 + * Handle NULL pcre study data + * Add setfiles support to selinux_restorecon(3) + * Evaluate inodes in selinux_restorecon(3) + * Change the location of _selinux.so + * Explain how to free policy type from selinux_getpolicytype() + * Compare absolute pathname in matchpathcon -V + * Add selinux_snapperd_contexts_path() + * Modify audit2why analyze function to use loaded policy + * Avoid mounting /proc outside of selinux_init_load_policy() + * Fix location of selinuxfs mount point + * Only mount /proc if necessary + * procattr: return einval for <= 0 pid args + * procattr: return error on invalid pid_t input +- Dropped + * libselinux-2.2-ruby.patch + * libselinux-proc-mount-only-if-needed.patch + * python-selinux-swig-3.10.patch + +------------------------------------------------------------------- +Wed Jul 5 10:30:57 UTC 2017 - sch...@suse.de + +- readv-proto.patch: include <sys/uio.h> for readv prototype + +------------------------------------------------------------------- +Sun Jul 17 15:30:05 UTC 2016 - jeng...@inai.de + +- Update RPM groups, trim description and combine filelist entries. + +------------------------------------------------------------------- +Thu Jul 14 07:59:04 UTC 2016 - jseg...@novell.com + +- Adjusted source link + +------------------------------------------------------------------- +Tue Jul 5 16:44:44 UTC 2016 - i...@marguerite.su + +- add patch: python-selinux-swig-3.10.patch, fixed boo#985368 + * swig-3.10 in Factory use importlib instead of imp to find + _selinux.so. imp searched the same directory as __init__.py + is while importlib searchs only standard paths. so we have + to move _selinux.so. fixed by upstream +- update version 2.5 + * Add selinux_restorecon function + * read_spec_entry: fail on non-ascii + * Add man information about thread specific functions + * Don't wrap rpm_execcon with DISABLE_RPM with SWIG + * Correct line count for property and service context files + * label_file: fix memory leaks and uninitialized jump + * Replace selabel_digest hash function + * Fix selabel_open(3) services if no digest requested + * Add selabel_digest function + * Flush the class/perm string mapping cache on policy reload + * Fix restorecon when path has no context + * Free memory when processing media and x specfiles + * Fix mmap memory release for file labeling + * Add policy context validation to sefcontext_compile + * Do not treat an empty file_contexts(.local) as an error + * Fail hard on invalid property_contexts entries + * Fail hard on invalid file_contexts entries + * Support context validation on file_contexts.bin + * Add selabel_cmp interface and label_file backend + * Support specifying file_contexts.bin file path + * Support file_contexts.bin without file_contexts + * Simplify procattr cache + * Use /proc/thread-self when available + * Add const to selinux_opt for label backends + * Fix binary file labels for regexes with metachars + * Fix file labels for regexes with metachars + * Fix if file_contexts not '\n' terminated + * Enhance file context support + * Fix property processing and cleanup formatting + * Add read_spec_entries function to replace sscanf + * Support consistent mode size for bin files + * Fix more bin file processing core dumps + * add selinux_openssh_contexts_path() + * setrans_client: minimize overhead when mcstransd is not present + * Ensure selabel_lookup_best_match links NULL terminated + * Fix core dumps with corrupt *.bin files + * Add selabel partial and best match APIs + * Use os.walk() instead of the deprecated os.path.walk() + * Remove deprecated mudflap option + * Mount procfs before checking /proc/filesystems + * Fix -Wformat errors with gcc-5.0.0 + * label_file: handle newlines in file names + * Fix audit2why error handling if SELinux is disabled + * pcre_study can return NULL without error + * Only check SELinux enabled status once in selinux_check_access +- changes in 2.4 + * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR + * Fix bugs found by hardened gcc flags + * Set the system to permissive if failing to disable SELinux because + policy has already been loaded + * Add db_exception and db_datatype support to label_db backend + * Log an error on unknown classes and permissions + * Add pcre version string to the compiled file_contexts format + * Deprecate use of flask.h and av_permissions.h + * Compiled file_context files and the original should have the same DAC + permissions +------------------------------------------------------------------- +Wed May 27 11:53:54 UTC 2015 - dims...@opensuse.org + +- Update libselinux-2.2-ruby.patch: use RbConfig instead of + deprecated Config. + +------------------------------------------------------------------- +Sun May 18 00:15:17 UTC 2014 - crrodrig...@opensuse.org + +- Update to version 2.3 +* Get rid of security_context_t and fix const declarations. +* Refactor rpm_execcon() into a new setexecfilecon() from Guillem Jover. + +------------------------------------------------------------------- +Thu Oct 31 13:43:41 UTC 2013 - p.drou...@gmail.com + +- Update to version 2.2 + * Fix avc_has_perm() returns -1 even when SELinux is in permissive mode. + * Support overriding Makefile RANLIB + * Update pkgconfig definition + * Mount sysfs before trying to mount selinuxfs. + * Fix man pages + * Support overriding PATH and LIBBASE in Makefile + * Fix LDFLAGS usage + * Avoid shadowing stat in load_mmap + * Support building on older PCRE libraries + * Fix handling of temporary file in sefcontext_compile + * Fix procattr cache + * Define python constants for getenforce result + * Fix label substitution handling of / + * Add selinux_current_policy_path from + * Change get_context_list to only return good matches + * Support udev-197 and higher + * Add support for local substitutions + * Change setfilecon to not return ENOSUP if context is already correct + * Python wrapper leak fixes + * Export SELINUX_TRANS_DIR definition in selinux.h + * Add selinux_systemd_contexts_path + * Add selinux_set_policy_root + * Add man page for sefcontext_compile +- Remove libselinux-rhat.patch; merged on upstream +- Adapt libselinux-ruby.patch to upstream changes +- Use fdupes to symlink duplicate manpages + +------------------------------------------------------------------- +Thu Jun 27 14:57:53 UTC 2013 - vci...@suse.com + +- change the source url to the official 2.1.13 release tarball + +------------------------------------------------------------------- +Wed Jan 30 12:33:45 UTC 2013 - vci...@suse.com + +- update to 2.1.12 +- added BuildRequires: pcre-devel + +------------------------------------------------------------------- +Mon Jan 7 22:34:03 UTC 2013 - jeng...@inai.de + +- Remove obsolete defines/sections + +------------------------------------------------------------------- +Wed Jul 25 11:15:02 UTC 2012 - meiss...@suse.com + +- updated to 2.1.9 again (see below) + +------------------------------------------------------------------- +Fri Jun 1 18:34:04 CEST 2012 - m...@suse.de + +- update to libselinux-2.1.9 + * better man pages + * selinux_status interfaces + * simple interface for access checks + * multiple bug fixes +- fix build for ruby-1.9 + +------------------------------------------------------------------- +Mon Jun 28 06:38:35 UTC 2010 - jeng...@medozas.de + +- use %_smp_mflags + +------------------------------------------------------------------- +Thu Feb 25 14:57:16 UTC 2010 - prus...@suse.cz ++++ 116 more lines (skipped) ++++ between /dev/null ++++ and /work/SRC/openSUSE:Factory/.libselinux.new.19453/libselinux-bindings.changes --- /work/SRC/openSUSE:Factory/libselinux/libselinux.changes 2018-12-10 12:22:34.298872238 +0100 +++ /work/SRC/openSUSE:Factory/.libselinux.new.19453/libselinux.changes 2018-12-10 22:42:36.230640583 +0100 @@ -2,26 +1,0 @@ -Thu Nov 29 19:10:14 UTC 2018 - Jan Engelhardt <jeng...@inai.de> - -- Replace old $RPM_* shell vars. - -------------------------------------------------------------------- -Wed Nov 21 10:38:23 UTC 2018 - jseg...@suse.com - -- Merged libselinux-bindings back into main spec file - -------------------------------------------------------------------- -Wed Oct 17 11:48:30 UTC 2018 - jseg...@suse.com - -- Update to version 2.8 (bsc#1111732). - For changes please see - https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt - -------------------------------------------------------------------- -Mon May 14 22:45:54 UTC 2018 - mc...@cepl.eu - -- Update to version 2.7. - * %files needed to be heavily modified - * Based expressly on python3, not just python - For changes please see - https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt - -------------------------------------------------------------------- Old: ---- libselinux-2.8.tar.gz New: ---- libselinux-2.6.tar.gz libselinux-bindings.changes libselinux-bindings.spec ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ libselinux-bindings.spec ++++++ # # spec file for package libselinux-bindings # # Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed # upon. The license for this file, and modifications and additions to the # file, is the same license as for the pristine package itself (unless the # license for the pristine package is not an Open Source License, in which # case the license is the MIT License). An "Open Source License" is a # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. # Please submit bugfixes or comments via http://bugs.opensuse.org/ # %{?!python_module:%define python_module() python-%{**} python3-%{**}} %define libsepol_ver 2.6 Name: libselinux-bindings Version: 2.6 Release: 0 Summary: SELinux runtime library and simple utilities License: GPL-2.0 and SUSE-Public-Domain Group: Development/Libraries/C and C++ Url: https://github.com/SELinuxProject/selinux/wiki/Releases # embedded is the MD5 Source: https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20161014/libselinux-%{version}.tar.gz Source1: selinux-ready Source2: baselibs.conf # PATCH-FIX-UPSTREAM Include <sys/uio.h> for readv prototype Patch4: readv-proto.patch Patch5: python3.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRequires: libsepol-devel-static >= %{libsepol_ver} BuildRequires: pcre-devel BuildRequires: python-rpm-macros BuildRequires: python3-devel BuildRequires: ruby-devel BuildRequires: swig %description libselinux provides an interface to get and set process and file security contexts and to obtain security policy decisions. %package -n python3-selinux Summary: Python bindings for the SELinux runtime library License: SUSE-Public-Domain Group: Development/Libraries/Python %define oldpython python %ifpython2 Obsoletes: %{oldpython}-selinux < %{version} Provides: %{oldpython}-selinux = %{version} %endif Requires: libselinux1 = %{version} Requires: python3 %description -n python3-selinux libselinux provides an interface to get and set process and file security contexts and to obtain security policy decisions. This subpackage contains Python extensions to use SELinux from that language. %package -n ruby-selinux Summary: Ruby bindings for the SELinux runtime library License: SUSE-Public-Domain Group: Development/Languages/Ruby Requires: libselinux1 = %{version} Requires: ruby %description -n ruby-selinux libselinux provides an interface to get and set process and file security contexts and to obtain security policy decisions. This subpackage contains Ruby extensions to use SELinux from that language. %prep %setup -q -n libselinux-%{version} %patch4 -p1 %patch5 -p1 %build make %{?_smp_mflags} LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" -C src make %{?_smp_mflags} LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" -C src swigify make %{?_smp_mflags} LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" PYTHON=/usr/bin/python3 -C src pywrap make %{?_smp_mflags} LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" -C src rubywrap %install make DESTDIR="$RPM_BUILD_ROOT" LIBDIR="$RPM_BUILD_ROOT%{_libdir}" SHLIBDIR="$RPM_BUILD_ROOT/%{_lib}" -C src install make DESTDIR="$RPM_BUILD_ROOT" LIBDIR="$RPM_BUILD_ROOT%{_libdir}" SHLIBDIR="$RPM_BUILD_ROOT/%{_lib}" -C src install-pywrap make DESTDIR="$RPM_BUILD_ROOT" LIBDIR="$RPM_BUILD_ROOT%{_libdir}" SHLIBDIR="$RPM_BUILD_ROOT/%{_lib}" -C src install-rubywrap rm -rf $RPM_BUILD_ROOT/%{_lib} $RPM_BUILD_ROOT%{_libdir}/libselinux.* $RPM_BUILD_ROOT%{_libdir}/pkgconfig %files -n python3-selinux %defattr(-,root,root,-) %{python3_sitearch}/selinux/ %{python3_sitearch}/_selinux.so %files -n ruby-selinux %defattr(-,root,root,-) %{_libdir}/ruby/vendor_ruby/%{rb_ver}/%{rb_arch}/selinux.so %changelog ++++++ libselinux.spec ++++++ --- /var/tmp/diff_new_pack.KXMyHH/_old 2018-12-10 22:42:37.146639637 +0100 +++ /var/tmp/diff_new_pack.KXMyHH/_new 2018-12-10 22:42:37.146639637 +0100 @@ -16,33 +16,26 @@ # -%define libsepol_ver 2.8 -%{?!python_module:%define python_module() python-%{**} python3-%{**}} +%define libsepol_ver 2.6 Name: libselinux -Version: 2.8 +Version: 2.6 Release: 0 Summary: SELinux runtime library and utilities -License: GPL-2.0-only AND SUSE-Public-Domain +License: GPL-2.0 and SUSE-Public-Domain Group: Development/Libraries/C and C++ Url: https://github.com/SELinuxProject/selinux/wiki/Releases -Source: https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/libselinux-%{version}.tar.gz + +Source: https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20161014/%{name}-%{version}.tar.gz Source1: selinux-ready Source2: baselibs.conf -Patch3: python3.patch # PATCH-FIX-UPSTREAM Include <sys/uio.h> for readv prototype Patch4: readv-proto.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRequires: fdupes BuildRequires: libsepol-devel >= %{libsepol_ver} -BuildRequires: libsepol-devel-static >= %{libsepol_ver} BuildRequires: pcre-devel BuildRequires: pkg-config -BuildRequires: python-rpm-macros -BuildRequires: python3 -BuildRequires: python3-devel -BuildRequires: ruby-devel -BuildRequires: swig %description libselinux provides an interface to get and set process and file @@ -50,7 +43,6 @@ %package -n libselinux1 Summary: SELinux runtime library -License: GPL-2.0-only AND SUSE-Public-Domain Group: System/Libraries %description -n libselinux1 @@ -64,7 +56,6 @@ %package -n selinux-tools Summary: SELinux command-line utilities -License: GPL-2.0-only AND SUSE-Public-Domain Group: System/Base %description -n selinux-tools @@ -78,7 +69,6 @@ %package devel Summary: Development files for the SELinux runtime library -License: GPL-2.0-only AND SUSE-Public-Domain Group: Development/Libraries/C and C++ Requires: glibc-devel Requires: libselinux1 = %{version} @@ -93,7 +83,6 @@ %package devel-static Summary: Static archives for the SELinux runtime -License: GPL-2.0-only AND SUSE-Public-Domain Group: Development/Libraries/C and C++ Requires: libselinux-devel = %{version} Requires: pkgconfig(libpcre) @@ -107,49 +96,34 @@ necessary to develop your own software using libselinux. %prep -%setup -q -n libselinux-%{version} -%patch3 -p1 +%setup -q %patch4 -p1 %build -make %{?_smp_mflags} LIBDIR="%{_libdir}" CFLAGS="%{optflags}" CC="%{__cc}" -make %{?_smp_mflags} LIBDIR="%{_libdir}" CFLAGS="%{optflags}" -C src V=1 -make %{?_smp_mflags} LIBDIR="%{_libdir}" CFLAGS="%{optflags}" -C src swigify V=1 -make %{?_smp_mflags} LIBDIR="%{_libdir}" CFLAGS="%{optflags}" -C src pywrap V=1 -make %{?_smp_mflags} LIBDIR="%{_libdir}" CFLAGS="%{optflags}" -C src rubywrap V=1 +make %{?_smp_mflags} LIBDIR="%{_libdir}" CC="%{__cc}" CFLAGS="$RPM_OPT_FLAGS" %install -mkdir -p %{buildroot}/%{_lib} -mkdir -p %{buildroot}/%{_libdir} -mkdir -p %{buildroot}/%{_includedir} -mkdir -p %{buildroot}/%{_sbindir} -%make_install LIBDIR="%{_libdir}" SHLIBDIR="/%{_lib}" BINDIR="%{_sbindir}" -rm -f %{buildroot}/%{_sbindir}/compute_* -rm -f %{buildroot}/%{_sbindir}/deftype -rm -f %{buildroot}/%{_sbindir}/execcon -rm -f %{buildroot}/%{_sbindir}/getenforcemode -rm -f %{buildroot}/%{_sbindir}/getfilecon -rm -f %{buildroot}/%{_sbindir}/getpidcon -rm -f %{buildroot}/%{_sbindir}/mkdircon -rm -f %{buildroot}/%{_sbindir}/policyvers -rm -f %{buildroot}/%{_sbindir}/setfilecon -rm -f %{buildroot}/%{_sbindir}/selinuxconfig -rm -f %{buildroot}/%{_sbindir}/selinuxdisable -rm -f %{buildroot}/%{_sbindir}/getseuser -rm -f %{buildroot}/%{_sbindir}/selinux_check_securetty_context -mv %{buildroot}/%{_sbindir}/getdefaultcon %{buildroot}/%{_sbindir}/selinuxdefcon -mv %{buildroot}/%{_sbindir}/getconlist %{buildroot}/%{_sbindir}/selinuxconlist -install -m 0755 %{SOURCE1} %{buildroot}/%{_sbindir}/selinux-ready - -%make_install LIBDIR="%{_libdir}" \ - SHLIBDIR="/%{_lib}" LIBSEPOLA=%{_libdir}/libsepol.a \ - -C src V=1 -make DESTDIR="%{buildroot}" LIBDIR="%{_libdir}" \ - SHLIBDIR="/%{_lib}" LIBSEPOLA=%{_libdir}/libsepol.a \ - -C src install-pywrap V=1 -make DESTDIR="%{buildroot}" LIBDIR="%{_libdir}" \ - SHLIBDIR="/%{_lib}" LIBSEPOLA=%{_libdir}/libsepol.a \ - -C src install-rubywrap V=1 +mkdir -p $RPM_BUILD_ROOT/%{_lib} +mkdir -p $RPM_BUILD_ROOT%{_libdir} +mkdir -p $RPM_BUILD_ROOT%{_includedir} +mkdir -p $RPM_BUILD_ROOT%{_sbindir} +make DESTDIR="$RPM_BUILD_ROOT" LIBDIR="$RPM_BUILD_ROOT%{_libdir}" SHLIBDIR="$RPM_BUILD_ROOT/%{_lib}" BINDIR="$RPM_BUILD_ROOT%{_sbindir}" install +rm -f $RPM_BUILD_ROOT%{_sbindir}/compute_* +rm -f $RPM_BUILD_ROOT%{_sbindir}/deftype +rm -f $RPM_BUILD_ROOT%{_sbindir}/execcon +rm -f $RPM_BUILD_ROOT%{_sbindir}/getenforcemode +rm -f $RPM_BUILD_ROOT%{_sbindir}/getfilecon +rm -f $RPM_BUILD_ROOT%{_sbindir}/getpidcon +rm -f $RPM_BUILD_ROOT%{_sbindir}/mkdircon +rm -f $RPM_BUILD_ROOT%{_sbindir}/policyvers +rm -f $RPM_BUILD_ROOT%{_sbindir}/setfilecon +rm -f $RPM_BUILD_ROOT%{_sbindir}/selinuxconfig +rm -f $RPM_BUILD_ROOT%{_sbindir}/selinuxdisable +rm -f $RPM_BUILD_ROOT%{_sbindir}/getseuser +rm -f $RPM_BUILD_ROOT%{_sbindir}/selinux_check_securetty_context +mv $RPM_BUILD_ROOT%{_sbindir}/getdefaultcon $RPM_BUILD_ROOT%{_sbindir}/selinuxdefcon +mv $RPM_BUILD_ROOT%{_sbindir}/getconlist $RPM_BUILD_ROOT%{_sbindir}/selinuxconlist +install -m 0755 %{SOURCE1} $RPM_BUILD_ROOT%{_sbindir}/selinux-ready # Remove duplicate files %fdupes -s %{buildroot}%{_mandir} @@ -165,7 +139,6 @@ %{_sbindir}/matchpathcon %{_sbindir}/selabel_digest %{_sbindir}/selabel_lookup -%{_sbindir}/selinux_check_access %{_sbindir}/selabel_lookup_best_match %{_sbindir}/selabel_partial_match %{_sbindir}/selinuxconlist @@ -173,7 +146,7 @@ %{_sbindir}/selinuxenabled %{_sbindir}/setenforce %{_sbindir}/togglesebool -#%#{_sbindir}/selinux_restorecon +%{_sbindir}/selinux_restorecon %{_sbindir}/selinux-ready %{_sbindir}/selinuxexeccon %{_sbindir}/sefcontext_compile @@ -195,45 +168,4 @@ %defattr(-,root,root,-) %{_libdir}/libselinux.a -%package -n python3-selinux -Summary: Python bindings for the SELinux runtime library -License: SUSE-Public-Domain -Group: Development/Libraries/Python -%define oldpython python -%ifpython2 -Obsoletes: %{oldpython}-selinux < %{version} -Provides: %{oldpython}-selinux = %{version} -%endif -Requires: libselinux1 = %{version} -Requires: python3 - -%description -n python3-selinux -libselinux provides an interface to get and set process and file -security contexts and to obtain security policy decisions. - -This subpackage contains Python extensions to use SELinux from that -language. - -%package -n ruby-selinux -Summary: Ruby bindings for the SELinux runtime library -License: SUSE-Public-Domain -Group: Development/Languages/Ruby -Requires: libselinux1 = %{version} -Requires: ruby - -%description -n ruby-selinux -libselinux provides an interface to get and set process and file -security contexts and to obtain security policy decisions. - -This subpackage contains Ruby extensions to use SELinux from that -language. - -%files -n python3-selinux -%defattr(-,root,root,-) -%{python3_sitearch}/*selinux* - -%files -n ruby-selinux -%defattr(-,root,root,-) -%{_libdir}/ruby/vendor_ruby/%{rb_ver}/%{rb_arch}/selinux.so - %changelog ++++++ libselinux-2.8.tar.gz -> libselinux-2.6.tar.gz ++++++ ++++ 5158 lines of diff (skipped) ++++++ python3.patch ++++++ --- /var/tmp/diff_new_pack.KXMyHH/_old 2018-12-10 22:42:37.370639406 +0100 +++ /var/tmp/diff_new_pack.KXMyHH/_new 2018-12-10 22:42:37.370639406 +0100 @@ -1,13 +1,13 @@ -Index: libselinux-2.7/src/Makefile +Index: libselinux-2.6/src/Makefile =================================================================== ---- libselinux-2.7.orig/src/Makefile -+++ libselinux-2.7/src/Makefile +--- libselinux-2.6.orig/src/Makefile 2016-10-14 17:31:26.000000000 +0200 ++++ libselinux-2.6/src/Makefile 2018-03-22 11:33:36.527385495 +0100 @@ -1,7 +1,7 @@ # Support building the Python bindings multiple times, against various Python # runtimes (e.g. Python 2 vs Python 3) by optionally prefixing the build # targets with "PYPREFIX": -PYTHON ?= python +PYTHON ?= python3 - PYPREFIX ?= $(shell $(PYTHON) -c 'import sys;print("python-%d.%d" % sys.version_info[:2])') + PYPREFIX ?= $(notdir $(PYTHON)) RUBY ?= ruby RUBYPREFIX ?= $(notdir $(RUBY))