Hello community,

here is the log from the commit of package setools for openSUSE:13.1 checked in 
at 2013-10-14 22:05:51
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.1/setools (Old)
 and      /work/SRC/openSUSE:13.1/.setools.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "setools"

Changes:
--------
--- /work/SRC/openSUSE:13.1/setools/setools.changes     2013-09-23 
11:09:02.000000000 +0200
+++ /work/SRC/openSUSE:13.1/.setools.new/setools.changes        2013-10-14 
22:05:57.000000000 +0200
@@ -1,0 +2,7 @@
+Fri Oct 11 15:36:20 UTC 2013 - vci...@suse.com
+
+- don't fail if there are no never-allow rules in the policy
+- remove dangling symlink /usr/bin/seaudit (bnc#812285)
+  * added 0003-Since-we-do-not-ship-neverallow-rules-all-always-fai.patch
+
+-------------------------------------------------------------------

New:
----
  0003-Since-we-do-not-ship-neverallow-rules-all-always-fai.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ setools.spec ++++++
--- /var/tmp/diff_new_pack.zflbZ4/_old  2013-10-14 22:05:57.000000000 +0200
+++ /var/tmp/diff_new_pack.zflbZ4/_new  2013-10-14 22:05:57.000000000 +0200
@@ -39,6 +39,7 @@
 Patch8:         %{name}-swig-2.0.7.patch
 Patch9:         %{name}-am121.patch
 Patch10:        %{name}-3.3.6-libsepol.patch
+Patch11:        0003-Since-we-do-not-ship-neverallow-rules-all-always-fai.patch
 Patch15:        0006-Changes-to-support-named-file_trans-rules.patch
 Patch16:        0007-Remove-unused-variables.patch
 Patch23:        add-to-header-define_cond_filename_trans.patch
@@ -232,6 +233,7 @@
 %patch8
 %patch9 -p1
 %patch10 -p1
+%patch11 -p1
 %patch15 -p1
 %patch16 -p1
 %patch23 -p1
@@ -276,7 +278,6 @@
 chmod 0755 $RPM_BUILD_ROOT%{_libdir}/%{name}/*/*.so.*
 # chmod 0755 $RPM_BUILD_ROOT%{py_sitedir}/*.so.*
 chmod 0755 $RPM_BUILD_ROOT%{_bindir}/*
-ln -sf consolehelper $RPM_BUILD_ROOT%{_bindir}/seaudit
 chmod 0755 $RPM_BUILD_ROOT%{_sbindir}/*
 chmod 0755 $RPM_BUILD_ROOT%{setoolsdir}/seaudit-report-service
 chmod 0644 $RPM_BUILD_ROOT%{tcllibdir}/*/pkgIndex.tcl
@@ -359,7 +360,6 @@
 
 %files gui
 %defattr(-,root,root,-)
-%{_bindir}/seaudit
 %{_bindir}/sediffx
 %{_bindir}/apol
 %dir %{tcllibdir}

++++++ 0003-Since-we-do-not-ship-neverallow-rules-all-always-fai.patch ++++++
>From 252b7c8bf311d615164a20f4f402767e5859d972 Mon Sep 17 00:00:00 2001
From: Dan Walsh <dwa...@redhat.com>
Date: Tue, 20 Sep 2011 15:40:28 -0400
Subject: [PATCH 3/6] Since-we-do-not-ship-neverallow-rules-all-always-fail

---
 libqpol/src/avrule_query.c |    5 +++--
 1 files changed, 3 insertions(+), 2 deletions(-)

diff --git a/libqpol/src/avrule_query.c b/libqpol/src/avrule_query.c
index 749565b..76dcaa3 100644
--- a/libqpol/src/avrule_query.c
+++ b/libqpol/src/avrule_query.c
@@ -57,8 +57,9 @@ int qpol_policy_get_avrule_iter(const qpol_policy_t * policy, 
uint32_t rule_type
 
        if ((rule_type_mask & QPOL_RULE_NEVERALLOW) && 
!qpol_policy_has_capability(policy, QPOL_CAP_NEVERALLOW)) {
                ERR(policy, "%s", "Cannot get avrules: Neverallow rules 
requested but not available");
-               errno = ENOTSUP;
-               return STATUS_ERR;
+/*             errno = ENOTSUP;
+               return STATUS_ERR; */
+               return STATUS_SUCCESS;
        }
 
        db = &policy->p->p;
-- 
1.7.6.2

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to