[yocto] [PATCH 04/13] libsemanage: uprev to 2.5 (20160223)
Stephen Smalley
sds at tycho.nsa.gov
Mon Mar 7 12:52:43 PST 2016
Signed-off-by: Stephen Smalley <sds at tycho.nsa.gov>
---
recipes-security/selinux/libsemanage.inc | 3 ++
...ibsemanage-allow-to-disable-audit-support.patch | 49 ++++++++++------------
recipes-security/selinux/libsemanage_2.4.bb | 19 ---------
recipes-security/selinux/libsemanage_2.5.bb | 19 +++++++++
4 files changed, 45 insertions(+), 45 deletions(-)
delete mode 100644 recipes-security/selinux/libsemanage_2.4.bb
create mode 100644 recipes-security/selinux/libsemanage_2.5.bb
diff --git a/recipes-security/selinux/libsemanage.inc b/recipes-security/selinux/libsemanage.inc
index 7742c30..552d54d 100644
--- a/recipes-security/selinux/libsemanage.inc
+++ b/recipes-security/selinux/libsemanage.inc
@@ -11,6 +11,9 @@ inherit lib_package
DEPENDS += "libsepol libselinux ustr bzip2 python bison-native flex-native"
DEPENDS_append_class-target += "audit"
+# For /usr/libexec/selinux/semanage_migrate_store
+RDEPENDS_${PN} += "python"
+
PACKAGES += "${PN}-python"
FILES_${PN}-python = "${libdir}/python${PYTHON_BASEVERSION}/site-packages/*"
FILES_${PN}-dbg += "${libdir}/python${PYTHON_BASEVERSION}/site-packages/.debug/*"
diff --git a/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch b/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch
index 575d3a6..d727acf 100644
--- a/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch
+++ b/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch
@@ -12,11 +12,11 @@ Signed-off-by: Wenzong Fan <wenzong.fan at windriver.com>
tests/Makefile | 10 +++++++++-
3 files changed, 31 insertions(+), 2 deletions(-)
-diff --git a/src/Makefile b/src/Makefile
-index 359d738..24dbf29 100644
---- a/src/Makefile
-+++ b/src/Makefile
-@@ -28,6 +28,14 @@ ifeq ($(DEBUG),1)
+Index: libsemanage-2.5/src/Makefile
+===================================================================
+--- libsemanage-2.5.orig/src/Makefile 2016-02-25 13:20:30.867978414 -0500
++++ libsemanage-2.5/src/Makefile 2016-02-25 13:20:30.859978414 -0500
+@@ -28,6 +28,14 @@
export LDFLAGS = -g
endif
@@ -31,7 +31,7 @@ index 359d738..24dbf29 100644
LEX = flex
LFLAGS = -s
YACC = bison
-@@ -92,7 +100,7 @@ $(LIBA): $(OBJS)
+@@ -92,7 +100,7 @@
$(RANLIB) $@
$(LIBSO): $(LOBJS)
@@ -40,11 +40,11 @@ index 359d738..24dbf29 100644
ln -sf $@ $(TARGET)
$(LIBPC): $(LIBPC).in ../VERSION
-diff --git a/src/seusers_local.c b/src/seusers_local.c
-index 63ab40c..8bdc7da 100644
---- a/src/seusers_local.c
-+++ b/src/seusers_local.c
-@@ -8,7 +8,11 @@ typedef struct semanage_seuser record_t;
+Index: libsemanage-2.5/src/seusers_local.c
+===================================================================
+--- libsemanage-2.5.orig/src/seusers_local.c 2016-02-25 13:20:30.867978414 -0500
++++ libsemanage-2.5/src/seusers_local.c 2016-02-25 13:20:30.863978414 -0500
+@@ -8,7 +8,11 @@
#include <sepol/policydb.h>
#include <sepol/context.h>
@@ -56,7 +56,7 @@ index 63ab40c..8bdc7da 100644
#include <errno.h>
#include "user_internal.h"
#include "seuser_internal.h"
-@@ -51,6 +55,7 @@ static char *semanage_user_roles(semanage_handle_t * handle, const char *sename)
+@@ -51,6 +55,7 @@
return roles;
}
@@ -64,7 +64,7 @@ index 63ab40c..8bdc7da 100644
static int semanage_seuser_audit(semanage_handle_t * handle,
const semanage_seuser_t * seuser,
const semanage_seuser_t * previous,
-@@ -114,6 +119,7 @@ err:
+@@ -114,6 +119,7 @@
free(proles);
return rc;
}
@@ -72,7 +72,7 @@ index 63ab40c..8bdc7da 100644
int semanage_seuser_modify_local(semanage_handle_t * handle,
const semanage_seuser_key_t * key,
-@@ -157,8 +163,11 @@ int semanage_seuser_modify_local(semanage_handle_t * handle,
+@@ -158,8 +164,11 @@
(void) semanage_seuser_query(handle, key, &previous);
handle->msg_callback = callback;
rc = dbase_modify(handle, dconfig, key, new);
@@ -84,7 +84,7 @@ index 63ab40c..8bdc7da 100644
err:
if (previous)
semanage_seuser_free(previous);
-@@ -174,8 +183,12 @@ int semanage_seuser_del_local(semanage_handle_t * handle,
+@@ -175,8 +184,12 @@
dbase_config_t *dconfig = semanage_seuser_dbase_local(handle);
rc = dbase_del(handle, dconfig, key);
semanage_seuser_query(handle, key, &seuser);
@@ -97,15 +97,15 @@ index 63ab40c..8bdc7da 100644
if (seuser)
semanage_seuser_free(seuser);
return rc;
-diff --git a/tests/Makefile b/tests/Makefile
-index 418d701..7839db6 100644
---- a/tests/Makefile
-+++ b/tests/Makefile
-@@ -13,7 +13,15 @@ EXECUTABLE = libsemanage-tests
+Index: libsemanage-2.5/tests/Makefile
+===================================================================
+--- libsemanage-2.5.orig/tests/Makefile 2016-02-25 13:20:30.867978414 -0500
++++ libsemanage-2.5/tests/Makefile 2016-02-25 13:22:05.171978120 -0500
+@@ -13,7 +13,15 @@
CC = gcc
- CFLAGS = -c -g -o0 -Wall -W -Wundef -Wmissing-noreturn -Wmissing-format-attribute -Wno-unused-parameter
+ CFLAGS += -g -O0 -Wall -W -Wundef -Wmissing-noreturn -Wmissing-format-attribute -Wno-unused-parameter
INCLUDE = -I$(TESTSRC) -I$(TESTSRC)/../include
--LDFLAGS = -lcunit -lustr -lbz2 -laudit
+-LDFLAGS += -lcunit -lustr -lbz2 -laudit
+DISABLE_AUDIT ?= n
+ifeq ($(DISABLE_AUDIT),y)
+ LIBAUDIT =
@@ -114,10 +114,7 @@ index 418d701..7839db6 100644
+ LIBAUDIT = -laudit
+endif
+
-+LDFLAGS = -lcunit -lustr -lbz2 $(LIBAUDIT)
++LDFLAGS += -lcunit -lustr -lbz2 $(LIBAUDIT)
OBJECTS = $(SOURCES:.c=.o)
all: $(EXECUTABLE)
---
-1.7.9.5
-
diff --git a/recipes-security/selinux/libsemanage_2.4.bb b/recipes-security/selinux/libsemanage_2.4.bb
deleted file mode 100644
index 4306675..0000000
--- a/recipes-security/selinux/libsemanage_2.4.bb
+++ /dev/null
@@ -1,19 +0,0 @@
-include selinux_20150202.inc
-include ${BPN}.inc
-
-LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343"
-
-SRC_URI[md5sum] = "cd551eb1cc5d20652660bda037972f0d"
-SRC_URI[sha256sum] = "1a4cace4ef16786531ec075c0e7b2f961e2fee5dc86c5f983a689058899a6484"
-
-SRC_URI += "\
- file://libsemanage-Fix-execve-segfaults-on-Ubuntu.patch \
- file://libsemanage-fix-path-len-limit.patch \
- file://libsemanage-fix-path-nologin.patch \
- file://libsemanage-drop-Wno-unused-but-set-variable.patch \
- file://libsemanage-define-FD_CLOEXEC-as-necessary.patch;striplevel=2 \
- file://libsemanage-allow-to-disable-audit-support.patch \
- file://libsemanage-disable-expand-check-on-policy-load.patch \
- file://0001-src-Makefile-fix-includedir-in-libselinux.pc.patch \
- "
-FILES_${PN} += "/usr/libexec"
diff --git a/recipes-security/selinux/libsemanage_2.5.bb b/recipes-security/selinux/libsemanage_2.5.bb
new file mode 100644
index 0000000..27cbe7d
--- /dev/null
+++ b/recipes-security/selinux/libsemanage_2.5.bb
@@ -0,0 +1,19 @@
+include selinux_20160223.inc
+include ${BPN}.inc
+
+LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343"
+
+SRC_URI[md5sum] = "eb030c863de1a6b3e2614a5c043c1641"
+SRC_URI[sha256sum] = "46e2f36254369b6e91d1eea0460c262b139361b055a3a67d3ceea2d8ef72e006"
+
+SRC_URI += "\
+ file://libsemanage-Fix-execve-segfaults-on-Ubuntu.patch \
+ file://libsemanage-fix-path-len-limit.patch \
+ file://libsemanage-fix-path-nologin.patch \
+ file://libsemanage-drop-Wno-unused-but-set-variable.patch \
+ file://libsemanage-define-FD_CLOEXEC-as-necessary.patch;striplevel=2 \
+ file://libsemanage-allow-to-disable-audit-support.patch \
+ file://libsemanage-disable-expand-check-on-policy-load.patch \
+ file://0001-src-Makefile-fix-includedir-in-libselinux.pc.patch \
+ "
+FILES_${PN} += "/usr/libexec"
--
2.4.3
More information about the yocto
mailing list