policycoreutils-sandbox-2.9-25.el8 > 6 6_6 3!pQp)Tξ7]mtZ`fNE ]mtZ`sq)$*qi}3`kB9T L?gok_( %ԔI(^e0>|6FfXAd;D_QKGֻo¤|s)J[[(j \$QJ;+ROG\s/[D푩,|XT+xڬCb# q^3kX|;ϽZ~@|[ܐU8,Hix^:1z[WO C=QIM*QR4WkmrLS fq`ʼnmL]K6%acbC坵X>p=?d % ?  5;D  <       +   h  (_8h9!:ܟGͨH$IΠXY\]ϔ^Ѡbd;e@fClEt`uvX wx\y ptzۼCpolicycoreutils-sandbox2.925.el8SELinux sandbox utilitiesThe policycoreutils-sandbox package contains the scripts to create graphical sandboxesfN1ord1-prod-a64build002.svc.aws.rockylinux.orgEKojiRockyGPLv2infrastructure@rockylinux.orgUnspecifiedhttps://github.com/SELinuxProject/selinuxlinuxaarch64U0%y|3RjMszLAA큤fN(fN/fN/fN/fN)fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN&fN(fN(fN(fN(fN(fN(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../../../../usr/sbin/seunsharerootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootpolicycoreutils-2.9-25.el8.src.rpmconfig(policycoreutils-sandbox)policycoreutils-sandboxpolicycoreutils-sandbox(aarch-64)@@@@@@@@@     @ /bin/bash/usr/bin/rsync/usr/bin/xmodmap/usr/libexec/platform-pythonconfig(policycoreutils-sandbox)ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.27)(64bit)libcap-ng.so.0()(64bit)libselinux.so.1()(64bit)matchbox-window-managerpython3-policycoreutilsrpmlib(CompressedFileNames)rpmlib(FileCaps)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)xorg-x11-server-Xephyr2.9-25.el82.9-25.el83.0.4-14.6.1-14.6.0-14.0-15.2-11.14.1-24.14.3e@c@cccR@bb8aea@aC1`i@`Gc@`3`>`U`@^!]|@]@]ʞ]µ]o@]^]G@\@\@\\l@\[[%@[Ѱ@[[ā@[[Q@[W[P}@[2*[[[@ZlZZZ@ZZ Z@Zv@Z}@ZqZ`@Z:PZ1@ZfY@Y(@Y(@YV@Y@Y}@Y{'@YyX-XXf@XX@XBXXZnX@X43@WH@W9W@WgW@W~Wq@Wk@W3W'A@W#LWW@VV@V@VIV=@Vn@VKVI@VD@V@V9@VZVqUUUŬUL@U@U@U(U(U@U4@U4@UK@Uy@UUJ@U+TgTfTk4TZ@TZ@T!`S@SuS/SϣSSS{CSuSpShShS`SZN@SXS:@S4S2@S0@R@R@RRa@RR=RʚRƦ@RƦ@R1@R@R@RR@RRG@R@R RrF@RrF@Rj]@R^RW@RW@RNRL RIgRFR9R' R' R%@R @RC@R R6R6R@Q@QdQQp@Q*@Q@Q5Q@QLQLQֵ@Q4Q@Q@@Q@@Q@QKQKQ@Q@QyQyQ(@QQQ@QaQ@Q'@Q'@QQQ@Q@Qu&@QfQeT@QdQb@Q\QYvQT0QR@QR@QP<@QJ@QJ@QHS@QAQ=@Q8@Q7/Q5@Q4Q0@Q/FQ/FQ*Q*Q']Q']Q']Q& @Q& @Q$Q"QQQ@Q.Q@Q \QsPDPDP[P[PP@PrPPѬ@P @P @PPPP7@PPPN@PN@PP@P@P*P6@P6@P6@PPPM@P@P@P@Pd@P@PoPoPP{@P)P)P5@P@P~P~P}L@P}L@Puc@PtPr@Pp@Pmz@PaPU@PU@PQP"TPPOjOO0@O"O"OO9O Os@O@O~O8OOD@O@Oz@Oz@Ou@OtNOr@OiOX@OX@ON@OKp@OB5OM@M@MM2@MMMI@M@M@MzMzMwkMv@Mv@MtMoMgMRMJMJMIG@M9u@M6@M0:M%M$]@M@MM @MLLL[@L[@L@LΫLΫLʷ@Lq@L*@LA@LA@L@L@LL@L)@L{@L{@LuLs@LrbLe3Le3Lc@LZLZLZLZLYV@LT@LPLPLN@LMxLF@LELk@Lk@Lk@L0L @L@L@LGLGK^KuKuKuKKKFK @K޺KtK#@KKKKŮ@K\K"@K9@KK@K@K[KrK,K@KK@K@KK{@KzKs@Kl@Kie@KbKa|@Ka|@K`*KXAKUKO@KG@KG@KD{@K+nK*@K(K K?KK@K KK>J@JJ@J@Jݦ@JTJ`@JJս@J1@JęJęJH@J@Jv@J$J$J0@J0@J0@JG@JG@JJ^@JJu@J#J#JJ@J:J@J@JJJ@J@J Jyt@Jp9JlE@JS8JD@J'@J#JJJIIIIzI@IܑIIyI@IaI@II@IU@IIIIx_Iw@IuImIl@IcGIFFI?@I:i@I7@I5#@I3I1.IsI"@I-I9@I IP@IP@II@Ig@HrH~@Hf@Hf@HYH@He@HHH|@H@HoH)HH@H@HH@H@H@Ht@HsVHsVHkmHkmHj@HhH`H_@HVUHQHQHO@H-w@H-w@H(1@H(1@H!H!H@H@G@G@G߮G@GGGD@GOG[@G@G}G}G,@G,@G,@GGG@G@GZ@GGeGxGxGkGjY@GiGiGbp@G^{G]*@GR@GAzGAzGAzGAzG=@G=@G<4G2@G/G/G+@G)G(n@G@G@GJGGV@GV@GV@G@G@G'@G2G2G2FF@FIFFFFFwF&@F@F1FFޚ@FFF@F@FҼFF@FvFvFɂ@FuF@F@F;@FF@FFi@F@F@F{Fzh@Fo@Fo@Fm9@Fm9@FcFcF` @FNFLCF; @F7+F5@F/BF/BF-@F-@F(@F&@F&@F&@F&@F$F#e@F @FpF@FF*F*FAF F @F@F@E{@E@E@E@E@EE@E݅E݅EEEEK@EVEɿ@E@EJ@EJ@EJ@EE@E@Ex@EEEE=E@EEI@E%E@EEySEx@EvEp@Emv@Emv@Emv@El$El$EfEd;EaEaE]@E\RE\RE[@E[@E[@E[@EYEYES@EO#E*9E&E@E E~E~E~E@E D@E D@EEEOE[@E D@D@D D D@D@D@D@DDD@DГDГDB@DȪDD@D{D{DA@DX@D@D4D@DD@DDW@DDDD|3DvDtJDtJDr@DoDhm@Dhm@Dhm@DaD_2D]@DYDGwDC@D?D5D5D3@D*vD)%@DDDDD@DDDDj@Dj@D $@D/C@CC@CtC@CCCCEC@CC @Ch@Ch@Ch@Ch@C@C@C@C-C-C-C@CCCǖ@CáCáC @C @CCC,C8@CC@C@C@CC @CqCqC @CCC}@C+C@CC@CBC@C|pC{@Cx|@CtCqCqCp@Cp@CoAC^@C^@CWCTCTCP@COCNL@CLCJWCFc@CECC@C:C:C1K@C/C)b@C&@C%mCC@C@C@C C C @C&BTBBw@BۙB@B@BB]@B@B@BBB@BBr!B^[@B] BZfBZfBU BS@B9q@B6@B06B.@B-B$Y@B#B@B@BBp@BB@B*@B@B@B@B @B LB LB @BBX@BBAA)@A)@AA@AAAA@An@A3A3A3AҜ@AƾAA@AAx@Ax@Ak@A]FA]FAT @ARAPA@EA3A,@A,@A,@A+-A+-A)@A(A AA,AA@@ @@@@@7@@7@@@@@@@@@p@@@@@@@@@@5@@5@@@@@c@@n@n@z@@@@@b@@z@u>@mU@l@@h@h@h@h@d@@b@`&@Y@@Y@@Y@@X=@X=@X=@X=@X=@U@U@U@O@@M@M@Hk@=@=@=@;<@4@@,@@@@@@@R??@??D@?@?@?z?q@?a@?a@?2?@?2?@?2?@?/@><@Vit Mojzis - 2.9-25Vit Mojzis - 2.9-24Vit Mojzis - 2.9-23Vit Mojzis - 2.9-22Vit Mojzis - 2.9-21.1Vit Mojzis - 2.9-20Vit Mojzis - 2.9-19Vit Mojzis - 2.9-18Petr Lautrbach - 2.9-17Vit Mojzis - 2.9-16Vit Mojzis - 2.9-15Vit Mojzis - 2.9-14Vit Mojzis - 2.9-13Petr Lautrbach - 2.9-12Vit Mojzis - 2.9-11Vit Mojzis - 2.9-10Vit Mojzis - 2.9-9Vit Mojzis - 2.9-8Petr Lautrbach - 2.9-7Petr Lautrbach - 2.9-6Vit Mojzis - 2.9-5Petr Lautrbach - 2.9-4Vit Mojzis - 2.9-3Petr Lautrbach - 2.9-2Petr Lautrbach - 2.9-1Petr Lautrbach - 2.8-16.1Petr Lautrbach - 2.8-15Petr Lautrbach - 2.8-14Petr Lautrbach - 2.8-13Petr Lautrbach - 2.8-12Petr Lautrbach - 2.8-11.1Petr Lautrbach - 2.8-10Petr Lautrbach - 2.8-9Petr Lautrbach - 2.8-8Petr Lautrbach - 2.8-7Petr Lautrbach - 2.8-6.1Petr Lautrbach - 2.8-5Petr Lautrbach - 2.8-4Petr Lautrbach - 2.8-3Petr Lautrbach - 2.8-2Petr Lautrbach - 2.8-1.1Petr Lautrbach - 2.7-19Petr Lautrbach - 2.7-18Petr Lautrbach - 2.7-17Petr Lautrbach - 2.7-16Petr Lautrbach - 2.7-15Petr Lautrbach - 2.7-14Petr Lautrbach - 2.7-13Miro Hrončok - 2.7-12Petr Lautrbach - 2.7-11Fedora Release Engineering - 2.7-10Petr Lautrbach - 2.7-9Igor Gnatenko - 2.7-8Petr Lautrbach - 2.7-7Petr Lautrbach - 2.7-6Petr Lautrbach - 2.7-5Petr Lautrbach - 2.7-4Zbigniew Jędrzejewski-Szmek - 2.7-3Zbigniew Jędrzejewski-Szmek - 2.7-2Petr Lautrbach - 2.7-1Fedora Release Engineering - 2.6-9Florian Weimer - 2.6-8Petr Lautrbach - 2.6-7Fedora Release Engineering - 2.6-6Petr Lautrbach - 2.6-5Petr Lautrbach - 2.6-4Petr Lautrbach - 2.6-3Petr Lautrbach - 2.6-2Petr Lautrbach - 2.6-1.1Igor Gnatenko - 2.5-22Fedora Release Engineering - 2.5-21Kevin Fenzi - 2.5-20Petr Lautrbach - 2.5-19Petr Lautrbach - 2.5-18Petr Lautrbach 2.5-17Petr Lautrbach 2.5-16Petr Lautrbach 2.5-15Richard W.M. Jones - 2.5-14Fedora Release Engineering - 2.5-13Petr Lautrbach - 2.5-12Petr Lautrbach - 2.5-11Petr Lautrbach - 2.5-10Petr Lautrbach - 2.5-9Petr Lautrbach - 2.5-8Petr Lautrbach - 2.5-7Petr Lautrbach - 2.5-6Petr Lautrbach - 2.5-5Petr Lautrbach - 2.5-4Petr Lautrbach - 2.5-3Petr Lautrbach 2.5-2Petr Lautrbach 2.5-1Fedora Release Engineering - 2.4-21Petr Lautrbach - 2.4-20Petr Lautrbach 2.4-19Petr Lautrbach 2.4-18Fedora Release Engineering - 2.4-17Petr Lautrbach 2.4-16Robert Kuska - 2.4-15Petr Lautrbach 2.4-14Petr Lautrbach 2.4-13Petr Lautrbach 2.4-12Petr Lautrbach 2.4-11Petr Lautrbach 2.4-10Petr Lautrbach 2.4-9Petr Lautrbach 2.4-8Petr Lautrbach 2.4-7Petr Lautrbach 2.4-6Petr Lautrbach 2.4-5Petr Lautrbach 2.4-4Petr Lautrbach 2.4-3Petr Lautrbach 2.4-2Petr Lautrbach 2.4-1.1Petr Lautrbach 2.4-0.7Petr Lautrbach 2.4-0.6Fedora Release Engineering - 2.3-18Petr Lautrbach 2.3-17Petr Lautrbach 2.4-0.4Petr Lautrbach 2.3-16Petr Lautrbach 2.3-15Dan Walsh - 2.3-14Miroslav Grepl - 2.3-13Miroslav Grepl - 2.3-12Miroslav Grepl - 2.3-11Fedora Release Engineering - 2.3-10Dan Walsh - 2.3-9Tom Callaway - 2.3-8Miroslav Grepl - 2.3-7Fedora Release Engineering - 2.3-6Kalev Lember - 2.3-5Miroslav Grepl - 2.3-4Dan Walsh - 2.3-3Miroslav Grepl - 2.3-2Dan Walsh - 2.3-1Miroslav Grepl - 2.2.5-15Dan Walsh - 2.2.5-14Miroslav Grepl - 2.2.5-13Miroslav Grepl - 2.2.5-12Dan Walsh - 2.2.5-11Miroslav Grepl - 2.2.5-10Dan Walsh - 2.2.5-9Dan Walsh - 2.2.5-8Dan Walsh - 2.2.5-7Dan Walsh - 2.2.5-6Dan Walsh - 2.2.5-5Dan Walsh - 2.2.5-4Dan Walsh - 2.2.5-3Dan Walsh - 2.2.5-2Dan Walsh - 2.2.5-1Dan Walsh - 2.2.4-8Dan Walsh - 2.2.4-7Dan Walsh - 2.2.4-6Dan Walsh - 2.2.4-5Dan Walsh - 2.2.4-4Dan Walsh - 2.2.4-3Dan Walsh - 2.2.4-2Dan Walsh - 2.2.4-1Dan Walsh - 2.2.3-1Dan Walsh - 2.2.2-2Dan Walsh - 2.2.2-1Dan Walsh - 2.2-2Dan Walsh - 2.2-1Dan Walsh - 2.1.14-89Dan Walsh - 2.1.14-88Dan Walsh - 2.1.14-87Dan Walsh - 2.1.14-86Dan Walsh - 2.1.14-85Dan Walsh - 2.1.14-84Dan Walsh - 2.1.14-83Dan Walsh - 2.1.14-82Dan Walsh - 2.1.14-81Dan Walsh - 2.1.14-80Dan Walsh - 2.1.14-79Dan Walsh - 2.1.14-78Dan Walsh - 2.1.14-77Dan Walsh - 2.1.14-76Dan Walsh - 2.1.14-75Dan Walsh - 2.1.14-74Dan Walsh - 2.1.14-73Dan Walsh - 2.1.14-72Dan Walsh - 2.1.14-71Dan Walsh - 2.1.14-70Dan Walsh - 2.1.14-69Dan Walsh - 2.1.14-68Dan Walsh - 2.1.14-67Dan Walsh - 2.1.14-66Dan Walsh - 2.1.14-65Dan Walsh - 2.1.14-64Dan Walsh - 2.1.14-63Dan Walsh - 2.1.14-62Dan Walsh - 2.1.14-61Dan Walsh - 2.1.14-60Dan Walsh - 2.1.14-59Dan Walsh - 2.1.14-58Dan Walsh - 2.1.14-57Dan Walsh - 2.1.14-56Dan Walsh - 2.1.14-55Dan Walsh - 2.1.14-54Dan Walsh - 2.1.14-53Dan Walsh - 2.1.14-52Dan Walsh - 2.1.14-51Dan Walsh - 2.1.14-50Dan Walsh - 2.1.14-49Dan Walsh - 2.1.14-48Dan Walsh - 2.1.14-47Dan Walsh - 2.1.14-46Dan Walsh - 2.1.14-45Dan Walsh - 2.1.14-44Dan Walsh - 2.1.14-43Dan Walsh - 2.1.14-42Dan Walsh - 2.1.14-41Dan Walsh - 2.1.14-40Dan Walsh - 2.1.14-39Dan Walsh - 2.1.14-38Dan Walsh - 2.1.14-37Dan Walsh - 2.1.14-36Dan Walsh - 2.1.14-35Dan Walsh - 2.1.14-34Dan Walsh - 2.1.14-33Dan Walsh - 2.1.14-32Dan Walsh - 2.1.14-31Dan Walsh - 2.1.14-30Dan Walsh - 2.1.14-28Dan Walsh - 2.1.14-27Dan Walsh - 2.1.14-26Dan Walsh - 2.1.14-25Dan Walsh - 2.1.14-24Dan Walsh - 2.1.14-23Dan Walsh - 2.1.14-22Dan Walsh - 2.1.14-21Dan Walsh - 2.1.14-20Dan Walsh - 2.1.14-19Dan Walsh - 2.1.14-18Dan Walsh - 2.1.14-17Dan Walsh - 2.1.14-16Dan Walsh - 2.1.14-15Dan Walsh - 2.1.14-14Dan Walsh - 2.1.14-13Rahul Sundaram - 2.1.14-13Dan Walsh - 2.1.14-12Dan Walsh - 2.1.14-11Dan Walsh - 2.1.14-10Dan Walsh - 2.1.14-9Dan Walsh - 2.1.14-8Dan Walsh - 2.1.14-7Dan Walsh - 2.1.14-6Dan Walsh - 2.1.14-5Dan Walsh - 2.1.14-4Dan Walsh - 2.1.14-3Dan Walsh - 2.1.14-2Dan Walsh - 2.1.14-1Dan Walsh - 2.1.12-58Dan Walsh - 2.1.12-57Dan Walsh - 2.1.12-56Dan Walsh - 2.1.12-55Dan Walsh - 2.1.12-54Dan Walsh - 2.1.12-53Dan Walsh - 2.1.12-52Dan Walsh - 2.1.12-51Dan Walsh - 2.1.12-50Dan Walsh - 2.1.12-49Dan Walsh - 2.1.12-48Dan Walsh - 2.1.12-47Dan Walsh - 2.1.12-46Dan Walsh - 2.1.12-45Dan Walsh - 2.1.12-44Dan Walsh - 2.1.12-43Dan Walsh - 2.1.12-42Dan Walsh - 2.1.12-41Dan Walsh - 2.1.12-40Dan Walsh - 2.1.12-39Dan Walsh - 2.1.12-38Dan Walsh - 2.1.12-37Dan Walsh - 2.1.12-36Dan Walsh - 2.1.12-35Dan Walsh - 2.1.12-34Dan Walsh - 2.1.12-33Dan Walsh - 2.1.12-32Dan Walsh - 2.1.12-31Dan Walsh - 2.1.12-30Dan Walsh - 2.1.12-29Dan Walsh - 2.1.12-27Dan Walsh - 2.1.12-26Dan Walsh - 2.1.12-25Dan Walsh - 2.1.12-24Dan Walsh - 2.1.12-23Dan Walsh - 2.1.12-22Dan Walsh - 2.1.12-21Dan Walsh - 2.1.12-20Dan Walsh - 2.1.12-19Dan Walsh - 2.1.12-18Dan Walsh - 2.1.12-17Dan Walsh - 2.1.12-16Dan Walsh - 2.1.12-15Dan Walsh - 2.1.12-14Dan Walsh - 2.1.12-13Dan Walsh - 2.1.12-12Dan Walsh - 2.1.12-11Dan Walsh - 2.1.12-10Dan Walsh - 2.1.12-9Dan Walsh - 2.1.12-8Dan Walsh - 2.1.12-7Dan Walsh - 2.1.12-6Dan Walsh - 2.1.12-5Dan Walsh - 2.1.12-4Dan Walsh - 2.1.12-3Dan Walsh - 2.1.12-2Dan Walsh - 2.1.12-1Dan Walsh - 2.1.11-6Dan Walsh - 2.1.11-5Dan Walsh - 2.1.11-4Dan Walsh - 2.1.11-3Dan Walsh - 2.1.11-2Dan Walsh - 2.1.11-1Dan Walsh - 2.1.11-18Dan Walsh - 2.1.11-17Dan Walsh - 2.1.11-16Dan Walsh - 2.1.11-15Dan Walsh - 2.1.11-12Dan Walsh - 2.1.11-11Dan Walsh - 2.1.11-10Dan Walsh - 2.1.11-9Dan Walsh - 2.1.11-8Dan Walsh - 2.1.11-7Dan Walsh - 2.1.11-6Dan Walsh - 2.1.11-5Dan Walsh - 2.1.11-4Dan Walsh - 2.1.11-3Dan Walsh - 2.1.11-2Dan Walsh - 2.1.11-1Dan Walsh - 2.1.10-30Dan Walsh - 2.1.10-29Dan Walsh - 2.1.10-28Dan Walsh - 2.1.10-27Dan Walsh - 2.1.10-26Dan Walsh - 2.1.10-25Dan Walsh - 2.1.10-24Dan Walsh - 2.1.10-23Dan Walsh - 2.1.10-22Dan Walsh - 2.1.10-21Dan Walsh - 2.1.10-20Dan Walsh - 2.1.10-19Dan Walsh - 2.1.10-18Dan Walsh - 2.1.10-17Harald Hoyer 2.1.10-16Harald Hoyer 2.1.10-15Harald Hoyer 2.1.10-14Harald Hoyer 2.1.10-13Harald Hoyer 2.1.10-12Dan Walsh - 2.1.10-11Dan Walsh - 2.1.10-10Dan Walsh - 2.1.10-9Dan Walsh - 2.1.10-8Dan Walsh - 2.1.10-7Dan Walsh - 2.1.10-5Dan Walsh - 2.1.10-4Dan Walsh - 2.1.10-3Dan Walsh - 2.1.10-2Dan Walsh - 2.1.10-1Dan Walsh - 2.1.9-3Dan Walsh - 2.1.9-2Dan Walsh - 2.1.9-1Dan Walsh - 2.1.8-8Dan Walsh - 2.1.8-7Dan Walsh - 2.1.8-6Dan Walsh - 2.1.8-5Dan Walsh - 2.1.8-4Dan Walsh - 2.1.8-3Dan Walsh - 2.1.8-2Dan Walsh - 2.1.8-1Dan Walsh - 2.1.7-6Dan Walsh - 2.1.7-5Dan Walsh - 2.1.7-4Dan Walsh - 2.1.7-3Dan Walsh - 2.1.7-2Dan Walsh - 2.1.7-1Dan Walsh - 2.1.6-3Dan Walsh - 2.1.6-2Dan Walsh - 2.1.6-1Dan Walsh - 2.1.5-6Dan Walsh - 2.1.5-5Dan Walsh - 2.1.5-4Dan Walsh - 2.1.5-3Dan Walsh - 2.1.5-2Dan Walsh - 2.1.5-1Dan Walsh - 2.1.4-2Dan Walsh - 2.1.4-1Dan Walsh 2.0.86-20Dan Walsh 2.0.86-18Dan Walsh 2.0.86-17Dan Walsh 2.0.86-16Jóhann B. Guðmundsson - 2.0.86-15Dan Walsh 2.0.86-14Dan Walsh 2.0.86-13Dan Walsh 2.0.86-12Dan Walsh 2.0.86-11Dan Walsh 2.0.86-10Dan Walsh 2.0.86-9Dan Walsh 2.0.86-8Dan Walsh 2.0.86-7Dan Walsh 2.0.86-6Dan Walsh 2.0.86-5Dan Walsh 2.0.86-4Dan Walsh 2.0.86-2Dan Walsh 2.0.86-1Dan Walsh 2.0.85-30Dan Walsh 2.0.85-29Dan Walsh 2.0.85-28Dan Walsh 2.0.85-27Dan Walsh 2.0.85-26Dan Walsh 2.0.85-25Dan Walsh 2.0.85-24Dan Walsh 2.0.85-23Dan Walsh 2.0.85-22Dan Walsh 2.0.85-21Dan Walsh 2.0.85-20Dan Walsh 2.0.85-19Dan Walsh 2.0.85-18Dan Walsh 2.0.85-17Dan Walsh 2.0.85-16Dan Walsh 2.0.85-15Dan Walsh 2.0.85-13Fedora Release Engineering - 2.0.85-12Dan Walsh 2.0.85-11Dan Walsh 2.0.85-10Dan Walsh 2.0.85-9Dan Walsh 2.0.85-8Dan Walsh 2.0.85-7Dan Walsh 2.0.85-6Dan Walsh 2.0.85-4Dan Walsh 2.0.85-3Dan Walsh 2.0.85-2Dan Walsh 2.0.85-1Dan Walsh 2.0.84-5Dan Walsh 2.0.84-4Dan Walsh 2.0.84-3Dan Walsh 2.0.84-2Dan Walsh 2.0.84-1Dan Walsh 2.0.83-37Dan Walsh 2.0.83-36Dan Walsh 2.0.83-35Dan Walsh 2.0.83-34Dan Walsh 2.0.83-33Dan Walsh 2.0.83-32jkeating - 2.0.83-31Dan Walsh 2.0.83-30Dan Walsh 2.0.83-29Dan Walsh 2.0.83-28Dan Walsh 2.0.83-27Dan Walsh 2.0.83-26Dan Walsh 2.0.83-25Dan Walsh 2.0.83-24Dan Walsh 2.0.83-23Dan Walsh 2.0.83-22Dan Walsh 2.0.83-21Dan Walsh 2.0.83-20Dan Walsh 2.0.83-19Dan Walsh 2.0.83-18Dan Walsh 2.0.83-17Dan Walsh 2.0.83-16Dan Walsh 2.0.83-15Dan Walsh 2.0.83-14Dan Walsh 2.0.83-13Dan Walsh 2.0.83-12Dan Walsh 2.0.83-11David Malcolm - 2.0.83-10Dan Walsh 2.0.83-9Dan Walsh 2.0.83-8Dan Walsh 2.0.83-7Dan Walsh 2.0.83-6David Malcolm - 2.0.83-5Dan Walsh 2.0.83-4Dan Walsh 2.0.83-3Dan Walsh 2.0.83-1Dan Walsh 2.0.82-31Dan Walsh 2.0.82-30Dan Walsh 2.0.82-29Dan Walsh 2.0.82-28Dan Walsh 2.0.82-27Dan Walsh 2.0.82-26Dan Walsh 2.0.82-25Dan Walsh 2.0.82-24Dan Walsh 2.0.82-23Dan Walsh 2.0.82-22Dan Walsh 2.0.82-21Dan Walsh 2.0.82-20Dan Walsh 2.0.82-18Dan Walsh 2.0.82-17Dan Walsh 2.0.82-15Dan Walsh 2.0.82-14Dan Walsh 2.0.82-13Dan Walsh 2.0.82-11Dan Walsh 2.0.82-10Dan Walsh 2.0.82-8Dan Walsh 2.0.82-7Dan Walsh 2.0.82-6Dan Walsh 2.0.82-5Dan Walsh 2.0.82-4Dan Walsh 2.0.82-3Dan Walsh 2.0.82-2Dan Walsh 2.0.82-1Dan Walsh 2.0.81-4Dan Walsh 2.0.81-3Dan Walsh 2.0.81-2Dan Walsh 2.0.81-1Dan Walsh 2.0.80-2Dan Walsh 2.0.80-1Dan Walsh 2.0.79-5Dan Walsh 2.0.79-4Dan Walsh 2.0.79-3Dan Walsh 2.0.79-2Dan Walsh 2.0.79-1Dan Walsh 2.0.78-21Dan Walsh 2.0.78-20Dan Walsh 2.0.78-19Dan Walsh 2.0.78-17Dan Walsh 2.0.78-16Dan Walsh 2.0.78-15Dan Walsh 2.0.78-14Dan Walsh 2.0.78-13Dan Walsh 2.0.78-12Dan Walsh 2.0.78-11Dan Walsh 2.0.78-10Dan Walsh 2.0.78-9Dan Walsh 2.0.78-8Dan Walsh 2.0.78-7Dan Walsh 2.0.78-6Dan Walsh 2.0.78-5Dan Walsh 2.0.78-4Dan Walsh 2.0.78-3Dan Walsh 2.0.78-2Dan Walsh 2.0.78-1Dan Walsh 2.0.77-1Dan Walsh 2.0.76-1Dan Walsh 2.0.75-3Dan Walsh 2.0.75-2Dan Walsh 2.0.75-1Dan Walsh 2.0.74-15Dan Walsh 2.0.74-14Dan Walsh 2.0.74-13Dan Walsh 2.0.74-12Dan Walsh 2.0.74-11Dan Walsh 2.0.74-10Dan Walsh 2.0.74-9Dan Walsh 2.0.74-8Dan Walsh 2.0.74-7Dan Walsh 2.0.74-6Dan Walsh 2.0.74-5Dan Walsh 2.0.74-4Dan Walsh 2.0.74-3Dan Walsh 2.0.74-2Dan Walsh 2.0.74-1Dan Walsh 2.0.73-5Dan Walsh 2.0.73-4Dan Walsh 2.0.73-3Dan Walsh 2.0.73-2Dan Walsh 2.0.73-1Dan Walsh 2.0.71-15Bill Nottingham 2.0.71-15Dan Walsh 2.0.71-14Tomas Mraz - 2.0.71-13Dan Walsh 2.0.71-12Dan Walsh 2.0.71-11Dan Walsh 2.0.71-10Ville Skyttä - 2.0.71-9Dan Walsh 2.0.71-7Dan Walsh 2.0.71-6Dan Walsh 2.0.71-5Dan Walsh 2.0.71-4Dan Walsh 2.0.71-3Dan Walsh 2.0.71-2Dan Walsh 2.0.71-1Dan Walsh 2.0.70-2Dan Walsh 2.0.70-1Dan Walsh 2.0.68-1Fedora Release Engineering - 2.0.64-3Tom "spot" Callaway 2.0.64-2Dan Walsh 2.0.64-1Dan Walsh 2.0.63-5Dan Walsh 2.0.63-4Dan Walsh 2.0.63-3Dan Walsh 2.0.63-2Dan Walsh 2.0.63-1Dan Walsh 2.0.62-14Dan Walsh 2.0.62-13Dan Walsh 2.0.62-12Dan Walsh 2.0.62-10Dan Walsh 2.0.62-9Dan Walsh 2.0.62-8Dan Walsh 2.0.62-7Dan Walsh 2.0.62-6Dan Walsh 2.0.62-5Dan Walsh 2.0.62-4Fedora Release Engineering - 2.0.62-3Dan Walsh 2.0.62-2Dan Walsh 2.0.62-1Dan Walsh 2.0.61-10Dan Walsh 2.0.61-9Dan Walsh 2.0.61-8Dan Walsh 2.0.61-7Dan Walsh 2.0.61-6Dan Walsh 2.0.61-4Dan Walsh 2.0.61-3Dan Walsh 2.0.61-2Dan Walsh 2.0.61-1Dan Walsh 2.0.60-7Dan Walsh 2.0.60-6Dan Walsh 2.0.60-5Dan Walsh 2.0.60-4Ignacio Vazquez-Abrams - 2.0.60-3Dan Walsh 2.0.60-2Dan Walsh 2.0.60-1Ignacio Vazquez-Abrams - 2.0.59-2Dan Walsh 2.0.59-1Dan Walsh 2.0.58-1Dan Walsh 2.0.57-12Jesse Keating - 2.0.57-11Dan Walsh 2.0.57-10Dan Walsh 2.0.57-9Dan Walsh 2.0.57-8Dan Walsh 2.0.57-7Dan Walsh 2.0.57-6Dan Walsh 2.0.57-5Dan Walsh 2.0.57-4Dan Walsh 2.0.57-3Dan Walsh 2.0.57-2Dan Walsh 2.0.57-1Dan Walsh 2.0.56-1Dan Walsh 2.0.55-8Dan Walsh 2.0.55-7Dan Walsh 2.0.55-5Dan Walsh 2.0.55-4Dan Walsh 2.0.55-2Dan Walsh 2.0.55-1Dan Walsh 2.0.54-7Dan Walsh 2.0.54-6Dan Walsh 2.0.54-5Dan Walsh 2.0.54-2Dan Walsh 2.0.54-1Dan Walsh 2.0.53-3Dan Walsh 2.0.53-2Dan Walsh 2.0.53-1Dan Walsh 2.0.52-6Dan Walsh 2.0.52-5Dan Walsh 2.0.52-4Dan Walsh 2.0.52-3Dan Walsh 2.0.52-2Dan Walsh 2.0.52-1Dan Walsh 2.0.50-2Dan Walsh 2.0.50-1Dan Walsh 2.0.49-10Dan Walsh 2.0.49-8Dan Walsh 2.0.49-7Dan Walsh 2.0.49-6Dan Walsh 2.0.49-5Dan Walsh 2.0.49-4Dan Walsh 2.0.49-3Dan Walsh 2.0.49-2Dan Walsh 2.0.49-1Dan Walsh 2.0.47-3Dan Walsh 2.0.47-2Dan Walsh 2.0.47-1Matthias Clasen - 2.0.46-5Matthias Clasen - 2.0.46-4Dan Walsh 2.0.46-3Dan Walsh 2.0.46-2Dan Walsh 2.0.46-1Dan Walsh 2.0.44-1Dan Walsh 2.0.43-2Dan Walsh 2.0.43-1Dan Walsh 2.0.42-3Dan Walsh 2.0.42-2Dan Walsh 2.0.42-1Dan Walsh 2.0.41-1Dan Walsh 2.0.39-1Dan Walsh 2.0.38-1Dan Walsh 2.0.37-1Dan Walsh 2.0.36-2Dan Walsh 2.0.36-1Dan Walsh 2.0.35-5Dan Walsh 2.0.35-4Dan Walsh 2.0.35-3Dan Walsh 2.0.35-2Dan Walsh 2.0.35-1Dan Walsh 2.0.34-8Dan Walsh 2.0.34-7Dan Walsh 2.0.34-5Dan Walsh 2.0.34-4Dan Walsh 2.0.34-3Dan Walsh 2.0.34-2Dan Walsh 2.0.34-1Dan Walsh 2.0.33-4Dan Walsh 2.0.33-3Dan Walsh 2.0.33-2Dan Walsh 2.0.33-1Dan Walsh 2.0.32-2Dan Walsh 2.0.32-1Dan Walsh 2.0.31-20Dan Walsh 2.0.31-19Dan Walsh 2.0.31-18Dan Walsh 2.0.31-17Dan Walsh 2.0.31-16Dan Walsh 2.0.31-15Dan Walsh 2.0.31-14Dan Walsh 2.0.31-13Dan Walsh 2.0.31-12Dan Walsh 2.0.31-11Dan Walsh 2.0.31-10Dan Walsh 2.0.31-9Dan Walsh 2.0.31-8Dan Walsh 2.0.31-7Dan Walsh 2.0.31-6Dan Walsh 2.0.31-5Dan Walsh 2.0.31-4Dan Walsh 2.0.31-3Dan Walsh 2.0.31-1Dan Walsh 2.0.29-2Dan Walsh 2.0.29-1Dan Walsh 2.0.28-1Dan Walsh 2.0.27-7Dan Walsh 2.0.27-6Dan Walsh 2.0.27-5Dan Walsh 2.0.27-4Dan Walsh 2.0.27-3Dan Walsh 2.0.27-1Dan Walsh 2.0.26-3Dan Walsh 2.0.26-2Dan Walsh 2.0.26-1Dan Walsh 2.0.25-15Dan Walsh 2.0.25-14Dan Walsh 2.0.25-13Dan Walsh 2.0.25-12Dan Walsh 2.0.25-11Dan Walsh 2.0.25-10Dan Walsh 2.0.25-9Dan Walsh 2.0.25-8Dan Walsh 2.0.25-7Dan Walsh 2.0.25-6Dan Walsh 2.0.25-5Dan Walsh 2.0.25-4Dan Walsh 2.0.25-3Dan Walsh 2.0.25-2Dan Walsh 2.0.25-1Dan Walsh 2.0.23-2Dan Walsh 2.0.23-1Dan Walsh 2.0.22-13Dan Walsh 2.0.22-11Dan Walsh 2.0.22-10Jeremy Katz - 2.0.22-9Dan Walsh 2.0.22-8Dan Walsh 2.0.22-7Dan Walsh 2.0.22-6Dan Walsh 2.0.22-5Dan Walsh 2.0.22-4Dan Walsh 2.0.22-3Dan Walsh 2.0.22-2Dan Walsh 2.0.22-1Dan Walsh 2.0.21-2Dan Walsh 2.0.21-1Dan Walsh 2.0.20-1Dan Walsh 2.0.19-5Dan Walsh 2.0.19-4Dan Walsh 2.0.19-3Dan Walsh 2.0.19-2Dan Walsh 2.0.19-1Dan Walsh 2.0.16-2Dan Walsh 2.0.16-1Dan Walsh 2.0.15-1Dan Walsh 2.0.14-2Dan Walsh 2.0.14-1Dan Walsh 2.0.13-1Dan Walsh 2.0.10-2Dan Walsh 2.0.10-1Dan Walsh 2.0.9-10Dan Walsh 2.0.9-9Dan Walsh 2.0.9-8Dan Walsh 2.0.9-7Dan Walsh 2.0.9-6Dan Walsh 2.0.9-5Dan Walsh 2.0.9-4Dan Walsh 2.0.9-3Dan Walsh 2.0.9-2Dan Walsh 2.0.9-1Dan Walsh 2.0.8-1Dan Walsh 2.0.7-11Dan Walsh 2.0.7-10Dan Walsh 2.0.7-9Dan Walsh 2.0.7-8Dan Walsh 2.0.7-7Dan Walsh 2.0.7-6Dan Walsh 2.0.7-5Dan Walsh 2.0.7-4Dan Walsh 2.0.7-3Dan Walsh 2.0.7-2Dan Walsh 2.0.7-1Dan Walsh 2.0.6-3Dan Walsh 2.0.6-2Dan Walsh 2.0.6-1Dan Walsh 2.0.3-2Dan Walsh 2.0.3-1Dan Walsh 2.0.2-3Dan Walsh 2.0.2-2Dan Walsh 2.0.2-1Dan Walsh 2.0.1-2Dan Walsh 2.0.1-1Dan Walsh 2.0.0-1Dan Walsh 1.34.1-4Dan Walsh 1.34.1-3Dan Walsh 1.34.1-2Dan Walsh 1.34.1-1Dan Walsh 1.33.15-1Dan Walsh 1.33.14-1Dan Walsh 1.33.12-3Dan Walsh 1.33.12-2Dan Walsh 1.33.12-1Dan Walsh 1.33.11-1Dan Walsh 1.33.10-1Dan Walsh 1.33.8-2Dan Walsh 1.33.8-1Dan Walsh 1.33.7-1Dan Walsh 1.33.6-9Dan Walsh 1.33.6-8Dan Walsh 1.33.6-7Dan Walsh 1.33.6-6Dan Walsh 1.33.6-5Jeremy Katz - 1.33.6-4Dan Walsh 1.33.6-3Dan Walsh 1.33.6-2Dan Walsh 1.33.6-1Dan Walsh 1.33.5-4Dan Walsh 1.33.5-3Dan Walsh 1.33.5-2Dan Walsh 1.33.5-1Dan Walsh 1.33.4-2Dan Walsh 1.33.4-1Dan Walsh 1.33.2-2Dan Walsh 1.33.2-1Dan Walsh 1.33.1-9Dan Walsh 1.33.1-8Dan Walsh 1.33.1-7Dan Walsh 1.33.1-6Dan Walsh 1.33.1-5Dan Walsh 1.33.1-4Dan Walsh 1.33.1-3Dan Walsh 1.33.1-2Dan Walsh 1.33.1-1Dan Walsh 1.32-3Dan Walsh 1.32-2Dan Walsh 1.32-1Dan Walsh 1.30.30-2Dan Walsh 1.30.30-1Dan Walsh 1.30.29-6Dan Walsh 1.30.29-5Dan Walsh 1.30.29-4Dan Walsh 1.30.29-3Dan Walsh 1.30.29-2Dan Walsh 1.30.29-1Dan Walsh 1.30.28-9Dan Walsh 1.30.28-8Dan Walsh 1.30.28-7Dan Walsh 1.30.28-6Dan Walsh 1.30.28-5Dan Walsh 1.30.28-4Dan Walsh 1.30.28-3Dan Walsh 1.30.28-2Dan Walsh 1.30.28-1Dan Walsh 1.30.27-5Dan Walsh 1.30.27-4Dan Walsh 1.30.27-3Dan Walsh 1.30.27-2Dan Walsh 1.30.27-1Dan Walsh 1.30.26-1Dan Walsh 1.30.25-1Dan Walsh 1.30.22-3Dan Walsh 1.30.22-2Dan Walsh 1.30.22-1Dan Walsh 1.30.17-7Dan Walsh 1.30.17-6Dan Walsh 1.30.17-5Dan Walsh 1.30.17-4Dan Walsh 1.30.17-3Dan Walsh 1.30.17-2Dan Walsh 1.30.17-1Dan Walsh 1.30.14-5Dan Walsh 1.30.14-4Dan Walsh 1.30.14-3Dan Walsh 1.30.14-2Dan Walsh 1.30.14-1James Antill 1.30.12-5Dan Walsh 1.30.12-4Dan Walsh 1.30.12-3Dan Walsh 1.30.12-2Dan Walsh 1.30.12-1Dan Walsh 1.30.11-1Dan Walsh 1.30.10-4James Antill 1.30.10-3James Antill 1.30.10-2Dan Walsh 1.30.10-1Dan Walsh 1.30.9-4James Antill 1.30.9-3James Antill 1.30.9-2Dan Walsh 1.30.9-1Dan Walsh 1.30.8-2Dan Walsh 1.30.8-1Dan Walsh 1.30.6-5Dan Walsh 1.30.6-4Dan Walsh 1.30.6-3Dan Walsh 1.30.6-2Dan Walsh 1.30.6-1Karsten Hopp 1.30.4-4Karsten Hopp 1.30.4-3Dan Walsh 1.30.4-2Dan Walsh 1.30.4-1Dan Walsh 1.30.1-4Dan Walsh 1.30.1-3Dan Walsh 1.30.1-2Dan Walsh 1.30.1-1Dan Walsh 1.30-5Dan Walsh 1.30-4Dan Walsh 1.30-3Dan Walsh 1.30-2Dan Walsh 1.30-1Dan Walsh 1.29.27-1Dan Walsh 1.29.26-6Dan Walsh 1.29.26-5Dan Walsh 1.29.26-4Dan Walsh 1.29.26-3Dan Walsh 1.29.26-2Dan Walsh 1.29.26-1Dan Walsh 1.29.23-1Jesse Keating - 1.29.20-2.1Dan Walsh 1.29.20-2Dan Walsh 1.29.20-1Jesse Keating - 1.29.18-2.1Dan Walsh 1.29.18-2Dan Walsh 1.29.18-1Dan Walsh 1.29.17-1Dan Walsh 1.29.15-1Dan Walsh 1.29.12-1Dan Walsh 1.29.11-3Dan Walsh 1.29.11-2Dan Walsh 1.29.11-1Dan Walsh 1.29.9-2Dan Walsh 1.29.9-1Dan Walsh 1.29.8-4Dan Walsh 1.29.8-3Dan Walsh 1.29.8-2Dan Walsh 1.29.8-1Dan Walsh 1.29.7-4Dan Walsh 1.29.7-3Dan Walsh 1.29.7-2Dan Walsh 1.29.7-1Dan Walsh 1.29.5-3Dan Walsh 1.29.5-2Dan Walsh 1.29.5-1Dan Walsh 1.29.4-1Dan Walsh 1.29.3-1Dan Walsh 1.29.2-10Dan Walsh 1.29.2-9Dan Walsh 1.29.2-8Dan Walsh 1.29.2-7Dan Walsh 1.29.2-6Dan Walsh 1.29.2-5Dan Walsh 1.29.2-4Dan Walsh 1.29.2-3Dan Walsh 1.29.2-1Dan Walsh 1.29.1-2Jesse Keating Dan Walsh 1.29.1-1Dan Walsh 1.28-1Dan Walsh 1.27.37-1Dan Walsh 1.27.36-2Dan Walsh 1.27.36-1Dan Walsh 1.27.35-1Dan Walsh 1.27.33-1Dan Walsh 1.27.31-1Dan Walsh 1.27.30-1Dan Walsh 1.27.29-1Dan Walsh 1.27.28-3Dan Walsh 1.27.28-2Dan Walsh 1.27.27-5Dan Walsh 1.27.27-3Dan Walsh 1.27.27-1Dan Walsh 1.27.26-4Dan Walsh 1.27.26-1Dan Walsh 1.27.23-1Dan Walsh 1.27.20-1Dan Walsh 1.27.19-2Dan Walsh 1.27.19-1Dan Walsh 1.27.18-1Dan Walsh 1.27.14-1Dan Walsh 1.27.13-1Dan Walsh 1.27.12-1Dan Walsh 1.27.11-1Dan Walsh 1.27.7-2Dan Walsh 1.27.7-1Dan Walsh 1.27.6-1Dan Walsh 1.27.5-3Dan Walsh 1.27.5-1Dan Walsh 1.27.3-2Dan Walsh 1.27.3-1Dan Walsh 1.27.2-2Dan Walsh 1.27.2-1Dan Walsh 1.27.1-1Dan Walsh 1.26-3Dan Walsh 1.26-2Dan Walsh 1.26-1Dan Walsh 1.25.9-2Dan Walsh 1.25.9-1Dan Walsh 1.25.7-3Dan Walsh 1.25.7-2Dan Walsh 1.25.7-1Dan Walsh 1.25.6-1Dan Walsh 1.25.5-3Dan Walsh 1.25.5-2Dan Walsh 1.25.5-1Dan Walsh 1.25.4-1Dan Walsh 1.25.3-1Dan Walsh 1.25.2-1Dan Walsh 1.25.1-1Dan Walsh 1.24-1Dan Walsh 1.23.11-4Dan Walsh 1.23.11-3Dan Walsh 1.23.11-2Dan Walsh 1.23.11-1Dan Walsh 1.23.10-2Dan Walsh 1.23.10-1Dan Walsh 1.23.9-1Dan Walsh 1.23.8-1Dan Walsh 1.23.7-1Dan Walsh 1.23.6-1Dan Walsh 1.23.5-1Dan Walsh 1.23.4-3Dan Walsh 1.23.4-1Dan Walsh 1.23.3-2Dan Walsh 1.23.3-1Dan Walsh 1.23.2-1Dan Walsh 1.23.1-1Dan Walsh 1.22-2Dan Walsh 1.21.22-2Dan Walsh 1.21.22-1Dan Walsh 1.21.21-1Dan Walsh 1.21.20-3Dan Walsh 1.21.20-2Dan Walsh 1.21.20-1Dan Walsh 1.21.19-4Dan Walsh 1.21.19-2Dan Walsh 1.21.19-1Dan Walsh 1.21.18-2Dan Walsh 1.21.18-1Dan Walsh 1.21.17-2Dan Walsh 1.21.17-1Dan Walsh 1.21.15-9Dan Walsh 1.21.15-8Dan Walsh 1.21.15-5Dan Walsh 1.21.15-1Dan Walsh 1.21.14-1Dan Walsh 1.21.13-1Dan Walsh 1.21.12-2Dan Walsh 1.21.12-1Dan Walsh 1.21.10-2Dan Walsh 1.21.10-1Dan Walsh 1.21.9-1Dan Walsh 1.21.7-3Dan Walsh 1.21.5-1Dan Walsh 1.21.4-1Dan Walsh 1.21.3-2Dan Walsh 1.21.3-1Dan Walsh 1.21.1-3Dan Walsh 1.21.1-1Dan Walsh 1.20.1-2Dan Walsh 1.20.1-1Dan Walsh 1.19.3-1Dan Walsh 1.19.2-4Dan Walsh 1.19.2-1Dan Walsh 1.19.1-1Dan Walsh 1.18.1-3Dan Walsh 1.18.1-1Steve Grubb 1.17.7-3Dan Walsh 1.17.7-2Dan Walsh 1.17.7-1Dan Walsh 1.17.6-2Dan Walsh 1.17.6-1Dan Walsh 1.17.5-6Dan Walsh 1.17.5-5Dan Walsh 1.17.5-4Dan Walsh 1.17.5-3Dan Walsh 1.17.5-2Dan Walsh 1.17.5-1Dan Walsh 1.17.4-1Dan Walsh 1.17.3-4Dan Walsh 1.17.3-3Dan Walsh 1.17.3-2Dan Walsh 1.17.3-1Dan Walsh 1.17.2-1Dan Walsh 1.17.1-1Dan Walsh 1.15.7-1Dan Walsh 1.15.6-1Dan Walsh 1.15.5-1Dan Walsh 1.15.3-2Dan Walsh 1.15.3-1Dan Walsh 1.15.2-4Dan Walsh 1.15.2-3Dan Walsh 1.15.2-2Dan Walsh 1.15.2-1Dan Walsh 1.15.1-2Dan Walsh 1.15.1-1Dan Walsh 1.14.1-2Dan Walsh 1.14.1-1Dan Walsh 1.13.4-1Dan Walsh 1.13.3-2Dan Walsh 1.13.3-1Dan Walsh 1.13.2-2Dan Walsh 1.13.2-1Elliot Lee Dan Walsh 1.13.1-2Dan Walsh 1.13.1-1Dan Walsh 1.13-3Dan Walsh 1.13-2Dan Walsh 1.13-1Dan Walsh 1.12-2Dan Walsh 1.12-1Dan Walsh 1.11-4Dan Walsh 1.11-3Dan Walsh 1.11-2Dan Walsh 1.11-1Dan Walsh 1.10-4Colin Walters 1.10-3Dan Walsh 1.10-2Dan Walsh 1.10-1Dan Walsh 1.9.2-1Dan Walsh 1.9.1-1Dan Walsh 1.9-19Dan Walsh 1.9-18Dan Walsh 1.9-17Dan Walsh 1.9-16Dan Walsh 1.9-15Dan Walsh 1.9-14Dan Walsh 1.9-12Dan Walsh 1.9-11Dan Walsh 1.9-10Dan Walsh 1.9-9Dan Walsh 1.9-8Dan Walsh 1.9-7Dan Walsh 1.9-6Dan Walsh 1.9-5Dan Walsh 1.9-4Dan Walsh 1.9-3Dan Walsh 1.9-2Dan Walsh 1.9-1Dan Walsh 1.6-8Dan Walsh 1.6-7Dan Walsh 1.6-6Dan Walsh 1.6-5Dan Walsh 1.6-4Dan Walsh 1.6-3Dan Walsh 1.6-2Dan Walsh 1.6-1Dan Walsh 1.4-9Elliot Lee Dan Walsh 1.4-7Dan Walsh 1.4-6Dan Walsh 1.4-5Dan Walsh 1.4-4Dan Walsh 1.4-3Dan Walsh 1.4-2Dan Walsh 1.4-1Dan Walsh 1.2-9Dan Walsh 1.2-8Dan Walsh 1.2-7Dan Walsh 1.2-6Dan Walsh 1.2-5Dan Walsh 1.2-4Dan Walsh 1.2-3Dan Walsh 1.2-1Dan Walsh 1.1-4Dan Walsh 1.1-3Dan Walsh 1.1-2Dan Walsh 1.0-1- Harden more tools against "rogue" modules (RHEL-17351) - sepolicy: port to dnf4 python API (RHEL-17398)- Update translations (#2124826)- python/sepolicy: Cache conditional rule queries (#2155540)- python/sepolicy: add missing booleans to man pages (#2155540)- python: Harden tools against "rogue" modules (#2128976) - Update "pathfix" arguments to match ^^^ (#2128976) - python: Do not query the local database if the fcontext is non-local (#2124825)- python: Split "semanage import" into two transactions (#2063353) - semodule: rename --rebuild-if-modules-changed to --refresh (#2089802) - selinux-autorelabel: Do not force reboot (#2093133)- semodule: move module hashing into libsemanage (requires libsemanage-2.9-7) - semodule: add command-line option to detect module changes (#2049189)- Improve error message when selabel_open fails (#1926511)- semodule: add -m | --checksum option- Update translations (#1962009)- setfiles: do not restrict checks against a binary policy (#1973754)- Update translations (#1899695)- selinux(8,5): Describe fcontext regular expressions (#1904059)- setfiles: Do not abort on labeling error (#1794518)- python/sepolgen: allow any policy statement in if(n)def (#1868717)- python/semanage: Sort imports in alphabetical order - python/semanage: empty stdout before exiting on BrokenPipeError (#1822100)- Update translations (#1754978)- restorecond: Fix redundant console log output error (#1626468)- dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot (#1754873)- Configure autorelabel service to output to journal and to console if set (#1766578)- fixfiles: Fix "verify" option (#1647532) - semanage: Improve handling of "permissive" statements (#1417455) - semanage: fix moduleRecords.customized() - semanage: Add support for DCCP and SCTP protocols (#1563742)- semanage: Do not use default s0 range in "semanage login -a" (#1554360) - gui: Fix remove module in system-config-selinux (#1748763)- fixfiles: Fix unbound variable problem (#1743213)- Update transition - fixfiles: Fix [-B] [-F] onboot- SELinux userspace 2.9 release- semanage: move valid_types initialisations to class constructors - semanage: import sepolicy only when it's needed - sepolicy: Add sepolicy.load_store_policy(store) - semanage: Start exporting "ibendport" and "ibpkey" entries- chcat: use check_call instead of getstatusoutput - semanage: Use standard argparse.error() method - semanage: Fix handling of -a/-e/-d/-r options- Update translations- Use ipaddress module instead of IPy- Handle more reserved port types - Replace aliases with corresponding type names- Fix RESOURCE_LEAK coverity scan defects- sepolicy: Update to work with setools-4.2.0 - gui: Make all polgen button labels translatable- sepolicy: Fix get_real_type_name to handle query failure properly- sepolicy: search() for dontaudit rules as well- setfiles: Improve description of -d switch - Fix typo in newrole.1 manpage - semanage: Stop rejecting aliases in semanage commands - sepolicy: Stop rejecting aliases in sepolicy commands - sepolicy: Fix "info" to search aliases as well - sepolgen: fix refpolicy parsing of "permissive" - sepolgen: return NotImplemented instead of raising it - semanage: fix Python syntax of catching several exceptions - semanage: Replace bare except with specific one - semanage: Fix logger class definition - semanage: Stop logging loginRecords changes - add xperms support to audit2allow - sepolgen: fix access vector initialization - sepolgen: print all AV rules correctly- Update translations- sandbox: Use matchbox-window-manager instead of openbox (#1568295)- selinux-autorelabel: Use plymouth --quit rather then --hide-splash (#1592221) - selinux-autorelabel: Increment boot_indeterminate grub environment variable (#1592221) - Do not require libcgroup - it's not used anymore- Do not use symlinks to enable selinux-autorelabel-mark.service (#1589720)- Don't build the Python 2 subpackages (#1567354)- SELinux userspace 2.8 release- selinux-autorelabel: set UEFI boot order (BootNext) same as BootCurrent - selinux-autorelabel: synchronize cached writes before reboot (#1385272)- Move semodule_* utilities to policycoreutils package (#1562549)- semanage/seobject.py: Fix undefined store check (#1559174)- Build python only subpackages as noarch - Move semodule_package to policycoreutils-devel- sepolicy: Fix translated strings with parameters - sepolicy: Support non-MLS policy - sepolicy: Initialize policy.ports as a dict in generate.py - gui/polgengui.py: Use stop_emission_by_name instead of emit_stop_by_name - Minor update for bash completion - semodule_package: fix semodule_unpackage man page - gui/semanagePage: Close "edit" and "add" dialogues when successfull - gui/fcontextPage: Set default object class in addDialog\ - sepolgen: fix typo in PolicyGenerator - build: follow standard semantics for DESTDIR and PREFIX- Use Fedora RPM build flags (#1548740)- Fix mangling of python shebangs- Rename the python3 subpackage to have prefix, not suffix - Use python3 prefixes in requires where possible- Rewrite selinux-polgengui to use Gtk3 - Drop python2 and gnome-python2 from gui Requires- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild- Require audit-libs-python2- Remove obsolete scriptlets- semanage: bring semanageRecords.set_reload back to seobject.py (#1527745)- semanage: make seobject.py backward compatible - Own %{pythonX_sitelib}/site-packages/sepolicy directories (#1522942)- sepolicy: Fix sepolicy manpage - semanage: Update Infiniband code to work on python3 - semanage: Fix export of ibendport entries - semanage: Enforce noreload only if it's requested by -N option- restorecond: check write() and daemon() results - sepolicy: do not fail when file_contexts.local or .subs do not exist - sepolicy: remove stray space in section "SEE ALSO" - sepolicy: fix misspelling of _ra_content_t suffix - gui: port to Python 3 by migrating to PyGI - gui: remove the status bar - gui: fix parsing of "semodule -lfull" in tab Modules - gui: delete overridden definition of usersPage.delete() - Enable listing file_contexts.homedirs (#1409813) - remove semodule_deps- Also add Provides for the old name without %_isa- Python 2 binary package renamed to python2-policycoreutils See https://fedoraproject.org/wiki/FinalizingFedoraSwitchtoPython3- Update to upstream release 2017-08-04 - Move DBUS API from -gui to -dbus package- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild- Rebuild with binutils fix for ppc64le (#1475636)- Make 'sepolicy manpage' and 'sepolicy transition' faster - open_init_pty: restore stdin/stdout to blocking upon exit - fixfiles: do not dereference link files in tmp - fixfiles: use a consistent order for options to restorecon - fixfiles: don't ignore `-F` when run in `-C` mode - fixfiles: remove bad modes of "relabel" command - fixfiles: refactor into the `set -u` dialect - fixfiles: if restorecon aborts, we should too - fixfiles: usage errors are fatal - fixfiles: syntax error - fixfiles: remove two unused variables - fixfiles: tidy up usage(), manpage synopsis - fixfiles: deprecate -l option - fixfiles: move logit call outside of redirected function - fixfiles: fix logging about R/O filesystems - fixfiles: clarify exclude_dirs() - fixfiles: remove (broken) redundant code- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- semanage: Unify argument handling (#1398987) - setfiles: set up a logging callback for libselinux - setfiles: Fix setfiles progress indicator - setfiles: stdout messages don't need program prefix - setfiles: don't scramble stdout and stderr together (#1435894) - restorecond: Decrease loglevel of termination message (#1264505) - fixfiles should handle path arguments more robustly - fixfiles: handle unexpected spaces in command - fixfiles: remove useless use of cat (#1435894) - semanage: Add checks if a module name is passed in (#1420707) - semanage: fix export of fcontext socket entries (#1435127) - selinux-autorelabel: remove incorrect redirection to /dev/null (#1415674)- Fix selinux-polgengui (#1432337) - sepolicy - fix obtaining domain name in HTMLManPages- Fix several issues in gui and 'sepolicy manpage' (#1416372)- Use %{__python3} instead of python3- Fix pp crash when processing base module (#1417200) - Update to upstream release 2016-10-14- Rebuild for brp-python-bytecompile- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild- Rebuild for python 3.6- seobject: Handle python error returns correctly - policycoreutils/sepolicy/gui: fix current selinux state radiobutton - policycoreutils: semodule_package: do not fail with an empty fc file- Update translations - Fix fcontextPage editing features (#1344842)- sandbox: Use dbus-run-session instead of dbus-launch when available - hll/pp: Change warning for module name not matching filename to match new behavior - Remove LDFLAGS from CFLAGS - sandbox: create a new session for sandboxed processes - sandbox: do not try to setup directories without -X or -M - sandbox: do not run xmodmap in a new X session - sandbox: Use GObject introspection binding instead of pygtk2 - sandbox: fix file labels on copied files - sandbox: tests - close stdout of p - sandbox: tests - use sandbox from cwd - audit2allow: tests should use local copy not system - audit2allow: fix audit2why import from seobject - audit2allow: remove audit2why so that it gets symlinked - semanage: fix man page and help message for import option - semanage: fix error message for fcontext -m - semanage: Fix semanage fcontext -D - semanage: Correct fcontext auditing - semanage: Default serange to "s0" for port modify - semanage: Use socket.getprotobyname for protocol - semanage: fix modify action in node and interface - fixfiles: Pass -n to restorecon for fixfiles check - sepolicy: Check get_rpm_nvr_list() return value - Don't use subprocess.getstatusoutput() in Python 2 code - semanage: Add auditing of changes in records - Remove unused 'q' from semodule getopt string- Remove unused autoconf files from po/ - Remove duplicate, empty translation files - Rebuilt with libsepol-2.5-9, libselinux-2.5-11, libsemanage-2.5-7- Fix sandbox -X issue related to python3 (#1358138)- Use generator approach to fix autorelabel- https://fedoraproject.org/wiki/Changes/Automatic_Provides_for_Python_RPM_Packages- open_init_pty: Do not error on EINTR - Fix [-s STORE] typos in semanage - Update sandbox types in sandbox manual - Update translations- Convert sandbox to gtk-3 using pygi-convert.sh (#1343166)- Fix typos in semanage manpages - Fix the documentation of -l,--list for semodule - Minor fix in a French translation - Fix the extract example in semodule.8 - Update sandbox.8 man page - Remove typos from chcat --help - sepolgen: Remove additional files when cleaning- Fix multiple spelling errors - Rebuild with libsepol-2.5-6- Rebuilt with libsepol-2.5-5- hll/pp: Warn if module name different than output filename- Ship selinux-autorelabel utility and systemd unit files (#1328825)- sepolgen: Add support for TYPEBOUNDS statement in INTERFACE policy files (#1319338)- Add documentation for MCS separated domains - Move svirt man page out of libvirt into its own- policycoreutils: use python3 in chcat(#1318408)- policycoreutils/sepolicy: selinux_server.py to use GLib instead of gobject - policycoreutils-gui requires python-slip-dbus (#1314685)- Update to upstream release 2016-02-23- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild- Fix 'semanage permissive -l' subcommand (#1286325) - Several 'sepolicy gui' fixes (#1281309,#1281309,#1282382)- Require at least one argument for 'semanage permissive -d' (#1255676)- Improve sepolicy command line interface - Fix sandbox to propagate specified MCS/MLS Security Level. (#1279006) - Fix 'audit2allow -R' (#1280418)- Rebuilt for https://fedoraproject.org/wiki/Changes/python3.5- policycoreutils-gui needs policycoreutils-python (#1279046)- Rebuilt for Python3.5 rebuild- Revert the attempt to port -gui to GTK 3 (#1269328, #1266059)- newrole: Set keepcaps around setresuid calls - newrole: Open stdin as read/write- Fix several semanage issue (#1247714) - Decode output from subprocess, if error occurred (#1247039)- audit2allow, audit2why - ignore setlocale errors (#1208529)- Port sandbox to GTK 3 and fix issue with Xephyr- Fix another python3 issues mainly in sepolicy (#1247039,#1247575,#1251713)- Fix multiple python3 issues in sepolgen (#1249388,#1247575,#1247564)- policycoreutils-python3 depends on python-IPy-python3- policycoreutils-devel depends on policycoreutils-python-utils (#1246818)- Move python utilities from -python to -python-utilities - All scripts originally from policycoreutils-python use python 3 now- policycoreutils: semanage: fix moduleRecords deleteall method- Improve compatibility with python 3 - Add sepolgen module to python3 package- Add Python3 support for sepolgen module (#1125208,#1125209)- Update to 2.4 release- Fix typo in semanage args for minimum policy store- policycoreutils: semanage: update to new source policy infrastructure - semanage: move permissive module creation to /tmp- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild- setfiles/restorecon: fix -r/-R option (#1211721)- Update to upstream 2.4- Temporary removed Requires:audit-libs-python from policycoreutils-python3 subpackage (#1195139) - Simplication of sepolicy-manpage web functionality (#1193552)- We need to cover file_context.XXX.homedir to have fixfiles with exclude_dirs working correctly - Use dnf instead of yum (#1156547)- Audit2allow will check for mislabeled files, and tells user to fix the label. - Also checks for basefiles and suggests creating a different label. - Patch from Ryan Hallisey- Switch back to yum. Need additional fixes to make it working correctly.- Switch over to dnf from yum- Improvements to audit2allow from rhallise@redhat.com * Check for mislabeled files. * Check for base file use and * Suggest writable files as alternatives- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- Remove build requires for openbox, not needed- fix license handling- Examples are no longer in the main semanage man page (#1084390) - Add support for Fedora22 man pages. We need to fix it to not using hardcoding. - Print usage for all mutually exclusive options. - Fix selinux man page to refer seinfo and sesearch tools.- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- Rebuilt for https://fedoraproject.org/wiki/Changes/Python_3.4- Fix setfiles to work correctly if -r option is defined- Update Miroslav Grepl Patches * If there is no executable we don't want to print a part of STANDARD FILE CON * Add-manpages-for-typealiased-types * Make fixfiles_exclude_dirs working if there is a substituion for the given d- If there is no executable we don't want to print a part of STANDARD FILE CONTEXT- Update to upstream * Add -P semodule option to man page from Dan Walsh. * selinux_current_policy_path will return none on a disabled SELinux system from Dan Walsh. * Add new icons for sepolicy gui from Dan Walsh. * Only return writeable files that are enabled from Dan Walsh. * Add domain to short list of domains, when -t and -d from Dan Walsh. * Fix up desktop files to match current standards from Dan Walsh. * Add support to return sensitivities and categories for python from Dan Walsh. * Cleanup whitespace from Dan Walsh. * Add message to tell user to install sandbox policy from Dan Walsh. * Add systemd unit file for mcstrans from Laurent Bigonville. * Improve restorecond systemd unit file from Laurent Bigonville. * Minor man pages improvements from Laurent Bigonville.- Apply patch to use setcon in seunshare from luto@mit.edu- Remove requirement for systemd-units- Fix previous Fix-STANDARD_FILE_CONTEXT patch to exclude if non_exec does not exist- Add policycoreutils-rhat-revert.patch to revert the last two commits to make build working - Add 0001-Fix-STANDARD_FILE_CONTEXT-section-in-man-pages patch- Update Translations- Add support for Fedora21 html manpage structure - Fix broken dependencies to require only usermode-gtk- mgrepl [PATCH] Deleteall user customization fails if there is a user used - for the default login. We do not want to fail on it and continue to delete - customizations for users which are not used for default login.- Update Translations - Make selinux-policy build working also on another architectures related to s - Miroslav grepl patch to fix the creation of man pages on different architectures. - Add ability to list the actual active modules - Fix spelling mistake on sesearch in generate man pages.- Allow manpages to be built on aarch64- Don't be verbose in fixfiles if there is not tty- Yum should only be required for policycoreutils-devel- Update translations- Add Miroslav patch to - Fix previously_modified_initialize() to show modified changes properly for all selections- Do not require /usr/share/selinux/devel/Makefile to build permissive domains- Update to upstream * Ignore selevel/serange if MLS is disabled from Sven Vermeulen.- Update Tranlations - Patch from Yuri Chornoivan to fix typos- Fixes Customized booleans causing a crash of the sepolicy gui- Fix sepolicy gui selection for advanced screen - Update Translations - Move requires checkpolicy requirement into policycoreutils-python- Fix semanage man page description of import command - Fix policy kit file to allow changing to permissive mode- Fix broken dependencies.- Break out python3 code into separate package- Add mgrepl patch - ptrace should be a part of deny_ptrace boolean in TEMPLATETYPE_admin- Update to upstream * Revert automatic setting of serange and seuser in seobject; was breaking non-MLS systems. - Add patches for sepolicy gui from mgrepl to Fix advanced_item_button_push() to allow to select an application in advanced search menu Fix previously_modified_initialize() to show modified changes properly for all selections- Update to upstream * Apply polkit check on all dbus interfaces and restrict to active user from Dan Walsh. * Fix typo in sepolicy gui dbus.relabel_on_boot call from Dan Walsh. - Apply Miroslav Grepl patch to fix TEMPLATETYPE_domtrans description in sepolicy generate- Fix selinux-polgengui, get_all_modules call- Speed up startup time of sepolicy gui - Clean up ports screen to only show enabled ports. - Update to upstream * Remove import policycoreutils.default_encoding_utf8 from semanage from Dan Walsh. * Make yum/extract_rpms optional for sepolicy generate from Dan Walsh. * Add test suite for audit2allow and sepolgen-ifgen from Dan Walsh.- Shift around some of the files to more appropriate packages. * semodule_* packages are required for devel.- Update to upstream * Properly build the swig exception file from Laurent Bigonville. * Fix man pages from Laurent Bigonville. * Support overriding PATH and INITDIR in Makefile from Laurent Bigonville. * Fix LDFLAGS usage from Laurent Bigonville. * Fix init_policy warning from Laurent Bigonville. * Fix semanage logging from Laurent Bigonville. * Open newrole stdin as read/write from Sven Vermeulen. * Fix sepolicy transition from Sven Vermeulen. * Support overriding CFLAGS from Simon Ruderich. * Create correct man directory for run_init from Russell Coker. * restorecon GLOB_BRACE change from Michal Trunecka. * Extend audit2why to report additional constraint information. * Catch IOError errors within audit2allow from Dan Walsh. * semanage export/import fixes from Dan Walsh. * Improve setfiles progress reporting from Dan Walsh. * Document setfiles -o option in usage from Dan Walsh. * Change setfiles to always return -1 on failure from Dan Walsh. * Improve setsebool error r eporting from Dan Walsh. * Major overhaul of gui from Dan Walsh. * Fix sepolicy handling of non-MLS policy from Dan Walsh. * Support returning type aliases from Dan Walsh. * Add sepolicy tests from Dan Walsh. * Add org.selinux.config.policy from Dan Walsh. * Improve range and user input checking by semanage from Dan Walsh. * Prevent source or target arguments that end with / for substitutions from Dan Walsh. * Allow use of <> for semanage fcontext from Dan Walsh. * Report customized user levels from Dan Walsh. * Support deleteall for restoring disabled modules from Dan Walsh. * Improve semanage error reporting from Dan Walsh. * Only list disabled modules for module locallist from Dan Walsh. * Fix logging from Dan Walsh. * Define new constants for file type character codes from Dan Walsh. * Improve bash completions from Dan Walsh. * Convert semanage to argparse from Dan Walsh (originally by Dave Quigley). * Add semanage tests from Dan Walsh. * Split semanage man pages from Dan Walsh. * Move bash completion scripts from Dan Walsh. * Replace genhomedircon script with a link to semodule from Dan Walsh. * Fix fixfiles from Dan Walsh. * Add support for systemd service for restorecon from Dan Walsh. * Spelling corrections from Dan Walsh. * Improve sandbox support for home dir symlinks and file caps from Dan Walsh. * Switch sandbox to openbox window manager from Dan Walsh. * Coalesce audit2why and audit2allow from Dan Walsh. * Change audit2allow to append to output file from Dan Walsh. * Update translations from Dan Walsh. * Change audit2why to use selinux_current_policy_path from Dan Walsh.- Fix handling of man pages.- Cleanup errors found by pychecker - Apply patch from Michal Trunecka to allow restorecon to handle {} in globs- sepolicy gui - mgrepl fixes for users and login - Update Translations.- sepolicy gui - mgrepl added delete screens for users and login - Fix lots of bugs. - Update Translations.- Fixes for fixfiles * exclude_from_dirs should apply to all types of restorecon calls * fixfiles check now works * exit with the correct status - semanage no longer import selinux- Fixes for sepolicy gui - Fix setsebool to return 0 on success - Update Po- Fix sizes of help screens in sepolicy gui- Improvements to sepolicy gui - Add more help information - Cleanup code - Add deny_ptrace on lockdown screen - Make unconfined/permissivedomains lockdown work - Add more support for file equivalency- Add back in the help png files - Begin Adding support for file equivalency.- Random fixes for sepolicy gui * Do not prompt for password until you make a change * Add user mappings and selinux users page * lots of code cleanup - Verify homedir is owned by user before mounting over it with seunshare - Fix fixfiles to handle Relabel properly - Fix semanage fcontext -e / command to allow "/"- Add Miroslav Grepl setsebool patch to give better error message on bad boolean names - Additional help screens for sepolicy gui- Random fixes for sepolicy gui - Update Translations- Add help screens for each page - Fixes for system page- Add Miroslav Grepl Patch to handle semanage -i and semanage -o better - Update Translations- Update sepolicy gui code, cleanups and add file transition tab - Fix semanage fcontext -a --ftype code to work.- If policy is not installed get_bools should not crash- Fix doc versioning- Update sepolicy gui code, cleanups and add file transition tab - Fix semanage argparse problems- Update sepolicy gui code, adding dbus calls - Update Translations- Fix semanage argparse bugs - Update Translations - Add test suite for semanage command lines- Fix semanage argparse bugs- Fix bugs introduced by previous patch. semanage port - Update Translations - Add test suite for sepolicy command lines- Fix bugs introduced by previous patch. semanage port - Update Translations- Rewrite argparse code in semanage and fix reload problem.- Do not generate shell script or spec file for sepolicy generate --newtype - Update translations - Fix sepolicy generate --admin_user man page again - Fix setsebool to print less verbose error messages by default, add -V for ve- Move audit2allow and audit2why back into -python package- Update sepolicy gui. - Error out of you call sepolicy gui without policycoreutils-gui package installed - Fix semanage login -d command - Update Translations- Update sepolicy gui.- Add Ryan Hallisey sepolicy gui. - Update Translations- Fix semanage module error handling- Add back default exception handling for errors, which argparse rewrite removed.- Fix generation of booleans in man pages- Remove requires for systemd-sysv - Move systemd-units require to restorecond section - Update Tranlasions - More sepolicy interfaces for gui - Cleanup man pages for sepolicy generate- Fix semanage export/import commands - Fix semange module command - Remove --version option from sandbox- Add man page doc for --role and bash complestion support for sepolicy --role- Make fcdict return a dictionary of dictionaries - Fix for sepolicy manpage- Add new man pages for each semanage subsection- Fix handling of sepolicy network sorting. - Additional interfaces needed for sepolicy gui- Fix handling of semanage args- Fix sepolicy generate --confined_admin to generate tunables - Add new interface to generate entrypoints for use with new gui- Fix handing of semanage with no args- Fix audit2allow -o to open file for append - Fix the name of the spec file generated in the build script- Fix mgrepl patch to support all semanage command parsing- Fix the name of the spec file generated in the build script - Add mgrepl patch to support argparse for semanage command parsing- Fix sandbox to always use sandbox_file_t, so generated policy will work. - Update Translations- Fix sepolicy-generate man page to clear up options/policy type - Add Miroslav Grepl to not generate man page when doing sepolicy generate --customize - Add support for executing semanage user within spec file - Fix generation of confined admin domains, to handle booleans properly.- Need to handle gziped policy.xml as well as not compressed.- Add support for Xephyr -resizable, so sandbox can now resize window - Add support for compressed policy.xml - Miroslav Grepl patch to allow sepolicy interface on individual interface fil - Also add capability to test interfaces for correctness.- Apply patches from Sven Vermeulen for sepolgen to fix typos.- Only require selinux-policy-devel for policycoreutils-devel, this will shrink the size of the livecd.- Run sepolgen-ifgen in audit2allow and sepolicy generate, if needed, first time - Add Sven Vermeulen patches to cleanup man pages- No longer run sepolgen-ifgen at install time. - Run sepolgen-ifgen in audit2allow and sepolicy generate, if needed. - Update Translations- Fix exceptionion hanling in audit2allow -o - Generate Man pages for everydomain, not just ones with exec_t entrypoints - sepolicy comunicate should return ValueError not TypeError - Trim header line in sepolicy manpage to use less space - Add missing options to restorecon man page- Raise proper Exception on sepolicy communicate with invalid value- Update translations - Add patch by Miroslav Grepl to add compile test for sepolicy interface command.- Update translations - Add patch inspired by Miroslav Grepl to add extended information for sepolicy interface command.- Update translations - Add missing man pages and fixup existing man pages- Move sepolicy to policycoreutils-devel pacage, since most of it is used for devel - Apply Miroslav Grepl Patches for sepolicy -- Fix generate mutually groups option handling -- EUSER is used for existing policy -- customize options can be used together with admin_domain option -- Fix manpage.py to generate correct man pages for SELinux users -- Fix policy *.te file generated by customize+writepaths options -- Fix install script for confined_admin option- Add post install scripts for gui to make sure Icon Cache is refreshed. - Fix grammar issue in secon man page - Update Translations- Add buildrequires for OpenBox to prevent me from accidently building into RHEL7 - Add support for returning alias data to sepolicy.info python bindings- Fix audit2allow output to better align analysys with the allow rules - Apply Miroslav Grepl patch to clean up sepolicy generate usage - Apply Miroslav Grepl patch to fixupt handing of admin_user generation - Update Tranlslations- Allow semanage fcontext -a -t "<>" ... to work- Can not unshare IPC in sandbox, since it blows up Xephyr - Remove bogus error message sandbox about reseting setfsuid- Fix sepolicy generate --customize to generate policy with -w commands- sepolgen-ifgen needs to handle filename transition rules containing ":"- sepolicy manpage: - use nroff instead of man2html - Remove checking for name of person who created the man page - audit2allow - Fix output to show the level that is different.- Fix newrole to not drop capabilities from the bounding set. - Stop dropping capabilities from its children. - Add better error messages. - Change location of bash_completion files to /usr/share/bash-completion/compl- sepolicy generate should look for booleans that effect equivalence names, and add them to the man page- Mention creation of permissive domains in sepolicy generate man page - Change sepolicy manpage to use shortname with an "_" to stop accidently grabbing unrelated types for a domain. - Fix audit2allow to show better information on constraint violations.- Have restorecon exit -1 on errors for consistancy.- Need to provide a value to semanage boolean -m- Fix cut and paste errors for sepolicy network command- Fix sepoicy interface to work properly- Fix fixfiles to use exclude_dirs on fixfiles restore- Allow users with symlinked homedirs to work. call realpath on homedir - Fix sepolicy reorganization of helper functions.- Update trans - Fix sepolicy reorganization of helper functions.- remove vendor tag from desktop file. https://fedorahosted.org/fpc/ticket/247 - clean up spec to follow current guidelines- Do not load interface file by default when sepolicy is called, mov get_all_methods to the sepolicy package- sepolgen-ifgen should use the current policy path if selinux is enabled- Fix sepolicy to be able to work on an SELinux disabled system. - Needed to be able to build man pages in selinux-policy package- Add yum to requires of policycoreutils-python since sepolicy requires it.- Sepolixy should not throw an exception on an SELinux disabled machine - Switch from using console app to using pkexec, so we will work better with policykit. - Add missing import to fix system-config-selinux startup - Add comment to pamd files about pam_rootok.so - Fix sepolicy generate to not comment out the first line- Add --root/-r flag to sepolicy manpage, - This allows us to generate man pages on the fly in the selinux-policy build- Fix newrole to retain cap_audit_write when compiled with namespace, also do not drop capabilities when run as root.- Fix man page generation and public_content description- Revert some changes which are causing the wrong policy version file to be created - Switch sandbox to start using openbox rather then matchbox - Make sepolgen a symlink to sepolicy - update translations- Fix empty system-config-selinux.png, again- Fix empty system-config-selinux.png- Update to upstream * setfiles: estimate percent progress * load_policy: make link at the destination directory * Rebuild polgen.glade with glade-3 * sepolicy: new command to unite small utilities * sepolicy: Update Makefiles and po files * sandbox: use sepolicy to look for sandbox_t * gui: switch to use sepolicy * gui: sepolgen: use sepolicy to generate * semanage: use sepolicy for boolean dictionary * add po file configuration information * po: stop running update-po on all * semanage: seobject verify policy types before allowing you to assign them. * gui: Start using Popen, instead of os.spawnl * sandbox: Copy /var/tmp to /tmp as they are the same inside * qualifier to shred content * semanage: Fix handling of boolean_sub names when using the -F flag * semanage: man: roles instead of role * gui: system-config-selinux: Catch no DISPLAY= error * setfiles: print error if no default label found * semanage: list logins file entries in semanage login -l * semanage: good error message is sepolgen python module missing * gui: system-config-selinux: do not use lokkit * secon: add support for setrans color information in prompt output * restorecond: remove /etc/mtab from default list * gui: If you are not able to read enforcemode set it to False * genhomedircon: regenerate genhomedircon more often * restorecond: Add /etc/udpatedb.conf to restorecond.conf * genhomedircon generation to allow spec file to pass in SEMODULE_PATH * fixfiles: relabel only after specific date * po: update translations * sandbox: seunshare: do not reassign realloc value * seunshare: do checking on setfsuid * sestatus: rewrite to shut up coverity- Reorginize sepolicy so all get_all functions are in main module - Add -B capability to fixfiles onboot and fixfiles restore, basically searches for all files created since the last boot.- Update to latest patches from eparis/Upstream - fixfiles onboot will write any flags handed to it to /.autorelabel. - * Patch sent to initscripts to have fedora-autorelabel pass flags back to fixfiles restore - * This should allow fixfiles -F onboot, to force a hard relabel. - Add -p to show progress on full relabel.- Additional changes for bash completsion and generate man page to match the w - Add newtype as a new qualifier to sepolicy generate. This new mechanism wil - a policy write to generate types after the initial policy has been written a - will autogenerate all of the interfaces. - I also added a -w options to allow policy writers from the command line to s - the writable directories of files. - - Modify network.py to include interface definitions for newly created port type - Standardize of te_types just like all of the other templates. - Change permissive domains creation to raise exception if sepolgen is not ins - get_te_results no longer needs or uses the opts parameter. - The compliler was complaining so I just removed the option. - Start returning analysis data for audit2allow- Update Translations - Fix handling of semanage generate --cgi -n MODULE PATHTO/CGI - This fixes the spec file and script file getting wrong names for modules and types.- Additional patch from Miroslav to handle role attributes- Update with Miroslav patch to handle role attributes - Update Translations - import sepolicy will only throw exception on missing policy iff selinux is enabled- Update to latest patches from eparis/Upstream - secon: add support for setrans color information in prompt output - Update translations- Update translations - Fix sepolicy booleans to handle autogenerated booleans descriptions - Cleanups of sepolicy manpage - Fix crash on git_shell man page generation- Update translations - update sepolicy manpage to generate fcontext equivalence data and to list default file context paths. - Add ability to generate policy for confined admins and domains like puppet.- Fix semanage permissive , this time with the patch. - Update translations- Fix semanage permissive - Change to use correct gtk forward button - Update po- Move audit2why to -devel package- sepolicy transition was blowing up. Also cleanup output when only source is specified. - sepolicy generate should allow policy modules names that include - or _- Apply patch from Miroslav to display proper range description in man pages g - Should print warning on missing default label when run in recusive mode iff - Remove extra -R description, and fix recursive description- Additional fixes for disabled SELinux Box - system-config-selinux no longer relies on lokkit for /etc/selinux/config- sepolicy should failover to installed policy file on a disabled SELinux box, if it exists.- Update Translations - sepolicy network -d needs to accept multiple domains- Add --path as a parameter to sepolicy generate - Print warning message if program does not exists when generating policy, and do not attempt to run nm command - Fix sepolicy generate -T to not take an argument, and supress the help message - Since this is really just a testing tool- Fix sepolicy communicate to handle invalid input- Fix sepolicy network -p to handle high ports- Fix handling of manpages without entrypoints, nsswitch domains - Update Translations- Move sepogen python bindings back into policycoreutils-python out of -devel, since sepolicy is using the- Fix sepolicy/__init__.py to handle _()- Add Miroslav Grepl patch to create etc_rw_t sock files policy- Fix semanage to work without policycoreutils-devel installed - Update translations- Fix semanage login -l to list contents of /etc/selinux/POLICY/logins directory- Fix booleansPage not showing booleans - Fix audit2allow -b- Fix sepolicy booleans again - Fix man page- Move policy generation tools into policycoreutils-devel- Document and fix sepolicy booleans - Update Translations - Fix several spelling mistakes- Only report restorecon warning for missing default label, if not running recusively - Update translations- Fix semanage booleans -l, move more boolean_dict handling into sepolicy - Update translations - Fixup sepolicy generate to discover /var/log, /var/run and /var/lib directories if they match the name - Fix kill function call should indicate signal_perms not kill capability - Error out cleanly in system-config-selinux, if it can not contact XServer- Remove run_init, no longer needed with systemd. - Fix sepolicy generate to not include subdirs in generated fcontext file. (mgrepl patch)- Fix manpage to generate proper man pages for alternate policy, basically allow me to build RHEL6 man pages on a Fedora 18 box, as long as I pull the policy, policy.xml and file_contexts and file_contexts.homedir- Fix some build problems in sepolicy manpage and sepolicy transition- Add alias man pages to sepolicy manpage- Redesign sepolicy to only read the policy file once, not for every call- Fixes to sepolicy transition, allow it to list all transitions from a domain- Change sepolicy python bindings to have python pick policy file, fixes weird memory problems in sepolicy network- Allow sepolicy to specify the policy to generate content from- Fix semanage boolean -F to handle boolean subs- Add Miroslav Grepl patch to generate html man pages - Update Translations - Add option to sandbox to shred files before deleting- Add Requires(post) PKGNAME to sepolicy generate /usr/bin/pkg- Add role_allow to sepolicy.search python bindings, this allows us to remove last requirement for setools-cmdline in gui tools. - Fix man page generator.- Remove dwalsh@redhat.com from man pages - Fix spec file for sepolicy generate- Add missing spec.py from templates directory needed for sepolicy generate - Add /var/tmp as collection point for sandbox apps.- Handle audit2allow -b in foreign locales- Update sepolicy generate with patch to create spec file and man page. - Patch initiated by Miroslav Grepl- Fix semanage to verify that types are appropriate for commands. * Patch initiated by mgrepl * Fixes problem of specifying non file_types for fcontext, or not port_types for semanage port- Fix typo in preunstall line for restorecond - Add mgrepl patch to consolidate file context generated by sepolicy generate- Fix manpage generation, missing import - Add equiv_dict to get samba booleans into smbd_selinux - Add proper translations for booleans and remove selinux.tbl- Fix system-config-selinux to use sepolicy.generate instead of sepolgen- Add sepolicy commands, and change tools to use them.- Rebuild without bogus prebuild 64 bit seunshare app- Allow fixfiles to specify -v, so they can get verbosity rather then progress. - Fix load_file Makefile to use SBINDIR rather then real OS. - Fix man pages in setfiles and restorecon to reflect what happens when you relabel the entire OS.- Use systemd post install scriptlets- Update to upstream * genhomedircon: manual page improvements * setfiles/restorecon minor improvements * run_init: If open_init_pty is not available then just use exec * newrole: do not drop capabilities when newrole is run as * restorecon: only update type by default * scripts: Don't syslog setfiles changes on a fixfiles restore * setfiles: do not syslog if no changes * Disable user restorecond by default * Make restorecon return 0 when a file has changed context * setfiles: Fix process_glob error handling * semanage: allow enable/disable under -m * add .tx to gitignore * translations: commit translations from Fedora community * po: silence build process * gui: Checking in policy to support polgengui and sepolgen. * gui: polgen: search for systemd subpackage when generating policy * gui: for exploring booleans * gui: system-config-selinux gui * Add Makefiles to support new gui code * gui: remove lockdown wizard * return equivalency records in fcontext customized * semanage: option to not load new policy into kernel after * sandbox: manpage update to describe standard types * setsebool: -N should not reload policy on changes * semodule: Add -N qualifier to no reload kernel policy * gui: polgen: sort selinux types of user controls * gui: polgen: follow symlinks and get the real path to * gui: Fix missing error function * setfiles: return errors when bad paths are given * fixfiles: tell restorecon to ignore missing paths * setsebool: error when setting multiple options * semanage: use boolean subs. * sandbox: Make sure Xephyr never listens on tcp ports * sepolgen: return and output constraint violation information * semanage: skip comments while reading external configuration files * restorecond: relabel all mount runtime files in the restorecond example * genhomedircon: dynamically create genhomedircon * Allow returning of bastard matches * sepolgen: return and output constraint violation information * audit2allow: one role/type pair per line- Change polgen to generate dbus apps as optional so they can compile on minimal policy system, patch from Miroslav Grepl- Fix sepolgen/audit2allow to handle multiple role/types in avc messages properly- Fix restorecon to generate a better percentage of completion on restorecon -R /. - Have audit2allow look at the constaint violation and tell the user whether it - is because of user,role or level- userapps is generating sandbox code in polgengui- Remove load_policy symbolic link on usrmove systems this breaks the system- Update to upstream - policycoreutils * restorecond: wrong options should exit with non-zero error code * restorecond: Add -h option to get usage command * resorecond: user: fix fd leak * mcstrans: add -f to run in foreground * semanage: fix man page range and level defaults * semanage: bash completion for modules should include -a,-m, -d * semanage: manpage update for -e * semanage: dontaudit off should work * semanage: locallist option does not take an argument * sepolgen: Make use of setools optional within sepolgen - sepolgen * Make use of setools optional within sepolgen * We need to support files that have a + in them- Make restorecon exit with an error on a bad path- Fix setsebool command, handling of = broken. - Add missing error option in booleansPage- Fix sepolgen to use realpath on executables handed to it. - Brian Bickford- Allow stream sock_files to be stored in /tmp and etc_rw_t directories by sepolgen - Trigger on selinux-policy needs to change to selinux-policy-devel - Update translations - Fix semanage dontaudit off/on exception- Add -N qualifier to semanage, setsebool and semodule to allow you to update - policy without reloading it into the kernel.- add some definition to the standard types available for sandboxes- Remove lockdown wizard- Fix semanage fcontext -E to extract the equivalance customizations.- Add mgrepl patch to have sepolgen search for -systemd rpm packages- Apply Stef Walter patch for semanage man page- Rebuild to get latest libsepol which fixes the file_name transition problems - Update translations - Fix calls to close fd for restorecond- Update translations - Fix sepolgen to discover unit files in /lib/systemd/- Update translations - Fix segfault on restorecon- Allow filename transitions to use + in a file name- Change policycoreutils-python to require selinux-policy-devel package- Update to upstream - policycoreutils * sandbox: do not propogate inside mounts outside * sandbox: Removing sandbox init script, should no longer be necessary * restorecond: Stop using deprecated interfaces for g_io * semanage: proper auditting of user changes for LSPP * semanage: audit message to show what record(s) and item(s) have chaged * scripts: Update Makefiles to handle /usrmove * mcstrans: Version should have been bumped on last check in * seunshare: Only drop caps not the Bounding Set from seunshare * Add bash-completion scripts for setsebool and semanage * newrole: Use correct capng calls in newrole * Fix infinite loop with inotify on 2.6.31 kernels * fix ftbfs with hardening flags * Only run setfiles if we found read-write filesystems to run it on * update .po files * remove empty po files * do not fail to install if unable to make load_policy lnk file - sepolgen * Fix dead links to www.nsa.gov/selinux * audit.py Dont crash if empty data is passed to sepolgen * do not use md5 when calculating hash signatures * fix detection of policy loads- Have sepolgen script specify the pp file with the make command. From mgrepl.- Fix sepolgen handling of unit files.- Require selinux-policy-doc- Fix unit file handling in sepolgen- Add bash_command completion for setsebool/getsebool- Disable restorecond on desktop by default - Change seunshare to not modify the bounding set- Stop using sandbox init in post install since it no longer exists.- Change to use new selinux_current_policy_path()- Change to use new selinux_binary_policy_path() - Add systemd_passwd_agent_exec($1), and systemd_read_fifo_file_passwd_run($1) to templates for _admin interface- On full relabels we will now show a estimated percent complete rather then just *s.- Add unit_file.py for sepolgen- Change sepolgen to use sha256 instead of md5- Stop syslogging on full restore - Stop syslogging when restorecon is not changing values- Change semanage to produce proper audit records for Common Criteria - Cleanup packaging for usrmove- fixed load_policy location- fixed load_policy location- fixed load_policy location- add filesystem guard- install everything in /usr https://fedoraproject.org/wiki/Features/UsrMove- restorecond fixes: Stop using depracated g_io interfaces Exit with non zero exit code if wrong options given Add -h option- Eliminate not needed Requires- fix sepolgen to not crash on echo "" | audit2allow- Remove sandbox init script, should no longer be necessary- Add unit file support to sepolgen, and cleanup some of the output.- Fix English in templates for sepolgen- Fix the handling of namespaces in seunshare/sandbox. - Currently mounting of directories within sandbox is propogating to the - parent namesspace.- Add umount code to seunshare to cleanup left over mounts of /var/tmp- Remove open_init_pty-Update to upstream - sepolgen * better analysis of why things broke - policycoreutils * Remove excess whitespace * sandbox: Add back in . functions to sandbox.init script * Fix Makefile to match other policycoreutils Makefiles * semanage: drop unused translation getopt- Bump libsepol version requires rebuild- Add back accidently dropped patches for semanage- Upgrade to upstream * sandbox: move sandbox.conf.5 to just sandbox.5 * po: Makefile use -p to preserve times to allow multilib simultatious installs * of po files * sandbox: Allow user to specify the DPI value for X in a sandbox * sandbox: make sure the domain launching sandbox has at least 100 categories * sandbox: do not try forever to find available category set * sandbox: only complain if sandbox unable to launch * sandbox: init script run twice is still successful * semanage: print local and dristo equiv rules * semanage: check file equivalence rules for conflict * semanage: Make sure semanage fcontext -l -C prints even if local keys * are not defined * semanage: change src,dst to target,substitute for equivalency * sestatus: Updated sestatus and man pages. * Added SELinux config file man page. * add clean target to man Makefile- Fix semange fcontext -a to check for more conflicts on equivalency- Fix dpi handling in sandbox - Make sure semanage fcontext -l -C prints if only local equiv have changed- Add listing of distribution equivalence class from semanage fcontext -l - Add checking to semanage fcontext -a to guarantee a file specification will not be masked by an equivalence- Allow ~ as a valid part of a filename in sepolgen- sandbox init script should always return 0 - sandbox command needs to check range of categories and report error if not big enough- Allow user to specify DPI when running sandbox- Add Miroslav patch to return all attributes- Upgrade to policycoreutils upstream * sandbox: Maintain the LANG environment into the sandbox * audit2allow: use audit2why internally * fixfiles: label /root but not /var/lib/BackupPC * semanage: update local boolean settings is dealing with localstore * semanage: missing modify=True * semanage: set modified correctly * restorecond: make restorecond dbuss-able * restorecon: Always check return code on asprintf * restorecond: make restorecond -u exit when terminal closes * sandbox: introduce package name and language stuff * semodule_package: remove semodule_unpackage on clean * fix sandbox Makefile to support DESTDIR * semanage: Add -o description to the semanage man page * make use of the new realpath_not_final function * setfiles: close /proc/mounts file when finished * semodule: Document semodule -p in man page * setfiles: fix use before initialized * restorecond: Add .local/share as a directory to watch - Upgrade to sepolgen upstream * Ignore permissive qualifier if found in an interface * Return name field in avc data- Rebuild versus newer libsepol- A couple of minor coverity fixes for a potential leaked file descriptor - An an unchecked return code. - Add ~/.local/share/* to restorecond_user watches- Have sepolgen return name field in AVC- restorecond -u needs to watch terminal for exit if run outside of dbus.- Do not drop capabilities if running newrole as root-Update to upstream * semanage: fix indentation error in seobject- Ignore permissive commands in interfaces- Remove gnome requirement from polgengui-Update to upstream policycoreutils-2.1.6 * sepolgen-ifgen: new attr-helper does something * audit2allow: use alternate policy file * audit2allow: sepolgen-ifgen use the attr helper * setfiles: switch from stat to stat64 * setfiles: Fix potential crash using dereferenced ftsent * setfiles: do not wrap * output at 80 characters * sandbox: add -Wall and -Werror to makefile * sandbox: add sandbox cgroup support * sandbox: rewrite /tmp handling * sandbox: do not bind mount so much * sandbox: add level based kill option * sandbox: cntrl-c should kill entire process control group * Create a new preserve_tunables flag in sepol_handle_t. * semanage: show running and disk setting for booleans * semanage: Dont print heading if no items selected * sepolgen: audit2allow is mistakakenly not allowing valid module names * semanage: Catch RuntimeErrors, that can be generated when SELinux is disabled * More files to ignore * tree: default make target to all not install * sandbox: do not load unused generic init functions sepolgen-1.1.2 * src: sepolgen: add attribute storing infrastructure * Change perm-map and add open to try to get better results on * look for booleans that might solve problems * sepolgen: audit2allow is mistakakenly not allowing valid module names * tree: default make target to all not install- Change separator on -L from ; to :- Add back lockdown wizard for booleans using pywebkitgtk- Maintain the LANG environment Variable into the sandbox - Change restorecon/setfiles to only change type part of the context unless -f qualifier is given- Remove lockdown wizard, since gtkhtml2 is no longer supported.- Allow setfiles and restorecon to use labeledprefix to speed up processing and limit memory.-Update to upstream * policycoreutils * setfiles: Fix process_glob to handle error situations * sandbox: Allow seunshare to run as root * sandbox: trap sigterm to make sure sandbox * sandbox: pass DPI from the desktop * sandbox: seunshare: introduce helper spawn_command * sandbox: seunshare: introduce new filesystem helpers * sandbox: add -C option to not drop * sandbox: split seunshare caps dropping * sandbox: use dbus-launch * sandbox: numerous simple updates to sandbox * sandbox: do not require selinux context * sandbox: Makefile: new man pages * sandbox: rename dir to srcdir * sandbox: allow users specify sandbox window size * sandbox: check for paths up front * sandbox: use defined values for paths rather * sandbox: move seunshare globals to the top * sandbox: whitespace fix * semodule_package: Add semodule_unpackage executable * setfiles: get rid of some stupid globals * setfiles: move exclude_non_seclabel_mounts to a generic location * sepolgen * refparser: include open among valid permissions * refparser: add support for filename_trans rules- Fix bug in glob handling for restorecon-Update to upstream 2.1.4 2011-08-17 * run_init: clarification of the usage in the * semanage: fix usage header around booleans * semanage: remove useless empty lines * semanage: update man page with new examples * semanage: update usage text * semanage: introduce file context equivalencies * semanage: enable and disable modules * semanage: output all local modifications * semanage: introduce extraction of local configuration * semanage: cleanup error on invalid operation * semanage: handle being called with no arguments * semanage: return sooner to save CPU time * semanage: surround getopt with try/except * semanage: use define/raise instead of lots of * semanage: some options are only valid for * semanage: introduce better deleteall support * semanage: do not allow spaces in file * semanage: distinguish between builtin and local permissive * semanage: centralized ip node handling * setfiles: make the restore function exclude() non-static * setfiles: use glob to handle ~ and * fixfiles: do not hard code types * fixfiles: stop trying to be smart about * fixfiles: use new kernel seclabel option * fixfiles: pipe everything to cat before sending * fixfiles: introduce /etc/selinux/fixfiles_exclude_dirs * semodule: support for alternative root paths 2.1.3 2011-08-03 * semanage: fix indention * semodule_package: fix man page typo * semodule_expand: update man page with -a * semanage: handle os errors * semanage: fix traceback with bad options * semanage: show usage on -h or --help * semanage: introduce more deleteall options * semanage: verify ports < 65536 * transaction into semanageRecords * make get_handle a method of semanageRecords * remove a needless blank line * make process_one error if not initialized correctly * fixfiles: correct usage for r_opts.rootpath * put -p in help for restorecon and * fixfiles: do not try to only label * fixfiles clean up /var/run and /var/lib/debug * fixfiles delete tmp sockets and pipes rather * fixfile use find -delete instead of pipe * chcat man page typo * add man page for genhomedircon * setfiles fix typo * setsebool should inform users they need to * setsebool typos * open_init_tty man page typos * Don't add user site directory to sys.path * newrole retain CAP_SETPCAP 2.1.2 2011-08-02 * seunshare: define _GNU_SOURCE earlier * make ignore_enoent do something * restorecond: first user logged in is not noticed * Repo: update .gitignore 2.1.1 2011-08-01 * Man page updates * restorecon fix for bad inotify assumptions 2.1.0 2011-07-27 * Release, minor version bump- Fix sepolgen usage statement - Stop using -k insandbox - Fix seunshare usage statement- Change seunshare to send kill signals to the childs session. - Also add signal handler to catch sigint, so if user enters ctrl-C sandbox will shutdown.- Add -k qualifier to seunshare to have it attempt to kill all processes with the matching MCS label.- Add -C option to sandbox and seunshare to maintain capabilities, otherwise the bounding set will be dropped. - Change --cgroups short name -c rather then -C for consistancy - Fix memory and fd leaks in seunshare- Introduce systemd unit file for restorecond drop SysV support- Do not drop capability bounding set in seunshare, this allows sandbox to - run setuid apps.- Add semanage-bash-completion.sh script- Remove mount -o bind calls from sandbox init script - pam_namespace now has this built in.- Pass desktop dpi to sandbox Xephyr window- Allow semodule to pick alternate root for selinux files - Add ~/.config/* to restorcond_user.conf, so restorecond will watch for mislabeled files in this directory.- Fix var_spool template read_spool_files - Fix sepolgen to handle filename transitions- Templates cleanedup by Dominic Grift- Clean up some of the templates for sepolgen- Apply patches from Christoph A. * fix sandbox title * stop xephyr from li - Also ignore errors on sandbox include of directory missing files- rebuild versus latest libsepol- Change fixfiles restore to delete unlabeled sockets in /tmp- rebuild versus latest libsepol- Update to upstream * Use correct color range in mcstrand by Richard Haines.- Add Elia Pinto patches to allow user to specify directories to ignore- Fix policycoreutils-sandbox description- rsynccmd should run outside of execcon- Fix semange node handling of ipv6 addresses- Fix sepolgen-ifgen call, add -p option- Fix sepolgen-ifgen call- Fix rsync command to work if the directory is old. - Fix all tests- Fix sepolgen to generate network polcy using generic_if and genric_node versus all_if and all_node- Return to original seunshare man page- change default location of HOMEDIR in sandbox to /tmp/.sandbox_home_* - This will allow default sandboxes to work on NFS homedirs without allowing access to homedir data- Change sepolgen-ifgen to search all available policy files - Exit in restorecond if it can not find a UID in the passwd database- Fix portspage in system-config-selinux to not crash - More fixes for seunshare from Tomas Hoger- put back in old handling of -T in sandbox command - Put back setsid in seunshare - Fix rsync to maintain times- Use rewritten seunshare from thoger- Require python-IPy for policycoreutils-python package - Fixes for sepologen - Usage statement needs -n name - Names with _ are being prevented - dbus apps should get _chat interface- Fix error message in seunshare, check for tmpdir existance before unlink.- Rewrite seunshare to make sure /tmp is mounted stickybit owned by root - Only allow names in polgengui that contain letters and numbers - Fix up node handling in semanage command - Update translations- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Fix sandbox policy creation with udp connect ports- Cleaup selinux-polgengui to be a little more modern, fix comments and use selected name - Cleanup chcat man page- Report full errors on OSError on Sandbox- Fix newrole hanlding of pcap- Have restorecond watch more directories in homedir- Add sandbox to sepolgen- Fix proper handling of getopt errors - Do not allow modules names to contain spaces- Polgengui raises the wrong type of exception. #471078 - Change semanage to not allow it to semanage module -D - Change setsebool to suggest run as root on failure- Fix restorecond watching utmp file for people logging in our out- Update to upstream- Change to allow sandbox to run on nfs homedirs, add start python script- Move seunshare to sandbox package- Fix sandbox to show correct types in usage statement- Stop fixfiles from complaining about missing dirs- Update to upstream - List types available for sandbox in usage statement- Don't report error on load_policy when system is disabled.- Fix up problems pointed out by solar designer on dropping capabilities- Check if you have full privs and reset otherwise dont drop caps- Fix setools require line- Move /etc/pam.d/newrole in to polcicycoreutils-newrole - Additional capability checking in sepolgen- Remove setuid flag and replace with file capabilities - Fix sandbox handling of files with spaces in them- Rebuilt for gcc bug 634757- Move restorecond into its own subpackage- Fix semanage man page- Add seremote, to allow the execution of command inside the sandbox from outside the sandbox.- Fix sandbox copyfile when copying a dir with a socket, print error- Stop polgengui from crashing if selinux policy is not installed- Fix bug preventing sandbox from using -l- Eliminate quotes fro desktop files- Add -w windowsize patch from Christoph A.- Update po- Update po- Tighten down seunshare to create /tmp dir with sticky bit and MS_NODEV | MS_NOSUID | MS_NOEXEC; - Remove setsid on seunshare so ^c on sandbox will cause apps to exit - Add dbus-launch --exit-with-session so all processes launched within the sandbox exit with the sandbox - Clean up error handling so error will get sent back to sandbox tool- Fix translation handling in file context page of system-config-selinux- Fix sandbox error handling- Apply patch to restorecond from Chris Adams, which will cause restorecond - to watch first user that logs in.- Add COPYING file to doc dir- Update po and translations Resolves: #610473- More fixes for polgen tools- Remove requirement to run selinux-polgen as root- Update po and translations - Fix gui policy generation tools- Update po and translations- rebuild against python 2.7- Update selinux-polgengui to sepolgen policy generation- Fix invalid free in seunshare and fix man page- Update translations- Fix sandbox man page- Rebuilt for https://fedoraproject.org/wiki/Features/Python_2.7/MassRebuild- Add translations for menus - Fixup man page from Russell Coker- Change python scripts to use -s flag - Update po- Update to upstream * Add sandbox support from Dan Walsh with modifications from Steve Lawrence.- Fix sepolgen code generation Resolve: #603001- Add cgroup support for sandbox- Allow creation of /var/cache/DOMAIN from sepolgen- Fix sandbox init script - Add dbus-launch to sandbox -X Resolve: #599599- Move genhomedircon.8 to same package as genhomedircon - Fix sandbox to pass unit test Resolves: #595796- Fix listing of booleans from audit2allow- Fix audit2allow to output if the current policy has avc - Update translations - Fix icon- Man page fixes - sandbox fixes - Move seunshare to base package- Fix seunshare translations - Fix seunshare to work on all arches - Fix icon for system-config-selinux Resolves: #595276- Fix can_exec definition in sepolgen- Add man page for seunshare and genhomedircon Resolves: #594303 - Fix node management via semanage- Fixes from upstream for sandbox command Resolves: #580938- Fix sandbox error handling on copyfile - Fix desktop files- Fix policy tool to have correct name in menus - Fix seunshare to handle /tmp being in ~/home - Fix saving of altered files - Update translations- Allow audit2allow to specify alternative policy file for analysis- Update po - Fix sepolgen --no_attrs Resolves: #588280- Make semanage boolean work on disabled machines and during livecd xguest - Fix homedir and tmpdir handling in sandbox Resolves: #587263- Make semanage boolean work on disabled machines- Make sepolgen-ifgen be quiet- Make sepolgen report on more interfaces - Fix system-config-selinux display of modules- Fix crash when args are empty Resolves: #582542 - Fix semange to exit on bad options - Fix semanage dontaudit man page section Resolves: #582533- Remove debug line from semanage - Update po- Fix sandbox comment on HOMEDIRS - Fix sandbox to throw error on bad executable- Fix spacing in templates- Fix semanage return codes- Fix sepolgen to confirm to the "Reference Policy Style Guide"- Update to upstream * Add avc's since boot from Dan Walsh. * Fix unit tests from Dan Walsh.- Update to upstream - sepolgen * Add since-last-boot option to audit2allow from Dan Walsh. * Fix sepolgen output to match what Chris expects for upstream refpolicy from Dan Walsh.- Allow restorecon on > 2 Gig files- Fix semanage handling of boolean options - Update translations- Update to upstream * Add dontaudit flag to audit2allow from Dan Walsh.- Use --rbind in sandbox init scripts- Update to upstream * Module enable/disable support from Dan Walsh.- Rewrite of sandbox script, add unit test for sandbox - Update translations- Fix patch for dontaudit rules from audit2allow for upstream acceptance- Fixes for fixfiles- Fix sandbox to complain if mount-shared has not been run - Fix to use /etc/sysconfig/sandbox- Update to upstream * Fix double-free in newrole - Fix python language handling- Fix display of command in sandbox- Catch OSError in semanage- Fix seobject and fixfiles- Change seobject to use translations properly- Cleanup spec file Resolves: 555835- Add use_resolve to sepolgen- Add session capability to sandbox - sandbox -SX -H ~/.homedir -t unconfined_t -l s0:c15 /etc/gdm/Xsession- Fix executable template for fifo files- Fix patch xod xmodmap - Exit 0 from script- Run with the same xdmodmap in sandbox as outside - Patch from Josh Cogliati- Fix sepolgen to not generate user sh section on non user policy- Add -e to semanage man page - Add -D qualifier to audit2allow to generate dontaudit rules- Speed up audit2allow processing of audit2why comments- Fixes to sandbox man page- Add setools-libs-python to requires for gui- If restorecond running as a user has no files to watch then it should exit. (NFS Homedirs)- Move sandbox man page to base package- Fix audit2allow to report constraints, dontaudits, types, booleans- Fix restorecon -i to ignore enoent- Update to upstream * Remove non-working OUTFILE from fixfiles from Dan Walsh. * Additional exception handling in chcat from Dan Walsh. * fix sepolgen to read a "type 1403" msg as a policy load by Stephen Smalley * Add support for Xen ocontexts from Paul Nuzzi.- Update to upstream * Fixed bug preventing semanage node -a from working from Chad Sellers * Fixed bug preventing semanage fcontext -l from working from Chad Sellers - Change semanage to use unicode- Update to upstream * Remove setrans management from semanage, as it does not work from Dan Walsh. * Move load_policy from /usr/sbin to /sbin from Dan Walsh.- Raise exception if user tries to add file context with an embedded space- Fix sandbox to setsid so it can run under mozilla without crashing the session- Update to upstream * Factor out restoring logic from setfiles.c into restore.c- Fix typo in seobject.py- Allow semanage -i and semanage -o to generate customization files. - semanage -o will generate a customization file that semanage -i can read and set a machines to the same selinux configuration- Fix restorecond man page- Add generation of the users context file to polgengui- Remove tabs from system-config-selinux glade file- Remove translations screen from system-config-selinux- Move fixfiles man pages into the correct package - Add genhomedircon to fixfiles restore- Add check to sandbox to verify save changes - Chris Pardy - Fix memory leak in restorecond - Steve Grubb- Fixes Templates- Fixes for polgengui to handle tcp ports correctly - Fix semanage node -a- Fixes for semanage -equiv, readded modules, --enable, --disable- Close sandbox when eclipse exits- Security fixes for seunshare - Fix Sandbox to handle non file input to command.- Security fixes for seunshare- Update to upstream * Change semodule upgrade behavior to install even if the module is not present from Dan Walsh. * Make setfiles label if selinux is disabled and a seclabel aware kernel is running from Caleb Case. * Clarify forkpty() error message in run_init from Manoj Srivastava.- Fix sandbox to handle relative paths- Add symbolic link to load_policy- Fix restorecond script to use force-reload- Fix init script to show status in usage message- Update to upstream * Add semanage dontaudit to turn off dontaudits from Dan Walsh. * Fix semanage to set correct mode for setrans file from Dan Walsh. * Fix malformed dictionary in portRecord from Dan Walsh. * Restore symlink handling support to restorecon based on a patch by Martin Orr. This fixes the restorecon /dev/stdin performed by Debian udev scripts that was broken by policycoreutils 2.0.70.- Add DAC_OVERRIED to seunshare- Fix typo- Add enable/disable patch- rebuilt with new audit- Tighten up controls on seunshare.c- Add sandboxX- Fix realpath usage to only happen on argv input from user- Don't try to remove restorecond after last erase (done already in %preun). - Ensure scriptlets exit with status 0. - Fix %post and %pr- Fix glob handling of /..- Redesign restorecond to use setfiles/restore functionality- Fix sepolgen again- Add --boot flag to audit2allow to get all AVC messages since last boot- Fix semanage command- exclude unconfined.if from sepolgen- Fix chcat to report error on non existing file - Update to upstream * Modify setfiles/restorecon checking of exclude paths. Only check user-supplied exclude paths (not automatically generated ones based on lack of seclabel support), don't require them to be directories, and ignore permission denied errors on them (it is ok to exclude a path to which the caller lacks permission).- Don't warn if the user did not specify the exclude if root can not stat file system- Update to upstream * Modify restorecon to only call realpath() on user-supplied pathnames from Stephen Smalley. * Fix typo in fixfiles that prevented it from relabeling btrfs filesystems from Dan Walsh.- Fix location of man pages - Update to upstream * Modify setfiles to exclude mounts without seclabel option in /proc/mounts on kernels >= 2.6.30 from Thomas Liu. * Re-enable disable_dontaudit rules upon semodule -B from Christopher Pardy and Dan Walsh. * setfiles converted to fts from Thomas Liu.- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- fix multiple directory ownership of mandirs- Update to upstream * Keep setfiles from spamming console from Dan Walsh. * Fix chcat's category expansion for users from Dan Walsh. - Update po files - Fix sepolgen- Add sepolgen executable- Fix Sandbox option handling - Fix fixfiles handling of btrfs- Fix sandbox to be able to execute files in homedir- Change polgen.py to be able to generate policy- Update to upstream * Fix transaction checking from Dan Walsh. * Make fixfiles -R (for rpm) recursive. * Make semanage permissive clean up after itself from Dan Walsh. * add /root/.ssh/* to restorecond.conf- Fix audit2allow -a to retun /var/log/messages- Run restorecond as a user service- Add semanage module support- Do not print \n, if count < 1000;- Handle case where subs file does not exist- Update po files - Add --equiv command for semanage- Cleanup creation of permissive domains - Update po files- Update po files- Fix semanage transations- Update polgengui templates to match current upstream policy- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Add /root/.ssh to restorecond.conf - fixfiles -R package should recursively fix files- Update to upstream * Add btrfs to fixfiles from Dan Walsh. * Remove restorecond error for matching globs with multiple hard links and fix some error messages from Dan Walsh. * Make removing a non-existant module a warning rather than an error from Dan Walsh. * Man page fixes from Dan Walsh.- Fix script created by polgengui to not refer to selinux-policy-devel- Change initc scripts to use proper labeling on gui- Add obsoletes to cause policycoreuils to update both python and non python version- Dont report errors on glob match and multiple links- Move sepolgen-ifgen to post python- Fix Translations- Add Domains Page to system-config-selinux - Add ability to create dbus confined applications to polgen- Split python into a separate package- Update to upstream * chcat: cut categories at arbitrary point (25) from Dan Walsh * semodule: use new interfaces in libsemanage for compressed files from Dan Walsh * audit2allow: string changes for usage- Don't error out when removing a non existing module- fix audit2allow man page- Fix Japanese translations- Change md5 to hashlib.md5 in sepolgen- Rebuild for Python 2.6- Fix error checking in restorecond, for inotify_add_watch- Update to upstream * semanage: use semanage_mls_enabled() from Stephen Smalley.- Rebuild for Python 2.6- Update to upstream * fcontext add checked local records twice, fix from Dan Walsh.- Update to upstream * Allow local file context entries to override policy entries in semanage from Dan Walsh. * Newrole error message corrections from Dan Walsh. * Add exception to audit2why call in audit2allow from Dan Walsh.- add compression- Move the usermode-gtk requires to the -gui subpackage.- Fix traceback in audit2why- Make GUI use translations- Fix typo in man page- Handle selinux disabled correctly - Handle manipulation of fcontext file correctly- Add usermode-gtk requires- Allow addition of local modifications of fcontext policy.- Fix system-config-selinux booleanspage throwing and exception - Update po files- Fix text in newrole - Fix revertbutton on booleans page in system-config-selinux- Change semodule calls for libsemanage- Update to upstream * Update po files from Dan Walsh.- Fix semanage help display - Update to upstream * fixfiles will now remove all files in /tmp and will check for unlabeled_t in /tmp and /var/tmp from Dan Walsh. * add glob support to restorecond from Dan Walsh. * allow semanage to handle multi-line commands in a single transaction from Dan Walsh.- Only call gen_requires once in sepolgen- Change Requires line to gnome-python2-gnome - Fix spelling mistakes - Require libselinux-utils- Add node support to semanage- Fix fixfiles to correct unlabeled_t files and remove .? files- Add glob support to restorecond so it can check every file in the homedir- Update to upstream * Merged semanage node support from Christian Kuester.- Add require libsemanage-python- Add missing html_util.py file- Fixes for multiple transactions- Allow multiple transactions in one semanage command- Update to upstream * Add support for boolean files and group support for seusers from Dan Walsh. * Ensure that setfiles -p output is newline terminated from Russell Coker.- Allow semanage user to add group lists % groupname- Fix help- Update to upstream * Change setfiles to validate all file_contexts files when using -c from Stephen Smalley.- Fix boolean handling - Upgrade to latest sepolgen - Update po patch- Additial cleanup of boolean handling for semanage- Handle ranges of ports in gui- Fix indent problems in seobject- Add lockdown wizard - Allow semanage booleans to take an input file an process lots of booleans at once.- Default prefix to "user"- Remove semodule use within semanage - Fix launching of polgengui from toolbar- Update to upstream * Fix audit2allow generation of role-type rules from Karl MacMillan.- Fix spelling of enforcement- Fix sepolgen/audit2allow handling of roles- Fix sepolgen-ifgen processing- Add deleteall to semanage permissive, cleanup error handling- Complete removal of rhpl requirement- Add semanage permissive *- Fix fixfiles to cleanup /tmp and /var/tmp- Fix listing of types in gui- Update to upstream * Remove security_check_context calls for prefix validation from semanage. * Change setfiles and restorecon to not relabel if the file already has the correct context value even if -F/force is specified.- Remove /usr/share/locale/sr@Latn/LC_MESSAGES/policycoreutils.mo- Add rm -rf /tmp/gconfd-* /tmp/pulse-* /tmp/orbit-* to fixfiles restore - So that mislabeled files will get removed on full relabel- Make restorecond not start by default - Fix polgengui to allow defining of confined roles. - Add patches from Lubomir Rintel * Add necessary runtime dependencies on setools-console for -gui * separate stderr when run seinfo commands - Update to upstream * Update semanage man page for booleans from Dan Walsh. * Add further error checking to seobject.py for setting booleans.- Uninvasive (ie no string or widget changes) HIG approximations in selinux-polgenui- Move s-c-selinux to the right menu- Fix boolean descriptions - Fix semanage man page- Don't use prefix in gui- Update to upstream * Update audit2allow to report dontaudit cases from Dan Walsh. * Fix semanage port to use --proto from Caleb Case.- Update to upstream * Fix for segfault when conf file parse error occurs.- Don't show tabs on polgengui- Update to upstream * Merged fix fixfiles option processing from Vaclav Ovsik. - Added existing users, staff and user_t users to polgengui- Add messages for audit2allow DONTAUDIT- Add ability to transition to roles via polgengui- Update to upstream * Make semodule_expand use sepol_set_expand_consume_base to reduce peak memory usage.- Update to upstream * Merged audit2why fix and semanage boolean --on/--off/-1/-0 support from Dan Walsh. * Merged a second fixfiles -C fix from Marshall Miller.- Don't initialize audit2allow for audit2why call. Use default - Update to upstream * Merged fixfiles -C fix from Marshall Miller.- Update to upstream * Merged audit2allow cleanups and boolean descriptions from Dan Walsh. * Merged setfiles -0 support by Benny Amorsen via Dan Walsh. * Merged fixfiles fixes and support for ext4 and gfs2 from Dan Walsh.- Update to upstream * Merged replacement for audit2why from Dan Walsh.- Cleanup fixfiles -f message in man page- Update to upstream * Merged update to chcat, fixfiles, and semanage scripts from Dan Walsh. * Merged sepolgen fixes from Dan Walsh.- handle files with spaces on upgrades- Add support in fixfiles for ext4 ext4dev and gfs2- Allow files with spaces to be used by setfiles- Add descriptions of booleans to audit2allow- Update to upstream * Merged support for non-interactive newrole command invocation from Tim Reed.- Change to use selinux bindings to audit2why- Fix fixfiles to handle no args- Fix roles output when creating a module- Handle files with spaces in fixfiles- Catch SELINUX_ERR with audit2allow and generate policy- Make sepolgen set error exit code when partial failure - audit2why now checks booleans for avc diagnosis- Update to upstream * Update Makefile to not build restorecond if /usr/include/sys/inotify.h is not present- Fix sepolgen to be able to parse Fedora 9 policy Handle ifelse statements Handle refpolicywarn inside of define Add init.if and inetd.if into parse Add parse_file to syntax error message- Add scroll bar to fcontext gui page- Add Russion Man pages- Upgrade from NSA * Drop verbose output on fixfiles -C from Dan Walsh. * Fix argument handling in fixfiles from Dan Walsh. * Enhance boolean support in semanage, including using the .xml description when available, from Dan Walsh. - Fix handling of final screen in polgengui- Fix handling of disable selinux button in gui- Upgrade from NSA * load_policy initial load option from Chad Sellers.- Don't show error on missing policy.xml- GUI Enhancements - Fix cgi generation - Use more patterns- Remove codec hacking, which seems to be fixed in python- Fix typo - Change to upstream minimal privledge interfaces- Fix fixfiles argument parsing- Fix File Labeling add- Fix semanage to handle state where policy.xml is not installed- Remove -v from restorecon in fixfiles- Fix filter and search capabilities, add wait cursor- Translate booleans via policy.xml - Allow booleans to be set via semanage- Require use of selinux-policy-devel- Validate semanage fcontext input - Fix template names for log files in gui- Fix template to generate correct content- Fix consolekit link to selinux-polgengui- Fix the generation templates- Fix enable/disable audit messages- Add booleans page- Lots of updates to gui- Remove no.po - Update to upstream * Fix semodule option handling from Dan Walsh. * Add deleteall support for ports and fcontexts in semanage from Dan Walsh.- Fix semodule parameter checking- Update to upstream * Add genhomedircon script to invoke semodule -Bn from Dan Walsh. - Add deleteall for ports and fcontext- Update to upstream * Update semodule man page for -D from Dan Walsh. * Add boolean, locallist, deleteall, and store support to semanage from Dan Walsh.- Add genhomedircon script to rebuild file_context for shadow-utils- Update translations- Additional checkboxes for application policy- Allow policy writer to select user types to transition to there users- Fix bug in building policy with polgengui - Creating ports correctly- Update to upstream * Improve semodule reporting of system errors from Stephen Smalley.- Show local changes with semanage- Fixed spelling mistakes in booleans defs - Update po- Update to upstream * Fix setfiles selabel option flag setting for 64-bit from Stephen Smalley.- Fix wording in policy generation tool- Fix calls to _admin interfaces- Upgrade version of sepolgen from NSA * Expand the sepolgen parser to parse all current refpolicy modules from Karl MacMillan. * Suppress generation of rules for non-denials from Karl MacMillan (take 3).- Remove bogus import libxml2- Lots of fixes for polgengui- Change Requires /bin/rpm to rpm- Bump libsemanage version for disable dontaudit - New gui features for creating admin users- Fix generated code for admin policy- Lots of fixes for role templates- Add more role_templates- Update genpolgui to add creation of user domains- Fix location of sepolgen-ifgen- Add selinux-polgengui to desktop- Cleanup spec- Update semodule man page * Fix genhomedircon searching for USER from Todd Miller * Install run_init with mode 0755 from Dan Walsh. * Fix chcat from Dan Walsh. * Fix fixfiles pattern expansion and error reporting from Dan Walsh. * Optimize genhomedircon to compile regexes once from Dan Walsh. * Fix semanage gettext call from Dan Walsh.- Update semodule man page- Update to match NSA * Disable dontaudits via semodule -D- Speed up genhomedircon by an order of magnitude by compiling regex - Allow semanage fcontext -a -t <> /path to work- Fixfiles update required to match new regex- Update booleans translations- rebuild for toolchain bug- Add requires libselinux-python- Fix fixfiles to report incorrect rpm - Patch provided by Tony Nelson- Clean up spec file- Require newer libselinux version- Fix checking for conflicting directory specification in genhomedircon- Fix spelling mistakes in GUI- Fix else path in chcat- Update to match NSA * Rebase setfiles to use new labeling interface.- Add filter to all system-config-selinux lists- Update to match NSA * Fixed setsebool (falling through to error path on success).- Update to match NSA * Merged genhomedircon fixes from Dan Walsh. * Merged setfiles -c usage fix from Dan Walsh. * Merged restorecon fix from Yuichi Nakamura. * Dropped -lsepol where no longer needed.- Fix translations code, Add more filters to gui- Fix setfiles -c to make it work- Fix french translation to not crash system-config-selinux- Fix genhomedircon to work in stage2 builds of anaconda- Update to match NSA- Fixes for polgentool templates file- Updated version of policycoreutils * Merged support for modifying the prefix via semanage from Dan Walsh. - Fixed genhomedircon to find homedirs correctly.- Updated version of policycoreutils * Merged po file updates from Dan Walsh. - Fix semanage to be able to modify prefix in user record- Fix title on system-config-selinux- Updated version of policycoreutils * Build fix for setsebool.- Updated version of policycoreutils * Merged setsebool patch to only use libsemanage for persistent boolean changes from Stephen Smalley. * Merged genhomedircon patch to use the __default__ setting from Dan Walsh. * Dropped -b option from load_policy in preparation for always preserving booleans across reloads in the kernel.- Fixes for polgengui- Updated version of policycoreutils * Merged chcat, fixfiles, genhomedircon, restorecond, and restorecon patches from Dan Walsh.- Fix genhomedircon to handle non user_u for the default user- More cleanups for gui- Fix size and use_tmp problem on gui- Fix restorecon crash- Change polgengui to a druid- Fully path script.py- Add -l flag to restorecon to not traverse file systems- Fixes for policygengui- Add polgengui- Updated version of sepolgen * Merged seobject setransRecords patch to return the first alias from Xavier Toth.- Updated version of sepolgen * Merged updates to sepolgen-ifgen from Karl MacMillan. * Merged updates to sepolgen parser and tools from Karl MacMillan. This includes improved debugging support, handling of interface calls with list parameters, support for role transition rules, updated range transition rule support, and looser matching.- Don't generate invalid context with genhomedircon- Add filter to booleans page- Fix polgen.py to not generate udp rules on tcp input- system-config-selinux should be able to run on a disabled system, - at least enough to get it enabled.- Many fixes to polgengui- Updated version of sepolgen * Merged patch to discard self from types when generating requires from Karl MacMillan.- Change location of audit2allow and sepol-ifgen to sbin - Updated version of sepolgen * Merged patch to move the sepolgen runtime data from /usr/share to /var/lib to facilitate a read-only /usr from Karl MacMillan.- Add polgen gui - Many fixes to system-config-selinux- service restorecond status needs to set exit value correctly- Fix gui- Update to upstream * Merged restorecond init script LSB compliance patch from Steve Grubb. -sepolgen * Merged better matching for refpolicy style from Karl MacMillan * Merged support for extracting interface paramaters from interface calls from Karl MacMillan * Merged support for parsing USER_AVC audit messages from Karl MacMillan.- Update to upstream -sepolgen * Merged support for enabling parser debugging from Karl MacMillan. - Add sgrupp cleanup of restorcon init script- Add Bill Nottinham patch to run restorcond condrestart in postun- Update to upstream - policycoreutils * Merged newrole O_NONBLOCK fix from Linda Knippers. * Merged sepolgen and audit2allow patches to leave generated files in the current directory from Karl MacMillan. * Merged restorecond memory leak fix from Steve Grubb. -sepolgen * Merged patch to leave generated files (e.g. local.te) in current directory from Karl MacMillan. * Merged patch to make run-tests.py use unittest.main from Karl MacMillan. * Merged patch to update PLY from Karl MacMillan. * Merged patch to update the sepolgen parser to handle the latest reference policy from Karl MacMillan.- Do not fail on sepolgen-ifgen- Update to upstream * Merged translations update from Dan Walsh. * Merged chcat fixes from Dan Walsh. * Merged man page fixes from Dan Walsh. * Merged seobject prefix validity checking from Dan Walsh. * Merged Makefile and refparser.py patch from Dan Walsh. Fixes PYTHONLIBDIR definition and error handling on interface files.- Updated newrole NONBlOCK patch- Remove Requires: %{name}-plugins- Update to upstream * Merged seobject exception handler fix from Caleb Case. * Merged setfiles memory leak patch from Todd Miller.- Cleanup man pages syntax - Add sepolgen- Update to upstream * Merged small fix to correct include of errcodes.h in semodule_deps from Dan Walsh.- Update to upstream * Merged new audit2allow from Karl MacMillan. This audit2allow depends on the new sepolgen python module. Note that you must run the sepolgen-ifgen tool to generate the data needed by audit2allow to generate refpolicy. * Fixed newrole non-pam build. - Fix Changelog and spelling error in man page- Fix audit2allow on missing translations- More chcat fixes- Change chcat to exec semodule so file context is maintained- Fix system-config-selinux ports view - Update to upstream * Fixed newrole non-pam build. * Updated version for stable branch.- Update to upstream * Merged unicode-to-string fix for seobject audit from Dan Walsh. * Merged man page updates to make "apropos selinux" work from Dan Walsh.* Merged newrole man page patch from Michael Thompson. * Merged patch to fix python unicode problem from Dan Walsh.- Fix handling of audit messages for useradd change Resolves: #222159- Update man pages by adding SELinux to header to fix apropos database Resolves: #217881- Want to update to match api - Update to upstream * Merged newrole securetty check from Dan Walsh. * Merged semodule patch to generalize list support from Karl MacMillan. Resolves: #200110- Update to upstream * Merged fixfiles and seobject fixes from Dan Walsh. * Merged semodule support for list of modules after -i from Karl MacMillan.- Update to upstream * Merged patch to correctly handle a failure during semanage handle creation from Karl MacMillan. * Merged patch to fix seobject role modification from Dan Walsh.- Stop newrole -l from working on non secure ttys Resolves: #200110- Update to upstream * Merged patches from Dan Walsh to: - omit the optional name from audit2allow - use the installed python version in the Makefiles - re-open the tty with O_RDWR in newrole- Update to upstream * Patch from Dan Walsh to correctly suppress warnings in load_policy.- Fix fixfiles script to use tty command correctly. If this command fails, it should set the LOGFILE to /dev/null Resolves: #220879- Remove hard coding of python2.4 from Makefiles- add exists switch to semanage to tell it not to check for existance of Linux user Resolves: #219421- Fix audit2allow generating reference policy - Fix semanage to manage user roles properly Resolves: #220071- Update po files - Fix newrole to open stdout and stderr rdrw so more will work on MLS machines Resolves: #216920- rebuild for python 2.5- Update po files Resolves: #216920- Update po files Resolves: #216920- Update to upstream * Patch from Dan Walsh to add an pam_acct_msg call to run_init * Patch from Dan Walsh to fix error code returns in newrole * Patch from Dan Walsh to remove verbose flag from semanage man page * Patch from Dan Walsh to make audit2allow use refpolicy Makefile in /usr/share/selinux/- Fixing the Makefile line again to build with LSPP support Resolves: #208838- Don't report errors on restorecond when file system does not support XATTRS Resolves: #217694- Fix -q qualifier on load_policy Resolves: #214827- Merge to upstream - Fix makefile line Resolves: #208838- Additional po changes - Added all booleans definitions- Upstream accepted my patches * Merged setsebool patch from Karl MacMillan. This fixes a bug reported by Yuichi Nakamura with always setting booleans persistently on an unmanaged system.- Fixes for the gui- Upstream accepted my patches- Add Amy Grifis Patch to preserve newrole exit status- Fix display of gui- Add patch by Jose Plans to make run_init use pam_acct_mgmt- More fixes to gui- Fix audit2allow to generate referene policy- Add group sort for portsPage.py - Add enable/disableaudit to modules page- Add glade file- Fix Module handling in system-config-selinux- Update to upstream * Merged newrole patch set from Michael Thompson. - Add policycoreutils-gui- No longer requires rhpl- Fix genhomedircon man page- Add newrole audit patch from sgrubb - Update to upstream * Merged audit2allow -l fix from Yuichi Nakamura. * Merged restorecon -i and -o - support from Karl MacMillan. * Merged semanage/seobject fix from Dan Walsh. * Merged fixfiles -R and verify changes from Dan Walsh.- Separate out newrole into its own package- Update to upstream * Merged newrole auditing of failures due to user actions from Michael Thompson.- Pass -i qualifier to restorecon for fixfiles -R - Update translations- Remove recursion from fixfiles -R calls - Fix semanage to verify prefix- More translations - Compile with -pie- Add translations - Fix audit2allow -l- Rebuild- Update to upstream - Change -o to take "-" for stdout- Add -h support for genhomedircon- Fix fixfiles handling of -o- Make restorecon return the number of changes files if you use the -n flag- Change setfiles and restorecon to use stderr except for -o flag - Also -o flag will now output files- Put back Erich's change- Remove recursive switch when using rpm- Fix fixfiles to handle multiple rpm and make -o work- Apply patch- Security fixes to run python in a more locked down manner - More Translations - Update to upstream * Merged fix for restorecon // handling from Erich Schubert. * Merged translations update and fixfiles fix from Dan Walsh.- Change scripts to use /usr/sbin/python- Add -i qualified to restorecon to tell it to ignore files that do not exist - Fixfiles also modified for this change- Ignore sigpipe- Fix init script and add translations- Update to upstream * Merged fix for restorecon symlink handling from Erich Schubert.- Update to upstream * Merged semanage local file contexts patch from Chris PeBenito. - Fix fixfiles log creation - More translations- Update to upstream * Merged patch from Dan Walsh with: * audit2allow: process MAC_POLICY_LOAD events * newrole: run shell with - prefix to start a login shell * po: po file updates * restorecond: bail if SELinux not enabled * fixfiles: omit -q * genhomedircon: fix exit code if non-root * semodule_deps: install man page * Merged secon Makefile fix from Joshua Brindle. * Merged netfilter contexts support patch from Chris PeBenito.- Fix audit2allow to handle reload of policy- Stop restorecond init script when selinux is not enabled- Update to upstream * Merged restorecond size_t fix from Joshua Brindle. * Merged secon keycreate patch from Michael LeMay. * Merged restorecond fixes from Dan Walsh. Merged updated po files from Dan Walsh. * Merged python gettext patch from Stephen Bennett. * Merged semodule_deps from Karl MacMillan.- Change newrole to exec a login shell to prevent suspend.- Report error when selinux not enabled in restorecond- Fix handling of restorecond- Fix creation of restorecond pidfile- Update translations - Update to new GCC- Add verbose flag to restorecond and update translations- Update to upstream * Lindent. * Merged patch from Dan Walsh with: * -p option (progress) for setfiles and restorecon. * disable context translation for setfiles and restorecon. * on/off values for setsebool. * Merged setfiles and semodule_link fixes from Joshua Brindle.- Add progress indicator on fixfiles/setfiles/restorecon- Don't use translations with matchpathcon- Prompt for selinux-policy-devel package in audit2allow- Allow setsebool to use on/off - Update translations- Update to upstream * Merged fix for setsebool error path from Serge Hallyn. * Merged patch from Dan Walsh with: * Updated po files. * Fixes for genhomedircon and seobject. * Audit message for mass relabel by setfiles.- Update audit mass relabel to only compile in when audit is installed.- Update to required versions - Update translation- Fix shell selection- Add BuildRequires for gettext* Updated fixfiles script for new setfiles location in /sbin.- Update to upstream * Merged more translations from Dan Walsh. * Merged patch to relocate setfiles to /sbin for early relabel when /usr might not be mounted from Dan Walsh. * Merged semanage/seobject patch to preserve fcontext ordering in list. * Merged secon patch from James Antill.- Fix seobject.py to not sort the file_context file. - move setfiles to /sbin- secon man page and getopt fixes. - Enable mass relabel audit, even though it doesn't work.- secon fixes for --self-exec etc. - secon change from level => sensitivity, add clearance. - Add mass relabel AUDIT patch, but disable it until kernel problem solved.- Update to upstream * Merged patch with updates to audit2allow, secon, genhomedircon, and semanage from Dan Walsh.- Fix exception in genhomedircon- Add rhpl dependancy- Add secon man page and prompt options.- Update to upstream * Fixed audit2allow and po Makefiles for DESTDIR= builds. * Merged .po file patch from Dan Walsh. * Merged bug fix for genhomedircon.- Fix exception on bad file_context- Update to upstream * Merged fix warnings patch from Karl MacMillan. * Merged patch from Dan Walsh. This includes audit2allow changes for analysis plugins, internationalization support for several additional programs and added po files, some fixes for semanage, and several cleanups. It also adds a new secon utility.- Fix genhomedircon to catch duplicate homedir problem- Add secon program - Add translations- Fix check for "msg"- Ship avc.py- Add /etc/samba/secrets.tdb to restorecond.conf - Update from upstream * Merged semanage prefix support from Russell Coker. * Added a test to setfiles to check that the spec file is a regular file.- added some missing buildrequires - added Requires: initscripts for /sbin/service- use absolute path /sbin/service- Fix audit2allow to not require ausearch. - Fix man page - Add libflashplayer to restorecond.conf- Update from upstream * Merged audit2allow fixes for refpolicy from Dan Walsh. * Merged fixfiles patch from Dan Walsh. * Merged restorecond daemon from Dan Walsh. * Merged semanage non-MLS fixes from Chris PeBenito. * Merged semanage and semodule man page examples from Thomas Bleher.- Clean up reference policy generation in audit2allow- Add IN_MOVED_TO to catch renames- make restorecond only ignore non directories with lnk > 1- Make audit2allow translate dontaudit as well as allow rules - Update from upstream * Merged semanage labeling prefix patch from Ivan Gyurdiev.- Fix audit2allow to retrieve dontaudit rules- Open file descriptor to make sure file does not change from underneath.- Fixes for restorecond attack via symlinks - Fixes for fixfiles- Restorecon has to handle suspend/resume- Update to upstream- Add restorecond- Remove prereq- Fix audit2allow to generate all rules- Minor fixes to chcat and semanage- Add missing setsebool man page- Change audit2allow to use devel instead of refpolicy- Update from upstream * Merged semanage bug fix patch from Ivan Gyurdiev. * Merged improve bindings patch from Ivan Gyurdiev. * Merged semanage usage patch from Ivan Gyurdiev. * Merged use PyList patch from Ivan Gyurdiev.- Update from upstream * Merged newrole -V/--version support from Glauber de Oliveira Costa. * Merged genhomedircon prefix patch from Dan Walsh. * Merged optionals in base patch from Joshua Brindle.- bump again for double-long bug on ppc(64)- Fix auditing to semanage - Change genhomedircon to use new prefix interface in libselinux- Update from upstream * Merged seuser/user_extra support patch to semodule_package from Joshua Brindle. * Merged getopt type fix for semodule_link/expand and sestatus from Chris PeBenito. - Fix genhomedircon output- rebuilt for new gcc4.1 snapshot and glibc changes- Add auditing to semanage- Update from upstream * Merged clone record on set_con patch from Ivan Gyurdiev.- Update from upstream * Merged genhomedircon fix from Dan Walsh. * Merged seusers.system patch from Ivan Gyurdiev. * Merged improve port/fcontext API patch from Ivan Gyurdiev. * Merged genhomedircon patch from Dan Walsh.- Update from upstream * Merged newrole audit patch from Steve Grubb. * Merged seuser -> seuser local rename patch from Ivan Gyurdiev. * Merged semanage and semodule access check patches from Joshua Brindle.- Add a default of /export/home- Cleanup of the patch- Correct handling of symbolic links in restorecon- Added translation support to semanage - Update from upstream * Modified newrole and run_init to use the loginuid when supported to obtain the Linux user identity to re-authenticate, and to fall back to real uid. Dropped the use of the SELinux user identity, as Linux users are now mapped to SELinux users via seusers and the SELinux user identity space is separate. * Merged semanage bug fixes from Ivan Gyurdiev. * Merged semanage fixes from Russell Coker. * Merged chcat.8 and genhomedircon patches from Dan Walsh.- Fix genhomedircon to work on MLS policy- Update to match NSA * Merged chcat, semanage, and setsebool patches from Dan Walsh.- Fixes for "add"-"modify" error messages - Fixes for chcat- Add management of translation file to semaange and seobject- Fix chcat -l -L to work while not root- Update to match NSA * Merged semanage fixes from Ivan Gyurdiev. * Merged semanage fixes from Russell Coker. * Merged chcat, genhomedircon, and semanage diffs from Dan Walsh.- Update chcat to manage user categories also- Add check for root for semanage, genhomedircon- Add ivans patch- Update to match NSA * Merged newrole cleanup patch from Steve Grubb. * Merged setfiles/restorecon performance patch from Russell Coker. * Merged genhomedircon and semanage patches from Dan Walsh. * Merged remove add_local/set_local patch from Ivan Gyurdiev.- Fixes for mls policy- Update semanage and split out seobject - Fix labeleing of home_root- Update to match NSA * Added filename to semodule error reporting.- Update to match NSA * Merged genhomedircon and semanage patch from Dan Walsh. * Changed semodule error reporting to include argv[0].- Update to match NSA * Merged semanage getpwnam bug fix from Serge Hallyn (IBM). * Merged patch series from Ivan Gyurdiev. This includes patches to: - cleanup setsebool - update setsebool to apply active booleans through libsemanage - update semodule to use the new semanage_set_rebuild() interface - fix various bugs in semanage * Merged patch from Dan Walsh (Red Hat). This includes fixes for restorecon, chcat, fixfiles, genhomedircon, and semanage.- Fix restorecon to not say it is changing user section when -vv is specified- Fixes for semanage, patch from Ivan and added a test script- Fix getpwnam call- Anaconda fixes- Turn off try catch block to debug anaconda failure- More fixes for chcat- Add try catch for files that may not exists- Remove commands from genhomedircon for installer- Fix genhomedircon to work in installer - Update to match NSA * Merged patch for chcat script from Dan Walsh.- More fixes to chcat- rebuilt- Update to match NSA * Merged fix for audit2allow long option list from Dan Walsh. * Merged -r option for restorecon (alias for -R) from Dan Walsh. * Merged chcat script and man page from Dan Walsh.- Update to match NSA - Add gfs support- Update to match NSA - Add chcat to policycoreutils, adding +/- syntax `- Require new version of libsemanage- Update to match NSA * Changed genhomedircon to warn on use of ROLE in homedir_template if using managed policy, as libsemanage does not yet support it.- Update to match NSA * Merged genhomedircon bug fix from Dan Walsh. * Revised semodule* man pages to refer to checkmodule and to include example sections.- Update to match NSA * Merged audit2allow --tefile and --fcfile support from Dan Walsh. * Merged genhomedircon fix from Dan Walsh. * Merged semodule* man pages from Dan Walsh, and edited them. * Changed setfiles to set the MATCHPATHCON_VALIDATE flag to retain validation/canonicalization of contexts during init.- Update to match NSA * Changed genhomedircon to always use user_r for the role in the managed case since user_get_defrole is broken. - Add te file capabilities to audit2allow - Add man pages for semodule- Update to match NSA * Merged sestatus, audit2allow, and semanage patch from Dan Walsh. * Fixed semodule -v option.- Update to match NSA * Merged audit2allow python script from Dan Walsh. (old script moved to audit2allow.perl, will be removed later). * Merged genhomedircon fixes from Dan Walsh. * Merged semodule quieting patch from Dan Walsh (inverts default, use -v to restore original behavior).- Audit2allow * Add more error checking * Add gen policy package * Add gen requires- Update to match NSA * Merged genhomedircon rewrite from Dan Walsh. - Rewrite audit2allow to python- Fix genhomedircon to work with non libsemanage systems- Patch genhomedircon to use libsemanage.py stuff- Update to match NSA * Merged setsebool cleanup patch from Ivan Gyurdiev.- Fix genhomedircon to use seusers file, temporary fix until swigified semanage* Added -B (--build) option to semodule to force a rebuild. * Reverted setsebool patch to call semanage_set_reload_bools(). * Changed setsebool to disable policy reload and to call security_set_boolean_list to update the runtime booleans. * Changed setfiles -c to use new flag to set_matchpathcon_flags() to disable context translation by matchpathcon_init().- Update to match NSA * Changed setfiles for the context canonicalization support. * Changed setsebool to call semanage_is_managed() interface and fall back to security_set_boolean_list() if policy is not managed. * Merged setsebool memory leak fix from Ivan Gyurdiev. * Merged setsebool patch to call semanage_set_reload_bools() interface from Ivan Gyurdiev.- Update to match NSA * Merged setsebool patch from Ivan Gyurdiev. This moves setsebool from libselinux/utils to policycoreutils, and rewrites it to use libsemanage for permanent boolean changes.- Rebuild to use latest libselinux, libsemanage, and libsepol- Update to match NSA * Merged semodule support for reload, noreload, and store options from Joshua Brindle. * Merged semodule_package rewrite from Joshua Brindle.- Update to match NSA * Cleaned up usage and error messages and releasing of memory by semodule utilities. * Corrected error reporting by semodule. * Updated semodule_expand for change to sepol interface. * Merged fixes for make DESTDIR= builds from Joshua Brindle.- Update to match NSA * Updated semodule_package for sepol interface changes.- Update to match NSA * Updated semodule_expand/link for sepol interface changes.- Update to match NSA * Merged non-PAM Makefile support for newrole and run_init from Timothy Wood.- Update to match NSA * Updated semodule_expand to use get interfaces for hidden sepol_module_package type. * Merged newrole and run_init pam config patches from Dan Walsh (Red Hat). * Merged fixfiles patch from Dan Walsh (Red Hat). * Updated semodule for removal of semanage_strerror.- Fix run_init.pamd and spec file- Update to match NSA * Updated semodule_link and semodule_expand to use shared libsepol. Fixed audit2why to call policydb_init prior to policydb_read (still uses the static libsepol).- Update to match NSA * Updated for changes to libsepol. Changed semodule and semodule_package to use the shared libsepol. Disabled build of semodule_link and semodule_expand for now. Updated audit2why for relocated policydb internal headers, still needs to be converted to a shared lib interface.- Update newrole pam file to remove pam-stack - Update run_init pam file to remove pam-stack- Update to match NSA * Fixed warnings in load_policy. * Rewrote load_policy to use the new selinux_mkload_policy() interface provided by libselinux.- Rebuild with newer libararies- Update to match NSA * Merged patch to update semodule to the new libsemanage API and improve the user interface from Karl MacMillan (Tresys). * Modified semodule for the create/connect API split.- More fixes to stop find from following nfs paths- Update to match NSA * Merged run_init open_init_pty bug fix from Manoj Srivastava (unblock SIGCHLD). Bug reported by Erich Schubert.- Update to match NSA * Merged error shadowing bug fix for restorecon from Dan Walsh. * Merged setfiles usage/man page update for -r option from Dan Walsh. * Merged fixfiles -C patch to ignore :s0 addition on update to a MCS/MLS policy from Dan Walsh.- Add chcat script for use with chcon.- Fix restorecon to exit with error code* Updated version for release.- Add prereq for mount command- Update to match NSA * Changed setfiles -c to translate the context to raw format prior to calling libsepol.- Use new version of libsemange and require it for install- Ignore s0 in file context- Update to match NSA * Merged patch for fixfiles -C from Dan Walsh.- Update to match NSA * Merged fixes for semodule_link and sestatus from Serge Hallyn (IBM). Bugs found by Coverity.- Fix fixfiles to call sort -u followed by sort -d.- Change fixfiles to ignore /home directory on updates- Update to match NSA * Merged patch to move module read/write code from libsemanage to libsepol from Jason Tang (Tresys).- Update to match NSA * Changed semodule* to link with libsemanage.- Update to match NSA * Merged restorecon patch from Ivan Gyurdiev.- Update to match NSA * Merged load_policy, newrole, and genhomedircon patches from Red Hat.- Update to match NSA * Merged loadable module support from Tresys Technology.- Update to match NSA * Updated version for release.- Fix Ivan's patch for user role changes- Add Ivan's patch for user role changes in genhomedircon- Fix warning message on reload of booleans- Update to match NSA * Merged fixfiles and newrole patch from Dan Walsh. * Merged audit2why man page from Dan Walsh.- Add call to pam_acct_mgmt in newrole.- Update to match NSA * Extended audit2why to incorporate booleans and local user settings when analyzing audit messages.- Update to match NSA * Updated audit2why for sepol_ prefixes on Flask types to avoid namespace collision with libselinux, and to include now.- Fix fixfiles to accept -f - Update to match NSA * Added audit2why utility.- Change -f flag in fixfiles to remove stuff from /tmp - Change -F flag to pass -F flag to restorecon/fixfiles. (IE Force relabel).- Update to match NSA * Fixed signed/unsigned pointer bug in load_policy. * Reverted context validation patch for genhomedircon.- Update to match NSA * Reverted load_policy is_selinux_enabled patch from Dan Walsh. Otherwise, an initial policy load cannot be performed using load_policy, e.g. for anaconda.- remove is_selinux_enabled check from load_policy (Bad idea)- Update to version from NSA * Merged load_policy is_selinux_enabled patch from Dan Walsh. * Merged restorecon verbose output patch from Dan Walsh. * Merged setfiles altroot patch from Chris PeBenito.- Don't run load_policy on a non SELinux kernel.- Update to version from NSA * Merged context validation patch for genhomedircon from Eric Paris. - Fix verbose output of restorecon- Update to version from NSA * Changed setfiles -c to call set_matchpathcon_flags(3) to turn off processing of .homedirs and .local.- Update to released version from NSA * Merged rewrite of genhomedircon by Eric Paris. * Changed fixfiles to relabel jfs since it now supports security xattrs (as of 2.6.11). Removed reiserfs until 2.6.12 is released with fixed support for reiserfs and selinux.- Update to released version from NSA - Patch genhomedircon to handle passwd in different places.- Fix genhomedircon to not put bad userad error in file_contexts.homedir- Cleanup error reporting* Merged load_policy and genhomedircon patch from Dan Walsh.- Fix genhomedircon to add extr "\n"- Fix genhomedircon to handle blank users- Update to latest from NSA - Add call to libsepol- Fix genhomedircon to handle root - Fix fixfiles to better handle file system types- Fix genhomedircon to handle spaces in SELINUXPOLICYTYPE- Update to latest from NSA * Merged several fixes from Ulrich Drepper.- Apply Uli patch * The Makefiles should use the -Wall option even if compiled in beehive * Add -W, too * use -Werror when used outside of beehive. This could also be used unconditionally * setfiles/setfiles.c: fix resulting warning * restorecon/restorecon.c: Likewise * run_init/open_init_pty.c: argc hasn't been checked, the program would crash if called without parameters. ignore the return value of nice properly. * run_init: don't link with -ldl lutil * load_policy: that's the bad bug. pointer to unsigned int is passed, size_t is written to. fails on 64-bit archs * sestatus: signed vs unsigned problem * newrole: don't link with -ldl- Update to latest from NSA * Changed load_policy to fall back to the original policy upon an error from sepol_genusers().- Only restorecon on ext[23], reiser and xfs- Update to latest from NSA * Merged new genhomedircon script from Dan Walsh. * Changed load_policy to call sepol_genusers().- Remove Red Hat rhpl usage - Add back in original syntax - Update man page to match new syntax- Fix genhomedircon regular expression - Fix exclude in restorecon- Trap failure on write - Rewrite genhomedircon to generate file_context.homedirs - several passes- Update from NSA * Changed relabel Makefile target to use restorecon.- Update from NSA * Merged restorecon patch from Dan Walsh.- Update from NSA * Merged further change to fixfiles -C from Dan Walsh. * Merged updated fixfiles script from Dan Walsh. - Fix error handling of restorecon- Fix sestatus for longer booleans- More cleanup of fixfiles sed patch * Merged further patches for restorecon/setfiles -e and fixfiles -C.- More cleanup of fixfiles sed patch- More cleanup of fixfiles sed patch - Upgrade to latest from NSA * Merged patch for open_init_pty from Manoj Srivastava.- More cleanup of sed patch - Upgrade to latest from NSA * Merged updated fixfiles script from Dan Walsh. * Merged updated man page for fixfiles from Dan Walsh and re-added unzipped. * Reverted fixfiles patch for file_contexts.local; obsoleted by setfiles rewrite. * Merged error handling patch for restorecon from Dan Walsh. * Merged semi raw mode for open_init_pty helper from Manoj Srivastava. * Rewrote setfiles to use matchpathcon and the new interfaces exported by libselinux (>= 1.21.5).- Fix fixfiles patch - Upgrade to latest from NSA * Prevent overflow of spec array in setfiles. - Add diff comparason between file_contexts to fixfiles - Allow restorecon to give an warning on file not found instead of exiting- Upgrade to latest from NSA * Merged newrole -l support from Darrel Goeddel (TCS). - Fix genhomedircon STARTING_UID- Upgrade to latest from NSA * Merged fixfiles patch for file_contexts.local from Dan Walsh.- Temp file needs to be created in /etc/selinux/POLICYTYPE/contexts/files/ directory.- Upgrade to latest from NSA * Fixed restorecon to not treat errors from is_context_customizable() as a customizable context. * Merged setfiles/restorecon patch to not reset user field unless -F option is specified from Dan Walsh. * Merged open_init_pty helper for run_init from Manoj Srivastava. * Merged audit2allow and genhomedircon man pages from Manoj Srivastava.- Don't change user componant if it is all that changed unless forced. - Change fixfiles to concatinate file_context.local for setfiles- Update to latest from NSA- Fix restorecon segfault- Update to latest from NSA * Merged fixfiles rewrite from Dan Walsh. * Merged restorecon patch from Dan Walsh.- Update to latest from NSA * Merged fixfiles and restorecon patches from Dan Walsh. * Don't display change if only user part changed.- Fix fixfiles handling of rpm - Fix restorecon to not warn on symlinks unless -v -v - Fix output of verbose to show old context as well as new context- Update to latest from NSA * Changed restorecon to ignore ENOENT errors from matchpathcon. * Merged nonls patch from Chris PeBenito.- Update to latest from NSA * Removed fixfiles.cron. * Merged run_init.8 patch from Dan Walsh.- Fix run_init.8 to refer to correct location of initrc_context- Upgrade to latest from NSA- Add code to sestatus to output the current policy from config file- Patch audit2allow to return self and no brackets if only one rule- Update to latest from NSA - Eliminate fixfiles.cron- Only run fixfiles.cron once a week, and eliminate null message- Update with NSA * Added -l option to setfiles to log changes via syslog. * Merged -e option to setfiles to exclude directories. * Merged -R option to restorecon for recursive descent.- Add -e (exclude directory) switch to setfiles - Add syslog to setfiles- Add -R (recursive) switch to restorecon.- Change to only display to terminal if tty is specified- Only display to stdout if logfile not specified- Add Steve Grubb patch to cleanup log files.- Add optargs - Update to match NSA- Add fix to get cdrom info from /proc/media in fixfiles.- Add Steve Grub patches for * Fix fixfiles.cron MAILTO * Several problems in sestatus- Add -q (quiet) qualifier to load_policy to not report warnings- Add requires for libsepol >= 1.1.1- Update to latest from upstream- Update to latest from upstream - Includes Colin patch for verifying file_contexts- Update to latest from upstream- Update to latest from upstream- Add Man page for load_policy- new version from NSA uses libsepol- Fix genhomedircon join command- Latest from NSA- Change fixfiles to not change when running a check- Fix restorecon getopt call to stop hang on IBM Arches- Only mail files less than 100 lines from fixfiles.cron - Add Russell's fix for genhomedircon- Latest from NSA- Add ro warnings- Latest from NSA - Fix fixfiles.cron to delete outfile- Fix fixfiles.cron to not run on non SELinux boxes - Fix several problems in fixfiles and fixfiles.cron- Update from NSA - Add cron capability to fixfiles- Update from NSA- Fix fixfiles to handle no rpm file on relabel- Update latest from NSA - Add -o option to setfiles to save output of any files with incorrect context.- Add rpm support to fixfiles - Update restorecon to add file input support- Update with NSA Latest- rebuilt- Fix run_init to use policy formats- Update from NSA- Change location of file_context file- Change to use /etc/sysconfig/selinux to determine location of policy files- Update to latest from NSA - Change fixfiles to prompt before deleteing /tmp files- have restorecon ingnore <> - Hand matchpathcon the file status- Update to match NSA- Move location of log file to /var/tmp- Better grep command for bind- Eliminate bind and context mounts- update to match NSA- Log fixfiles to the /tmp directory- Add patch to fall back to authenticating via uid if the current user's SELinux user identity is the default identity - Add BuildRequires pam-devel- Add man page, thanks to Richard Halley- Upgrade to latest from NSA- Update with latest from gentoo and NSA- Check return codes in sestatus.c- Fix sestatus to not double free - Fix sestatus.conf to be unix format- Warn on setfiles failure to relabel.- Updated version of sestatus- Fix fixfiles to checklabel properly- add sestatus- Change free call to freecon - Cleanup- Remove setfiles-assoc patch - Fix restorecon to not crash on missing dir- Eliminate trailing / in restorecon- Add Verbosity check- Change restorecon to not follow symlinks. It is too difficult and confusing - to figure out the file context for the file pointed to by a symlink.- Fix restorecon- Read restorecon patch- Change genhomedircon to take POLICYSOURCEDIR from command line- Add checkselinux - move fixfiles and restorecon to /sbin- Restore patch of genhomedircon- Add setfiles-assoc patch to try to freeup memory use- Add fixlabels- Update to latest from NSA- Increase the size of buffer accepted by setfiles to BUFSIZ.- genhomedircon should complete even if it can't read /etc/default/useradd- fix restorecon to relabel unlabled files.- Add genhomedircon from tresys - Fixed patch for restorecon- exit out when selinux is not enabled- Fix minor bugs in restorecon- Add restorecon c program- Update to latest tarball from NSA- Add sort patch- rebuilt- remove mods to run_init since init scripts don't require it anymore- fix genhomedircon not to return and error- add setfiles quiet patch- add checkcon to verify context match file_context- fix command parsing restorecon- Add restorecon- Update to latest NSA 1.4- Change run_init.console to run as run_init_t- Remove dietcc since load_policy is not in mkinitrd - Change to use CONSOLEHELPER flag- Don't authenticate run_init when used with consolehelper- Add run_init consolehelper link- Add russell spead up patch to deal with file path stems- Build load_policy with diet gcc in order to save space on initrd- Update with NSA latest- remove i18n - Temp remove gtk support- Remove wnck requirement- Add gtk support to run_init- Add internationalization- Initial version csdadeesfifrhuitjakonlplptrusisvtrukzhzh2.9-25.el82.9-25.el82.9-25.el8 sandbox.build-id88771689c27d97d79dfc5adcfe1d529f520eca34seunshareselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.moselinux-sandbox.mosandbox.5.gzseunshare.8.gzsandbox.5.gzseunshare.8.gzsandboxX.shstart/etc/sysconfig//usr/lib//usr/lib/.build-id//usr/lib/.build-id/88//usr/sbin//usr/share/locale/cs/LC_MESSAGES//usr/share/locale/da/LC_MESSAGES//usr/share/locale/de/LC_MESSAGES//usr/share/locale/es/LC_MESSAGES//usr/share/locale/fi/LC_MESSAGES//usr/share/locale/fr/LC_MESSAGES//usr/share/locale/hu/LC_MESSAGES//usr/share/locale/it/LC_MESSAGES//usr/share/locale/ja/LC_MESSAGES//usr/share/locale/ko/LC_MESSAGES//usr/share/locale/nl/LC_MESSAGES//usr/share/locale/pl/LC_MESSAGES//usr/share/locale/pt_BR/LC_MESSAGES//usr/share/locale/ru/LC_MESSAGES//usr/share/locale/si/LC_MESSAGES//usr/share/locale/sv/LC_MESSAGES//usr/share/locale/tr/LC_MESSAGES//usr/share/locale/uk/LC_MESSAGES//usr/share/locale/zh_CN/LC_MESSAGES//usr/share/locale/zh_TW/LC_MESSAGES//usr/share/man/man5//usr/share/man/man8//usr/share/man/ru/man5//usr/share/man/ru/man8//usr/share/sandbox/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-redhat-linux-gnuASCII textdirectorysetuid ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=88771689c27d97d79dfc5adcfe1d529f520eca34, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)troff or preprocessor input, UTF-8 Unicode text, with very long lines (gzip compressed data, max compression, from Unix)Bourne-Again shell script, ASCII text executablePython script, ASCII text executable RR RR R RRRRRcap_dac_override,cap_fowner,cap_setuid,cap_setpcap,cap_sys_admin,cap_sys_nice=eputf-8c56244cc53b8667f40d9a539a9f6041ae809a87c46c528fb0aacf2d712a548e3?07zXZ !#,Xn/] b2u Q{LY09G%_=[ݡyQ#׋kB) MLK뢽f4\o{kѧn6Le:*t뒯eרX^{*gl@^H}oyLhNTO֨@f&#*H>T-xتA~锗BiF-/_}~rrP!qf\C-2Kl(kkOxB(02vZwm}js`4 C6s'L&K+T7W?۬tmD34Njh2>Ge򄴭ĽO1=j9b{:=<\`Kש7e;*gKMʯnD rN땝^bGSKqZ}|!;N~( ]OJ5!MR'_K$ b,qPєeC|z/S{>J.TVu=z[hR>olh2qT6sP&.I2EX \B6ag$I w ]DFŏ75)܆ @XOI\!XMQP5H[̈́xZ'DC|`KWK+zl=)d5QkuVU6c,WlukEu(H.ߣeg߱y g 4' GQٷ lu{J Lihu >&Ř0Ƞ3Z"m gImuM!yb[ƇwWRr܋aV- 9=-K6.U+0~1`+[8您Aѡ7='lwѮPuԖhaԉi{ #|\_jDYQK}K[19+}yЇAP`-`b ̒i_#PFZe@H5HO1ߚ1SCh`|Z>Iu &gS'ȉT"@˱Gm*⧖No_$vûrj[D;〷eέ8ͻ K0ߊہI9azx!|R^ 45t⟺aXA4eۥ7>'-FyOx|L"7;WV%jZm  gFA=Q1yQ15dBʅuG1l5\KDi=:5)K(:/gs]9TN$9nZLY)/jUB1 g+ʌG$[ ='Tf)!})nj2sR mL)@x<7eПx4GP[c8n Kx+{Amh<1{MQF4~iw,ӛ?mG,Y eˏ뜔g*G-Ix4 l\t[q2xiNIi}y0CLI?]G3 Rj#l7/%M /]Vg}NTQów~hk;_*BHWٳ" \V`fՀ&Txq;op'Q+G5shh`2ﴩhxBE/'piƎOv0]%\",~h1~ n) Nx:˫Vw08AAډjйx#o> 9ڧl5{FH#ǃRkãp\lS3i^T?KίTn*?7mK =!&d?ZTe,-%7x{O~؆z_g?T:Xhr਺ga%-pނC86j@“Y/1MjYPD,\/8e-uAny0," {8)lYP>^sɋ -`Ya% r[#Ͼ>p4j,v%kBe?!{9{;K人'Wo͐x61 'jhQ6Nґq ^&Jjhgm†|xtDmWV\O߉J },Uík k2]h]=v"DBn(DE77bjtr=]X\}qk+r/hũ2ob"Z~v` ,3v}BiލG]IWu҂}\: F[u<9Ԁ8Oqp7c2 sR^jѰO}W0?,5q,;^-K?7:,:e?P /%ZIDvlq#Uu9HrX`? VSMM;# 3g)&r+J` Mh?<ulwln%@)zIJ}ەu.857Eo\-繺!ʦƀD|!#ϑI;PK2Eq6×L*!@m O4as ^LP(!fNT!AuR~@:@>/ }@F0s3j%^GPj|h;>Rd/^ߟKyh,[[;͠S?OZnNhfI"3Od/u Q1ɰhᆡQ$2sIL!J7u>ߤ (l[X\7cJlgZs%SXxF zyv _ =;n5),a1")(jm-?m@"!X71U,q{J "2. ]xia;k~Um33̪~zR&m~A9 b" 8Cq"=9mb\TN׶_A_n[#0_޿ጟ"/ 9dAVsBަ^-h=>YlvFAkb%@d>C$Av7;4JPyU\X sV0 76;}fU1nB 7k7b`5VodI h:/cznOc#xoڷSa@- ۲Q. HY6.Ri&{hAjԘoUo߆*iRxS s\YɝYvtøyQ5AT*fhkC4#Uu3h0op/D+a4b5d2tsO^^n[pbO: Дⴉů&=]<+ jt=o \K~ s~Z.>cUA(!ՒvetvȠpU;}n&ZVmѪ뫤0(Ee @|!@Sb=j4vO2ehm=m]6{L%C$t5@:ɒ  Sby8$M!kG mt^-z$܌ϺQ.`Hl^Q?yp[׬4<7#9k'N܌;|o;RO_w !?WΆ5Σt['&b%*k㓹1}$F,^(&rb0 fk-D(蘆QI@:aP44tfTM'oF Cib%>fa(gڔ\= R`%΅ 2uG18Uo\vZʄkJ(̃OgQJ9;"rҹ SFaMJ؝mk6*;Waup Eܶ95z׳z-Mkܧr 4Umr֟{(7xN:U'0wg5s=1׿/J9IA֥o!Wր别; ]~C3w 3g$=^lhîvdbfNh35WIƏY4hEvJ|fA:tu +(x/Q& znsE<|_vlT8rYgh 58o G&`J`h4Ȗ~,ȏ>X>CO8|1բ^3WڏN;H.'}ɠ8{FvW_%^Lj *O)&s 8svҵ~X8!@BCbC! t+1޺+^m|SJ[zF*XZ+>L> +ۑBЅ<"ʧ Ի?.<^TW#)`(ׇwN '$ۑG9!|K Uk5HDPr)&|Ś\`MQ Fk*p` h̷1[tlR}aIr A51ƌג32I*ӝ:rRA[Ϟ̋u3Jΐ ?rCSSRs 9R͌2~8w:2Xhc :9b$2l"LձQNFqL$)n/EAAV70'<nDQmbH0goX"gbQӎՄ}F@ONNR@yC1_m ^׋%+z qd͕ Kwr˅'k-4r"R)[DGk` G Fk6s3 _ Je#֝O; u#!niZ#Q!3wi,GpT\:FިVd֋R38Ɍbt=Y檆TFwܥ[^C#(1׾98dLċDGl};v9jr?Zn tXR@W}8a~ȫ:5讏<,wTT, o/B{J`zSPf@&8_G0I ƊkW>XRȟiVغPk9Jv)oZXӎW_'!!pAqQX(#**h)!byj*_NxRN-6HDGAú.'7*KүҬ&81?2̓}Ch?h_1S"1oy@bï%+;md MClbPu>}DKc-t䗉{iWZb}ARUirr*+1! ^.GίFO83v50[lovD N},h"u hco_$ Y_3<ߙ߾?"L7}z4 [(*ˎa&vBQh^^r 4oTF +}iVb4doȃ PR=paV?o26yt !T|pe@ | joÍbɦ͙oc_7gK/z-}G/FW{f!&u~MvplI9 ;͏éWdfv/8xb7s_/_^P+ #rLgVLP4\.l8LU7G~qRu<+}N!QzmmBvn+1/"^ݵP)S6+YK0jW[BGzmy=(VaM2ew;zx& *-Vv&.R(t,)_Ƒ(Uz/u3ͩlrH*mfŶxc̐EcRS*hzkm!Y^&"TPa.c.Pw.ўCڊ mj]_2j Xtbj08k &^ŻVH4yl=4\ Ƽ`ϱ Ԕ晻۞R茢9E /߷ܣ FP`I;iw]53X5=HTN'C~cI"!*[*/+)=f2B*FZ}qx+ A2.j"nkکRnH#{ $r4byy;O }N/>>|,JD[n!;)뛙 щDH祜 Є =n[ ?J6jI`·9e:;"~ !#Šmn RXOw@Y蘍̢k})>%=;CE' 4{6&m'!:!@0Y)] > _ EDK-|K>L-kg㿬.FPu#q>XU[un@Vӯ7VJ t0hD]jZq~4au5U :᪽nYBe"F:2,#T‹c#ЊTFȂ!z 0Ytֶ`&q6}ELu [(![C=Z{| vI(T`74Ǿ.w| TG㓬YԞ:hSFD>8o bNJ#b>yE$"S5!69p&wA(FF[-\6נa7T3`uB3@}Nm}wdH@ z z24DAW4!2젷a,%ܒ\einL\'Ѹ`?O&U&2Kwr7cO{ |{n(piz|5-S}[ ҋSrsd?uy8d 6%rofGHJ^װ!mi*“EC:să]ocKzGE$r7^x*U{] h!i )2H;R+r dN.ɞL4Z33}Yۅ'C =Awپ2H&OjYŐ{s1VXF$g\W;_iB|IHL0~{K$vi>;?F'ȃb+x@6r DQaP/!FrMM oO@fݰ]A9f,C1\is˯x;{t!V/׼LS/2.iZҌiw ]`܂XV3ܿ} ;Y~8+iig_ /A ZUg\mb Cx+mX')qQ: H ݐa' x&yvg<Dt\9)worI]Ղ") bEr+C25Pr*>9H^?LEĊm"bSQCt5q^fa|+GTw}ie=ν)0@^k`[ B"{5:}bHsHpۥ 5^D|3UYMaؾXP*qiAUC *_1l|$@e>C?i {488/IuvAEm+!hq%([]X*feu@;1]8lㄍCx{)qzLuay;#>vy*1N1 ni/;%BxneQn] Er2+BA C/y.HG[J|hw[tk W Kv—V~r(m]]WfzHxD^3g:{C тP]&$jx-DٛIR+9kQ^U"•\TV~_: lDz_ʹÒq{1}c!_W' !N@M@¼~UF^DJE3l?،R`J"i[zYG`QT=s};(t?uCSy kc~6%daZC69yk`:؃0嘴DCYڙ}jPŢFᄟ+w0rqK:ArqFE/ 3l-Sw]G7v0ϞNX\]eꎊ? -i;%o8f*AQIxO*S* e x{ZC^BCnljĶ U`7,6}2PNXKzmK%guN/p,7&X܅,{4뭬s5wN{t]e#*K[.A1p6[*xQvA%ԙQY(}|۫2Jod] 9SP Nt /} \U;cHC}H3ȻYGۻDş$D0?Z*ޮ~e9SlAhtDϙTJa|GMݝDO6[Q]p(D]EϑI*$* /:)uqy';$֔je-ŅeN458ojR[p G6ti"0'ثf1"P}FXLa㷓З(Q*lڮ&ڱm^iv)^Ӡ9Loق=U(Yq C(),}On9}eߢR`B G_9#V`3OcQ~1O^XA)&F듟8TFlف!+\(aMಌJ 0,L#j!< 4m޷F|rٳ.%Vbr,Ljk(|Ry#ﴗoaAF7^YvĤ-C:z. ,yT Y)cf}R2ioJXrn;@qU<Ǭ):l#hjKGAU^[MBDTNR8cxqt|7+1!M rjPZ56ˮOOVK$X8* rdK@?#{ \JBZi_lc»$߄b`)h Z{XK aD 7H̥1%H(ps/>Տ>#n%y$]=~sճ2(> *C)bZ]߂P M4D\m{) 8=*=jl ~d.$\nBlE#2# kB4 \$Z 4\ 0x4tRFo\HKOxߞzJyS*YgE%KZ3?-}3Y3O`WO]l~04%w|#GLJ_6l`o2c1qT <>W剏{}"LbplhvE0bXb?q$MQT2qOcWGR#c QaypGŗtd42XķINMX\3t5م Knޥvlakp͊T,70>s2ec BCF*[6?0-ֶAl<_Ph>n!/jL{7S=b1N.!j"#!n*8a$eH!{ɗp*aV)OaO"F*uZvU` Vri.{F94)b@0dW rp ױH+&vR:(l1d~l `xtUV9p=I =qrEaZ=3]2n.s E,^L@+TW5݊|$_2Y*w(# s?ܛb# &[MYǭ NT[^t_ĿLHO) ZI#-?G}c{X82f27Nw*TZUCk8(fWGn2AgY _%VdN݃Ir)4-UŠPG *eŢ)tş=nIGu$(l0'&RlVZq8":Wa'X?,lwޛu7%xZKKd;a30&Rq$slTiKmđ@g@Rm (au)7t:.pn5Wx<5ʓ *VlS[3He]BF9 H m:m} `[kdRS-[&$ڐXЩ縎4D0'cY8$&e#ܣw3޸?*B򽫮X{,l8D/= 2XJ7gFl .`!J\Jo.F_i]CL[ `Dr[҂ j4np0*hI~wWyHi WC/bT2˜V%鞝'rvOF B#~WK۷Fpa;Y(\ 32_oZaD)h$Hvx]T{Jͱxݳ 7+Dٞ\ť6;RKd6lKFw(3UBHDFtٖz"Sƫ"A ؘ֎.GIQtɟt= wa%(0#Jj%eGư> d<eNyS5ЙNG/Y$FK2pVzF9g߬FM_;)e؛/1Bxkx:ϒ0$Pn\FFqqPY/OO#xSʛ5-|V3_"p/yx^rEw?g{ƨ]aݳ1e͛?Ed"EkKHՃF`Sx шo? Lz34`Q(d*6$Il$Zn rx;798*5[b~vTӅv).S]6ϤX:> ~Z3YD:q-/GZajnbR'a? AK5U3Lz][iF!<#-ZM'q:_(^֮\UU@z6}Y n%Vf "s,y}Lj("no2WڱȱG=<鳑$i[izi?*91jN[4?a5*Pm=DիNH6Z2~S,2.{tL)~(UzuCTz"SU I)rn#6!u9 lx@eX))Eϟ9!<,x8E=4>;J} [7 U[R!j! 7c3ݍow?j)+z{z羽&Q}";<7%^-]m(eNY7@U[ق EV"]=rl{ձ4R330VL`[V@+J:rd:wYpyY19K3oٺ@X⧂e)ħљ@$ں@> ^f|N'w!T n*^J"nR߈5;$몷ŠdSwkDոA~\4l^0cCoѼظn2i^l%vR9iZSޚKN̸srFjs9d&YnӾbk&|;E4̋NSxL/eV$DAa 5)M8DalHF6>0/B??;0/V]4J,uO\A /ß4h.q&Fal̬ s̬L  Kfsٗ(]ŠOr vFon3ifP _M^]57_!pPra}Z% ()#>(Lؐ%U~pT1 hSjIna}:N΂q +sH-fFzĝ$4$R%:1CXt~9\R?G?\a8L1 k)ԃVc0 ϙmX(@<ɭ9lL4mBggR>ʚꛃQ%QeF/dI.q(fc;sivW0+KuC]GJynFȤLj1)wǝ0",b-ё7|33L#g >dG\cZ2ڸYQ#`_g!Ob o+- 6/|7TU áyDri(cD# ?\J(i@2wK|Go9xΎ`;YQ 7Nq %%(]£mp }8U It~!7P`4^%'HdQX@E] >z#s]$˲9Û~#޽2P9(㔲OR6R?P5޵sz .j=i !riL%ހ/ͪµW)/́6~F=hR)vMAmN>+uc^b+q>gە}[NakΚcM!%(?n, b{i_Zoze&ꟅHeN6]kr˱JZfX{/թ*<Bc%!㒶o~\?5X XFawp0[C}_b'QF6g)t QnT0“Wuw'&nF;Gl  O_2"];s#c ؙa{KpA)@9!]g8E㝻d -Ώaˁ'ʕxSJ,cY?ѭ"i\!>d*8a?P\88xoC8bPX᭣DwnnN#>csjb-g)s ^x" -(>G2jc4uYKY Ҝ񜇙oKy)A:Vp J "XC doZ.={3Gz TĮSҊͿ+UuxO2怂]W8rm۾9*s)F9h 8m֭-![Q0FϳB=KE]4|mVp FFz2H.;6G^;8JG2TZѰRA {1Tvߝ />n8ػB73CI6c ޚ245>YGSI ^"c[EJ5OT N'i.c AP2D%/rbx_pi$:_(c \"h|aw:YUs[G L`1HIo+|`i>^Td.ToRC #D{_UE,ګ*s2&~q/)'ND1TV&k'oF A w"Z!2BN9oBY3G0vQPx ^e p60xA 1j̐>9Ԏp/ဗl{5d0.}mIluz5m̯` xYjE4I[4NYvЏFFPS1niOE|V⹠uaiVe/ږ]`Ow kH H:WŞ\|۶^?Y}n%N$B#WiPQȣOą"N/zZŰ'd`+vooTέ?lr 1yĎd X2~;gĆ)`?-VlNAZnT mX:+E̦7/ϕ>$9Esm'4Sޯe\](=J718PE\ |6V)OJ5׳˭l\㒐`P[ƌURLV{"Q8uTCV*mTV j誒*K%b,A5v&7U?e բt؀y&unDyދY"n0nϒ-agV@Px9Ρ `,]7m]B{gy^fcݡ_Ŀ$</p@%X[a̗iz|ye!./<d K8'5g)B >L>=~/Fˆ?&5ֶhap)VnKˠQjr(єPZPZ>:k[8EB}@ |zr.j[Zd\`@9[ +ܮ#{xW3NIp> C='GVY+a$Dt-T?)L_6j<ޏg?AjUϵT0P39yxд.͞rn!b/Z01':Tx_:f2{҇y//L۫Kk|; '`G[3R?CCDU+IĸYƁo4DlZHg%vՙi|7VV1;l̨Zc|HNzI /7eOD; R(Ռ҃$ܦ& N_8 EPMƿ#_]e뭒y*m4_GOhBR'PpU'$w WBnH-}mVޠ6z"E4k=杼PHYa@bJ[ mޒRji>MyY$kSFVO(Հg!OF!ݖ[ųQ)|q!5m_rQ8 *~/ ޙ3($:M. VLu-3^HH9n>-%uOU|@@C$n"[ˌA~c3tu#:yYḱ@=YŊWd|wH}{v6)O(,Oƨ9'΅ cAc֪/D0.hs:&(h)|)p~R  5;a7V6k& l 0&F])>9 ɨ_V]De]B>i786rs"W@P44\HH.1JF\~|ZVݑ2h姌a&']䡄ej3S7Yĩ4XTM>j {|jղSB:(XO(~ uʢXgw2pVz)=#m1CY pl_[Bl, k{4aFOObq6yHjnN_=VejЅ]Uum\"t!!;Bgkp8x] Y, m$[ͯvc^+2.ɇr:nbb7 #9]+gA?ߕw# @$3A'w>ƎOW`W-_v\&x%Il{#J4e]?9< tꤟ"nN(;Bad"G`OlHUQƃ` IFųV{m+{>3Rڧ ڏٵ$hm{лRз.01)i&H[,5CL6G&+ӪUf$T" uJ|٪;ӞH$a;F[b&O@PdVNι,|atu5w%{DJ$?3 <%C]iVґ.ε?%NBpԳ,42oǃ|2ZޫY 4W} 8;d\LKr碛]ǂe'ġ'vc=c$ 1RjJ#%u᫠ #[-CG7Qr"/LR cz.+A9!*EHg"Vd%" V]s,m}U<_8{`ם k:@#pj*h蠘V&_H.-e*)@xn<8 'srk>-0ˤ* ,DZ0Xx~g,N %eB1 OWsm\Ti$'J9`dF~MNrU\8S'ŧ5L;6N " O(,0=$09jk5%}[W%A{&tLQ7 .eƊ<A+lMخFV-\jXY¡!hL`F`-$z@ߓB+/bMdX:bK5d&Ǖ9d#hZ83`|0_Feεr:\5I^Ʋ3;zߜr_~R2 OO 3M9wm{ %LgT֘A.`KͲhPB#-M6$/pW U)}Sm?Yv#*0~uCN5ɕV/$ߟФigUHڊE_B̅{}jG=9"Ga]M]d}a,^]gGG~Ug̓j=[.Hu*EߍF۾2Q;H|^X`21᧩Mۅ^nE {Gz!(u1n P6*KU\y=Iplod1 @8F`7G4;6CʂJ) `~@z++יI-X;Z#R7X,*AwT,Q&akwCZfGjooW(l%?] uzZZN`6/Xc56a]"pMYQ-|tJf5>Ud)3BT4& xH;ݙ܍s??99 oqZa8x]&KxӻNV*oa{uOB̫Vbwa~3b уCt 7A/,Tp$Ɏ>3}ս󌋟"M8[fЋ0'IIҭ 嗯6\ \@}"B !F%.'`kju&_c!MPJc| [.炞ީuxpIOcd0Rz3*ꭷNUU,Dqu1QHwv^4f"~Nnd"NF)걛"|CEvܧnVɰ9|=-oKSlh0rO(/xbEğLrvS3SuG?WNagEā߭j>*3WYiiчJ-Z;{ /:uYK0TN4alԚnpx%x;n]"vs"*׫ϥxx˪bD' JΛAMgg\b+Cn$wcETh9 lRVHFŭ+ԞA"f0 ٩ajP8ʗ#J QƂ?Z% YQW _ LE"*m+fh$.5=o Yq+Z@֫Mʇ^,Pݜ% 0MZaPe7·T[(P`EB狅kWteˀS~EG2JuWRTs A$id"^+r[USpOc?Ij]O5RyLp}nyJ[Xu-Y#9WP ށZ9a,mm7KuW"?F|T=-` gaoů6+l v6Ӽ)>6QJoKб Z YZ