libsemanage-migrate-store-3.1-150400.1.65 >  A bvp9|Ȇ6^`۲E cOSz_>ʧ旈kAaM",xb$׎;Rq0zȉ-`V[ܸ'8fY C%Qqj OXSr9 _BN6ة#->#XGRjX~ bP4PZL%]dR1F#V.ԟ/';W^k.X~Ϭy(q(Oڋ Z)-o'q(ޚ>ָi)0+j 096988005e42770816fa6f4c9fbc772bd9870b34629f0903235d0a8a43de22afa2981e0a233ac459d76c50ce28b97933479c6dcc.tbvp9|5xR/ܛ'5!O؛],wF[հ압^ln|Wl*y9$n q 䏊pڴ'\A)#+_5i7~0G@1kX hsN3N0ESƂi#vڱ~I)YiAaK?ՆήnG.1+udKf+Shj \U>p>?d  , K PV`h l p x  DX(89@:FtGHIXY\]^b cdeflu0v8whxpyxz|Clibsemanage-migrate-store3.1150400.1.65SELinux Policy Store MigrationIn version 2.4 of libsemanage, libsepol, and policycoreutils, the policy module store was moved from /etc/selinux//modules/ to /var/lib/selinux//. Once the libraries are upgraded, all policy stores must be migrated before any commands that modify or use the store (e.g. semodule, semanage) can be executed.bvibs-arm-3#SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/Productivity/Securityhttps://github.com/SELinuxProject/selinux/wiki/Releaseslinuxaarch64#Abvbvf4e3cacb4c868e21a0015b65ad1ac9e987639083e8cd332bccb5d16e7376a308rootrootrootrootlibsemanage-3.1-150400.1.65.src.rpmlibsemanage-migrate-storelibsemanage-migrate-store(aarch-64)@    /usr/bin/python3rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3_!d__ @^@^n@^@^@^^F] u@\+@[%@[%@[@Z%Z XN@Ws@W~W-@Wkukuk@suse.comjsegitz@suse.comjsegitz@suse.comjsegitz@suse.compmonrealgonzalez@suse.comdimstar@opensuse.orgjsegitz@suse.dejsegitz@suse.demliska@suse.czjsegitz@suse.comjengelh@inai.dejsegitz@suse.compmonrealgonzalez@suse.comrgoldwyn@suse.comjsegitz@suse.comdimstar@opensuse.orgjengelh@inai.dejsegitz@novell.comjsegitz@novell.comi@marguerite.su- Add /var/lib/selinux- Remove libsemanage-update-map-file.patch to prevent checkers from declining the submission. Keeping the snippet in the spec file in case we try to enable LTO again- Update to version 3.1 * Improved manpage * fsync final files before rename- Disabled LTO again. This breaks e.g. shadow and also other packages in security:SELinux- Fix build with LTO: [bsc#1133102] * Enable LTO (Link Time Optimization) and build with -ffat-lto-objects * Update map file to include new symbols and remove wildcards - Add libsemanage-update-map-file.patch- Drop suse_path.patch: replace it with a grep/sed logic replacing /usr/libexec in all files with the correct value for all distros (taking into account that openSUSE is in progress of migrating from /usr/lib to /usr/libexec).- Apply suse_path.patch only for older distributions. Newer use libexec- Update to version 3.0 * Add support for DCCP and SCTP protocols * include internal header to use the hidden function prototypes * mark all exported function "extern" * optionally optimize policy on rebuild Refreshed suse_path.patch- Disable LTO due to symbol versioning (boo#1138812).- Update to version 2.9 * Always set errno to 0 before calling getpwent() * Include user name in ROLE_REMOVE audit events * genhomedircon - improve handling large groups * improve semanage_migrate_store import failure * reset umask before creating directories * set selinux policy root around calls to selinux_boolean_sub * use previous seuser when getting the previous name- Use more %make_install.- Adjusted source urls (bsc#1115052)- update to version 2.8 * semanage fcontext -l now also lists home directory entries from file_contexts.homedirs. * libsemanage no longer deletes the tmp directory if there is an error while committing the policy transaction, so that any temporary files can be further inspected for debugging purposes (e.g. to examine a particular line of the generated CIL module). The tmp directory will be deleted upon the next transaction, so no manual removal is needed. * When overriding PREFIX, BINDIR, SBINDIR, SHLIBDIR, LIBEXECDIR, etc., DESTDIR has to be removed from the definition. For example on Arch Linux, SBINDIR="${pkgdir}/usr/bin" was changed to SBINDIR="/usr/bin". * PYSITEDIR has been renamed PYTHONLIBDIR (and its definition changed). - Clened with spec-cleaner- Update to version 2.7. Changes: * IB support * saves linked policy and skips relinking whenever possible- Update to version 2.6. Notable changes: * genhomedircon: do not suppress logging from libsepol * genhomedircon: use userprefix as the role for homedir * Fix bug preventing the installation of base modules * Use pp module name instead of filename when installing module * genhomedircon: remove hardcoded refpolicy strings * genhomedircon: add support for %group syntax * genhomedircon: generate contexts for logins mapped to the default user * Validate and compile file contexts before installing * Swap tcp and udp protocol numbers * genhomedircon: %{USERID} and %{USERNAME} support and code cleanups- Split out the Policy Store Migration tool into libsemanage-store-migrate: it is not a devel tool to start with. Additionally, it causes the -devel package to depend on python, which we want to avoid (libsemanabe being part of the core build cycle). The library suggests libsemanage-store-migrate.- Update RPM groups, trim description, combine filelist entries, ensure pkgconfig() symbols are generated.- Without bug number no submit to SLE 12 SP2 is possible, so to make sle-changelog-checker happy: bsc#988977- Added suse_path.patch to fix path to hll compiler- update version 2.5 * Do not overwrite CFLAGS in test Makefile, from Nicolas Iooss. * Fix uninitialized variable in direct_commit and direct_api * semanage_migrate_store: Load libsepol.so.1 instead of libsepol.so * Store homedir_template and users_extra in policy store * Fix null pointer dereference in semanage_module_key_destroy * Add semanage_module_extract() to extract a module as CIL or HLL * semanage_migrate_store: add -r option for migrating inside chroots * Add file_contexts and seusers to the store * Add policy binary and file_contexts.local to the store * Allow to install compressed modules without a compression extension * Do not copy contexts in semanage_migrate_store * Fix logic in bunzip for uncompressed pp files * Fix fname[] initialization in test_utilities.c * Add remove-hll semanage.conf option to remove HLL files after compilation to CIL * Fix memory leaks when parsing semanage.conf * Change bunzip to use heap instead of stack to prevent segfault on systems with small stack size - changes in 2.4 * Fix Makefile to allow LIBDIR and SHLIBDIR to be set to different directories * Fix bugs found by hardened gcc flags * Add missing manpage links to security_load_policy * Fix failing libsemanage pywrap tests * Fix deprecation warning for bison * Skip policy module relink when only setting booleans * Only try to compile file contexts if they exist * Fix memory leak when setting a custom store path * Add semodule option to set store root path in semanage.conf and the semodule command * Add semanage.conf option to set an alternative root path for policy store * Add support for High Level Language (HLL) to CIL compilers. The HLL compiler path is configurable, but should be placed in /usr/libexec/selinux/hll by default * Create a policy migration script for migrating the policy store from /etc/selinux to /var/lib/selinux * Add python3 support to the migration script * Use libcil to compile modules * Use symbolic versioning to maintain ABI compatibility for old install functions * Add a target-platform option to semanage.conf to control how policies are built * Add API to handle modules and source policies, moving module store to /var/lib/selinux * Only try to compile file contexts if they existibs-arm-3 16519566983.1-150400.1.653.1-150400.1.65selinuxsemanage_migrate_store/usr/lib//usr/lib/selinux/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15-SP4:GA/standard/2f65c3b3275d006832870c1bf23c17dc-libsemanagecpioxz5aarch64-suse-linuxdirectoryPython script, ASCII text executableR2=&O$eOlutf-81b4e4f19d31f0751b8d7d03ea77683827ce2ba89d9b601e4e0680a3952ac1c04? 7zXZ !t/% =] crt:bLL g8UBߖ8Ic$++'h9/3:=~ru9xL7;h&O9uvz\zx2\ؐ/-7yRbwPX֊rJi>qmvh,{i敔(PoA-{Cͩ9 (o׶z@/9- m*|4VCAr{B2pۡ.[gHv5F-sWG'gu0&G6+|:eH ;bhL .U6wsO^^wK8N텞ʜpuXa'5ѣ#y:l^RG5+Qڈw/j$6ob3<\/AevF>$ƞ|5UQ6}JKJOy#L}ƱABehfz̓}bK[0\ IK{퓝}>,'lD)?"8pjO}jt$0v|P┺rn?`$֒$~;H@776¸p$bww2BĖuA93;FrlxtSs t1 "˙( +Z ƙ P|$o;<DO\6ځ {Y) !4F6D|@XeG$6k Udnwl88yGGNg?h p,Bj`;:i@󌅫ABVp|?Wp4^y-\"4K1vVm:+ &`& ERrr~H0 [6]\uVg `E=V9bubsPols/V_w4qEd-OI*Z&e@B[@I&dAsY}J2dMhḰa#u/88$ᰫ~Gj[ ״jEȤY)ǔM}Xn+x'95XbE7S[e(aCK0y4*e}һ~l̜CjhZ+>aHeګyS)]Sfq nqYFٛɯ"b9TIƭ7Y2)V0*o(^TcZ7n7k{*Og\{n]:wPl@ ]6:TR P>j6lQB%OTH|S=p0a亦0TŞ"9.Vc1-v5gG;&Ky!C% PeƆ !h?^t.2i"RGf%$3Fռ_ W¢4%c 5CLs&krO?RX}cHHJ-R$cfxYYXͶ0GN? _rcZzDf{p}<Y4/ϹJG:KY#ŧf2{K U;ad\aOEA_Чp۶&(&!taUS:ow?tܢA)'E= ;qiOW͟[P]LbQ^.} w&Ҏ7$M;#0KkcrG,JOsٹHD4h[<Ek`x'>1> K43W&}wji]Kw-:21dUl.z\hwkٮ-~黖kWd;/݌m)I=DX̓\옼=lF}TC9d^wNIEl 'Y4դ+&Ld՟S5'U\Ӵ_ۊ20}tk%Smx&|<0;T<7^\T∞UjD!2\l'lFDw?;K;[`؄5b$7Ui4I*(I?oEޖQ:!Yn f}N(CYrYG,rXp@sTV֍W@g]aL<‡x[+Ȯ[иyXah"Ƕ\-9m Pd|pZvU$1U?zHU ^ڇx.LGWwcn)É)y\?l7٪FA-oa,HѴ R*D tn #h];_z%^uǔƺGf?F%aKqKZ>)a/^!#`k?xs`]6ˌW2O4!Z$7C}rLQKNCn>9[!ڈYz$)KtI YZ