diff options
author | Colin Walters <walters@verbum.org> | 2004-08-23 16:09:54 +0000 |
---|---|---|
committer | Colin Walters <walters@verbum.org> | 2004-08-23 16:09:54 +0000 |
commit | ee78f2800f2642b4fff962b736296d87a7f12a17 (patch) | |
tree | 6ea2949c889f80ae4a4f0f72dee53f277056b0b7 /ChangeLog | |
parent | a7291aee0e12b9b6abe90f835ef9cb3e158a96c4 (diff) |
2004-08-23 Colin Walters <walters@redhat.com>
* bus/selinux.h: Prototype bus_selinux_get_policy_root.
* bus/selinux.c: Create a thread for policy reload notification.
(bus_selinux_get_policy_root): Implement.
Updated SELinux support from Matthew Rickard <mjricka@epoch.ncsc.mil>
* bus/config-parser.c (start_busconfig_child)
(bus_config_parser_content): Support SELinux-root relative
inclusion.
* configure.in <HAVE_SELINUX>: Add -lpthread.
* bus/test-main.c (test_pre_hook, test_post_hook): New.
(test_post_hook): Move memory checking into here.
(test_pre_hook, test_post_hook): Move SELinux checks in
here, but conditional on a DBUS_TEST_SELINUX environment
variable. Unfortunately we can't run the SELinux checks
as a normal user, since they won't have any permissions
for /selinux. So this will have to be tested manually
for now, until we have virtualization for most of
libselinux.
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 25 |
1 files changed, 25 insertions, 0 deletions
@@ -1,3 +1,28 @@ +2004-08-23 Colin Walters <walters@redhat.com> + + * bus/selinux.h: Prototype bus_selinux_get_policy_root. + + * bus/selinux.c: Create a thread for policy reload notification. + (bus_selinux_get_policy_root): Implement. + + Updated SELinux support from Matthew Rickard <mjricka@epoch.ncsc.mil> + + * bus/config-parser.c (start_busconfig_child) + (bus_config_parser_content): Support SELinux-root relative + inclusion. + + * configure.in <HAVE_SELINUX>: Add -lpthread. + + * bus/test-main.c (test_pre_hook, test_post_hook): New. + (test_post_hook): Move memory checking into here. + (test_pre_hook, test_post_hook): Move SELinux checks in + here, but conditional on a DBUS_TEST_SELINUX environment + variable. Unfortunately we can't run the SELinux checks + as a normal user, since they won't have any permissions + for /selinux. So this will have to be tested manually + for now, until we have virtualization for most of + libselinux. + 2004-08-23 Havoc Pennington <hp@redhat.com> * dbus/dbus-sysdeps.c (_dbus_change_identity): add setgroups() to |