dbus/dbus
Colin Walters
walters at verbum.org
Mon Aug 23 09:09:55 PDT 2004
CVS commit by walters:
2004-08-23 Colin Walters <walters at redhat.com>
* bus/selinux.h: Prototype bus_selinux_get_policy_root.
* bus/selinux.c: Create a thread for policy reload notification.
(bus_selinux_get_policy_root): Implement.
Updated SELinux support from Matthew Rickard <mjricka at epoch.ncsc.mil>
* bus/config-parser.c (start_busconfig_child)
(bus_config_parser_content): Support SELinux-root relative
inclusion.
* configure.in <HAVE_SELINUX>: Add -lpthread.
* bus/test-main.c (test_pre_hook, test_post_hook): New.
(test_post_hook): Move memory checking into here.
(test_pre_hook, test_post_hook): Move SELinux checks in
here, but conditional on a DBUS_TEST_SELINUX environment
variable. Unfortunately we can't run the SELinux checks
as a normal user, since they won't have any permissions
for /selinux. So this will have to be tested manually
for now, until we have virtualization for most of
libselinux.
M +25 -0 dbus/dbus/ChangeLog 1.555
M +1 -1 dbus/dbus/configure.in 1.98
--- dbus/dbus/configure.in #1.97:1.98
@@ -725,5 +725,5 @@
if test x$have_selinux = xyes ; then
- SELINUX_LIBS=-lselinux
+ SELINUX_LIBS="-lselinux -lpthread"
AC_DEFINE(HAVE_SELINUX,1,[SELinux support])
else
--- dbus/dbus/ChangeLog #1.554:1.555
@@ -1,2 +1,27 @@
+2004-08-23 Colin Walters <walters at redhat.com>
+
+ * bus/selinux.h: Prototype bus_selinux_get_policy_root.
+
+ * bus/selinux.c: Create a thread for policy reload notification.
+ (bus_selinux_get_policy_root): Implement.
+
+ Updated SELinux support from Matthew Rickard <mjricka at epoch.ncsc.mil>
+
+ * bus/config-parser.c (start_busconfig_child)
+ (bus_config_parser_content): Support SELinux-root relative
+ inclusion.
+
+ * configure.in <HAVE_SELINUX>: Add -lpthread.
+
+ * bus/test-main.c (test_pre_hook, test_post_hook): New.
+ (test_post_hook): Move memory checking into here.
+ (test_pre_hook, test_post_hook): Move SELinux checks in
+ here, but conditional on a DBUS_TEST_SELINUX environment
+ variable. Unfortunately we can't run the SELinux checks
+ as a normal user, since they won't have any permissions
+ for /selinux. So this will have to be tested manually
+ for now, until we have virtualization for most of
+ libselinux.
+
2004-08-23 Havoc Pennington <hp at redhat.com>
More information about the dbus-commit
mailing list