python3-selinux-3.5-150600.3.3.1;>+Ahp9|Gʷ|paJ,vȽw1zYwt8-f:ZdU9w%M0_5V= H +vVgaKf!|pr!U .w̽zbi-Q|S4'VڌxK1ջ%@)5Z3u-jd1dOz'^\cy&-y˯xzjOƮȘD=Kvll-;&"b7]Z 9?M  0OˆӂAz >A5|?5ld # S $04Mn  4  N  h      ( \   @|x(89 $: B.nF.~G. H. I/ X/Y/Z/D[/H\/L ]/ ^0ob13c1d2ue2zf2}l2u2 v2w4P x4 y4z5 55 5&5hCpython3-selinux3.5150600.3.3.1Python bindings for the SELinux runtime librarylibselinux provides an interface to get and set process and file security contexts and to obtain security policy decisions. This subpackage contains Python extensions to use SELinux from that language.hh02-armsrv3 KSUSE Linux Enterprise 15SUSE LLC SUSE-Public-Domainhttps://www.suse.com/Development/Libraries/C and C++https://github.com/SELinuxProject/selinux/wiki/Releaseslinuxaarch641Xi1M h AA큤A큤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_selinux.cpython-36m-aarch64-linux-gnu.sorootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootlibselinux-bindings-3.5-150600.3.3.1.src.rpmpython3-selinuxpython3-selinuxpython3-selinux(aarch-64)@@@@@@@@@@@    ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.26)(64bit)libpython3.6m.so.1.0()(64bit)libselinux.so.1()(64bit)libselinux.so.1(LIBSELINUX_1.0)(64bit)libselinux.so.1(LIBSELINUX_3.4)(64bit)libselinux.so.1(LIBSELINUX_3.5)(64bit)libselinux1python(abi)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.53.63.0.4-14.6.0-14.0-15.2-14.14.3h@ehy@d@ddx@dTdS@d?@cby@a`Q@`Gc@_ @^^F]q]{@\"\\+@[$@Zz@ZZ Y\Ws@W~W{@Uejsegitz@suse.comcathy.hu@suse.commcepl@suse.comjsegitz@suse.comkastl@b1-systems.dedaniel.garcia@suse.comfcrozat@suse.commliska@suse.czjsegitz@suse.comjsegitz@suse.comjsegitz@suse.comdimstar@opensuse.orgjsegitz@suse.comjsegitz@suse.comjsegitz@suse.dejsegitz@suse.demcepl@suse.commliska@suse.czjsegitz@suse.comjsegitz@suse.comjsegitz@suse.commcepl@cepl.eujsegitz@suse.comjsegitz@suse.comschwab@suse.dejengelh@inai.dejsegitz@novell.comi@marguerite.sudimstar@opensuse.org- Ship license file (bsc#1252160)- Also build python3-selinux for toolchain compability on SLE- (bsc#1212618) Divide libselinux and libselinux-bindings again. libselinux itself is in Ring0 so it has to have absolutely minimal dependencies, so it is better to separate libselinux-bindings into a separate pacakge.- Add explicit BuildRequires for python3-pip and python3-wheel on 15.5, currently the macros don't do the right thing- allow building this with different python versions, to make this usable for the new sle15 macro (using python3.11)- Add python-wheel build dependency to build correctly with latest python-pip version.- Add _multibuild to define additional spec files as additional flavors. Eliminates the need for source package links in OBS.- Enable LTO as it works fine now.- Update to version 3.5: * check for truncations * avoid newline in avc message * bail out on path truncations * add getpidprevcon to gather the previous context before the last exec of a given process * Workaround for heap overhead of pcre * fix memory leaks on the audit2why module init * ignore invalid class name lookup - Drop restorecon_pin_file.patch, is upstream - Refreshed python3.8-compat.patch - Added additional developer key (Jason Zaman)- Update to version 3.4: * Use PCRE2 by default * Make selinux_log() and is_context_customizable() thread-safe * Prevent leakeing file descriptors * Correctly hash specfiles larger than 4G - Refreshed skip_cycles.patch- Update to version 3.3: * Lots of smaller issues fixed found by fuzzing- Switch to pcre2: + Replace pcre-devel BuildRequires with pkgconfig(libpcre2-8) + Pass USE_PCRE2=y to make.- Update to version 3.2: * Use mmap()'ed kernel status page instead of netlink by default. See "KERNEL STATUS PAGE" section in avc_init(3) for more details. * New log callback levels for enforcing and policy load notices - SELINUX_POLICYLOAD, SELINUX_SETENFORCE * Changed userspace AVC setenforce and policy load messages to audit format.- Update to version 3.1: * selinux/flask.h, selinux/av_permissions.h and sepol/policydb/flask.h were removed. All userspace object managers should have been updated to use the dynamic class/perm mapping support. Use string_to_security_class(3) and string_to_av_perm(3) to map the class and permission names to their policy values, or selinux_set_mapping(3) to create a mapping from class and permission index values used by the application to the policy values. * Removed restrictions in libsepol and checkpolicy that required all declared initial SIDs to be assigned a context. * Support for new policy capability genfs_seclabel_symlinks * selinuxfs is mounted with noexec and nosuid * `security_compute_user()` was deprecated * Refreshed python3.8-compat.patch- Update to version 3.0 * Ignore the stem when looking up all matches in file context * Save digest of all partial matches for directory * Use Python distutils to install SELinux python bindings * ensure that digest_len is not zero * fix string conversion of unknown perms * mark all exported function "extern"- Added swig4_moduleimport.patch to prevent import errors due to SWIG 4- Add python3.8-compat.patch which makes build possible even with Python 3.8, which doesn’t automatically adds -lpython- Disable LTO (boo#1133244).- Set License: to correct value (bsc#1135710)- Update to version 2.9 * Add security_reject_unknown(3) man page * Change matchpathcon usage to match with matchpathcon manpage * Do not define gettid() if glibc >= 2.30 is used * Fix RESOURCE_LEAK defects reported by coverity scan * Fix line wrapping in selabel_file.5 * Do not dereference symlink with statfs in selinux_restorecon * Fix overly strict validation of file_contexts.bin * Fix selinux_restorecon() on non-SELinux hosts * Fix the whatis line for the selinux_boolean_sub.3 manpage * Fix printf format string specifier for uint64_t * Fix handling of unknown classes/perms * Set an appropriate errno in booleans.c - Dropped python3.patch, is now upstream- Update to version 2.8 (bsc#1111732). For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt - ran spec-cleaner on spec files- Update to version 2.7. * %files needed to be heavily modified * Based expressly on python3, not just python For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt- Updated spec file to use python3. Added python3.patch to fix build- Update to version 2.6. Notable changes: * selinux_restorecon: fix realpath logic * sefcontext_compile: invert semantics of "-r" flag * sefcontext_compile: Add "-i" flag * Introduce configurable backends * Add function to find security.restorecon_last entries * Add openrc_contexts functions * Add support for pcre2 * Handle NULL pcre study data * Add setfiles support to selinux_restorecon(3) * Evaluate inodes in selinux_restorecon(3) * Change the location of _selinux.so * Explain how to free policy type from selinux_getpolicytype() * Compare absolute pathname in matchpathcon -V * Add selinux_snapperd_contexts_path() * Modify audit2why analyze function to use loaded policy * Avoid mounting /proc outside of selinux_init_load_policy() * Fix location of selinuxfs mount point * Only mount /proc if necessary * procattr: return einval for <= 0 pid args * procattr: return error on invalid pid_t input - Dropped * libselinux-2.2-ruby.patch * libselinux-proc-mount-only-if-needed.patch * python-selinux-swig-3.10.patch- readv-proto.patch: include for readv prototype- Update RPM groups, trim description and combine filelist entries.- Adjusted source link- add patch: python-selinux-swig-3.10.patch, fixed boo#985368 * swig-3.10 in Factory use importlib instead of imp to find _selinux.so. imp searched the same directory as __init__.py is while importlib searchs only standard paths. so we have to move _selinux.so. fixed by upstream - update version 2.5 * Add selinux_restorecon function * read_spec_entry: fail on non-ascii * Add man information about thread specific functions * Don't wrap rpm_execcon with DISABLE_RPM with SWIG * Correct line count for property and service context files * label_file: fix memory leaks and uninitialized jump * Replace selabel_digest hash function * Fix selabel_open(3) services if no digest requested * Add selabel_digest function * Flush the class/perm string mapping cache on policy reload * Fix restorecon when path has no context * Free memory when processing media and x specfiles * Fix mmap memory release for file labeling * Add policy context validation to sefcontext_compile * Do not treat an empty file_contexts(.local) as an error * Fail hard on invalid property_contexts entries * Fail hard on invalid file_contexts entries * Support context validation on file_contexts.bin * Add selabel_cmp interface and label_file backend * Support specifying file_contexts.bin file path * Support file_contexts.bin without file_contexts * Simplify procattr cache * Use /proc/thread-self when available * Add const to selinux_opt for label backends * Fix binary file labels for regexes with metachars * Fix file labels for regexes with metachars * Fix if file_contexts not '\n' terminated * Enhance file context support * Fix property processing and cleanup formatting * Add read_spec_entries function to replace sscanf * Support consistent mode size for bin files * Fix more bin file processing core dumps * add selinux_openssh_contexts_path() * setrans_client: minimize overhead when mcstransd is not present * Ensure selabel_lookup_best_match links NULL terminated * Fix core dumps with corrupt *.bin files * Add selabel partial and best match APIs * Use os.walk() instead of the deprecated os.path.walk() * Remove deprecated mudflap option * Mount procfs before checking /proc/filesystems * Fix -Wformat errors with gcc-5.0.0 * label_file: handle newlines in file names * Fix audit2why error handling if SELinux is disabled * pcre_study can return NULL without error * Only check SELinux enabled status once in selinux_check_access - changes in 2.4 * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR * Fix bugs found by hardened gcc flags * Set the system to permissive if failing to disable SELinux because policy has already been loaded * Add db_exception and db_datatype support to label_db backend * Log an error on unknown classes and permissions * Add pcre version string to the compiled file_contexts format * Deprecate use of flask.h and av_permissions.h * Compiled file_context files and the original should have the same DAC permissions- Update libselinux-2.2-ruby.patch: use RbConfig instead of deprecated Config.python3-selinuxh02-armsrv3 1760936359 3.53.5-150600.3.3.13.5-150600.3.3.13.5_selinux.cpython-36m-aarch64-linux-gnu.soselinuxselinux-3.5.dist-infoINSTALLERMETADATARECORDWHEELtop_level.txt__init__.py_selinux.cpython-36m-aarch64-linux-gnu.soaudit2why.cpython-36m-aarch64-linux-gnu.sopython3-selinuxLICENSE/usr/lib64/python3.6/site-packages//usr/lib64/python3.6/site-packages/selinux-3.5.dist-info//usr/lib64/python3.6/site-packages/selinux//usr/share/licenses//usr/share/licenses/python3-selinux/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:41224/SUSE_SLE-15-SP6_Update/cbb927a0f67b8e2eac79a483fee1f05e-libselinux.SUSE_SLE-15-SP6_Update:libselinux-bindingsdrpmxz5aarch64-suse-linuxdirectoryASCII textASCII text, with CRLF line terminatorsPython script, ASCII text executableELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=5a91169f55798a8a16d3f45b8353d0d047e821d1, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=95f50a635486aa391899eacad055e34175d87861, stripped  R R R RRR RRRRRRR RRRRRRRR|}-ms%n(xutf-8762c10ea35758c67ab10dc0c3493abc311ce46d5a988d0ab85b84758444537d6?7zXZ !t/]"k%%) `>_.Y:Yfu+>M >CB4i-܍CȻ,`?O71tq,g$';B#pLsʈM^p  WS?ږ[`~XCǪ})fUN ERy^ *7*&^X*6x9s"d$vb/n&ckvsG)[̮+52Wň[ P~40Ц]8,q3WYwJ9ruC|lѴ {T0z37ϩuZjr bSQodW|:Œq`xHQ\t'?۳-ycBMpC<ھ\ eg,X^T1$ґ_׺KZ#ؿRhe00p$NІ>ډ&fqgU'ɒ/ @!Y1 "͗P91LsyҘs9#=}>2O;>4x٧xRb=ne tx&87[4?a]ftpYRuSpiEDW |] [ה xB3-צ8/(xR!M%`HoR4:z_ПUťWdWo|e5fftek- '::=TNb e휴D5}C L|dn1 ~ %vI -˕#N&?C C.:HE am*[U'L˱ ^3EOҏ2g3 #4vP" '^._ .QSkNMc|[=qÿc z~q D q֏g Q@{Ի-:_bı$OɏeJ&GޓmB;<(DfmK\$-#'"S@YSGQKRZK`c@km KlP[&PgOO3{VEǥQRY aB>ۃ2_ئy1;1HБU%REߒ.r9lDP=BusXܦSU@`<]-ic0prk z yĚ8N4$i$ H57Od7,EqC $D(iT6c@87Stbfa}k۽T,T2̄]sH-jIDr\ !2VWb{ -(jޯWgtX;"mnE3oeS'¤YqAl P5SO3֐Vt2|ꚔEh&_+e)0996'6~]P(<۸.ǧ JQtwtx2_!D|;`00UtXn8!\ioK\Qq\/GNM/JePxpM|Fᶁ`Y$7?X0y-Hy4x<]}Z_[zêS*<2HX皫c˗&KUEʠjcG'`Nt{19{߶ YZ