-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Currently audit2allow/sepolgen will create two identical gen_requires block if you have allow rules and a role statement. This patch fixes this problem. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iEYEARECAAYFAkjJHroACgkQrlYvE4MpobPgMQCghgAMBtaQO0BeZX+ug6IwsWB8 bNEAoMkRo4cZa0iJhGoGMmCvy5ncGpj8 =gMFg -----END PGP SIGNATURE-----
diff --exclude-from=exclude -N -u -r nsasepolgen/src/sepolgen/policygen.py policycoreutils-2.0.55/sepolgen-1.0.13/src/sepolgen/policygen.py --- nsasepolgen/src/sepolgen/policygen.py 2008-08-28 09:34:24.000000000 -0400 +++ policycoreutils-2.0.55/sepolgen-1.0.13/src/sepolgen/policygen.py 2008-09-11 09:26:52.000000000 -0400 @@ -134,6 +134,10 @@ m.refpolicy = False def get_module(self): + # Generate the requires + if self.gen_requires: + gen_requires(self.module) + """Return the generated module""" return self.module @@ -163,18 +167,10 @@ # Generate the raw allow rules from the filtered list self.__add_allow_rules(raw_allow) - # Generate the requires - if self.gen_requires: - gen_requires(self.module) - def add_role_types(self, role_type_set): for role_type in role_type_set: self.module.children.append(role_type) - # Generate the requires - if self.gen_requires: - gen_requires(self.module) - def explain_access(av, ml=None, verbosity=SHORT_EXPLANATION): """Explain why a policy statement was generated.
Attachment:
diffsepol.sig
Description: Binary data