-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 audit2why can throw a runtime exception and typo in man page. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iEYEARECAAYFAkkUUnwACgkQrlYvE4MpobNB3gCg1gVyqHVlNPHofR7iDktfmKSF cTQAniHIYf8nq+nbB9MC0mlVbyvEECMX =JXfF -----END PGP SIGNATURE-----
--- nsapolicycoreutils/audit2allow/audit2allow 2008-08-28 09:34:24.000000000 -0400 +++ policycoreutils-2.0.57/audit2allow/audit2allow 2008-10-30 14:21:33.000000000 -0400 @@ -287,7 +287,11 @@ def __output(self): if self.__options.audit2why: - return self.__output_audit2why() + try: + return self.__output_audit2why() + except RuntimeError, e: + print e + sys.exit(1) g = policygen.PolicyGenerator() --- nsapolicycoreutils/audit2allow/audit2allow.1 2008-08-28 09:34:24.000000000 -0400 +++ policycoreutils-2.0.57/audit2allow/audit2allow.1 2008-10-29 09:44:41.000000000 -0400 @@ -82,7 +82,7 @@ Indicates input file is a te (type enforcement) file. This can be used to translate old te format to new policy format. .TP .B "\-w" | "\-\-why" -Translates SELinux audit messages into a description of why the access wasn denied +Translates SELinux audit messages into a description of why the access was denied .TP .B "\-v" | "\-\-verbose"
Attachment:
audit2allow.patch.sig
Description: Binary data