Revisions of audit

buildservice-autocommit accepted request 1098554 from Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) (revision 150)
baserev update by copy to link target
Wolfgang Frisch's avatar Wolfgang Frisch (wfrisch) accepted request 1096509 from Paolo Stivanin's avatar Paolo Stivanin (polslinux) (revision 148)
- Update to 3.1.1:
  * Add user friendly keywords for signals to auditctl
  * In ausearch, parse up URINGOP and DM_CTRL records
  * Harden auparse to better handle corrupt logs
  * Fix a CFLAGS propogation problem in the common directory
  * Move the audispd af_unix plugin to a standalone program 
- Update to 3.1.1:
  * Add user friendly keywords for signals to auditctl
  * In ausearch, parse up URINGOP and DM_CTRL records
  * Harden auparse to better handle corrupt logs
  * Fix a CFLAGS propogation problem in the common directory
  * Move the audispd af_unix plugin to a standalone program
Wolfgang Frisch's avatar Wolfgang Frisch (wfrisch) accepted request 1084694 from Frederic Crozat's avatar Frederic Crozat (fcrozat) (revision 147)
- Add _multibuild to define additional spec files as additional
  flavors.
  Eliminates the need for source package links in OBS.

- Add _multibuild to define additional spec files as additional
  flavors.
  Eliminates the need for source package links in OBS.
Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) accepted request 1073295 from Giuliano Belinassi's avatar Giuliano Belinassi (gbelinassi) (revision 146)
- Enable livepatching on main library on x86_64.

We are enabling livepatching support on this library because SAP Hana link against it.
Wolfgang Frisch's avatar Wolfgang Frisch (wfrisch) accepted request 1066846 from Paolo Stivanin's avatar Paolo Stivanin (polslinux) (revision 145)
- Update to 3.1:
  * Disable ProtectControlGroups in auditd.service by default
  * Fix rule checking for exclude filter
  * Make audit_rule_syscallbyname_data work correctly outside of auditctl
  * Add new record types
  * Add io_uring support
  * Add support for new FANOTIFY record fields
  * Add keyword, this-hour, to ausearch/report start/end options
  * Add Requires.private to audit.pc file
  * Try to interpret OPENAT2 fields correctly
- Update to 3.1:
  * Disable ProtectControlGroups in auditd.service by default
  * Fix rule checking for exclude filter
  * Make audit_rule_syscallbyname_data work correctly outside of auditctl
  * Add new record types
  * Add io_uring support
  * Add support for new FANOTIFY record fields
  * Add keyword, this-hour, to ausearch/report start/end options
  * Add Requires.private to audit.pc file
  * Try to interpret OPENAT2 fields correctly
buildservice-autocommit accepted request 1066163 from Robert Frohl's avatar Robert Frohl (rfrohl) (revision 144)
baserev update by copy to link target
Robert Frohl's avatar Robert Frohl (rfrohl) committed (revision 143)
clean up stale archiv and removed patches
Robert Frohl's avatar Robert Frohl (rfrohl) accepted request 1051400 from Ludwig Nussel's avatar Ludwig Nussel (lnussel) (revision 142)
- Replace transitional %usrmerged macro with regular version check (boo#1206798)
Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) accepted request 1043243 from Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) (revision 141)
- Enable build for ARM (32-bit)
- Update to version 3.0.9:
  * In auditd, release the async flush lock on stop
  * Don't allow auditd to log directly into /var/log when log_group is non-zero
  * Cleanup krb5 memory leaks on error paths
  * Update auditd.cron to use auditctl --signal
  * In auparse, if too many fields, realloc array bigger (Paul Wolneykien)
  * In auparse, special case kernel module name interpretation
  * If overflow_action is ignore, don't treat as an error
  (3.0.8)
  * Add gcc function attributes for access and allocation
  * Add some more man pages (MIZUTA Takeshi)
  * In auditd, change the reinitializing of the plugin queue
  * Fix path normalization in auparse (Sergio Correia)
  * In libaudit, handle ECONNREFUSED for network uid/gid lookups (Enzo Matsumiya)
  * In audisp-remote, fix hang with disk_low_action=suspend (Enzo Matsumiya)
  * Drop ProtectHome from auditd.service as it interferes with rules
  (3.0.7)
  * Add support for the OPENAT2 record type (Richard Guy Briggs)
  * In auditd, close the logging file descriptor when logging is suspended
  * Update the capabilities lookup table to match 5.16 kernel
  * Improve interpretation of renamat & faccessat family of syscalls
  * Update syscall table for the 5.16 kernel
  * Reduce dependency from initscripts to initscripts-service
- Refresh patches (context adjusment):
  * audit-allow-manual-stop.patch
  * audit-ausearch-do-not-require-tclass.patch
  * audit-no-gss.patch
  * enable-stop-rules.patch
  * fix-hardened-service.patch
  * harden_auditd.service.patch
- Remove patches (fixed by version update):
  * libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch
  * audisp-remote-fix-hang-with-disk_low_action-suspend-.patch
- Enable build for ARM (32-bit)
- Update to version 3.0.9:
  * In auditd, release the async flush lock on stop
  * Don't allow auditd to log directly into /var/log when log_group is non-zero
  * Cleanup krb5 memory leaks on error paths
  * Update auditd.cron to use auditctl --signal
  * In auparse, if too many fields, realloc array bigger (Paul Wolneykien)
  * In auparse, special case kernel module name interpretation
  * If overflow_action is ignore, don't treat as an error
  (3.0.8)
  * Add gcc function attributes for access and allocation
  * Add some more man pages (MIZUTA Takeshi)
  * In auditd, change the reinitializing of the plugin queue
  * Fix path normalization in auparse (Sergio Correia)
  * In libaudit, handle ECONNREFUSED for network uid/gid lookups (Enzo Matsumiya)
  * In audisp-remote, fix hang with disk_low_action=suspend (Enzo Matsumiya)
  * Drop ProtectHome from auditd.service as it interferes with rules
  (3.0.7)
  * Add support for the OPENAT2 record type (Richard Guy Briggs)
  * In auditd, close the logging file descriptor when logging is suspended
  * Update the capabilities lookup table to match 5.16 kernel
  * Improve interpretation of renamat & faccessat family of syscalls
  * Update syscall table for the 5.16 kernel
  * Reduce dependency from initscripts to initscripts-service
- Refresh patches (context adjusment):
  * audit-allow-manual-stop.patch
  * audit-ausearch-do-not-require-tclass.patch
  * audit-no-gss.patch
  * enable-stop-rules.patch
  * fix-hardened-service.patch
  * harden_auditd.service.patch
- Remove patches (fixed by version update):
  * libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch
  * audisp-remote-fix-hang-with-disk_low_action-suspend-.patch
buildservice-autocommit accepted request 969466 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 140)
baserev update by copy to link target
Marcus Meissner's avatar Marcus Meissner (msmeissn) accepted request 969286 from Jan Engelhardt's avatar Jan Engelhardt (jengelh) (revision 139)
- Drop buildrequire on C++ compiler. (can't find anything that uses it)
- Modernize specfile constructs.
buildservice-autocommit accepted request 965461 from Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) (revision 138)
baserev update by copy to link target
Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) accepted request 965005 from Stephan Kulow's avatar Stephan Kulow (coolo) (revision 137)
- Fix buildrequire for openldap2-devel - audit doesn't require the
  (outdated) C++ binding, but the C headers that happen to be pulled
  in by buildrequiring the C++ devel package
Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) accepted request 964942 from Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) (revision 136)
- Fix unhandled ECONNREFUSED with LDAP environments (bsc#1196645)
  * add libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch
- Fix hang in audisp-remote with disk_low_action=suspend (bsc#1196517)
  * add audisp-remote-fix-hang-with-disk_low_action-suspend-.patch
Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) accepted request 964336 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 135)
- add audit-userspace-517-compat.patch
Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) accepted request 934558 from Fabian Vogt's avatar Fabian Vogt (favogt) (revision 134)
- Use %autosetup
- Don't include sample rules as %doc, they're already installed
  as normal files
- Fix create-augenrules-service.patch:
  * auditd.service needs to require augenrules.service,
    not the other way around
- Fix documentation for enable-stop-rules.patch
Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) accepted request 930154 from Callum Farmer's avatar Callum Farmer (gmbr3) (revision 133)
- Update to version 3.0.6:
  * fixes a segfault on some SELINUX_ERR records
  * makes IPX packet interpretation dependent on the ipx header
    file existing
  * adds b32/b64 support to ausyscall
  * adds support for armv8l
  * fixes auditctl list of syscalls on PPC
  * auditd.service now restarts auditd under some conditions
- Update to version 3.0.6:
  * fixes a segfault on some SELINUX_ERR records
  * makes IPX packet interpretation dependent on the ipx header
    file existing
  * adds b32/b64 support to ausyscall
  * adds support for armv8l
  * fixes auditctl list of syscalls on PPC
  * auditd.service now restarts auditd under some conditions
Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) accepted request 925413 from Callum Farmer's avatar Callum Farmer (gmbr3) (revision 132)
- Add CONFIG parameter to %sysusers_generate_pre
Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) accepted request 925195 from Enzo Matsumiya's avatar Enzo Matsumiya (ematsumiya) (revision 131)
- Create separate service for augenrules (bsc#1191614, bsc#1181400)
  * add create-augenrules-service.patch
  Remove ReadWritePaths=/etc/audit from auditd.service, also removes
  augenrules call from ExecStartPost.
  Create augenrules.service with the ReadWritePaths directive above.
  This makes /etc/audit only accessible by augenrules.service and
  let auditd.service (and daemon) to be sandboxed again.
- Update audit-secondary.spec to accomodate the new service file.
Displaying revisions 1 - 20 of 150
openSUSE Build Service is sponsored by