various: Module version bump.

Signed-off-by: Chris PeBenito <pebenito@ieee.org>
This commit is contained in:
Chris PeBenito 2021-02-02 13:58:24 -05:00
parent a673712d8a
commit 4436cd0d6d
10 changed files with 11 additions and 11 deletions

View File

@ -1,4 +1,4 @@
policy_module(apt, 1.15.0)
policy_module(apt, 1.15.1)
########################################
#

View File

@ -1,4 +1,4 @@
policy_module(bootloader, 1.21.1)
policy_module(bootloader, 1.21.2)
########################################
#

View File

@ -1,4 +1,4 @@
policy_module(logrotate, 1.24.0)
policy_module(logrotate, 1.24.1)
########################################
#

View File

@ -1,4 +1,4 @@
policy_module(games, 2.7.1)
policy_module(games, 2.7.2)
########################################
#

View File

@ -1,4 +1,4 @@
policy_module(mplayer, 2.10.0)
policy_module(mplayer, 2.10.1)
########################################
#

View File

@ -1,4 +1,4 @@
policy_module(dbus, 1.29.5)
policy_module(dbus, 1.29.6)
gen_require(`
class dbus all_dbus_perms;

View File

@ -1,4 +1,4 @@
policy_module(ssh, 2.14.3)
policy_module(ssh, 2.14.4)
########################################
#

View File

@ -1,4 +1,4 @@
policy_module(authlogin, 2.17.6)
policy_module(authlogin, 2.17.7)
########################################
#

View File

@ -1,4 +1,4 @@
policy_module(locallogin, 1.21.2)
policy_module(locallogin, 1.21.3)
########################################
#

View File

@ -1,4 +1,4 @@
policy_module(systemd, 1.10.11)
policy_module(systemd, 1.10.12)
#########################################
#
@ -731,7 +731,7 @@ allow systemd_machined_t self:process setfscreate;
allow systemd_machined_t self:unix_dgram_socket { connected_socket_perms connect };
term_create_pty(systemd_machined_t, systemd_machined_devpts_t)
allow systemd_machined_t systemd_machined_devpts_t:chr_file manage_file_perms;
allow systemd_machined_t systemd_machined_devpts_t:chr_file manage_chr_file_perms;
manage_files_pattern(systemd_machined_t, systemd_machined_runtime_t, systemd_machined_runtime_t)
allow systemd_machined_t systemd_machined_runtime_t:lnk_file manage_lnk_file_perms;