summaryrefslogtreecommitdiff
path: root/lib/rpmts_internal.h
diff options
context:
space:
mode:
authorPanu Matilainen <pmatilai@redhat.com>2010-12-21 11:01:22 +0200
committerPanu Matilainen <pmatilai@redhat.com>2010-12-21 11:01:22 +0200
commit00463e2fe0d115d873f141995e7d8b3041de7d36 (patch)
tree1fa56e147d7251ae0b9071382f26d39ab95c0805 /lib/rpmts_internal.h
parent247c5431776299196cf32e0a3980a4b9516379ea (diff)
downloadrpm-00463e2fe0d115d873f141995e7d8b3041de7d36.tar.gz
Move rpmtsSELabelFoo() functions to an internal-only header
- The sepolicy plugin needs them so the symbols can't be hidden, but these are not something external API-users should be messing with. - Ultimately we'll want to push the actual labeling from FSM to the plugin, insulating rpm from all SELinux specifics, this is just a band-aid temporary "solution" to keep this out of the API.
Diffstat (limited to 'lib/rpmts_internal.h')
-rw-r--r--lib/rpmts_internal.h21
1 files changed, 21 insertions, 0 deletions
diff --git a/lib/rpmts_internal.h b/lib/rpmts_internal.h
index 7ed6eb6ed..438fd46a4 100644
--- a/lib/rpmts_internal.h
+++ b/lib/rpmts_internal.h
@@ -81,6 +81,27 @@ int rpmtsSolve(rpmts ts, rpmds key);
RPM_GNUC_INTERNAL
rpmlock rpmtsAcquireLock(rpmts ts);
+/** \ingroup rpmts
+ * Get the selabel handle from the transaction set
+ * @param ts transaction set
+ * @return rpm selabel handle, or NULL if it hasn't been initialized yet
+ */
+struct selabel_handle * rpmtsSELabelHandle(rpmts ts);
+
+/** \ingroup rpmts
+ * Initialize selabel
+ * @param ts transaction set
+ * @param path path to contexts file
+ * @return RPMRC_OK on success, RPMRC_FAIL otherwise
+ */
+rpmRC rpmtsSELabelInit(rpmts ts, const char * path);
+
+/** \ingroup rpmts
+ * Clean up selabel
+ * @param ts transaction set
+ */
+void rpmtsSELabelFini(rpmts ts);
+
#ifdef __cplusplus
}
#endif