Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.
This commit is contained in:
Dominick Grift 2010-09-24 09:17:22 +02:00
parent 39178aaf8a
commit 1e2abee10b
14 changed files with 224 additions and 233 deletions

View File

@ -6,7 +6,6 @@ policy_module(razor, 2.1.1)
# #
ifdef(`distro_redhat',` ifdef(`distro_redhat',`
gen_require(` gen_require(`
type spamc_t, spamc_exec_t, spamd_log_t; type spamc_t, spamc_exec_t, spamd_log_t;
type spamd_spool_t, spamd_var_lib_t, spamd_etc_t; type spamd_spool_t, spamd_var_lib_t, spamd_etc_t;
@ -23,9 +22,7 @@ ifdef(`distro_redhat',`
typealias spamc_home_t alias { auditadm_razor_home_t secadm_razor_home_t }; typealias spamc_home_t alias { auditadm_razor_home_t secadm_razor_home_t };
typealias spamc_tmp_t alias { user_razor_tmp_t staff_razor_tmp_t sysadm_razor_tmp_t }; typealias spamc_tmp_t alias { user_razor_tmp_t staff_razor_tmp_t sysadm_razor_tmp_t };
typealias spamc_tmp_t alias { auditadm_razor_tmp_t secadm_razor_tmp_t }; typealias spamc_tmp_t alias { auditadm_razor_tmp_t secadm_razor_tmp_t };
',` ',`
type razor_exec_t; type razor_exec_t;
corecmd_executable_file(razor_exec_t) corecmd_executable_file(razor_exec_t)
@ -144,5 +141,4 @@ tunable_policy(`use_samba_home_dirs',`
optional_policy(` optional_policy(`
milter_manage_spamass_state(razor_t) milter_manage_spamass_state(razor_t)
') ')
') ')

View File

@ -129,7 +129,6 @@ optional_policy(`
# #
allow gfs_controld_t self:capability { net_admin sys_resource }; allow gfs_controld_t self:capability { net_admin sys_resource };
allow gfs_controld_t self:shm create_shm_perms; allow gfs_controld_t self:shm create_shm_perms;
allow gfs_controld_t self:netlink_kobject_uevent_socket create_socket_perms; allow gfs_controld_t self:netlink_kobject_uevent_socket create_socket_perms;
@ -159,7 +158,6 @@ optional_policy(`
allow groupd_t self:capability { sys_nice sys_resource }; allow groupd_t self:capability { sys_nice sys_resource };
allow groupd_t self:process setsched; allow groupd_t self:process setsched;
allow groupd_t self:shm create_shm_perms; allow groupd_t self:shm create_shm_perms;
dev_list_sysfs(groupd_t) dev_list_sysfs(groupd_t)
@ -174,7 +172,6 @@ init_rw_script_tmp_files(groupd_t)
# #
allow qdiskd_t self:capability { ipc_lock sys_boot }; allow qdiskd_t self:capability { ipc_lock sys_boot };
allow qdiskd_t self:tcp_socket create_stream_socket_perms; allow qdiskd_t self:tcp_socket create_stream_socket_perms;
allow qdiskd_t self:udp_socket create_socket_perms; allow qdiskd_t self:udp_socket create_socket_perms;
@ -226,7 +223,6 @@ optional_policy(`
allow cluster_domain self:capability { sys_nice }; allow cluster_domain self:capability { sys_nice };
allow cluster_domain self:process setsched; allow cluster_domain self:process setsched;
allow cluster_domain self:sem create_sem_perms; allow cluster_domain self:sem create_sem_perms;
allow cluster_domain self:fifo_file rw_fifo_file_perms; allow cluster_domain self:fifo_file rw_fifo_file_perms;
allow cluster_domain self:unix_stream_socket create_stream_socket_perms; allow cluster_domain self:unix_stream_socket create_stream_socket_perms;

View File

@ -4,6 +4,7 @@ policy_module(snmp, 1.11.0)
# #
# Declarations # Declarations
# #
type snmpd_t; type snmpd_t;
type snmpd_exec_t; type snmpd_exec_t;
init_daemon_domain(snmpd_t, snmpd_exec_t) init_daemon_domain(snmpd_t, snmpd_exec_t)
@ -24,6 +25,7 @@ files_type(snmpd_var_lib_t)
# #
# Local policy # Local policy
# #
allow snmpd_t self:capability { chown dac_override kill ipc_lock setgid setuid sys_ptrace net_admin sys_nice sys_tty_config }; allow snmpd_t self:capability { chown dac_override kill ipc_lock setgid setuid sys_ptrace net_admin sys_nice sys_tty_config };
dontaudit snmpd_t self:capability { sys_module sys_tty_config }; dontaudit snmpd_t self:capability { sys_module sys_tty_config };
allow snmpd_t self:process { signal_perms getsched setsched }; allow snmpd_t self:process { signal_perms getsched setsched };

View File

@ -217,7 +217,6 @@ optional_policy(`
dontaudit ssh_keygen_t self:capability sys_tty_config; dontaudit ssh_keygen_t self:capability sys_tty_config;
allow ssh_keygen_t self:process { sigchld sigkill sigstop signull signal }; allow ssh_keygen_t self:process { sigchld sigkill sigstop signull signal };
allow ssh_keygen_t self:unix_stream_socket create_stream_socket_perms; allow ssh_keygen_t self:unix_stream_socket create_stream_socket_perms;
allow ssh_keygen_t sshd_key_t:file manage_file_perms; allow ssh_keygen_t sshd_key_t:file manage_file_perms;
@ -287,7 +286,6 @@ optional_policy(`
# so a tunnel can point to another ssh tunnel # so a tunnel can point to another ssh tunnel
allow sshd_t self:netlink_route_socket r_netlink_socket_perms; allow sshd_t self:netlink_route_socket r_netlink_socket_perms;
allow sshd_t self:key { search link write }; allow sshd_t self:key { search link write };
allow sshd_t self:process setcurrent; allow sshd_t self:process setcurrent;
kernel_search_key(sshd_t) kernel_search_key(sshd_t)
@ -405,7 +403,6 @@ tunable_policy(`ssh_sysadm_login',`
dontaudit ssh_keygen_t self:capability sys_tty_config; dontaudit ssh_keygen_t self:capability sys_tty_config;
allow ssh_keygen_t self:process { sigchld sigkill sigstop signull signal }; allow ssh_keygen_t self:process { sigchld sigkill sigstop signull signal };
allow ssh_keygen_t self:unix_stream_socket create_stream_socket_perms; allow ssh_keygen_t self:unix_stream_socket create_stream_socket_perms;
allow ssh_keygen_t sshd_key_t:file manage_file_perms; allow ssh_keygen_t sshd_key_t:file manage_file_perms;

View File

@ -28,6 +28,7 @@ files_pid_file(sssd_var_run_t)
# #
# sssd local policy # sssd local policy
# #
allow sssd_t self:capability { chown dac_read_search dac_override kill sys_nice setgid setuid }; allow sssd_t self:capability { chown dac_read_search dac_override kill sys_nice setgid setuid };
allow sssd_t self:process { setfscreate setsched sigkill signal getsched }; allow sssd_t self:process { setfscreate setsched sigkill signal getsched };
allow sssd_t self:fifo_file rw_file_perms; allow sssd_t self:fifo_file rw_file_perms;

View File

@ -120,4 +120,5 @@ ifdef(`distro_gentoo', `
gen_require(` gen_require(`
type stunnel_port_t; type stunnel_port_t;
') ')
allow stunnel_t stunnel_port_t:tcp_socket name_bind; allow stunnel_t stunnel_port_t:tcp_socket name_bind;

View File

@ -71,4 +71,3 @@ optional_policy(`
optional_policy(` optional_policy(`
nscd_socket_use(sysstat_t) nscd_socket_use(sysstat_t)
') ')

View File

@ -43,7 +43,6 @@ files_pid_file(tor_var_run_t)
allow tor_t self:capability { setgid setuid sys_tty_config }; allow tor_t self:capability { setgid setuid sys_tty_config };
allow tor_t self:process signal; allow tor_t self:process signal;
allow tor_t self:fifo_file rw_fifo_file_perms; allow tor_t self:fifo_file rw_fifo_file_perms;
allow tor_t self:unix_stream_socket create_stream_socket_perms; allow tor_t self:unix_stream_socket create_stream_socket_perms;
allow tor_t self:netlink_route_socket r_netlink_socket_perms; allow tor_t self:netlink_route_socket r_netlink_socket_perms;