Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes.
This commit is contained in:
parent
3507be9506
commit
2a724571c9
@ -710,8 +710,8 @@ interface(`postfix_admin',`
|
|||||||
allow $1 postfix_smtpd_t:process { ptrace signal_perms };
|
allow $1 postfix_smtpd_t:process { ptrace signal_perms };
|
||||||
ps_process_pattern($1, postfix_smtpd_t)
|
ps_process_pattern($1, postfix_smtpd_t)
|
||||||
|
|
||||||
postfix_run_map($1,$2)
|
postfix_run_map($1, $2)
|
||||||
postfix_run_postdrop($1,$2)
|
postfix_run_postdrop($1, $2)
|
||||||
|
|
||||||
postfix_initrc_domtrans($1)
|
postfix_initrc_domtrans($1)
|
||||||
domain_system_change_exemption($1)
|
domain_system_change_exemption($1)
|
||||||
|
@ -312,7 +312,7 @@ interface(`postgresql_stream_connect',`
|
|||||||
|
|
||||||
files_search_pids($1)
|
files_search_pids($1)
|
||||||
files_search_tmp($1)
|
files_search_tmp($1)
|
||||||
stream_connect_pattern($1, { postgresql_var_run_t postgresql_tmp_t}, { postgresql_var_run_t postgresql_tmp_t}, postgresql_t)
|
stream_connect_pattern($1, { postgresql_var_run_t postgresql_tmp_t }, { postgresql_var_run_t postgresql_tmp_t }, postgresql_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -96,4 +96,3 @@ interface(`procmail_read_home_files',`
|
|||||||
userdom_search_user_home_dirs($1)
|
userdom_search_user_home_dirs($1)
|
||||||
read_files_pattern($1, procmail_home_t, procmail_home_t)
|
read_files_pattern($1, procmail_home_t, procmail_home_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -91,7 +91,6 @@ interface(`psad_manage_config',`
|
|||||||
files_search_etc($1)
|
files_search_etc($1)
|
||||||
manage_dirs_pattern($1, psad_etc_t, psad_etc_t)
|
manage_dirs_pattern($1, psad_etc_t, psad_etc_t)
|
||||||
manage_files_pattern($1, psad_etc_t, psad_etc_t)
|
manage_files_pattern($1, psad_etc_t, psad_etc_t)
|
||||||
|
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -21,7 +21,7 @@
|
|||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`puppet_rw_tmp', `
|
interface(`puppet_rw_tmp',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type puppet_tmp_t;
|
type puppet_tmp_t;
|
||||||
')
|
')
|
||||||
|
@ -132,5 +132,3 @@ interface(`pyzor_admin',`
|
|||||||
files_list_var_lib($1)
|
files_list_var_lib($1)
|
||||||
admin_pattern($1, pyzor_var_lib_t)
|
admin_pattern($1, pyzor_var_lib_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
## <summary>policy for qpidd</summary>
|
## <summary>policy for qpidd</summary>
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -19,7 +18,6 @@ interface(`qpidd_domtrans',`
|
|||||||
domtrans_pattern($1, qpidd_exec_t, qpidd_t)
|
domtrans_pattern($1, qpidd_exec_t, qpidd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute qpidd server in the qpidd domain.
|
## Execute qpidd server in the qpidd domain.
|
||||||
@ -77,7 +75,6 @@ interface(`qpidd_manage_var_run',`
|
|||||||
manage_lnk_files_pattern($1, qpidd_var_run_t, qpidd_var_run_t)
|
manage_lnk_files_pattern($1, qpidd_var_run_t, qpidd_var_run_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Search qpidd lib directories.
|
## Search qpidd lib directories.
|
||||||
@ -156,7 +153,6 @@ interface(`qpidd_manage_var_lib',`
|
|||||||
manage_lnk_files_pattern($1, qpidd_var_lib_t, qpidd_var_lib_t)
|
manage_lnk_files_pattern($1, qpidd_var_lib_t, qpidd_var_lib_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## All of the rules required to administrate
|
## All of the rules required to administrate
|
||||||
@ -182,7 +178,6 @@ interface(`qpidd_admin',`
|
|||||||
allow $1 qpidd_t:process { ptrace signal_perms };
|
allow $1 qpidd_t:process { ptrace signal_perms };
|
||||||
ps_process_pattern($1, qpidd_t)
|
ps_process_pattern($1, qpidd_t)
|
||||||
|
|
||||||
|
|
||||||
# Allow qpidd_t to restart the apache service
|
# Allow qpidd_t to restart the apache service
|
||||||
qpidd_initrc_domtrans($1)
|
qpidd_initrc_domtrans($1)
|
||||||
domain_system_change_exemption($1)
|
domain_system_change_exemption($1)
|
||||||
@ -192,7 +187,6 @@ interface(`qpidd_admin',`
|
|||||||
qpidd_manage_var_run($1)
|
qpidd_manage_var_run($1)
|
||||||
|
|
||||||
qpidd_manage_var_lib($1)
|
qpidd_manage_var_lib($1)
|
||||||
|
|
||||||
')
|
')
|
||||||
|
|
||||||
#####################################
|
#####################################
|
||||||
|
@ -26,6 +26,7 @@ template(`razor_common_domain_template',`
|
|||||||
gen_require(`
|
gen_require(`
|
||||||
type razor_exec_t, razor_etc_t, razor_log_t, razor_var_lib_t;
|
type razor_exec_t, razor_etc_t, razor_log_t, razor_var_lib_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
type $1_t;
|
type $1_t;
|
||||||
domain_type($1_t)
|
domain_type($1_t)
|
||||||
domain_entry_file($1_t, razor_exec_t)
|
domain_entry_file($1_t, razor_exec_t)
|
||||||
@ -197,4 +198,3 @@ interface(`razor_read_lib_files',`
|
|||||||
files_search_var_lib($1)
|
files_search_var_lib($1)
|
||||||
read_files_pattern($1, razor_var_lib_t, razor_var_lib_t)
|
read_files_pattern($1, razor_var_lib_t, razor_var_lib_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -51,7 +51,6 @@ template(`rhcs_domain_template',`
|
|||||||
manage_fifo_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
|
manage_fifo_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
|
||||||
manage_sock_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
|
manage_sock_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
|
||||||
files_pid_filetrans($1_t, $1_var_run_t, { file fifo_file })
|
files_pid_filetrans($1_t, $1_var_run_t, { file fifo_file })
|
||||||
|
|
||||||
')
|
')
|
||||||
|
|
||||||
######################################
|
######################################
|
||||||
|
@ -28,7 +28,7 @@ interface(`ricci_domtrans',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`ricci_initrc_domtrans', `
|
interface(`ricci_initrc_domtrans',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type ricci_initrc_exec_t;
|
type ricci_initrc_exec_t;
|
||||||
')
|
')
|
||||||
|
@ -32,7 +32,7 @@ interface(`rpc_stub',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
template(`rpc_domain_template', `
|
template(`rpc_domain_template',`
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Declarations
|
# Declarations
|
||||||
|
@ -1,7 +1,5 @@
|
|||||||
|
|
||||||
## <summary>policy for vnstatd</summary>
|
## <summary>policy for vnstatd</summary>
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute a domain transition to run vnstatd.
|
## Execute a domain transition to run vnstatd.
|
||||||
@ -20,8 +18,6 @@ interface(`vnstatd_domtrans',`
|
|||||||
domtrans_pattern($1, vnstatd_exec_t, vnstatd_t)
|
domtrans_pattern($1, vnstatd_exec_t, vnstatd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute a domain transition to run vnstat.
|
## Execute a domain transition to run vnstat.
|
||||||
@ -146,5 +142,4 @@ interface(`vnstatd_admin',`
|
|||||||
|
|
||||||
files_list_var_lib($1)
|
files_list_var_lib($1)
|
||||||
admin_pattern($1, vnstatd_var_lib_t)
|
admin_pattern($1, vnstatd_var_lib_t)
|
||||||
|
|
||||||
')
|
')
|
||||||
|
@ -243,7 +243,7 @@ interface(`xserver_rw_session',`
|
|||||||
type xserver_t, xserver_tmpfs_t;
|
type xserver_t, xserver_tmpfs_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
xserver_ro_session($1,$2)
|
xserver_ro_session($1, $2)
|
||||||
allow $1 xserver_t:shm rw_shm_perms;
|
allow $1 xserver_t:shm rw_shm_perms;
|
||||||
allow $1 xserver_tmpfs_t:file rw_file_perms;
|
allow $1 xserver_tmpfs_t:file rw_file_perms;
|
||||||
')
|
')
|
||||||
|
Loading…
Reference in New Issue
Block a user