Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes.
This commit is contained in:
parent
3507be9506
commit
2a724571c9
@ -710,8 +710,8 @@ interface(`postfix_admin',`
|
||||
allow $1 postfix_smtpd_t:process { ptrace signal_perms };
|
||||
ps_process_pattern($1, postfix_smtpd_t)
|
||||
|
||||
postfix_run_map($1,$2)
|
||||
postfix_run_postdrop($1,$2)
|
||||
postfix_run_map($1, $2)
|
||||
postfix_run_postdrop($1, $2)
|
||||
|
||||
postfix_initrc_domtrans($1)
|
||||
domain_system_change_exemption($1)
|
||||
|
@ -312,7 +312,7 @@ interface(`postgresql_stream_connect',`
|
||||
|
||||
files_search_pids($1)
|
||||
files_search_tmp($1)
|
||||
stream_connect_pattern($1, { postgresql_var_run_t postgresql_tmp_t}, { postgresql_var_run_t postgresql_tmp_t}, postgresql_t)
|
||||
stream_connect_pattern($1, { postgresql_var_run_t postgresql_tmp_t }, { postgresql_var_run_t postgresql_tmp_t }, postgresql_t)
|
||||
')
|
||||
|
||||
########################################
|
||||
|
@ -96,4 +96,3 @@ interface(`procmail_read_home_files',`
|
||||
userdom_search_user_home_dirs($1)
|
||||
read_files_pattern($1, procmail_home_t, procmail_home_t)
|
||||
')
|
||||
|
||||
|
@ -91,7 +91,6 @@ interface(`psad_manage_config',`
|
||||
files_search_etc($1)
|
||||
manage_dirs_pattern($1, psad_etc_t, psad_etc_t)
|
||||
manage_files_pattern($1, psad_etc_t, psad_etc_t)
|
||||
|
||||
')
|
||||
|
||||
########################################
|
||||
|
@ -21,7 +21,7 @@
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`puppet_rw_tmp', `
|
||||
interface(`puppet_rw_tmp',`
|
||||
gen_require(`
|
||||
type puppet_tmp_t;
|
||||
')
|
||||
|
@ -132,5 +132,3 @@ interface(`pyzor_admin',`
|
||||
files_list_var_lib($1)
|
||||
admin_pattern($1, pyzor_var_lib_t)
|
||||
')
|
||||
|
||||
|
||||
|
@ -1,4 +1,3 @@
|
||||
|
||||
## <summary>policy for qpidd</summary>
|
||||
|
||||
########################################
|
||||
@ -19,7 +18,6 @@ interface(`qpidd_domtrans',`
|
||||
domtrans_pattern($1, qpidd_exec_t, qpidd_t)
|
||||
')
|
||||
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Execute qpidd server in the qpidd domain.
|
||||
@ -77,7 +75,6 @@ interface(`qpidd_manage_var_run',`
|
||||
manage_lnk_files_pattern($1, qpidd_var_run_t, qpidd_var_run_t)
|
||||
')
|
||||
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Search qpidd lib directories.
|
||||
@ -156,7 +153,6 @@ interface(`qpidd_manage_var_lib',`
|
||||
manage_lnk_files_pattern($1, qpidd_var_lib_t, qpidd_var_lib_t)
|
||||
')
|
||||
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## All of the rules required to administrate
|
||||
@ -182,7 +178,6 @@ interface(`qpidd_admin',`
|
||||
allow $1 qpidd_t:process { ptrace signal_perms };
|
||||
ps_process_pattern($1, qpidd_t)
|
||||
|
||||
|
||||
# Allow qpidd_t to restart the apache service
|
||||
qpidd_initrc_domtrans($1)
|
||||
domain_system_change_exemption($1)
|
||||
@ -192,7 +187,6 @@ interface(`qpidd_admin',`
|
||||
qpidd_manage_var_run($1)
|
||||
|
||||
qpidd_manage_var_lib($1)
|
||||
|
||||
')
|
||||
|
||||
#####################################
|
||||
|
@ -26,6 +26,7 @@ template(`razor_common_domain_template',`
|
||||
gen_require(`
|
||||
type razor_exec_t, razor_etc_t, razor_log_t, razor_var_lib_t;
|
||||
')
|
||||
|
||||
type $1_t;
|
||||
domain_type($1_t)
|
||||
domain_entry_file($1_t, razor_exec_t)
|
||||
@ -197,4 +198,3 @@ interface(`razor_read_lib_files',`
|
||||
files_search_var_lib($1)
|
||||
read_files_pattern($1, razor_var_lib_t, razor_var_lib_t)
|
||||
')
|
||||
|
||||
|
@ -51,7 +51,6 @@ template(`rhcs_domain_template',`
|
||||
manage_fifo_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
|
||||
manage_sock_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
|
||||
files_pid_filetrans($1_t, $1_var_run_t, { file fifo_file })
|
||||
|
||||
')
|
||||
|
||||
######################################
|
||||
|
@ -28,7 +28,7 @@ interface(`ricci_domtrans',`
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`ricci_initrc_domtrans', `
|
||||
interface(`ricci_initrc_domtrans',`
|
||||
gen_require(`
|
||||
type ricci_initrc_exec_t;
|
||||
')
|
||||
|
@ -32,7 +32,7 @@ interface(`rpc_stub',`
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
template(`rpc_domain_template', `
|
||||
template(`rpc_domain_template',`
|
||||
########################################
|
||||
#
|
||||
# Declarations
|
||||
|
@ -1,7 +1,5 @@
|
||||
|
||||
## <summary>policy for vnstatd</summary>
|
||||
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Execute a domain transition to run vnstatd.
|
||||
@ -20,8 +18,6 @@ interface(`vnstatd_domtrans',`
|
||||
domtrans_pattern($1, vnstatd_exec_t, vnstatd_t)
|
||||
')
|
||||
|
||||
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Execute a domain transition to run vnstat.
|
||||
@ -146,5 +142,4 @@ interface(`vnstatd_admin',`
|
||||
|
||||
files_list_var_lib($1)
|
||||
admin_pattern($1, vnstatd_var_lib_t)
|
||||
|
||||
')
|
||||
|
@ -243,7 +243,7 @@ interface(`xserver_rw_session',`
|
||||
type xserver_t, xserver_tmpfs_t;
|
||||
')
|
||||
|
||||
xserver_ro_session($1,$2)
|
||||
xserver_ro_session($1, $2)
|
||||
allow $1 xserver_t:shm rw_shm_perms;
|
||||
allow $1 xserver_tmpfs_t:file rw_file_perms;
|
||||
')
|
||||
|
Loading…
Reference in New Issue
Block a user