Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Signed-off-by: Dominick Grift <domg472@gmail.com>
This commit is contained in:
parent
60d27bf8ab
commit
2d102f8402
@ -609,4 +609,3 @@ interface(`virt_dontaudit_write_pipes',`
|
|||||||
|
|
||||||
dontaudit $1 virtd_t:fifo_file write_fifo_file_perms;
|
dontaudit $1 virtd_t:fifo_file write_fifo_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
## <summary>X Windows Font Server </summary>
|
## <summary>X Windows Font Server</summary>
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
|
@ -114,7 +114,7 @@ interface(`xserver_restricted_role',`
|
|||||||
# Needed for escd, remove if we get escd policy
|
# Needed for escd, remove if we get escd policy
|
||||||
xserver_manage_xdm_tmp_files($2)
|
xserver_manage_xdm_tmp_files($2)
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms', `
|
ifdef(`hide_broken_symptoms',`
|
||||||
dontaudit iceauth_t $2:socket_class_set { read write };
|
dontaudit iceauth_t $2:socket_class_set { read write };
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -179,7 +179,6 @@ interface(`xserver_role',`
|
|||||||
manage_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
manage_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
||||||
relabel_dirs_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
relabel_dirs_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
||||||
relabel_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
relabel_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
||||||
|
|
||||||
')
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
@ -504,7 +503,7 @@ template(`xserver_user_x_domain_template',`
|
|||||||
# for .xsession-errors
|
# for .xsession-errors
|
||||||
userdom_dontaudit_write_user_home_content_files($2)
|
userdom_dontaudit_write_user_home_content_files($2)
|
||||||
|
|
||||||
xserver_ro_session($2,$3)
|
xserver_ro_session($2, $3)
|
||||||
xserver_use_user_fonts($2)
|
xserver_use_user_fonts($2)
|
||||||
|
|
||||||
xserver_read_xdm_tmp_files($2)
|
xserver_read_xdm_tmp_files($2)
|
||||||
@ -512,7 +511,7 @@ template(`xserver_user_x_domain_template',`
|
|||||||
|
|
||||||
# X object manager
|
# X object manager
|
||||||
xserver_object_types_template($1)
|
xserver_object_types_template($1)
|
||||||
xserver_common_x_domain_template($1,$2)
|
xserver_common_x_domain_template($1, $2)
|
||||||
|
|
||||||
# Client write xserver shm
|
# Client write xserver shm
|
||||||
tunable_policy(`allow_write_xshm',`
|
tunable_policy(`allow_write_xshm',`
|
||||||
@ -584,7 +583,7 @@ interface(`xserver_domtrans_xauth',`
|
|||||||
|
|
||||||
domtrans_pattern($1, xauth_exec_t, xauth_t)
|
domtrans_pattern($1, xauth_exec_t, xauth_t)
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms', `
|
ifdef(`hide_broken_symptoms',`
|
||||||
dontaudit xauth_t $1:socket_class_set { read write };
|
dontaudit xauth_t $1:socket_class_set { read write };
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
@ -764,7 +763,6 @@ interface(`xserver_rw_xdm_pipes',`
|
|||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`xserver_dontaudit_rw_xdm_pipes',`
|
interface(`xserver_dontaudit_rw_xdm_pipes',`
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type xdm_t;
|
type xdm_t;
|
||||||
')
|
')
|
||||||
@ -1600,7 +1598,6 @@ interface(`xserver_search_xdm_lib',`
|
|||||||
allow $1 xdm_var_lib_t:dir search_dir_perms;
|
allow $1 xdm_var_lib_t:dir search_dir_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Make an X executable an entrypoint for the specified domain.
|
## Make an X executable an entrypoint for the specified domain.
|
||||||
|
@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
## <summary>policy for zarafa services</summary>
|
## <summary>policy for zarafa services</summary>
|
||||||
|
|
||||||
######################################
|
######################################
|
||||||
@ -66,7 +65,6 @@ interface(`zarafa_server_domtrans',`
|
|||||||
domtrans_pattern($1, zarafa_server_exec_t, zarafa_server_t)
|
domtrans_pattern($1, zarafa_server_exec_t, zarafa_server_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute a domain transition to run zarafa_deliver.
|
## Execute a domain transition to run zarafa_deliver.
|
||||||
|
Loading…
Reference in New Issue
Block a user