Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Signed-off-by: Dominick Grift <domg472@gmail.com>
This commit is contained in:
parent
60d27bf8ab
commit
2d102f8402
@ -609,4 +609,3 @@ interface(`virt_dontaudit_write_pipes',`
|
|||||||
|
|
||||||
dontaudit $1 virtd_t:fifo_file write_fifo_file_perms;
|
dontaudit $1 virtd_t:fifo_file write_fifo_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
## <summary>X Windows Font Server </summary>
|
## <summary>X Windows Font Server</summary>
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
|
@ -114,7 +114,7 @@ interface(`xserver_restricted_role',`
|
|||||||
# Needed for escd, remove if we get escd policy
|
# Needed for escd, remove if we get escd policy
|
||||||
xserver_manage_xdm_tmp_files($2)
|
xserver_manage_xdm_tmp_files($2)
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms', `
|
ifdef(`hide_broken_symptoms',`
|
||||||
dontaudit iceauth_t $2:socket_class_set { read write };
|
dontaudit iceauth_t $2:socket_class_set { read write };
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -179,7 +179,6 @@ interface(`xserver_role',`
|
|||||||
manage_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
manage_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
||||||
relabel_dirs_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
relabel_dirs_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
||||||
relabel_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
relabel_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
|
||||||
|
|
||||||
')
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
@ -504,7 +503,7 @@ template(`xserver_user_x_domain_template',`
|
|||||||
# for .xsession-errors
|
# for .xsession-errors
|
||||||
userdom_dontaudit_write_user_home_content_files($2)
|
userdom_dontaudit_write_user_home_content_files($2)
|
||||||
|
|
||||||
xserver_ro_session($2,$3)
|
xserver_ro_session($2, $3)
|
||||||
xserver_use_user_fonts($2)
|
xserver_use_user_fonts($2)
|
||||||
|
|
||||||
xserver_read_xdm_tmp_files($2)
|
xserver_read_xdm_tmp_files($2)
|
||||||
@ -512,7 +511,7 @@ template(`xserver_user_x_domain_template',`
|
|||||||
|
|
||||||
# X object manager
|
# X object manager
|
||||||
xserver_object_types_template($1)
|
xserver_object_types_template($1)
|
||||||
xserver_common_x_domain_template($1,$2)
|
xserver_common_x_domain_template($1, $2)
|
||||||
|
|
||||||
# Client write xserver shm
|
# Client write xserver shm
|
||||||
tunable_policy(`allow_write_xshm',`
|
tunable_policy(`allow_write_xshm',`
|
||||||
@ -584,7 +583,7 @@ interface(`xserver_domtrans_xauth',`
|
|||||||
|
|
||||||
domtrans_pattern($1, xauth_exec_t, xauth_t)
|
domtrans_pattern($1, xauth_exec_t, xauth_t)
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms', `
|
ifdef(`hide_broken_symptoms',`
|
||||||
dontaudit xauth_t $1:socket_class_set { read write };
|
dontaudit xauth_t $1:socket_class_set { read write };
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
@ -712,7 +711,7 @@ interface(`xserver_use_xdm_fds',`
|
|||||||
type xdm_t;
|
type xdm_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
allow $1 xdm_t:fd use;
|
allow $1 xdm_t:fd use;
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -731,7 +730,7 @@ interface(`xserver_dontaudit_use_xdm_fds',`
|
|||||||
type xdm_t;
|
type xdm_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
dontaudit $1 xdm_t:fd use;
|
dontaudit $1 xdm_t:fd use;
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -749,7 +748,7 @@ interface(`xserver_rw_xdm_pipes',`
|
|||||||
type xdm_t;
|
type xdm_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
allow $1 xdm_t:fifo_file { getattr read write };
|
allow $1 xdm_t:fifo_file { getattr read write };
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -764,12 +763,11 @@ interface(`xserver_rw_xdm_pipes',`
|
|||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`xserver_dontaudit_rw_xdm_pipes',`
|
interface(`xserver_dontaudit_rw_xdm_pipes',`
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type xdm_t;
|
type xdm_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
dontaudit $1 xdm_t:fifo_file rw_fifo_file_perms;
|
dontaudit $1 xdm_t:fifo_file rw_fifo_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -1039,7 +1037,7 @@ interface(`xserver_read_xdm_etc_files',`
|
|||||||
type xdm_etc_t;
|
type xdm_etc_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
files_search_etc($1)
|
files_search_etc($1)
|
||||||
read_files_pattern($1, xdm_etc_t, xdm_etc_t)
|
read_files_pattern($1, xdm_etc_t, xdm_etc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -1058,7 +1056,7 @@ interface(`xserver_manage_xdm_etc_files',`
|
|||||||
type xdm_etc_t;
|
type xdm_etc_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
files_search_etc($1)
|
files_search_etc($1)
|
||||||
manage_files_pattern($1, xdm_etc_t, xdm_etc_t)
|
manage_files_pattern($1, xdm_etc_t, xdm_etc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -1077,7 +1075,7 @@ interface(`xserver_read_xdm_tmp_files',`
|
|||||||
type xdm_tmp_t;
|
type xdm_tmp_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
files_search_tmp($1)
|
files_search_tmp($1)
|
||||||
read_files_pattern($1, xdm_tmp_t, xdm_tmp_t)
|
read_files_pattern($1, xdm_tmp_t, xdm_tmp_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -1171,7 +1169,7 @@ interface(`xserver_domtrans',`
|
|||||||
type xserver_t, xserver_exec_t;
|
type xserver_t, xserver_exec_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
allow $1 xserver_t:process siginh;
|
allow $1 xserver_t:process siginh;
|
||||||
domtrans_pattern($1, xserver_exec_t, xserver_t)
|
domtrans_pattern($1, xserver_exec_t, xserver_t)
|
||||||
|
|
||||||
allow xserver_t $1:process getpgid;
|
allow xserver_t $1:process getpgid;
|
||||||
@ -1314,7 +1312,7 @@ interface(`xserver_read_tmp_files',`
|
|||||||
## <summary>
|
## <summary>
|
||||||
## Interface to provide X object permissions on a given X server to
|
## Interface to provide X object permissions on a given X server to
|
||||||
## an X client domain. Gives the domain permission to read the
|
## an X client domain. Gives the domain permission to read the
|
||||||
## virtual core keyboard and virtual core pointer devices.
|
## virtual core keyboard and virtual core pointer devices.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1600,7 +1598,6 @@ interface(`xserver_search_xdm_lib',`
|
|||||||
allow $1 xdm_var_lib_t:dir search_dir_perms;
|
allow $1 xdm_var_lib_t:dir search_dir_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Make an X executable an entrypoint for the specified domain.
|
## Make an X executable an entrypoint for the specified domain.
|
||||||
|
@ -5,9 +5,9 @@
|
|||||||
## Execute a domain transition to run zabbix.
|
## Execute a domain transition to run zabbix.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed to transition.
|
## Domain allowed to transition.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`zabbix_domtrans',`
|
interface(`zabbix_domtrans',`
|
||||||
@ -44,9 +44,9 @@ interface(`zabbix_read_log',`
|
|||||||
## zabbix log files.
|
## zabbix log files.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`zabbix_append_log',`
|
interface(`zabbix_append_log',`
|
||||||
|
@ -1,15 +1,14 @@
|
|||||||
|
|
||||||
## <summary>policy for zarafa services</summary>
|
## <summary>policy for zarafa services</summary>
|
||||||
|
|
||||||
######################################
|
######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Creates types and rules for a basic
|
## Creates types and rules for a basic
|
||||||
## zararfa init daemon domain.
|
## zararfa init daemon domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="prefix">
|
## <param name="prefix">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Prefix for the domain.
|
## Prefix for the domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
template(`zarafa_domain_template',`
|
template(`zarafa_domain_template',`
|
||||||
@ -19,12 +18,12 @@ template(`zarafa_domain_template',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
##############################
|
##############################
|
||||||
#
|
#
|
||||||
# $1_t declarations
|
# $1_t declarations
|
||||||
#
|
#
|
||||||
|
|
||||||
type zarafa_$1_t, zarafa_domain;
|
type zarafa_$1_t, zarafa_domain;
|
||||||
type zarafa_$1_exec_t;
|
type zarafa_$1_exec_t;
|
||||||
init_daemon_domain(zarafa_$1_t, zarafa_$1_exec_t)
|
init_daemon_domain(zarafa_$1_t, zarafa_$1_exec_t)
|
||||||
|
|
||||||
type zarafa_$1_log_t;
|
type zarafa_$1_log_t;
|
||||||
@ -34,28 +33,28 @@ template(`zarafa_domain_template',`
|
|||||||
files_pid_file(zarafa_$1_var_run_t)
|
files_pid_file(zarafa_$1_var_run_t)
|
||||||
|
|
||||||
##############################
|
##############################
|
||||||
#
|
#
|
||||||
# $1_t local policy
|
# $1_t local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
manage_files_pattern(zarafa_$1_t, zarafa_$1_var_run_t, zarafa_$1_var_run_t)
|
manage_files_pattern(zarafa_$1_t, zarafa_$1_var_run_t, zarafa_$1_var_run_t)
|
||||||
manage_sock_files_pattern(zarafa_$1_t, zarafa_$1_var_run_t, zarafa_$1_var_run_t)
|
manage_sock_files_pattern(zarafa_$1_t, zarafa_$1_var_run_t, zarafa_$1_var_run_t)
|
||||||
files_pid_filetrans(zarafa_$1_t, zarafa_$1_var_run_t, { file sock_file })
|
files_pid_filetrans(zarafa_$1_t, zarafa_$1_var_run_t, { file sock_file })
|
||||||
#stream_connect_pattern(zarafa_$1_t, $1_var_run_t, $1_var_run_t, virtd_t)
|
#stream_connect_pattern(zarafa_$1_t, $1_var_run_t, $1_var_run_t, virtd_t)
|
||||||
|
|
||||||
manage_files_pattern(zarafa_$1_t, zarafa_$1_log_t,zarafa_$1_log_t)
|
manage_files_pattern(zarafa_$1_t, zarafa_$1_log_t,zarafa_$1_log_t)
|
||||||
#manage_sock_files_pattern(zarafa_$1_t, zarafa_$1_log_t,zarafa_$1_log_t)
|
#manage_sock_files_pattern(zarafa_$1_t, zarafa_$1_log_t,zarafa_$1_log_t)
|
||||||
logging_log_filetrans(zarafa_$1_t,zarafa_$1_log_t,{ file })
|
logging_log_filetrans(zarafa_$1_t,zarafa_$1_log_t,{ file })
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute a domain transition to run zarafa_server.
|
## Execute a domain transition to run zarafa_server.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed to transition.
|
## Domain allowed to transition.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`zarafa_server_domtrans',`
|
interface(`zarafa_server_domtrans',`
|
||||||
@ -66,15 +65,14 @@ interface(`zarafa_server_domtrans',`
|
|||||||
domtrans_pattern($1, zarafa_server_exec_t, zarafa_server_t)
|
domtrans_pattern($1, zarafa_server_exec_t, zarafa_server_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute a domain transition to run zarafa_deliver.
|
## Execute a domain transition to run zarafa_deliver.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed to transition.
|
## Domain allowed to transition.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`zarafa_deliver_domtrans',`
|
interface(`zarafa_deliver_domtrans',`
|
||||||
@ -87,19 +85,19 @@ interface(`zarafa_deliver_domtrans',`
|
|||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Connect to zarafa-server unix domain stream socket.
|
## Connect to zarafa-server unix domain stream socket.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
#
|
#
|
||||||
interface(`zarafa_stream_connect_server',`
|
interface(`zarafa_stream_connect_server',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type zarafa_server_t, zarafa_server_var_run_t;
|
type zarafa_server_t, zarafa_server_var_run_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
stream_connect_pattern($1, zarafa_server_t, zarafa_server_var_run_t, zarafa_server_t)
|
stream_connect_pattern($1, zarafa_server_t, zarafa_server_var_run_t, zarafa_server_t)
|
||||||
')
|
')
|
||||||
|
@ -5,9 +5,9 @@
|
|||||||
## Execute a domain transition to run audispd-zos-remote.
|
## Execute a domain transition to run audispd-zos-remote.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed to transition.
|
## Domain allowed to transition.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`zosremote_domtrans',`
|
interface(`zosremote_domtrans',`
|
||||||
|
Loading…
Reference in New Issue
Block a user