Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes.
This commit is contained in:
parent
0bdd855157
commit
68ac47d8c5
@ -23,7 +23,6 @@ files_pid_file(clogd_var_run_t)
|
||||
|
||||
allow clogd_t self:capability { net_admin mknod };
|
||||
allow clogd_t self:process signal;
|
||||
|
||||
allow clogd_t self:sem create_sem_perms;
|
||||
allow clogd_t self:shm create_shm_perms;
|
||||
allow clogd_t self:netlink_socket create_socket_perms;
|
||||
|
@ -26,9 +26,7 @@ files_pid_file(cmirrord_var_run_t)
|
||||
allow cmirrord_t self:capability { net_admin kill };
|
||||
dontaudit cmirrord_t self:capability sys_tty_config;
|
||||
allow cmirrord_t self:process signal;
|
||||
|
||||
allow cmirrord_t self:fifo_file rw_fifo_file_perms;
|
||||
|
||||
allow cmirrord_t self:sem create_sem_perms;
|
||||
allow cmirrord_t self:shm create_shm_perms;
|
||||
allow cmirrord_t self:netlink_socket create_socket_perms;
|
||||
|
@ -309,4 +309,3 @@ optional_policy(`
|
||||
optional_policy(`
|
||||
vbetool_domtrans(devicekit_power_t)
|
||||
')
|
||||
|
||||
|
@ -400,6 +400,7 @@ userdom_use_user_terminals(ftpdctl_t)
|
||||
#
|
||||
# sftpd local policy
|
||||
#
|
||||
|
||||
files_read_etc_files(sftpd_t)
|
||||
|
||||
# allow read access to /home by default
|
||||
|
@ -189,4 +189,3 @@ optional_policy(`
|
||||
|
||||
git_role_template(git_shell)
|
||||
gen_user(git_shell_u, user, git_shell_r, s0, s0)
|
||||
|
||||
|
@ -46,4 +46,3 @@ storage_raw_read_fixed_disk(hddtemp_t)
|
||||
logging_send_syslog_msg(hddtemp_t)
|
||||
|
||||
miscfiles_read_localization(hddtemp_t)
|
||||
|
||||
|
@ -4,6 +4,7 @@ policy_module(inn, 1.9.0)
|
||||
#
|
||||
# Declarations
|
||||
#
|
||||
|
||||
type innd_t;
|
||||
type innd_exec_t;
|
||||
init_daemon_domain(innd_t, innd_exec_t)
|
||||
@ -30,6 +31,7 @@ files_mountpoint(news_spool_t)
|
||||
#
|
||||
# Local policy
|
||||
#
|
||||
|
||||
allow innd_t self:capability { dac_override kill setgid setuid };
|
||||
dontaudit innd_t self:capability sys_tty_config;
|
||||
allow innd_t self:process { setsched signal_perms };
|
||||
|
@ -1,4 +1,3 @@
|
||||
|
||||
policy_module(jabber, 1.8.0)
|
||||
|
||||
########################################
|
||||
|
@ -49,4 +49,3 @@ mls_file_read_to_clearance(ksmtuned_t)
|
||||
term_use_all_terms(ksmtuned_t)
|
||||
|
||||
miscfiles_read_localization(ksmtuned_t)
|
||||
|
||||
|
@ -33,7 +33,6 @@ files_type(spamass_milter_state_t)
|
||||
#
|
||||
|
||||
allow dkim_milter_t self:capability { kill setgid setuid };
|
||||
|
||||
allow dkim_milter_t self:unix_stream_socket create_stream_socket_perms;
|
||||
|
||||
read_files_pattern(dkim_milter_t, dkim_milter_private_key_t, dkim_milter_private_key_t)
|
||||
|
@ -27,6 +27,7 @@ files_type(mock_var_lib_t)
|
||||
#
|
||||
# mock local policy
|
||||
#
|
||||
|
||||
allow mock_t self:capability { sys_admin setfcap setuid sys_ptrace sys_chroot chown audit_write dac_override sys_nice mknod fsetid setgid fowner };
|
||||
allow mock_t self:process { siginh noatsecure signull transition rlimitinh setsched setpgid sigkill };
|
||||
dontaudit mock_t self:process { siginh noatsecure rlimitinh };
|
||||
|
@ -41,7 +41,6 @@ files_type(mpd_var_lib_t)
|
||||
#cjp: dac_override bug in mpd relating to mpd.log file
|
||||
allow mpd_t self:capability { dac_override kill setgid setuid };
|
||||
allow mpd_t self:process { getsched setsched setrlimit signal signull };
|
||||
|
||||
allow mpd_t self:fifo_file rw_fifo_file_perms;
|
||||
allow mpd_t self:unix_stream_socket { connectto create_stream_socket_perms };
|
||||
allow mpd_t self:tcp_socket create_stream_socket_perms;
|
||||
|
@ -314,8 +314,6 @@ kernel_read_system_state(user_mail_domain)
|
||||
kernel_read_network_state(user_mail_domain)
|
||||
kernel_request_load_module(user_mail_domain)
|
||||
|
||||
|
||||
|
||||
optional_policy(`
|
||||
# postfix needs this for newaliases
|
||||
files_getattr_tmp_dirs(user_mail_domain)
|
||||
|
@ -141,6 +141,7 @@ optional_policy(`
|
||||
#
|
||||
# Nagios CGI local policy
|
||||
#
|
||||
|
||||
optional_policy(`
|
||||
apache_content_template(nagios)
|
||||
typealias httpd_nagios_script_t alias nagios_cgi_t;
|
||||
@ -268,7 +269,6 @@ files_getattr_all_file_type_fs(nagios_admin_plugin_t)
|
||||
#
|
||||
|
||||
allow nagios_mail_plugin_t self:capability { setuid setgid dac_override };
|
||||
|
||||
allow nagios_mail_plugin_t self:netlink_route_socket r_netlink_socket_perms;
|
||||
allow nagios_mail_plugin_t self:tcp_socket create_stream_socket_perms;
|
||||
allow nagios_mail_plugin_t self:udp_socket create_socket_perms;
|
||||
@ -321,7 +321,6 @@ storage_raw_read_fixed_disk(nagios_checkdisk_plugin_t)
|
||||
|
||||
allow nagios_services_plugin_t self:capability { net_bind_service net_raw };
|
||||
allow nagios_services_plugin_t self:process { signal sigkill };
|
||||
|
||||
allow nagios_services_plugin_t self:tcp_socket create_stream_socket_perms;
|
||||
allow nagios_services_plugin_t self:udp_socket create_socket_perms;
|
||||
|
||||
|
@ -146,6 +146,7 @@ optional_policy(`
|
||||
samba_append_log(nscd_t)
|
||||
samba_dontaudit_use_fds(nscd_t)
|
||||
')
|
||||
|
||||
samba_read_config(nscd_t)
|
||||
samba_read_var_files(nscd_t)
|
||||
')
|
||||
|
Loading…
Reference in New Issue
Block a user