Style fixes and module version bumps for 38fc1bd.

This commit is contained in:
Chris PeBenito 2010-03-17 09:28:18 -04:00
parent 38fc1bd180
commit 827060cb04
10 changed files with 77 additions and 127 deletions

View File

@ -4,6 +4,7 @@
cobbler (Dominick Grift)
dbadm (KaiGai Kohei)
nut (Stefan Schulze Frielinghaus, Miroslav Grepl)
likewise (Scott Salley)
pyicqt (Stefan Schulze Frielinghaus)
sectoolm (Miroslav Grepl)

View File

@ -1,5 +1,5 @@
policy_module(corenetwork, 1.13.8)
policy_module(corenetwork, 1.13.9)
########################################
#

View File

@ -2921,24 +2921,6 @@ interface(`files_dontaudit_getattr_home_dir',`
dontaudit $1 home_root_t:dir getattr;
')
########################################
## <summary>
## Relabel to user home root (/home).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`files_relabelto_home',`
gen_require(`
type home_root_t;
')
allow $1 home_root_t:dir relabelto;
')
########################################
## <summary>
## Search home directories root (/home).
@ -3013,6 +2995,24 @@ interface(`files_list_home',`
allow $1 home_root_t:dir list_dir_perms;
')
########################################
## <summary>
## Relabel to user home root (/home).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`files_relabelto_home',`
gen_require(`
type home_root_t;
')
allow $1 home_root_t:dir relabelto;
')
########################################
## <summary>
## Create objects in /home.

View File

@ -1,5 +1,5 @@
policy_module(files, 1.12.3)
policy_module(files, 1.12.4)
########################################
#

View File

@ -202,7 +202,6 @@ interface(`kerberos_read_keytab',`
## Domain allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`kerberos_rw_keytab',`
gen_require(`

View File

@ -1,5 +1,5 @@
policy_module(kerberos, 1.10.1)
policy_module(kerberos, 1.10.2)
########################################
#

View File

@ -3,7 +3,7 @@ policy_module(likewise, 1.0.0)
#################################
#
# Likewise global personal declarations.
# Declarations
#
attribute likewise_domains;
@ -23,69 +23,25 @@ files_type(likewise_pstore_lock_t)
type likewise_krb5_ad_t;
files_type(likewise_krb5_ad_t)
#############################
#
# Likewise dcerpcd personal declarations.
#
likewise_domain_template(dcerpcd)
#############################
#
# Likewise eventlogd personal declarations.
#
likewise_domain_template(eventlogd)
#############################
#
# Likewise lsassd personal declarations.
#
likewise_domain_template(lsassd)
type lsassd_tmp_t;
files_tmp_file(lsassd_tmp_t)
#############################
#
# Likewise lwiod personal declarations.
#
likewise_domain_template(lwiod)
#############################
#
# Likewise lwregd personal declarations.
#
likewise_domain_template(lwregd)
#############################
#
# Likewise lwsmd personal declarations.
#
likewise_domain_template(lwsmd)
#############################
#
# Likewise netlogond personal declarations.
#
likewise_domain_template(netlogond)
#############################
#
# Likewise srvsvcd personal declarations.
#
likewise_domain_template(srvsvcd)
##################################
#
# Likewise global personal policy.
#################################
#
# Likewise dcerpcd personal policy
@ -134,8 +90,8 @@ corenet_udp_sendrecv_generic_port(eventlogd_t)
# Likewise Authentication service local policy
#
allow lsassd_t self:capability {fowner chown fsetid dac_override sys_time};
allow lsassd_t self:unix_stream_socket {create_stream_socket_perms connectto};
allow lsassd_t self:capability { fowner chown fsetid dac_override sys_time };
allow lsassd_t self:unix_stream_socket { create_stream_socket_perms connectto };
allow lsassd_t self:netlink_route_socket rw_netlink_socket_perms;
allow lsassd_t likewise_krb5_ad_t:file read_file_perms;
@ -152,6 +108,11 @@ stream_connect_pattern(lsassd_t, likewise_var_lib_t, lwiod_var_socket_t, lwiod_t
stream_connect_pattern(lsassd_t, likewise_var_lib_t, lwregd_var_socket_t, lwregd_t)
stream_connect_pattern(lsassd_t, likewise_var_lib_t, netlogond_var_socket_t, netlogond_t)
kernel_read_system_state(lsassd_t)
kernel_getattr_proc_files(lsassd_t)
kernel_list_all_proc(lsassd_t)
kernel_list_proc(lsassd_t)
corecmd_exec_bin(lsassd_t)
corecmd_exec_shell(lsassd_t)
@ -164,19 +125,13 @@ corenet_tcp_bind_generic_node(lsassd_t)
corenet_tcp_connect_epmap_port(lsassd_t)
corenet_tcp_sendrecv_epmap_port(lsassd_t)
domain_obj_id_change_exemption(lsassd_t)
files_manage_etc_files(lsassd_t)
files_manage_etc_symlinks(lsassd_t)
files_manage_etc_runtime_files(lsassd_t)
files_relabelto_home(lsassd_t)
kernel_read_system_state(lsassd_t)
kernel_getattr_proc_files(lsassd_t)
kernel_list_all_proc(lsassd_t)
kernel_list_proc(lsassd_t)
domain_obj_id_change_exemption(lsassd_t)
selinux_get_fs_mount(lsassd_t)
selinux_validate_context(lsassd_t)
@ -201,7 +156,7 @@ optional_policy(`
# Likewise I/O service local policy
#
allow lwiod_t self:capability {fowner chown fsetid dac_override };
allow lwiod_t self:capability { fowner chown fsetid dac_override };
allow lwiod_t self:netlink_route_socket rw_netlink_socket_perms;
allow lwiod_t likewise_krb5_ad_t:file read_file_perms;
@ -228,11 +183,6 @@ optional_policy(`
kerberos_use(lwiod_t)
')
#################################
#
# Likewise Registry server local policy
#
#################################
#
# Likewise Service Manager service local policy

View File

@ -1,5 +1,5 @@
policy_module(authlogin, 2.1.2)
policy_module(authlogin, 2.1.3)
########################################
#