Docs standardizing on the role portion of run interfaces. Additional docs cleanup.

This commit is contained in:
Chris PeBenito 2010-08-03 09:20:22 -04:00
parent 9d4395a736
commit a7ee7f819a
66 changed files with 132 additions and 132 deletions

View File

@ -30,7 +30,7 @@ interface(`amanda_domtrans_recover',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the amanda_recover domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`amtu_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the amtu domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -30,7 +30,7 @@ interface(`backup_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the backup domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -30,7 +30,7 @@ interface(`bootloader_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the bootloader domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -34,7 +34,7 @@ interface(`certwatch_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the certwatch domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -62,7 +62,7 @@ interface(`certwatch_run',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the certwatch domain.
## Role allowed access.
## </summary>
## </param>
## <param name="terminal">

View File

@ -37,7 +37,7 @@ interface(`consoletype_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the consoletype domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -35,7 +35,7 @@ interface(`dmidecode_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the dmidecode domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -33,7 +33,7 @@ interface(`firstboot_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the firstboot domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -31,7 +31,7 @@ interface(`kismet_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the kismet domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -30,7 +30,7 @@ interface(`kudzu_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the kudzu domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -30,7 +30,7 @@ interface(`logrotate_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the logrotate domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -86,7 +86,7 @@ interface(`logrotate_use_fds',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -104,7 +104,7 @@ interface(`logrotate_dontaudit_use_fds',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain allowed access.
## </summary>
## </param>
#

View File

@ -30,7 +30,7 @@ interface(`netutils_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the netutils domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -146,7 +146,7 @@ interface(`netutils_signal_ping',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the ping domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -172,7 +172,7 @@ interface(`netutils_run_ping',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the ping domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -238,7 +238,7 @@ interface(`netutils_domtrans_traceroute',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the traceroute domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -264,7 +264,7 @@ interface(`netutils_run_traceroute',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the traceroute domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -30,7 +30,7 @@ interface(`quota_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the quota domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -35,7 +35,7 @@ interface(`shutdown_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the shutdown domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -43,7 +43,7 @@ interface(`tripwire_domtrans_tripwire',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the tripwire domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -87,7 +87,7 @@ interface(`tripwire_domtrans_twadmin',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the twadmin domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -131,7 +131,7 @@ interface(`tripwire_domtrans_twprint',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the twprint domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -175,7 +175,7 @@ interface(`tripwire_domtrans_siggen',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the siggen domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`usbmodules_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the usbmodules domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -36,7 +36,7 @@ interface(`usermanage_domtrans_chfn',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the chfn domain.
## Role allowed access.
## </summary>
## </param>
#
@ -85,7 +85,7 @@ interface(`usermanage_domtrans_groupadd',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the groupadd domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -157,7 +157,7 @@ interface(`usermanage_kill_passwd',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the passwd domain.
## Role allowed access.
## </summary>
## </param>
#
@ -205,7 +205,7 @@ interface(`usermanage_domtrans_admin_passwd',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the admin passwd domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -225,11 +225,11 @@ interface(`usermanage_run_admin_passwd',`
########################################
## <summary>
## Dontaudit attempts to use useradd fds
## Do not audit attempts to use useradd fds.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## Domain to not audit.
## </summary>
## </param>
#
@ -277,7 +277,7 @@ interface(`usermanage_domtrans_useradd',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the useradd domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`vbetool_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the vbetool domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -30,7 +30,7 @@ interface(`vpn_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the vpnc domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`ada_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the ada domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -125,7 +125,7 @@ template(`java_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the java domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -87,7 +87,7 @@ interface(`mono_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the mono domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -31,7 +31,7 @@ interface(`podsleuth_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the podsleuth domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -30,7 +30,7 @@ interface(`ptchown_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the ptchown domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -69,7 +69,7 @@ interface(`pulseaudio_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the pulseaudio domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -30,7 +30,7 @@ interface(`usernetctl_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the usernetctl domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -30,7 +30,7 @@ interface(`webalizer_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the webalizer domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -141,7 +141,7 @@ interface(`wine_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the wine domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -31,7 +31,7 @@ interface(`yam_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the yam domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -1722,7 +1722,7 @@ interface(`corenet_tcp_bind_all_reserved_ports',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -1759,7 +1759,7 @@ interface(`corenet_udp_bind_all_reserved_ports',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -1999,7 +1999,7 @@ interface(`corenet_tcp_bind_all_rpc_ports',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -2036,7 +2036,7 @@ interface(`corenet_udp_bind_all_rpc_ports',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#

View File

@ -222,7 +222,7 @@ interface(`kernel_use_fds',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#

View File

@ -27,7 +27,7 @@ interface(`storage_getattr_fixed_disk_dev',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -67,7 +67,7 @@ interface(`storage_setattr_fixed_disk_dev',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -111,7 +111,7 @@ interface(`storage_raw_read_fixed_disk',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -538,7 +538,7 @@ interface(`storage_getattr_removable_dev',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -557,7 +557,7 @@ interface(`storage_dontaudit_getattr_removable_dev',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -577,7 +577,7 @@ interface(`storage_dontaudit_read_removable_device',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -616,7 +616,7 @@ interface(`storage_setattr_removable_dev',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#

View File

@ -382,7 +382,7 @@ interface(`term_getattr_pty_fs',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -460,7 +460,7 @@ interface(`term_list_ptys',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -479,7 +479,7 @@ interface(`term_dontaudit_list_ptys',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -498,7 +498,7 @@ interface(`term_dontaudit_manage_pty_dirs',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -600,7 +600,7 @@ interface(`term_use_generic_ptys',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -696,7 +696,7 @@ interface(`term_use_ptmx',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -975,7 +975,7 @@ interface(`term_use_all_user_ptys',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -1206,7 +1206,7 @@ interface(`term_use_unallocated_ttys',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#

View File

@ -916,7 +916,7 @@ interface(`apache_domtrans_all_scripts',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the script domains.
## Role allowed access..
## </summary>
## </param>
#

View File

@ -102,7 +102,7 @@ interface(`bind_kill',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the bind domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -141,7 +141,7 @@ interface(`bluetooth_domtrans_helper',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the bluetooth_helper domain.
## Role allowed access.
## </summary>
## </param>
## <param name="terminal">

View File

@ -29,7 +29,7 @@ interface(`clockspeed_domtrans_cli',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the clockspeed_cli domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`dcc_domtrans_cdcc',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the cdcc domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -94,7 +94,7 @@ interface(`dcc_signal_client',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the dcc_client domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -139,7 +139,7 @@ interface(`dcc_domtrans_dbclean',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the dcc_dbclean domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -30,7 +30,7 @@ interface(`gnomeclock_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the gnomeclock domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -30,7 +30,7 @@ interface(`gpsd_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the gpsd domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -287,7 +287,7 @@ interface(`hal_write_log',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#

View File

@ -64,7 +64,7 @@ interface(`lpd_domtrans_checkpc',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the lpd domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -143,7 +143,7 @@ interface(`nis_domtrans_ypbind',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the ypbind domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -221,7 +221,7 @@ interface(`nscd_unconfined',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the nscd domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -31,7 +31,7 @@ interface(`oav_domtrans_update',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the oav_update domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -30,7 +30,7 @@ interface(`openvpn_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the openvpn domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -51,7 +51,7 @@ interface(`policykit_domtrans_auth',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the load_policy domain.
## Role allowed access.
## </summary>
## </param>
#
@ -94,7 +94,7 @@ interface(`policykit_domtrans_grant',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the load_policy domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -32,7 +32,7 @@ interface(`portmap_domtrans_helper',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the portmap domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -343,7 +343,7 @@ interface(`postfix_domtrans_map',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the postfix_map domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -43,7 +43,7 @@ interface(`ricci_domtrans_modcluster',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -62,7 +62,7 @@ interface(`ricci_dontaudit_use_modcluster_fds',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#

View File

@ -89,7 +89,7 @@ interface(`samba_domtrans_net',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the samba_net domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -134,7 +134,7 @@ interface(`samba_domtrans_smbmount',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the smbmount domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -445,7 +445,7 @@ interface(`samba_domtrans_smbcontrol',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the smbcontrol domain.
## Role allowed access.
## </summary>
## </param>
#
@ -578,7 +578,7 @@ interface(`samba_domtrans_winbind_helper',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the winbind_helper domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -907,7 +907,7 @@ interface(`xserver_getattr_log',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -921,12 +921,11 @@ interface(`xserver_dontaudit_write_log',`
########################################
## <summary>
## Do not audit attempts to write the X server
## log files.
## Delete X server log files.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain allowed access.
## </summary>
## </param>
#
@ -947,7 +946,7 @@ interface(`xserver_delete_log',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain allowed access.
## </summary>
## </param>
#
@ -968,7 +967,7 @@ interface(`xserver_read_xkb_libs',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain allowed access.
## </summary>
## </param>
#
@ -987,7 +986,7 @@ interface(`xserver_read_xdm_tmp_files',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -1006,7 +1005,7 @@ interface(`xserver_dontaudit_read_xdm_tmp_files',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain allowed access.
## </summary>
## </param>
#
@ -1025,7 +1024,7 @@ interface(`xserver_rw_xdm_tmp_files',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain allowed access.
## </summary>
## </param>
#
@ -1039,11 +1038,12 @@ interface(`xserver_manage_xdm_tmp_files',`
########################################
## <summary>
## dontaudit getattr xdm temporary named sockets.
## Do not audit attempts to get the attributes of
## xdm temporary named sockets.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -1080,7 +1080,7 @@ interface(`xserver_domtrans',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain allowed access.
## </summary>
## </param>
#
@ -1098,7 +1098,7 @@ interface(`xserver_signal',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain allowed access.
## </summary>
## </param>
#
@ -1136,7 +1136,7 @@ interface(`xserver_rw_shm',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -1193,7 +1193,7 @@ interface(`xserver_stream_connect',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain allowed access.
## </summary>
## </param>
#

View File

@ -31,7 +31,7 @@ interface(`zosremote_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the zos_remote domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -30,7 +30,7 @@ interface(`clock_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the clock domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`fstools_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the fs tools domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`hostname_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the hostname domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -260,7 +260,7 @@ interface(`ipsec_domtrans_setkey',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the racoon and setkey domains.
## Role allowed access..
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`iptables_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the iptables domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -174,7 +174,7 @@ interface(`logging_domtrans_auditctl',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the auditctl domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -218,7 +218,7 @@ interface(`logging_domtrans_auditd',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the auditd domain.
## Role allowed access.
## </summary>
## </param>
#

View File

@ -175,7 +175,7 @@ interface(`modutils_domtrans_insmod',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the insmod domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -238,7 +238,7 @@ interface(`modutils_domtrans_depmod',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the depmod domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -301,7 +301,7 @@ interface(`modutils_domtrans_update_mods',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the update_modules domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`mount_domtrans',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the mount domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -164,7 +164,7 @@ interface(`mount_domtrans_unconfined',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the unconfined mount domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`netlabel_domtrans_mgmt',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the netlabel_mgmt domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -82,7 +82,7 @@ interface(`pcmcia_domtrans_cardctl',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the cardmgr domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -33,7 +33,7 @@ interface(`seutil_domtrans_checkpolicy',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the checkpolicy domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -100,7 +100,7 @@ interface(`seutil_domtrans_loadpolicy',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the load_policy domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -185,7 +185,7 @@ interface(`seutil_domtrans_newrole',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the newrole domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -333,7 +333,7 @@ interface(`seutil_domtrans_restorecon',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the restorecon domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -420,7 +420,7 @@ interface(`seutil_init_script_domtrans_runinit',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the run_init domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -461,7 +461,7 @@ interface(`seutil_run_runinit',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the run_init domain.
## Role allowed access.
## </summary>
## </param>
#
@ -529,7 +529,7 @@ interface(`seutil_domtrans_setfiles',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the setfiles domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -1020,7 +1020,7 @@ interface(`seutil_domtrans_semanage',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the checkpolicy domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -31,7 +31,7 @@ interface(`sysnet_domtrans_dhcpc',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the clock domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
@ -479,7 +479,7 @@ interface(`sysnet_domtrans_ifconfig',`
## </param>
## <param name="role">
## <summary>
## The role to be allowed the ifconfig domain.
## Role allowed access.
## </summary>
## </param>
## <rolecap/>

View File

@ -1438,7 +1438,7 @@ interface(`userdom_list_user_home_dirs',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#
@ -1568,7 +1568,7 @@ interface(`userdom_user_home_domtrans',`
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit
## Domain to not audit.
## </summary>
## </param>
#