Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes.
This commit is contained in:
parent
1b1f7d01a9
commit
c5eae5f83c
@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
## <summary>policy for ajaxterm</summary>
|
## <summary>policy for ajaxterm</summary>
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -19,7 +18,6 @@ interface(`ajaxterm_domtrans',`
|
|||||||
domtrans_pattern($1, ajaxterm_exec_t, ajaxterm_t)
|
domtrans_pattern($1, ajaxterm_exec_t, ajaxterm_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute ajaxterm server in the ajaxterm domain.
|
## Execute ajaxterm server in the ajaxterm domain.
|
||||||
@ -68,5 +66,4 @@ interface(`ajaxterm_admin',`
|
|||||||
domain_system_change_exemption($1)
|
domain_system_change_exemption($1)
|
||||||
role_transition $2 ajaxterm_initrc_exec_t system_r;
|
role_transition $2 ajaxterm_initrc_exec_t system_r;
|
||||||
allow $2 system_r;
|
allow $2 system_r;
|
||||||
|
|
||||||
')
|
')
|
||||||
|
@ -512,6 +512,7 @@ tunable_policy(`allow_httpd_mod_auth_pam',`
|
|||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
gen_tunable(allow_httpd_mod_auth_ntlm_winbind, false)
|
gen_tunable(allow_httpd_mod_auth_ntlm_winbind, false)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
tunable_policy(`allow_httpd_mod_auth_ntlm_winbind',`
|
tunable_policy(`allow_httpd_mod_auth_ntlm_winbind',`
|
||||||
samba_domtrans_winbind_helper(httpd_t)
|
samba_domtrans_winbind_helper(httpd_t)
|
||||||
@ -926,6 +927,7 @@ tunable_policy(`httpd_enable_cgi && httpd_unified',`
|
|||||||
manage_sock_files_pattern(httpd_sys_script_t, httpdcontent, httpdcontent)
|
manage_sock_files_pattern(httpd_sys_script_t, httpdcontent, httpdcontent)
|
||||||
manage_lnk_files_pattern(httpd_sys_script_t, httpdcontent, httpdcontent)
|
manage_lnk_files_pattern(httpd_sys_script_t, httpdcontent, httpdcontent)
|
||||||
')
|
')
|
||||||
|
|
||||||
tunable_policy(`httpd_enable_cgi',`
|
tunable_policy(`httpd_enable_cgi',`
|
||||||
domtrans_pattern(httpd_suexec_t, httpd_user_script_t, httpd_user_script_t)
|
domtrans_pattern(httpd_suexec_t, httpd_user_script_t, httpd_user_script_t)
|
||||||
')
|
')
|
||||||
@ -1148,4 +1150,3 @@ typealias httpd_sys_rw_content_t alias { httpd_fastcgi_rw_content_t httpd_fastcg
|
|||||||
typealias httpd_sys_ra_content_t alias httpd_fastcgi_script_ra_t;
|
typealias httpd_sys_ra_content_t alias httpd_fastcgi_script_ra_t;
|
||||||
typealias httpd_sys_script_t alias httpd_fastcgi_script_t;
|
typealias httpd_sys_script_t alias httpd_fastcgi_script_t;
|
||||||
typealias httpd_var_run_t alias httpd_fastcgi_var_run_t;
|
typealias httpd_var_run_t alias httpd_fastcgi_var_run_t;
|
||||||
|
|
||||||
|
@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
## <summary>policy for boinc</summary>
|
## <summary>policy for boinc</summary>
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -14,7 +14,6 @@
|
|||||||
#
|
#
|
||||||
# Define the policy interface for the CacheFiles userspace management daemon.
|
# Define the policy interface for the CacheFiles userspace management daemon.
|
||||||
#
|
#
|
||||||
|
|
||||||
## <summary>policy for cachefilesd</summary>
|
## <summary>policy for cachefilesd</summary>
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
## <summary>policy for cmirrord</summary>
|
## <summary>policy for cmirrord</summary>
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -114,5 +113,4 @@ interface(`cmirrord_admin',`
|
|||||||
|
|
||||||
files_search_pids($1)
|
files_search_pids($1)
|
||||||
admin_pattern($1, cmirrord_var_run_t)
|
admin_pattern($1, cmirrord_var_run_t)
|
||||||
|
|
||||||
')
|
')
|
||||||
|
@ -152,7 +152,6 @@ interface(`cron_role',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
dbus_stub(cronjob_t)
|
dbus_stub(cronjob_t)
|
||||||
|
|
||||||
allow cronjob_t $2:dbus send_msg;
|
allow cronjob_t $2:dbus send_msg;
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
@ -188,7 +187,6 @@ interface(`cron_unconfined_role',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
dbus_stub(unconfined_cronjob_t)
|
dbus_stub(unconfined_cronjob_t)
|
||||||
|
|
||||||
allow unconfined_cronjob_t $2:dbus send_msg;
|
allow unconfined_cronjob_t $2:dbus send_msg;
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
@ -241,7 +239,6 @@ interface(`cron_admin_role',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
dbus_stub(admin_cronjob_t)
|
dbus_stub(admin_cronjob_t)
|
||||||
|
|
||||||
allow cronjob_t $2:dbus send_msg;
|
allow cronjob_t $2:dbus send_msg;
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
@ -695,7 +692,6 @@ interface(`cron_read_system_job_lib_files',`
|
|||||||
type system_cronjob_var_lib_t;
|
type system_cronjob_var_lib_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
read_files_pattern($1, system_cronjob_var_lib_t, system_cronjob_var_lib_t)
|
read_files_pattern($1, system_cronjob_var_lib_t, system_cronjob_var_lib_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -714,6 +710,5 @@ interface(`cron_manage_system_job_lib_files',`
|
|||||||
type system_cronjob_var_lib_t;
|
type system_cronjob_var_lib_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
manage_files_pattern($1, system_cronjob_var_lib_t, system_cronjob_var_lib_t)
|
manage_files_pattern($1, system_cronjob_var_lib_t, system_cronjob_var_lib_t)
|
||||||
')
|
')
|
||||||
|
Loading…
Reference in New Issue
Block a user