Whitespace cleanup.
This commit is contained in:
parent
0f982dada2
commit
dccbb80cb0
@ -1233,7 +1233,7 @@ interface(`files_manage_config_files',`
|
|||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Relabel configuration files
|
## Relabel configuration files
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
|
@ -595,18 +595,18 @@ interface(`term_dontaudit_use_generic_ptys',`
|
|||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Set the attributes of the tty device
|
## Set the attributes of the tty device
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`term_setattr_controlling_term',`
|
interface(`term_setattr_controlling_term',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type devtty_t;
|
type devtty_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
dev_list_all_dev_nodes($1)
|
dev_list_all_dev_nodes($1)
|
||||||
allow $1 devtty_t:chr_file setattr;
|
allow $1 devtty_t:chr_file setattr;
|
||||||
|
@ -21,22 +21,21 @@ interface(`lvm_domtrans',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute lvm programs in the caller domain.
|
## Execute lvm programs in the caller domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`lvm_exec',`
|
interface(`lvm_exec',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type lvm_exec_t;
|
type lvm_exec_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
corecmd_search_sbin($1)
|
|
||||||
can_exec($1, lvm_exec_t)
|
|
||||||
|
|
||||||
|
corecmd_search_sbin($1)
|
||||||
|
can_exec($1, lvm_exec_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -108,19 +107,19 @@ interface(`lvm_manage_config',`
|
|||||||
|
|
||||||
######################################
|
######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute a domain transition to run clvmd.
|
## Execute a domain transition to run clvmd.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed to transition.
|
## Domain allowed to transition.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`lvm_domtrans_clvmd',`
|
interface(`lvm_domtrans_clvmd',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type clvmd_t, clvmd_exec_t;
|
type clvmd_t, clvmd_exec_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
corecmd_search_bin($1)
|
corecmd_search_bin($1)
|
||||||
domtrans_pattern($1,clvmd_exec_t,clvmd_t)
|
domtrans_pattern($1, clvmd_exec_t, clvmd_t)
|
||||||
')
|
')
|
||||||
|
@ -196,12 +196,12 @@ files_lock_filetrans(lvm_t, lvm_lock_t, file)
|
|||||||
|
|
||||||
manage_dirs_pattern(lvm_t, lvm_var_lib_t, lvm_var_lib_t)
|
manage_dirs_pattern(lvm_t, lvm_var_lib_t, lvm_var_lib_t)
|
||||||
manage_files_pattern(lvm_t, lvm_var_lib_t, lvm_var_lib_t)
|
manage_files_pattern(lvm_t, lvm_var_lib_t, lvm_var_lib_t)
|
||||||
files_var_lib_filetrans(lvm_t, lvm_var_lib_t,{ dir file })
|
files_var_lib_filetrans(lvm_t, lvm_var_lib_t, { dir file })
|
||||||
|
|
||||||
manage_dirs_pattern(lvm_t, lvm_var_run_t, lvm_var_run_t)
|
manage_dirs_pattern(lvm_t, lvm_var_run_t, lvm_var_run_t)
|
||||||
manage_files_pattern(lvm_t, lvm_var_run_t, lvm_var_run_t)
|
manage_files_pattern(lvm_t, lvm_var_run_t, lvm_var_run_t)
|
||||||
manage_sock_files_pattern(lvm_t, lvm_var_run_t, lvm_var_run_t)
|
manage_sock_files_pattern(lvm_t, lvm_var_run_t, lvm_var_run_t)
|
||||||
files_pid_filetrans(lvm_t, lvm_var_run_t,{ file sock_file })
|
files_pid_filetrans(lvm_t, lvm_var_run_t, { file sock_file })
|
||||||
|
|
||||||
read_files_pattern(lvm_t, lvm_etc_t, lvm_etc_t)
|
read_files_pattern(lvm_t, lvm_etc_t, lvm_etc_t)
|
||||||
read_lnk_files_pattern(lvm_t, lvm_etc_t, lvm_etc_t)
|
read_lnk_files_pattern(lvm_t, lvm_etc_t, lvm_etc_t)
|
||||||
|
@ -416,8 +416,8 @@ interface(`miscfiles_read_public_files',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
allow $1 { public_content_t public_content_rw_t }:dir list_dir_perms;
|
allow $1 { public_content_t public_content_rw_t }:dir list_dir_perms;
|
||||||
read_files_pattern($1,{ public_content_t public_content_rw_t },{ public_content_t public_content_rw_t })
|
read_files_pattern($1, { public_content_t public_content_rw_t }, { public_content_t public_content_rw_t })
|
||||||
read_lnk_files_pattern($1,{ public_content_t public_content_rw_t },{ public_content_t public_content_rw_t })
|
read_lnk_files_pattern($1, { public_content_t public_content_rw_t }, { public_content_t public_content_rw_t })
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
Loading…
Reference in New Issue
Block a user