Removed unnecessary semicolons
Removed unecessary semicolons in ipsec.te, logging.te, and systemd.te Signed-off-by: James Carter <jwcart2@tycho.nsa.gov>
This commit is contained in:
parent
ed60abef70
commit
2268d42fee
|
@ -59,7 +59,7 @@ files_pid_file(ipsec_mgmt_var_run_t)
|
|||
|
||||
type ipsec_supervisor_t;
|
||||
type ipsec_supervisor_exec_t;
|
||||
init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t);
|
||||
init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t)
|
||||
role system_r types ipsec_supervisor_t;
|
||||
|
||||
type racoon_t;
|
||||
|
@ -122,7 +122,7 @@ allow ipsec_mgmt_t ipsec_t:unix_stream_socket { read write };
|
|||
allow ipsec_mgmt_t ipsec_t:process { rlimitinh sigchld };
|
||||
|
||||
kernel_read_kernel_sysctls(ipsec_t)
|
||||
kernel_rw_net_sysctls(ipsec_t);
|
||||
kernel_rw_net_sysctls(ipsec_t)
|
||||
kernel_list_proc(ipsec_t)
|
||||
kernel_read_proc_symlinks(ipsec_t)
|
||||
# allow pluto to access /proc/net/ipsec_eroute;
|
||||
|
@ -245,7 +245,7 @@ stream_connect_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t, ipsec_t)
|
|||
can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t)
|
||||
allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read;
|
||||
|
||||
domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t);
|
||||
domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t)
|
||||
allow ipsec_mgmt_t ipsec_supervisor_t:process { signal signull };
|
||||
|
||||
kernel_rw_net_sysctls(ipsec_mgmt_t)
|
||||
|
@ -467,7 +467,7 @@ allow ipsec_supervisor_t self:netlink_route_socket rw_netlink_socket_perms;
|
|||
allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms;
|
||||
|
||||
allow ipsec_supervisor_t ipsec_conf_file_t:dir list_dir_perms;
|
||||
read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t);
|
||||
read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t)
|
||||
|
||||
manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t)
|
||||
|
||||
|
@ -479,23 +479,23 @@ manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)
|
|||
manage_files_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)
|
||||
files_pid_filetrans(ipsec_supervisor_t, ipsec_var_run_t, { dir file sock_file })
|
||||
|
||||
domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t);
|
||||
domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t)
|
||||
|
||||
kernel_read_network_state(ipsec_supervisor_t)
|
||||
kernel_read_system_state(ipsec_supervisor_t)
|
||||
kernel_rw_net_sysctls(ipsec_supervisor_t);
|
||||
kernel_rw_net_sysctls(ipsec_supervisor_t)
|
||||
|
||||
corecmd_exec_bin(ipsec_supervisor_t);
|
||||
corecmd_exec_bin(ipsec_supervisor_t)
|
||||
corecmd_exec_shell(ipsec_supervisor_t)
|
||||
|
||||
dev_read_rand(ipsec_supervisor_t);
|
||||
dev_read_urand(ipsec_supervisor_t);
|
||||
dev_read_rand(ipsec_supervisor_t)
|
||||
dev_read_urand(ipsec_supervisor_t)
|
||||
|
||||
files_read_etc_files(ipsec_supervisor_t);
|
||||
files_read_etc_files(ipsec_supervisor_t)
|
||||
|
||||
logging_send_syslog_msg(ipsec_supervisor_t);
|
||||
logging_send_syslog_msg(ipsec_supervisor_t)
|
||||
|
||||
miscfiles_read_localization(ipsec_supervisor_t);
|
||||
miscfiles_read_localization(ipsec_supervisor_t)
|
||||
|
||||
optional_policy(`
|
||||
modutils_domtrans(ipsec_supervisor_t)
|
||||
|
|
|
@ -31,7 +31,7 @@ type auditd_initrc_exec_t;
|
|||
init_script_file(auditd_initrc_exec_t)
|
||||
|
||||
type auditd_unit_t;
|
||||
init_unit_file(auditd_unit_t);
|
||||
init_unit_file(auditd_unit_t)
|
||||
|
||||
type auditd_var_run_t;
|
||||
files_pid_file(auditd_var_run_t)
|
||||
|
|
|
@ -776,10 +776,10 @@ allow systemd_passwd_agent_t self:capability { chown sys_tty_config dac_override
|
|||
allow systemd_passwd_agent_t self:process { setfscreate setsockcreate signal };
|
||||
allow systemd_passwd_agent_t self:unix_dgram_socket create_socket_perms;
|
||||
|
||||
manage_dirs_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
|
||||
manage_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
|
||||
manage_sock_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
|
||||
manage_fifo_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
|
||||
manage_dirs_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
|
||||
manage_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
|
||||
manage_sock_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
|
||||
manage_fifo_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
|
||||
init_pid_filetrans(systemd_passwd_agent_t, systemd_passwd_var_run_t, { dir fifo_file file })
|
||||
|
||||
kernel_read_system_state(systemd_passwd_agent_t)
|
||||
|
|
Loading…
Reference in New Issue