Removed unnecessary semicolons

Removed unecessary semicolons in ipsec.te, logging.te, and systemd.te

Signed-off-by: James Carter <jwcart2@tycho.nsa.gov>
This commit is contained in:
James Carter 2018-04-11 14:55:18 -04:00 committed by Chris PeBenito
parent ed60abef70
commit 2268d42fee
3 changed files with 17 additions and 17 deletions

View File

@ -59,7 +59,7 @@ files_pid_file(ipsec_mgmt_var_run_t)
type ipsec_supervisor_t;
type ipsec_supervisor_exec_t;
init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t);
init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t)
role system_r types ipsec_supervisor_t;
type racoon_t;
@ -122,7 +122,7 @@ allow ipsec_mgmt_t ipsec_t:unix_stream_socket { read write };
allow ipsec_mgmt_t ipsec_t:process { rlimitinh sigchld };
kernel_read_kernel_sysctls(ipsec_t)
kernel_rw_net_sysctls(ipsec_t);
kernel_rw_net_sysctls(ipsec_t)
kernel_list_proc(ipsec_t)
kernel_read_proc_symlinks(ipsec_t)
# allow pluto to access /proc/net/ipsec_eroute;
@ -245,7 +245,7 @@ stream_connect_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t, ipsec_t)
can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t)
allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read;
domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t);
domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t)
allow ipsec_mgmt_t ipsec_supervisor_t:process { signal signull };
kernel_rw_net_sysctls(ipsec_mgmt_t)
@ -467,7 +467,7 @@ allow ipsec_supervisor_t self:netlink_route_socket rw_netlink_socket_perms;
allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms;
allow ipsec_supervisor_t ipsec_conf_file_t:dir list_dir_perms;
read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t);
read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t)
manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t)
@ -479,23 +479,23 @@ manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)
manage_files_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)
files_pid_filetrans(ipsec_supervisor_t, ipsec_var_run_t, { dir file sock_file })
domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t);
domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t)
kernel_read_network_state(ipsec_supervisor_t)
kernel_read_system_state(ipsec_supervisor_t)
kernel_rw_net_sysctls(ipsec_supervisor_t);
kernel_rw_net_sysctls(ipsec_supervisor_t)
corecmd_exec_bin(ipsec_supervisor_t);
corecmd_exec_bin(ipsec_supervisor_t)
corecmd_exec_shell(ipsec_supervisor_t)
dev_read_rand(ipsec_supervisor_t);
dev_read_urand(ipsec_supervisor_t);
dev_read_rand(ipsec_supervisor_t)
dev_read_urand(ipsec_supervisor_t)
files_read_etc_files(ipsec_supervisor_t);
files_read_etc_files(ipsec_supervisor_t)
logging_send_syslog_msg(ipsec_supervisor_t);
logging_send_syslog_msg(ipsec_supervisor_t)
miscfiles_read_localization(ipsec_supervisor_t);
miscfiles_read_localization(ipsec_supervisor_t)
optional_policy(`
modutils_domtrans(ipsec_supervisor_t)

View File

@ -31,7 +31,7 @@ type auditd_initrc_exec_t;
init_script_file(auditd_initrc_exec_t)
type auditd_unit_t;
init_unit_file(auditd_unit_t);
init_unit_file(auditd_unit_t)
type auditd_var_run_t;
files_pid_file(auditd_var_run_t)

View File

@ -776,10 +776,10 @@ allow systemd_passwd_agent_t self:capability { chown sys_tty_config dac_override
allow systemd_passwd_agent_t self:process { setfscreate setsockcreate signal };
allow systemd_passwd_agent_t self:unix_dgram_socket create_socket_perms;
manage_dirs_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
manage_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
manage_sock_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
manage_fifo_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
manage_dirs_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
manage_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
manage_sock_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
manage_fifo_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
init_pid_filetrans(systemd_passwd_agent_t, systemd_passwd_var_run_t, { dir fifo_file file })
kernel_read_system_state(systemd_passwd_agent_t)