Whitespace fixes in authlogin.
This commit is contained in:
parent
baa87c9324
commit
9262d3c958
|
@ -195,7 +195,7 @@ interface(`auth_domtrans_login_program',`
|
||||||
')
|
')
|
||||||
|
|
||||||
corecmd_search_bin($1)
|
corecmd_search_bin($1)
|
||||||
domtrans_pattern($1, login_exec_t,$2)
|
domtrans_pattern($1, login_exec_t, $2)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -224,7 +224,7 @@ interface(`auth_ranged_domtrans_login_program',`
|
||||||
type login_exec_t;
|
type login_exec_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
auth_domtrans_login_program($1,$2)
|
auth_domtrans_login_program($1, $2)
|
||||||
|
|
||||||
ifdef(`enable_mcs',`
|
ifdef(`enable_mcs',`
|
||||||
range_transition $1 login_exec_t:process $3;
|
range_transition $1 login_exec_t:process $3;
|
||||||
|
@ -512,10 +512,10 @@ interface(`auth_dontaudit_getattr_shadow',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
# cjp: these next three interfaces are split
|
# cjp: these next three interfaces are split
|
||||||
# since typeattribute does not work in conditionals
|
# since typeattribute does not work in conditionals
|
||||||
# yet, otherwise they should be one interface.
|
# yet, otherwise they should be one interface.
|
||||||
#
|
#
|
||||||
interface(`auth_read_shadow',`
|
interface(`auth_read_shadow',`
|
||||||
auth_can_read_shadow_passwords($1)
|
auth_can_read_shadow_passwords($1)
|
||||||
auth_tunable_read_shadow($1)
|
auth_tunable_read_shadow($1)
|
||||||
|
@ -1113,7 +1113,7 @@ interface(`auth_read_all_dirs_except_shadow',`
|
||||||
type shadow_t;
|
type shadow_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
files_read_all_dirs_except($1,$2 -shadow_t)
|
files_read_all_dirs_except($1, $2 -shadow_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1139,7 +1139,7 @@ interface(`auth_read_all_files_except_shadow',`
|
||||||
type shadow_t;
|
type shadow_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
files_read_all_files_except($1,$2 -shadow_t)
|
files_read_all_files_except($1, $2 -shadow_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1164,7 +1164,7 @@ interface(`auth_read_all_symlinks_except_shadow',`
|
||||||
type shadow_t;
|
type shadow_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
files_read_all_symlinks_except($1,$2 -shadow_t)
|
files_read_all_symlinks_except($1, $2 -shadow_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1190,7 +1190,7 @@ interface(`auth_relabel_all_files_except_shadow',`
|
||||||
type shadow_t;
|
type shadow_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
files_relabel_all_files($1,$2 -shadow_t)
|
files_relabel_all_files($1, $2 -shadow_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1216,7 +1216,7 @@ interface(`auth_rw_all_files_except_shadow',`
|
||||||
type shadow_t;
|
type shadow_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
files_rw_all_files($1,$2 -shadow_t)
|
files_rw_all_files($1, $2 -shadow_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1242,7 +1242,7 @@ interface(`auth_manage_all_files_except_shadow',`
|
||||||
type shadow_t;
|
type shadow_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
files_manage_all_files($1,$2 -shadow_t)
|
files_manage_all_files($1, $2 -shadow_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
|
|
@ -89,7 +89,6 @@ allow chkpwd_t shadow_t:file read_file_perms;
|
||||||
files_list_etc(chkpwd_t)
|
files_list_etc(chkpwd_t)
|
||||||
|
|
||||||
kernel_read_crypto_sysctls(chkpwd_t)
|
kernel_read_crypto_sysctls(chkpwd_t)
|
||||||
|
|
||||||
# is_selinux_enabled
|
# is_selinux_enabled
|
||||||
kernel_read_system_state(chkpwd_t)
|
kernel_read_system_state(chkpwd_t)
|
||||||
|
|
||||||
|
@ -150,7 +149,7 @@ dontaudit pam_t self:capability sys_tty_config;
|
||||||
|
|
||||||
allow pam_t self:fd use;
|
allow pam_t self:fd use;
|
||||||
allow pam_t self:fifo_file rw_file_perms;
|
allow pam_t self:fifo_file rw_file_perms;
|
||||||
allow pam_t self:unix_dgram_socket create_socket_perms;
|
allow pam_t self:unix_dgram_socket create_socket_perms;
|
||||||
allow pam_t self:unix_stream_socket rw_stream_socket_perms;
|
allow pam_t self:unix_stream_socket rw_stream_socket_perms;
|
||||||
allow pam_t self:unix_dgram_socket sendto;
|
allow pam_t self:unix_dgram_socket sendto;
|
||||||
allow pam_t self:unix_stream_socket connectto;
|
allow pam_t self:unix_stream_socket connectto;
|
||||||
|
|
Loading…
Reference in New Issue