Rearrange role lines from "own" patch.

This commit is contained in:
Chris PeBenito 2012-02-27 10:18:00 -05:00
parent 93c3ee8b7f
commit e707a70819
2 changed files with 5 additions and 5 deletions

View File

@ -6,11 +6,9 @@ policy_module(usermanage, 1.17.0)
# #
attribute_role chfn_roles; attribute_role chfn_roles;
role chfn_roles types chfn_t;
role system_r types chfn_t; role system_r types chfn_t;
attribute_role groupadd_roles; attribute_role groupadd_roles;
role groupadd_roles types groupadd_t;
attribute_role passwd_roles; attribute_role passwd_roles;
roleattribute system_r passwd_roles; roleattribute system_r passwd_roles;
@ -19,7 +17,6 @@ attribute_role sysadm_passwd_roles;
roleattribute system_r sysadm_passwd_roles; roleattribute system_r sysadm_passwd_roles;
attribute_role useradd_roles; attribute_role useradd_roles;
role useradd_roles types useradd_t;
type admin_passwd_exec_t; type admin_passwd_exec_t;
files_type(admin_passwd_exec_t) files_type(admin_passwd_exec_t)
@ -28,6 +25,7 @@ type chfn_t;
type chfn_exec_t; type chfn_exec_t;
domain_obj_id_change_exemption(chfn_t) domain_obj_id_change_exemption(chfn_t)
application_domain(chfn_t, chfn_exec_t) application_domain(chfn_t, chfn_exec_t)
role chfn_roles types chfn_t;
type crack_t; type crack_t;
type crack_exec_t; type crack_exec_t;
@ -44,6 +42,7 @@ type groupadd_t;
type groupadd_exec_t; type groupadd_exec_t;
domain_obj_id_change_exemption(groupadd_t) domain_obj_id_change_exemption(groupadd_t)
init_system_domain(groupadd_t, groupadd_exec_t) init_system_domain(groupadd_t, groupadd_exec_t)
role groupadd_roles types groupadd_t;
type passwd_t; type passwd_t;
type passwd_exec_t; type passwd_exec_t;
@ -63,6 +62,7 @@ type useradd_t;
type useradd_exec_t; type useradd_exec_t;
domain_obj_id_change_exemption(useradd_t) domain_obj_id_change_exemption(useradd_t)
init_system_domain(useradd_t, useradd_exec_t) init_system_domain(useradd_t, useradd_exec_t)
role useradd_roles types useradd_t;
######################################## ########################################
# #

View File

@ -13,10 +13,8 @@ attribute can_write_binary_policy;
attribute can_relabelto_binary_policy; attribute can_relabelto_binary_policy;
attribute_role newrole_roles; attribute_role newrole_roles;
role newrole_roles types newrole_t;
attribute_role run_init_roles; attribute_role run_init_roles;
role run_init_roles types run_init_t;
role system_r types run_init_t; role system_r types run_init_t;
attribute_role semanage_roles; attribute_role semanage_roles;
@ -62,6 +60,7 @@ application_domain(newrole_t, newrole_exec_t)
domain_role_change_exemption(newrole_t) domain_role_change_exemption(newrole_t)
domain_obj_id_change_exemption(newrole_t) domain_obj_id_change_exemption(newrole_t)
domain_interactive_fd(newrole_t) domain_interactive_fd(newrole_t)
role newrole_roles types newrole_t;
# #
# policy_config_t is the type of /etc/security/selinux/* # policy_config_t is the type of /etc/security/selinux/*
@ -93,6 +92,7 @@ type run_init_t;
type run_init_exec_t; type run_init_exec_t;
application_domain(run_init_t, run_init_exec_t) application_domain(run_init_t, run_init_exec_t)
domain_system_change_exemption(run_init_t) domain_system_change_exemption(run_init_t)
role run_init_roles types run_init_t;
type semanage_t; type semanage_t;
type semanage_exec_t; type semanage_exec_t;