Rearrange role lines from "own" patch.
This commit is contained in:
parent
93c3ee8b7f
commit
e707a70819
|
@ -6,11 +6,9 @@ policy_module(usermanage, 1.17.0)
|
||||||
#
|
#
|
||||||
|
|
||||||
attribute_role chfn_roles;
|
attribute_role chfn_roles;
|
||||||
role chfn_roles types chfn_t;
|
|
||||||
role system_r types chfn_t;
|
role system_r types chfn_t;
|
||||||
|
|
||||||
attribute_role groupadd_roles;
|
attribute_role groupadd_roles;
|
||||||
role groupadd_roles types groupadd_t;
|
|
||||||
|
|
||||||
attribute_role passwd_roles;
|
attribute_role passwd_roles;
|
||||||
roleattribute system_r passwd_roles;
|
roleattribute system_r passwd_roles;
|
||||||
|
@ -19,7 +17,6 @@ attribute_role sysadm_passwd_roles;
|
||||||
roleattribute system_r sysadm_passwd_roles;
|
roleattribute system_r sysadm_passwd_roles;
|
||||||
|
|
||||||
attribute_role useradd_roles;
|
attribute_role useradd_roles;
|
||||||
role useradd_roles types useradd_t;
|
|
||||||
|
|
||||||
type admin_passwd_exec_t;
|
type admin_passwd_exec_t;
|
||||||
files_type(admin_passwd_exec_t)
|
files_type(admin_passwd_exec_t)
|
||||||
|
@ -28,6 +25,7 @@ type chfn_t;
|
||||||
type chfn_exec_t;
|
type chfn_exec_t;
|
||||||
domain_obj_id_change_exemption(chfn_t)
|
domain_obj_id_change_exemption(chfn_t)
|
||||||
application_domain(chfn_t, chfn_exec_t)
|
application_domain(chfn_t, chfn_exec_t)
|
||||||
|
role chfn_roles types chfn_t;
|
||||||
|
|
||||||
type crack_t;
|
type crack_t;
|
||||||
type crack_exec_t;
|
type crack_exec_t;
|
||||||
|
@ -44,6 +42,7 @@ type groupadd_t;
|
||||||
type groupadd_exec_t;
|
type groupadd_exec_t;
|
||||||
domain_obj_id_change_exemption(groupadd_t)
|
domain_obj_id_change_exemption(groupadd_t)
|
||||||
init_system_domain(groupadd_t, groupadd_exec_t)
|
init_system_domain(groupadd_t, groupadd_exec_t)
|
||||||
|
role groupadd_roles types groupadd_t;
|
||||||
|
|
||||||
type passwd_t;
|
type passwd_t;
|
||||||
type passwd_exec_t;
|
type passwd_exec_t;
|
||||||
|
@ -63,6 +62,7 @@ type useradd_t;
|
||||||
type useradd_exec_t;
|
type useradd_exec_t;
|
||||||
domain_obj_id_change_exemption(useradd_t)
|
domain_obj_id_change_exemption(useradd_t)
|
||||||
init_system_domain(useradd_t, useradd_exec_t)
|
init_system_domain(useradd_t, useradd_exec_t)
|
||||||
|
role useradd_roles types useradd_t;
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
|
|
@ -13,10 +13,8 @@ attribute can_write_binary_policy;
|
||||||
attribute can_relabelto_binary_policy;
|
attribute can_relabelto_binary_policy;
|
||||||
|
|
||||||
attribute_role newrole_roles;
|
attribute_role newrole_roles;
|
||||||
role newrole_roles types newrole_t;
|
|
||||||
|
|
||||||
attribute_role run_init_roles;
|
attribute_role run_init_roles;
|
||||||
role run_init_roles types run_init_t;
|
|
||||||
role system_r types run_init_t;
|
role system_r types run_init_t;
|
||||||
|
|
||||||
attribute_role semanage_roles;
|
attribute_role semanage_roles;
|
||||||
|
@ -62,6 +60,7 @@ application_domain(newrole_t, newrole_exec_t)
|
||||||
domain_role_change_exemption(newrole_t)
|
domain_role_change_exemption(newrole_t)
|
||||||
domain_obj_id_change_exemption(newrole_t)
|
domain_obj_id_change_exemption(newrole_t)
|
||||||
domain_interactive_fd(newrole_t)
|
domain_interactive_fd(newrole_t)
|
||||||
|
role newrole_roles types newrole_t;
|
||||||
|
|
||||||
#
|
#
|
||||||
# policy_config_t is the type of /etc/security/selinux/*
|
# policy_config_t is the type of /etc/security/selinux/*
|
||||||
|
@ -93,6 +92,7 @@ type run_init_t;
|
||||||
type run_init_exec_t;
|
type run_init_exec_t;
|
||||||
application_domain(run_init_t, run_init_exec_t)
|
application_domain(run_init_t, run_init_exec_t)
|
||||||
domain_system_change_exemption(run_init_t)
|
domain_system_change_exemption(run_init_t)
|
||||||
|
role run_init_roles types run_init_t;
|
||||||
|
|
||||||
type semanage_t;
|
type semanage_t;
|
||||||
type semanage_exec_t;
|
type semanage_exec_t;
|
||||||
|
|
Loading…
Reference in New Issue