mirror of
https://github.com/SELinuxProject/refpolicy
synced 2025-04-16 20:25:36 +00:00
Removed unnecessary semicolons
Removed unecessary semicolons in ipsec.te, logging.te, and systemd.te Signed-off-by: James Carter <jwcart2@tycho.nsa.gov>
This commit is contained in:
parent
ed60abef70
commit
2268d42fee
@ -59,7 +59,7 @@ files_pid_file(ipsec_mgmt_var_run_t)
|
|||||||
|
|
||||||
type ipsec_supervisor_t;
|
type ipsec_supervisor_t;
|
||||||
type ipsec_supervisor_exec_t;
|
type ipsec_supervisor_exec_t;
|
||||||
init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t);
|
init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t)
|
||||||
role system_r types ipsec_supervisor_t;
|
role system_r types ipsec_supervisor_t;
|
||||||
|
|
||||||
type racoon_t;
|
type racoon_t;
|
||||||
@ -122,7 +122,7 @@ allow ipsec_mgmt_t ipsec_t:unix_stream_socket { read write };
|
|||||||
allow ipsec_mgmt_t ipsec_t:process { rlimitinh sigchld };
|
allow ipsec_mgmt_t ipsec_t:process { rlimitinh sigchld };
|
||||||
|
|
||||||
kernel_read_kernel_sysctls(ipsec_t)
|
kernel_read_kernel_sysctls(ipsec_t)
|
||||||
kernel_rw_net_sysctls(ipsec_t);
|
kernel_rw_net_sysctls(ipsec_t)
|
||||||
kernel_list_proc(ipsec_t)
|
kernel_list_proc(ipsec_t)
|
||||||
kernel_read_proc_symlinks(ipsec_t)
|
kernel_read_proc_symlinks(ipsec_t)
|
||||||
# allow pluto to access /proc/net/ipsec_eroute;
|
# allow pluto to access /proc/net/ipsec_eroute;
|
||||||
@ -245,7 +245,7 @@ stream_connect_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t, ipsec_t)
|
|||||||
can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t)
|
can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t)
|
||||||
allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read;
|
allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read;
|
||||||
|
|
||||||
domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t);
|
domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t)
|
||||||
allow ipsec_mgmt_t ipsec_supervisor_t:process { signal signull };
|
allow ipsec_mgmt_t ipsec_supervisor_t:process { signal signull };
|
||||||
|
|
||||||
kernel_rw_net_sysctls(ipsec_mgmt_t)
|
kernel_rw_net_sysctls(ipsec_mgmt_t)
|
||||||
@ -467,7 +467,7 @@ allow ipsec_supervisor_t self:netlink_route_socket rw_netlink_socket_perms;
|
|||||||
allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms;
|
allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms;
|
||||||
|
|
||||||
allow ipsec_supervisor_t ipsec_conf_file_t:dir list_dir_perms;
|
allow ipsec_supervisor_t ipsec_conf_file_t:dir list_dir_perms;
|
||||||
read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t);
|
read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t)
|
||||||
|
|
||||||
manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t)
|
manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t)
|
||||||
|
|
||||||
@ -479,23 +479,23 @@ manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)
|
|||||||
manage_files_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)
|
manage_files_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)
|
||||||
files_pid_filetrans(ipsec_supervisor_t, ipsec_var_run_t, { dir file sock_file })
|
files_pid_filetrans(ipsec_supervisor_t, ipsec_var_run_t, { dir file sock_file })
|
||||||
|
|
||||||
domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t);
|
domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t)
|
||||||
|
|
||||||
kernel_read_network_state(ipsec_supervisor_t)
|
kernel_read_network_state(ipsec_supervisor_t)
|
||||||
kernel_read_system_state(ipsec_supervisor_t)
|
kernel_read_system_state(ipsec_supervisor_t)
|
||||||
kernel_rw_net_sysctls(ipsec_supervisor_t);
|
kernel_rw_net_sysctls(ipsec_supervisor_t)
|
||||||
|
|
||||||
corecmd_exec_bin(ipsec_supervisor_t);
|
corecmd_exec_bin(ipsec_supervisor_t)
|
||||||
corecmd_exec_shell(ipsec_supervisor_t)
|
corecmd_exec_shell(ipsec_supervisor_t)
|
||||||
|
|
||||||
dev_read_rand(ipsec_supervisor_t);
|
dev_read_rand(ipsec_supervisor_t)
|
||||||
dev_read_urand(ipsec_supervisor_t);
|
dev_read_urand(ipsec_supervisor_t)
|
||||||
|
|
||||||
files_read_etc_files(ipsec_supervisor_t);
|
files_read_etc_files(ipsec_supervisor_t)
|
||||||
|
|
||||||
logging_send_syslog_msg(ipsec_supervisor_t);
|
logging_send_syslog_msg(ipsec_supervisor_t)
|
||||||
|
|
||||||
miscfiles_read_localization(ipsec_supervisor_t);
|
miscfiles_read_localization(ipsec_supervisor_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
modutils_domtrans(ipsec_supervisor_t)
|
modutils_domtrans(ipsec_supervisor_t)
|
||||||
|
@ -31,7 +31,7 @@ type auditd_initrc_exec_t;
|
|||||||
init_script_file(auditd_initrc_exec_t)
|
init_script_file(auditd_initrc_exec_t)
|
||||||
|
|
||||||
type auditd_unit_t;
|
type auditd_unit_t;
|
||||||
init_unit_file(auditd_unit_t);
|
init_unit_file(auditd_unit_t)
|
||||||
|
|
||||||
type auditd_var_run_t;
|
type auditd_var_run_t;
|
||||||
files_pid_file(auditd_var_run_t)
|
files_pid_file(auditd_var_run_t)
|
||||||
|
@ -776,10 +776,10 @@ allow systemd_passwd_agent_t self:capability { chown sys_tty_config dac_override
|
|||||||
allow systemd_passwd_agent_t self:process { setfscreate setsockcreate signal };
|
allow systemd_passwd_agent_t self:process { setfscreate setsockcreate signal };
|
||||||
allow systemd_passwd_agent_t self:unix_dgram_socket create_socket_perms;
|
allow systemd_passwd_agent_t self:unix_dgram_socket create_socket_perms;
|
||||||
|
|
||||||
manage_dirs_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
|
manage_dirs_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
|
||||||
manage_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
|
manage_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
|
||||||
manage_sock_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
|
manage_sock_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
|
||||||
manage_fifo_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t);
|
manage_fifo_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t)
|
||||||
init_pid_filetrans(systemd_passwd_agent_t, systemd_passwd_var_run_t, { dir fifo_file file })
|
init_pid_filetrans(systemd_passwd_agent_t, systemd_passwd_var_run_t, { dir fifo_file file })
|
||||||
|
|
||||||
kernel_read_system_state(systemd_passwd_agent_t)
|
kernel_read_system_state(systemd_passwd_agent_t)
|
||||||
|
Loading…
Reference in New Issue
Block a user