mirror of
https://github.com/SELinuxProject/refpolicy
synced 2025-04-11 03:51:33 +00:00
trunk: additional whitespace fixes.
This commit is contained in:
parent
88cf0a9c2b
commit
2a98379a24
@ -19,7 +19,6 @@ interface(`aide_domtrans',`
|
|||||||
domtrans_pattern($1, aide_exec_t, aide_t)
|
domtrans_pattern($1, aide_exec_t, aide_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute aide programs in the AIDE domain.
|
## Execute aide programs in the AIDE domain.
|
||||||
|
@ -37,7 +37,6 @@ interface(`apcupsd_read_pid_files',`
|
|||||||
allow $1 apcupsd_var_run_t:file read_file_perms;
|
allow $1 apcupsd_var_run_t:file read_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the specified domain to read apcupsd's log files.
|
## Allow the specified domain to read apcupsd's log files.
|
||||||
|
@ -14,7 +14,6 @@ type apm_exec_t;
|
|||||||
application_domain(apm_t, apm_exec_t)
|
application_domain(apm_t, apm_exec_t)
|
||||||
role system_r types apm_t;
|
role system_r types apm_t;
|
||||||
|
|
||||||
|
|
||||||
type apmd_log_t;
|
type apmd_log_t;
|
||||||
logging_log_file(apmd_log_t)
|
logging_log_file(apmd_log_t)
|
||||||
|
|
||||||
|
@ -20,7 +20,6 @@ interface(`cyrus_manage_data',`
|
|||||||
manage_files_pattern($1, cyrus_var_lib_t, cyrus_var_lib_t)
|
manage_files_pattern($1, cyrus_var_lib_t, cyrus_var_lib_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Connect to Cyrus using a unix domain stream socket.
|
## Connect to Cyrus using a unix domain stream socket.
|
||||||
@ -81,4 +80,3 @@ interface(`cyrus_admin',`
|
|||||||
admin_pattern($1, cyrus_var_run_t)
|
admin_pattern($1, cyrus_var_run_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
|
@ -34,6 +34,3 @@ ifdef(`distro_redhat', `
|
|||||||
|
|
||||||
/var/spool/dovecot(/.*)? gen_context(system_u:object_r:dovecot_spool_t,s0)
|
/var/spool/dovecot(/.*)? gen_context(system_u:object_r:dovecot_spool_t,s0)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -283,7 +283,6 @@ interface(`hal_read_pid_files',`
|
|||||||
allow $1 hald_var_run_t:file read_file_perms;
|
allow $1 hald_var_run_t:file read_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read/Write hald PID files.
|
## Read/Write hald PID files.
|
||||||
|
@ -156,7 +156,6 @@ interface(`inn_dgram_send',`
|
|||||||
allow $1 innd_t:unix_dgram_socket sendto;
|
allow $1 innd_t:unix_dgram_socket sendto;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute inn in the inn domain.
|
## Execute inn in the inn domain.
|
||||||
|
@ -53,7 +53,6 @@ interface(`ldap_use',`
|
|||||||
refpolicywarn(`$0($*) has been deprecated.')
|
refpolicywarn(`$0($*) has been deprecated.')
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Connect to slapd over an unix stream socket.
|
## Connect to slapd over an unix stream socket.
|
||||||
|
@ -7,4 +7,3 @@ HOME_DIR/\.oidentd.conf gen_context(system_u:object_r:ROLE_oidentd_home_t, s0)
|
|||||||
|
|
||||||
/usr/sbin/oidentd -- gen_context(system_u:object_r:oidentd_exec_t, s0)
|
/usr/sbin/oidentd -- gen_context(system_u:object_r:oidentd_exec_t, s0)
|
||||||
|
|
||||||
|
|
||||||
|
@ -37,7 +37,6 @@ interface(`rpcbind_read_pid_files',`
|
|||||||
allow $1 rpcbind_var_run_t:file read_file_perms;
|
allow $1 rpcbind_var_run_t:file read_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Search rpcbind lib directories.
|
## Search rpcbind lib directories.
|
||||||
|
@ -57,7 +57,6 @@ interface(`rwho_read_log_files',`
|
|||||||
logging_search_logs($1)
|
logging_search_logs($1)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Search rwho spool directories.
|
## Search rwho spool directories.
|
||||||
|
@ -650,7 +650,6 @@ optional_policy(`
|
|||||||
# Winbind local policy
|
# Winbind local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
|
|
||||||
allow winbind_t self:capability { dac_override ipc_lock setuid };
|
allow winbind_t self:capability { dac_override ipc_lock setuid };
|
||||||
dontaudit winbind_t self:capability sys_tty_config;
|
dontaudit winbind_t self:capability sys_tty_config;
|
||||||
allow winbind_t self:process signal_perms;
|
allow winbind_t self:process signal_perms;
|
||||||
|
Loading…
Reference in New Issue
Block a user