trunk: additional whitespace fixes.

This commit is contained in:
Chris PeBenito 2008-10-17 15:52:39 +00:00
parent 88cf0a9c2b
commit 2a98379a24
43 changed files with 106 additions and 121 deletions

View File

@ -19,7 +19,6 @@ interface(`aide_domtrans',`
domtrans_pattern($1, aide_exec_t, aide_t) domtrans_pattern($1, aide_exec_t, aide_t)
') ')
######################################## ########################################
## <summary> ## <summary>
## Execute aide programs in the AIDE domain. ## Execute aide programs in the AIDE domain.

View File

@ -37,7 +37,6 @@ interface(`apcupsd_read_pid_files',`
allow $1 apcupsd_var_run_t:file read_file_perms; allow $1 apcupsd_var_run_t:file read_file_perms;
') ')
######################################## ########################################
## <summary> ## <summary>
## Allow the specified domain to read apcupsd's log files. ## Allow the specified domain to read apcupsd's log files.

View File

@ -14,7 +14,6 @@ type apm_exec_t;
application_domain(apm_t, apm_exec_t) application_domain(apm_t, apm_exec_t)
role system_r types apm_t; role system_r types apm_t;
type apmd_log_t; type apmd_log_t;
logging_log_file(apmd_log_t) logging_log_file(apmd_log_t)

View File

@ -20,7 +20,6 @@ interface(`cyrus_manage_data',`
manage_files_pattern($1, cyrus_var_lib_t, cyrus_var_lib_t) manage_files_pattern($1, cyrus_var_lib_t, cyrus_var_lib_t)
') ')
######################################## ########################################
## <summary> ## <summary>
## Connect to Cyrus using a unix domain stream socket. ## Connect to Cyrus using a unix domain stream socket.
@ -81,4 +80,3 @@ interface(`cyrus_admin',`
admin_pattern($1, cyrus_var_run_t) admin_pattern($1, cyrus_var_run_t)
') ')

View File

@ -34,6 +34,3 @@ ifdef(`distro_redhat', `
/var/spool/dovecot(/.*)? gen_context(system_u:object_r:dovecot_spool_t,s0) /var/spool/dovecot(/.*)? gen_context(system_u:object_r:dovecot_spool_t,s0)

View File

@ -283,7 +283,6 @@ interface(`hal_read_pid_files',`
allow $1 hald_var_run_t:file read_file_perms; allow $1 hald_var_run_t:file read_file_perms;
') ')
######################################## ########################################
## <summary> ## <summary>
## Read/Write hald PID files. ## Read/Write hald PID files.

View File

@ -156,7 +156,6 @@ interface(`inn_dgram_send',`
allow $1 innd_t:unix_dgram_socket sendto; allow $1 innd_t:unix_dgram_socket sendto;
') ')
######################################## ########################################
## <summary> ## <summary>
## Execute inn in the inn domain. ## Execute inn in the inn domain.

View File

@ -53,7 +53,6 @@ interface(`ldap_use',`
refpolicywarn(`$0($*) has been deprecated.') refpolicywarn(`$0($*) has been deprecated.')
') ')
######################################## ########################################
## <summary> ## <summary>
## Connect to slapd over an unix stream socket. ## Connect to slapd over an unix stream socket.

View File

@ -7,4 +7,3 @@ HOME_DIR/\.oidentd.conf gen_context(system_u:object_r:ROLE_oidentd_home_t, s0)
/usr/sbin/oidentd -- gen_context(system_u:object_r:oidentd_exec_t, s0) /usr/sbin/oidentd -- gen_context(system_u:object_r:oidentd_exec_t, s0)

View File

@ -37,7 +37,6 @@ interface(`rpcbind_read_pid_files',`
allow $1 rpcbind_var_run_t:file read_file_perms; allow $1 rpcbind_var_run_t:file read_file_perms;
') ')
######################################## ########################################
## <summary> ## <summary>
## Search rpcbind lib directories. ## Search rpcbind lib directories.

View File

@ -57,7 +57,6 @@ interface(`rwho_read_log_files',`
logging_search_logs($1) logging_search_logs($1)
') ')
######################################## ########################################
## <summary> ## <summary>
## Search rwho spool directories. ## Search rwho spool directories.

View File

@ -650,7 +650,6 @@ optional_policy(`
# Winbind local policy # Winbind local policy
# #
allow winbind_t self:capability { dac_override ipc_lock setuid }; allow winbind_t self:capability { dac_override ipc_lock setuid };
dontaudit winbind_t self:capability sys_tty_config; dontaudit winbind_t self:capability sys_tty_config;
allow winbind_t self:process signal_perms; allow winbind_t self:process signal_perms;