From 3c484f5bdc5e68add5745525764621c4ffd4404e Mon Sep 17 00:00:00 2001 From: Dominick Grift Date: Sep 17 2010 12:32:47 +0000 Subject: XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. XML summary fixes. --- diff --git a/policy/modules/services/ajaxterm.if b/policy/modules/services/ajaxterm.if index 2eee297..8e6e2c3 100644 --- a/policy/modules/services/ajaxterm.if +++ b/policy/modules/services/ajaxterm.if @@ -24,7 +24,7 @@ interface(`ajaxterm_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if index 854d78d..9668cde 100644 --- a/policy/modules/services/apache.if +++ b/policy/modules/services/apache.if @@ -1046,7 +1046,7 @@ interface(`apache_domtrans_all_scripts',` ## ## ## -## Role allowed access.. +## Role allowed access. ## ## ## @@ -1224,7 +1224,7 @@ interface(`apache_read_tmp_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1375,7 +1375,7 @@ ifdef(`TODO',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if index f384848..617eead 100644 --- a/policy/modules/services/automount.if +++ b/policy/modules/services/automount.if @@ -29,7 +29,6 @@ interface(`automount_domtrans',` ## ## # -# interface(`automount_signal',` gen_require(` type automount_t; diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if index 7c5d8c9..a01ce9f 100644 --- a/policy/modules/services/bluetooth.if +++ b/policy/modules/services/bluetooth.if @@ -179,7 +179,7 @@ interface(`bluetooth_run_helper',` ######################################## ## -## Read bluetooth helper state files. +## Do not audit attempts to read bluetooth helper state files. ## ## ## diff --git a/policy/modules/services/certmaster.if b/policy/modules/services/certmaster.if index 2704e81..ffd0da5 100644 --- a/policy/modules/services/certmaster.if +++ b/policy/modules/services/certmaster.if @@ -108,7 +108,7 @@ interface(`certmaster_manage_log',` ## ## ## -## The role to be allowed to manage the syslog domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if index 49b5829..9811f7f 100644 --- a/policy/modules/services/chronyd.if +++ b/policy/modules/services/chronyd.if @@ -25,7 +25,7 @@ interface(`chronyd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if index 7fcf2fb..a4c26ff 100644 --- a/policy/modules/services/cobbler.if +++ b/policy/modules/services/cobbler.if @@ -153,7 +153,7 @@ interface(`cobbler_manage_lib_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if index 7614a00..a2e6830 100644 --- a/policy/modules/services/corosync.if +++ b/policy/modules/services/corosync.if @@ -24,7 +24,7 @@ interface(`corosync_domtrans',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if index 3089b83..ffd5436 100644 --- a/policy/modules/services/cron.if +++ b/policy/modules/services/cron.if @@ -311,7 +311,7 @@ interface(`cron_exec',` ######################################## ## -## Execute crond server in the nscd domain. +## Execute crond server in the crond domain. ## ## ## diff --git a/policy/modules/services/devicekit.if b/policy/modules/services/devicekit.if index 70cf018..e20390f 100644 --- a/policy/modules/services/devicekit.if +++ b/policy/modules/services/devicekit.if @@ -147,16 +147,6 @@ interface(`devicekit_read_pid_files',` ## Domain allowed access. ## ## -## -## -## The role to be allowed to manage the devicekit domain. -## -## -## -## -## The type of the user terminal. -## -## ## # interface(`devicekit_admin',` diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if index 42cc08f..f5149c8 100644 --- a/policy/modules/services/dnsmasq.if +++ b/policy/modules/services/dnsmasq.if @@ -144,7 +144,6 @@ interface(`dnsmasq_write_config',` ## ## # -# interface(`dnsmasq_delete_pid_files',` gen_require(` type dnsmasq_var_run_t; diff --git a/policy/modules/services/exim.if b/policy/modules/services/exim.if index 1685c5d..91f751d 100644 --- a/policy/modules/services/exim.if +++ b/policy/modules/services/exim.if @@ -24,7 +24,7 @@ interface(`exim_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## #