diff --git a/policy/modules/services/nagios.te b/policy/modules/services/nagios.te
index 61a3920..3b620e3 100644
--- a/policy/modules/services/nagios.te
+++ b/policy/modules/services/nagios.te
@@ -179,7 +179,7 @@ optional_policy(`
#
allow nrpe_t self:capability { setuid setgid };
-dontaudit nrpe_t self:capability {sys_tty_config sys_resource};
+dontaudit nrpe_t self:capability { sys_tty_config sys_resource };
allow nrpe_t self:process { setpgid signal_perms setsched setrlimit };
allow nrpe_t self:fifo_file rw_fifo_file_perms;
allow nrpe_t self:tcp_socket create_stream_socket_perms;
diff --git a/policy/modules/services/ntop.te b/policy/modules/services/ntop.te
index ded9fb6..9d1e60a 100644
--- a/policy/modules/services/ntop.te
+++ b/policy/modules/services/ntop.te
@@ -51,7 +51,7 @@ files_tmp_filetrans(ntop_t, ntop_tmp_t, { file dir })
manage_dirs_pattern(ntop_t, ntop_var_lib_t, ntop_var_lib_t)
manage_files_pattern(ntop_t, ntop_var_lib_t, ntop_var_lib_t)
-files_var_lib_filetrans(ntop_t, ntop_var_lib_t, { file dir } )
+files_var_lib_filetrans(ntop_t, ntop_var_lib_t, { file dir })
manage_files_pattern(ntop_t, ntop_var_run_t, ntop_var_run_t)
files_pid_filetrans(ntop_t, ntop_var_run_t, file)
diff --git a/policy/modules/services/nx.te b/policy/modules/services/nx.te
index 737415e..1c72c6e 100644
--- a/policy/modules/services/nx.te
+++ b/policy/modules/services/nx.te
@@ -89,10 +89,10 @@ seutil_dontaudit_search_config(nx_server_t)
sysnet_read_config(nx_server_t)
ifdef(`TODO',`
-# clients already have create permissions; the nxclient wants to also have unlink rights
-allow userdomain xdm_tmp_t:sock_file delete_sock_file_perms;
-# for a lockfile created by the client process
-allow nx_server_t user_tmpfile:file getattr_file_perms;
+ # clients already have create permissions; the nxclient wants to also have unlink rights
+ allow userdomain xdm_tmp_t:sock_file delete_sock_file_perms;
+ # for a lockfile created by the client process
+ allow nx_server_t user_tmpfile:file getattr_file_perms;
')
########################################
diff --git a/policy/modules/services/oddjob.te b/policy/modules/services/oddjob.te
index 03ed75d..c8f4d64 100644
--- a/policy/modules/services/oddjob.te
+++ b/policy/modules/services/oddjob.te
@@ -100,4 +100,3 @@ userdom_home_filetrans_user_home_dir(oddjob_mkhomedir_t)
userdom_manage_user_home_dirs(oddjob_mkhomedir_t)
userdom_manage_user_home_content_dirs(oddjob_mkhomedir_t)
userdom_manage_user_home_content(oddjob_mkhomedir_t)
-
diff --git a/policy/modules/services/oident.te b/policy/modules/services/oident.te
index b1effe6..73c1fa5 100644
--- a/policy/modules/services/oident.te
+++ b/policy/modules/services/oident.te
@@ -1,4 +1,4 @@
-policy_module(oident, 2.1.0)
+policy_module(oident, 2.1.0)
########################################
#
diff --git a/policy/modules/services/openvpn.te b/policy/modules/services/openvpn.te
index ba7c06b..cb87bef 100644
--- a/policy/modules/services/openvpn.te
+++ b/policy/modules/services/openvpn.te
@@ -6,9 +6,9 @@ policy_module(openvpn, 1.10.0)
#
##
-##
-## Allow openvpn to read home directories
-##
+##
+## Allow openvpn to read home directories
+##
##
gen_tunable(openvpn_enable_homedirs, false)
@@ -46,7 +46,6 @@ files_pid_file(openvpn_var_run_t)
allow openvpn_t self:capability { dac_read_search dac_override ipc_lock net_bind_service net_admin setgid setuid sys_chroot sys_tty_config };
allow openvpn_t self:process { signal getsched };
allow openvpn_t self:fifo_file rw_fifo_file_perms;
-
allow openvpn_t self:unix_dgram_socket { create_socket_perms sendto };
allow openvpn_t self:unix_stream_socket { create_stream_socket_perms connectto };
allow openvpn_t self:udp_socket create_socket_perms;
@@ -129,12 +128,12 @@ tunable_policy(`openvpn_enable_homedirs',`
')
tunable_policy(`openvpn_enable_homedirs && use_nfs_home_dirs',`
- fs_read_nfs_files(openvpn_t)
-')
+ fs_read_nfs_files(openvpn_t)
+')
tunable_policy(`openvpn_enable_homedirs && use_samba_home_dirs',`
- fs_read_cifs_files(openvpn_t)
-')
+ fs_read_cifs_files(openvpn_t)
+')
optional_policy(`
daemontools_service_domain(openvpn_t, openvpn_exec_t)
diff --git a/policy/modules/services/pads.te b/policy/modules/services/pads.te
index 5e25230..f414173 100644
--- a/policy/modules/services/pads.te
+++ b/policy/modules/services/pads.te
@@ -1,4 +1,4 @@
-policy_module(pads, 1.0.0)
+policy_module(pads, 1.0.0)
########################################
#
diff --git a/policy/modules/services/passenger.te b/policy/modules/services/passenger.te
index 9cb0d1c..ba9fdb9 100644
--- a/policy/modules/services/passenger.te
+++ b/policy/modules/services/passenger.te
@@ -1,5 +1,4 @@
-
-policy_module(passanger,1.0.0)
+policy_module(passanger, 1.0.0)
########################################
#
@@ -30,7 +29,6 @@ permissive passenger_t;
allow passenger_t self:capability { dac_override fsetid fowner chown setuid setgid };
allow passenger_t self:process signal;
-
allow passenger_t self:fifo_file rw_fifo_file_perms;
allow passenger_t self:unix_stream_socket { create_stream_socket_perms connectto };
diff --git a/policy/modules/services/piranha.te b/policy/modules/services/piranha.te
index 76e216a..6b69f38 100644
--- a/policy/modules/services/piranha.te
+++ b/policy/modules/services/piranha.te
@@ -1,4 +1,4 @@
-policy_module(piranha,1.0.0)
+policy_module(piranha, 1.0.0)
########################################
#
@@ -6,9 +6,9 @@ policy_module(piranha,1.0.0)
#
##
-##
-## Allow piranha-lvs domain to connect to the network using TCP.
-##
+##
+## Allow piranha-lvs domain to connect to the network using TCP.
+##
##
gen_tunable(piranha_lvs_can_network_connect, false)
@@ -65,7 +65,6 @@ init_domtrans_script(piranha_fos_t)
allow piranha_web_t self:capability { setuid sys_nice kill setgid };
allow piranha_web_t self:process { getsched setsched signal signull ptrace };
allow piranha_web_t self:rawip_socket create_socket_perms;
-
allow piranha_web_t self:netlink_route_socket r_netlink_socket_perms;
allow piranha_web_t self:sem create_sem_perms;
allow piranha_web_t self:shm create_shm_perms;
@@ -80,7 +79,7 @@ rw_files_pattern(piranha_web_t, piranha_etc_rw_t, piranha_etc_rw_t)
manage_dirs_pattern(piranha_web_t, piranha_log_t, piranha_log_t)
manage_files_pattern(piranha_web_t, piranha_log_t, piranha_log_t)
-logging_log_filetrans(piranha_web_t, piranha_log_t, { dir file } )
+logging_log_filetrans(piranha_web_t, piranha_log_t, { dir file })
can_exec(piranha_web_t, piranha_web_tmp_t)
manage_dirs_pattern(piranha_web_t, piranha_web_tmp_t, piranha_web_tmp_t)
@@ -119,7 +118,7 @@ optional_policy(`
')
optional_policy(`
- sasl_connect(piranha_web_t)
+ sasl_connect(piranha_web_t)
')
######################################
@@ -129,9 +128,7 @@ optional_policy(`
# neede by nanny
allow piranha_lvs_t self:capability { net_raw sys_nice };
-
allow piranha_lvs_t self:process signal;
-
allow piranha_lvs_t self:unix_dgram_socket create_socket_perms;
allow piranha_lvs_t self:rawip_socket create_socket_perms;
@@ -145,7 +142,7 @@ sysnet_dns_name_resolve(piranha_lvs_t)
# needed by nanny
tunable_policy(`piranha_lvs_can_network_connect',`
- corenet_tcp_connect_all_ports(piranha_lvs_t)
+ corenet_tcp_connect_all_ports(piranha_lvs_t)
')
# needed by ipvsadm
@@ -176,7 +173,7 @@ optional_policy(`
')
optional_policy(`
- sysnet_domtrans_ifconfig(piranha_pulse_t)
+ sysnet_domtrans_ifconfig(piranha_pulse_t)
')
####################################
diff --git a/policy/modules/services/plymouthd.te b/policy/modules/services/plymouthd.te
index c30505a..836e2e2 100644
--- a/policy/modules/services/plymouthd.te
+++ b/policy/modules/services/plymouthd.te
@@ -92,7 +92,7 @@ sysnet_read_config(plymouth_t)
plymouthd_stream_connect(plymouth_t)
-ifdef(`hide_broken_symptoms', `
+ifdef(`hide_broken_symptoms',`
optional_policy(`
hal_dontaudit_write_log(plymouth_t)
hal_dontaudit_rw_pipes(plymouth_t)
diff --git a/policy/modules/services/policykit.te b/policy/modules/services/policykit.te
index e731afa..7385ecf 100644
--- a/policy/modules/services/policykit.te
+++ b/policy/modules/services/policykit.te
@@ -41,7 +41,6 @@ files_pid_file(policykit_var_run_t)
allow policykit_t self:capability { dac_override dac_read_search setgid setuid sys_ptrace };
allow policykit_t self:process { getsched getattr signal };
allow policykit_t self:fifo_file rw_fifo_file_perms;
-
allow policykit_t self:unix_dgram_socket create_socket_perms;
allow policykit_t self:unix_stream_socket { create_stream_socket_perms connectto };
@@ -275,4 +274,3 @@ optional_policy(`
kernel_search_proc(policykit_resolve_t)
hal_read_state(policykit_resolve_t)
')
-
diff --git a/policy/modules/services/postfix.te b/policy/modules/services/postfix.te
index ff20bb0..628fcda 100644
--- a/policy/modules/services/postfix.te
+++ b/policy/modules/services/postfix.te
@@ -6,10 +6,9 @@ policy_module(postfix, 1.12.0)
#
##
-##
-## Allow postfix_local domain full write access to mail_spool directories
-##
-##
+##
+## Allow postfix_local domain full write access to mail_spool directories
+##
##
gen_tunable(allow_postfix_local_write_mail_spool, false)
@@ -21,7 +20,7 @@ attribute postfix_user_domtrans;
postfix_server_domain_template(bounce)
-type postfix_spool_bounce_t, postfix_spool_type;
+type postfix_spool_bounce_t, postfix_spool_type;
files_type(postfix_spool_bounce_t)
postfix_server_domain_template(cleanup)
@@ -40,7 +39,7 @@ type postfix_map_t;
type postfix_map_exec_t;
application_domain(postfix_map_t, postfix_map_exec_t)
role system_r types postfix_map_t;
-
+
type postfix_map_tmp_t;
files_tmp_file(postfix_map_tmp_t)
diff --git a/policy/modules/services/postgresql.te b/policy/modules/services/postgresql.te
index fac7b13..b4101fa 100644
--- a/policy/modules/services/postgresql.te
+++ b/policy/modules/services/postgresql.te
@@ -15,16 +15,16 @@ gen_require(`
#
##
-##
-## Allow unprived users to execute DDL statement
-##
+##
+## Allow unprived users to execute DDL statement
+##
##
gen_tunable(sepgsql_enable_users_ddl, true)
##
-##
-## Allow database admins to execute DML statement
-##
+##
+## Allow database admins to execute DML statement
+##
##
gen_tunable(sepgsql_unconfined_dbadm, true)
diff --git a/policy/modules/services/ppp.te b/policy/modules/services/ppp.te
index 916f73f..d32a0d2 100644
--- a/policy/modules/services/ppp.te
+++ b/policy/modules/services/ppp.te
@@ -6,16 +6,16 @@ policy_module(ppp, 1.12.0)
#
##
-##
-## Allow pppd to load kernel modules for certain modems
-##
+##
+## Allow pppd to load kernel modules for certain modems
+##
##
gen_tunable(pppd_can_insmod, false)
##
-##
-## Allow pppd to be run for a regular user
-##
+##
+## Allow pppd to be run for a regular user
+##
##
gen_tunable(pppd_for_user, false)
diff --git a/policy/modules/services/privoxy.te b/policy/modules/services/privoxy.te
index 19138e1..2404ddc 100644
--- a/policy/modules/services/privoxy.te
+++ b/policy/modules/services/privoxy.te
@@ -6,10 +6,10 @@ policy_module(privoxy, 1.10.0)
#
##
-##
-## Allow privoxy to connect to all ports, not just
-## HTTP, FTP, and Gopher ports.
-##
+##
+## Allow privoxy to connect to all ports, not just
+## HTTP, FTP, and Gopher ports.
+##
##
gen_tunable(privoxy_connect_any, false)
diff --git a/policy/modules/services/puppet.te b/policy/modules/services/puppet.te
index 4a3866b..80c1f5d 100644
--- a/policy/modules/services/puppet.te
+++ b/policy/modules/services/puppet.te
@@ -6,10 +6,10 @@ policy_module(puppet, 1.0.0)
#
##
-##
-## Allow Puppet client to manage all file
-## types.
-##
+##
+## Allow Puppet client to manage all file
+## types.
+##
##
gen_tunable(puppet_manage_all_files, false)
diff --git a/policy/modules/services/pyzor.te b/policy/modules/services/pyzor.te
index 2f03bad..6872068 100644
--- a/policy/modules/services/pyzor.te
+++ b/policy/modules/services/pyzor.te
@@ -5,9 +5,7 @@ policy_module(pyzor, 2.1.0)
# Declarations
#
-
ifdef(`distro_redhat',`
-
gen_require(`
type spamc_t;
type spamc_exec_t;
@@ -34,43 +32,41 @@ ifdef(`distro_redhat',`
typealias spamd_etc_t alias pyzor_etc_t;
typealias spamc_home_t alias pyzor_home_t;
typealias spamc_home_t alias user_pyzor_home_t;
-
',`
-
-type pyzor_t;
-type pyzor_exec_t;
-typealias pyzor_t alias { user_pyzor_t staff_pyzor_t sysadm_pyzor_t };
-typealias pyzor_t alias { auditadm_pyzor_t secadm_pyzor_t };
-application_domain(pyzor_t, pyzor_exec_t)
-ubac_constrained(pyzor_t)
-role system_r types pyzor_t;
-
-type pyzor_etc_t;
-files_type(pyzor_etc_t)
-
-type pyzor_home_t;
-typealias pyzor_home_t alias { user_pyzor_home_t staff_pyzor_home_t sysadm_pyzor_home_t };
-typealias pyzor_home_t alias { auditadm_pyzor_home_t secadm_pyzor_home_t };
-userdom_user_home_content(pyzor_home_t)
-
-type pyzor_tmp_t;
-typealias pyzor_tmp_t alias { user_pyzor_tmp_t staff_pyzor_tmp_t sysadm_pyzor_tmp_t };
-typealias pyzor_tmp_t alias { auditadm_pyzor_tmp_t secadm_pyzor_tmp_t };
-files_tmp_file(pyzor_tmp_t)
-ubac_constrained(pyzor_tmp_t)
-
-type pyzor_var_lib_t;
-typealias pyzor_var_lib_t alias { user_pyzor_var_lib_t staff_pyzor_var_lib_t sysadm_pyzor_var_lib_t };
-typealias pyzor_var_lib_t alias { auditadm_pyzor_var_lib_t secadm_pyzor_var_lib_t };
-files_type(pyzor_var_lib_t)
-ubac_constrained(pyzor_var_lib_t)
-
-type pyzord_t;
-type pyzord_exec_t;
-init_daemon_domain(pyzord_t, pyzord_exec_t)
-
-type pyzord_log_t;
-logging_log_file(pyzord_log_t)
+ type pyzor_t;
+ type pyzor_exec_t;
+ typealias pyzor_t alias { user_pyzor_t staff_pyzor_t sysadm_pyzor_t };
+ typealias pyzor_t alias { auditadm_pyzor_t secadm_pyzor_t };
+ application_domain(pyzor_t, pyzor_exec_t)
+ ubac_constrained(pyzor_t)
+ role system_r types pyzor_t;
+
+ type pyzor_etc_t;
+ files_type(pyzor_etc_t)
+
+ type pyzor_home_t;
+ typealias pyzor_home_t alias { user_pyzor_home_t staff_pyzor_home_t sysadm_pyzor_home_t };
+ typealias pyzor_home_t alias { auditadm_pyzor_home_t secadm_pyzor_home_t };
+ userdom_user_home_content(pyzor_home_t)
+
+ type pyzor_tmp_t;
+ typealias pyzor_tmp_t alias { user_pyzor_tmp_t staff_pyzor_tmp_t sysadm_pyzor_tmp_t };
+ typealias pyzor_tmp_t alias { auditadm_pyzor_tmp_t secadm_pyzor_tmp_t };
+ files_tmp_file(pyzor_tmp_t)
+ ubac_constrained(pyzor_tmp_t)
+
+ type pyzor_var_lib_t;
+ typealias pyzor_var_lib_t alias { user_pyzor_var_lib_t staff_pyzor_var_lib_t sysadm_pyzor_var_lib_t };
+ typealias pyzor_var_lib_t alias { auditadm_pyzor_var_lib_t secadm_pyzor_var_lib_t };
+ files_type(pyzor_var_lib_t)
+ ubac_constrained(pyzor_var_lib_t)
+
+ type pyzord_t;
+ type pyzord_exec_t;
+ init_daemon_domain(pyzord_t, pyzord_exec_t)
+
+ type pyzord_log_t;
+ logging_log_file(pyzord_log_t)
')
########################################
@@ -149,7 +145,7 @@ can_exec(pyzord_t, pyzor_exec_t)
manage_files_pattern(pyzord_t, pyzord_log_t, pyzord_log_t)
allow pyzord_t pyzord_log_t:dir setattr;
-logging_log_filetrans(pyzord_t, pyzord_log_t, { file dir } )
+logging_log_filetrans(pyzord_t, pyzord_log_t, { file dir })
kernel_read_kernel_sysctls(pyzord_t)
kernel_read_system_state(pyzord_t)
diff --git a/policy/modules/services/qmail.te b/policy/modules/services/qmail.te
index 7653c35..54329f9 100644
--- a/policy/modules/services/qmail.te
+++ b/policy/modules/services/qmail.te
@@ -60,7 +60,7 @@ application_domain(qmail_tcp_env_t, qmail_tcp_env_exec_t)
########################################
#
# qmail-clean local policy
-# this component cleans up the queue directory
+# this component cleans up the queue directory
#
read_files_pattern(qmail_clean_t, qmail_spool_t, qmail_spool_t)
@@ -69,7 +69,7 @@ delete_files_pattern(qmail_clean_t, qmail_spool_t, qmail_spool_t)
########################################
#
# qmail-inject local policy
-# this component preprocesses mail from stdin and invokes qmail-queue
+# this component preprocesses mail from stdin and invokes qmail-queue
#
allow qmail_inject_t self:process signal_perms;
@@ -88,7 +88,7 @@ qmail_read_config(qmail_inject_t)
########################################
#
# qmail-local local policy
-# this component delivers a mail message
+# this component delivers a mail message
#
allow qmail_local_t self:process signal_perms;
@@ -131,7 +131,7 @@ optional_policy(`
########################################
#
# qmail-lspawn local policy
-# this component schedules local deliveries
+# this component schedules local deliveries
#
allow qmail_lspawn_t self:capability { setuid setgid };
@@ -154,7 +154,7 @@ files_search_tmp(qmail_lspawn_t)
########################################
#
# qmail-queue local policy
-# this component places a mail in a delivery queue, later to be processed by qmail-send
+# this component places a mail in a delivery queue, later to be processed by qmail-send
#
allow qmail_queue_t qmail_lspawn_t:fd use;
@@ -179,7 +179,7 @@ optional_policy(`
########################################
#
# qmail-remote local policy
-# this component sends mail via SMTP
+# this component sends mail via SMTP
#
allow qmail_remote_t self:tcp_socket create_socket_perms;
@@ -206,7 +206,7 @@ sysnet_read_config(qmail_remote_t)
########################################
#
# qmail-rspawn local policy
-# this component scedules remote deliveries
+# this component scedules remote deliveries
#
allow qmail_rspawn_t self:process signal_perms;
@@ -221,7 +221,7 @@ corecmd_search_bin(qmail_rspawn_t)
########################################
#
# qmail-send local policy
-# this component delivers mail messages from the queue
+# this component delivers mail messages from the queue
#
allow qmail_send_t self:process signal_perms;
@@ -240,7 +240,7 @@ optional_policy(`
########################################
#
# qmail-smtpd local policy
-# this component receives mails via SMTP
+# this component receives mails via SMTP
#
allow qmail_smtpd_t self:process signal_perms;
@@ -269,7 +269,7 @@ optional_policy(`
########################################
#
# splogger local policy
-# this component creates entries in syslog
+# this component creates entries in syslog
#
allow qmail_splogger_t self:unix_dgram_socket create_socket_perms;
@@ -283,7 +283,7 @@ miscfiles_read_localization(qmail_splogger_t)
########################################
#
# qmail-start local policy
-# this component starts up the mail delivery component
+# this component starts up the mail delivery component
#
allow qmail_start_t self:capability { setgid setuid };
@@ -307,7 +307,7 @@ optional_policy(`
########################################
#
# tcp-env local policy
-# this component sets up TCP-related environment variables
+# this component sets up TCP-related environment variables
#
allow qmail_tcp_env_t qmail_smtpd_exec_t:file read_file_perms;
diff --git a/policy/modules/services/qpidd.te b/policy/modules/services/qpidd.te
index cf9a327..43639a0 100644
--- a/policy/modules/services/qpidd.te
+++ b/policy/modules/services/qpidd.te
@@ -1,4 +1,4 @@
-policy_module(qpidd,1.0.0)
+policy_module(qpidd, 1.0.0)
########################################
#
@@ -32,7 +32,7 @@ allow qpidd_t self:unix_stream_socket create_stream_socket_perms;
manage_dirs_pattern(qpidd_t, qpidd_var_lib_t, qpidd_var_lib_t)
manage_files_pattern(qpidd_t, qpidd_var_lib_t, qpidd_var_lib_t)
-files_var_lib_filetrans(qpidd_t, qpidd_var_lib_t, { file dir } )
+files_var_lib_filetrans(qpidd_t, qpidd_var_lib_t, { file dir })
manage_dirs_pattern(qpidd_t, qpidd_var_run_t, qpidd_var_run_t)
manage_files_pattern(qpidd_t, qpidd_var_run_t, qpidd_var_run_t)