diff --git a/policy/modules/services/abrt.if b/policy/modules/services/abrt.if index 1adfe2f..0b827c5 100644 --- a/policy/modules/services/abrt.if +++ b/policy/modules/services/abrt.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -62,7 +62,7 @@ interface(`abrt_signull',` ## ## ## -## Domain to allow access. +## Domain allowed access. ## ## # @@ -120,7 +120,7 @@ interface(`abrt_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -139,7 +139,7 @@ interface(`abrt_domtrans_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/afs.if b/policy/modules/services/afs.if index ada201c..8559cdc 100644 --- a/policy/modules/services/afs.if +++ b/policy/modules/services/afs.if @@ -44,7 +44,7 @@ interface(`afs_rw_udp_sockets',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # @@ -63,7 +63,7 @@ interface(`afs_rw_cache',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/aide.if b/policy/modules/services/aide.if index 23d7889..838d25b 100644 --- a/policy/modules/services/aide.if +++ b/policy/modules/services/aide.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`aide_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/aisexec.if b/policy/modules/services/aisexec.if index 4827f39..0370dba 100644 --- a/policy/modules/services/aisexec.if +++ b/policy/modules/services/aisexec.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/amavis.if b/policy/modules/services/amavis.if index 15c6df1..adb3d5f 100644 --- a/policy/modules/services/amavis.if +++ b/policy/modules/services/amavis.if @@ -28,7 +28,7 @@ interface(`amavis_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if index 223bfc2..c9e1a44 100644 --- a/policy/modules/services/apache.if +++ b/policy/modules/services/apache.if @@ -299,7 +299,7 @@ interface(`apache_read_user_content',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -391,7 +391,7 @@ interface(`apache_use_fds',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -410,7 +410,7 @@ interface(`apache_dontaudit_rw_fifo_file',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -429,7 +429,7 @@ interface(`apache_dontaudit_rw_stream_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -615,7 +615,7 @@ interface(`apache_domtrans_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -785,7 +785,7 @@ interface(`apache_exec_modules',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -848,7 +848,7 @@ interface(`apache_manage_sys_content',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -872,7 +872,7 @@ interface(`apache_domtrans_sys_script',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -891,7 +891,7 @@ interface(`apache_dontaudit_rw_sys_script_stream_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -911,7 +911,7 @@ interface(`apache_domtrans_all_scripts',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -991,7 +991,7 @@ interface(`apache_search_sys_content',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -1054,7 +1054,7 @@ interface(`apache_manage_all_user_content',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -1093,7 +1093,7 @@ interface(`apache_read_tmp_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/apcupsd.if b/policy/modules/services/apcupsd.if index acd4956..e342775 100644 --- a/policy/modules/services/apcupsd.if +++ b/policy/modules/services/apcupsd.if @@ -25,7 +25,7 @@ interface(`apcupsd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -84,7 +84,7 @@ interface(`apcupsd_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/apm.if b/policy/modules/services/apm.if index 77d31b9..1ea99b2 100644 --- a/policy/modules/services/apm.if +++ b/policy/modules/services/apm.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/arpwatch.if b/policy/modules/services/arpwatch.if index d41aee1..c804110 100644 --- a/policy/modules/services/arpwatch.if +++ b/policy/modules/services/arpwatch.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/asterisk.if b/policy/modules/services/asterisk.if index 57d74bd..8b8143e 100644 --- a/policy/modules/services/asterisk.if +++ b/policy/modules/services/asterisk.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if index 904f700..d80a16b 100644 --- a/policy/modules/services/automount.if +++ b/policy/modules/services/automount.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -95,7 +95,7 @@ interface(`automount_dontaudit_use_fds',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/avahi.if b/policy/modules/services/avahi.if index a5e598e..210ca0b 100644 --- a/policy/modules/services/avahi.if +++ b/policy/modules/services/avahi.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -119,7 +119,7 @@ interface(`avahi_stream_connect',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/bind.if b/policy/modules/services/bind.if index 5d3c891..44a1e3d 100644 --- a/policy/modules/services/bind.if +++ b/policy/modules/services/bind.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -24,7 +24,7 @@ interface(`bind_initrc_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -97,7 +97,7 @@ interface(`bind_kill',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -122,7 +122,7 @@ interface(`bind_run_ndc',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if index d17e012..3e45431 100644 --- a/policy/modules/services/bluetooth.if +++ b/policy/modules/services/bluetooth.if @@ -64,7 +64,7 @@ interface(`bluetooth_stream_connect',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -121,7 +121,7 @@ interface(`bluetooth_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -136,7 +136,7 @@ interface(`bluetooth_domtrans_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -161,7 +161,7 @@ interface(`bluetooth_run_helper',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/certmonger.if b/policy/modules/services/certmonger.if index 95a9290..a3728d4 100644 --- a/policy/modules/services/certmonger.if +++ b/policy/modules/services/certmonger.if @@ -45,7 +45,7 @@ interface(`certmonger_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if index 16e4342..9a0da94 100644 --- a/policy/modules/services/chronyd.if +++ b/policy/modules/services/chronyd.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/clamav.if b/policy/modules/services/clamav.if index ecb594c..1f11572 100644 --- a/policy/modules/services/clamav.if +++ b/policy/modules/services/clamav.if @@ -24,7 +24,7 @@ interface(`clamav_domtrans',` ## ## ## -## Domain allowed to connect. +## Domain allowed access. ## ## # @@ -101,7 +101,7 @@ interface(`clamav_search_lib',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/clockspeed.if b/policy/modules/services/clockspeed.if index 9e3f911..0797617 100644 --- a/policy/modules/services/clockspeed.if +++ b/policy/modules/services/clockspeed.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -24,7 +24,7 @@ interface(`clockspeed_domtrans_cli',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if index 9f7dd57..293e08d 100644 --- a/policy/modules/services/cobbler.if +++ b/policy/modules/services/cobbler.if @@ -34,7 +34,7 @@ interface(`cobblerd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -72,7 +72,7 @@ interface(`cobbler_read_config',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if index 5318dce..5220c9d 100644 --- a/policy/modules/services/corosync.if +++ b/policy/modules/services/corosync.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/courier.if b/policy/modules/services/courier.if index 6192cc3..37b03f6 100644 --- a/policy/modules/services/courier.if +++ b/policy/modules/services/courier.if @@ -90,7 +90,7 @@ template(`courier_domain_template',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -109,7 +109,7 @@ interface(`courier_domtrans_authdaemon',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -201,7 +201,7 @@ interface(`courier_read_spool',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if index 06ff274..35241ed 100644 --- a/policy/modules/services/cron.if +++ b/policy/modules/services/cron.if @@ -272,7 +272,7 @@ interface(`cron_system_entry',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -308,7 +308,7 @@ interface(`cron_exec',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -381,7 +381,7 @@ interface(`cron_read_pipes',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -435,7 +435,7 @@ interface(`cron_rw_tcp_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -453,7 +453,7 @@ interface(`cron_dontaudit_rw_tcp_sockets',` ## ## ## -## The type of the process to performing this action. +## Domain allowed access. ## ## # @@ -490,7 +490,7 @@ interface(`cron_manage_pid_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/cups.if b/policy/modules/services/cups.if index 9a751a1..305ddf4 100644 --- a/policy/modules/services/cups.if +++ b/policy/modules/services/cups.if @@ -33,7 +33,7 @@ interface(`cups_backend',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -124,7 +124,7 @@ interface(`cups_read_pid_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/dbus.if b/policy/modules/services/dbus.if index d76131b..39e901a 100644 --- a/policy/modules/services/dbus.if +++ b/policy/modules/services/dbus.if @@ -172,7 +172,7 @@ template(`dbus_role_template',` ## ## ## -## The type of the domain. +## Domain allowed access. ## ## # @@ -202,7 +202,7 @@ interface(`dbus_system_bus_client',` ## ## ## -## The type of the domain. +## Domain allowed access. ## ## # @@ -449,7 +449,7 @@ interface(`dbus_system_domain',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/dcc.if b/policy/modules/services/dcc.if index ffce351..784753e 100644 --- a/policy/modules/services/dcc.if +++ b/policy/modules/services/dcc.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`dcc_domtrans_cdcc',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -51,7 +51,7 @@ interface(`dcc_run_cdcc',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -89,7 +89,7 @@ interface(`dcc_signal_client',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -114,7 +114,7 @@ interface(`dcc_run_client',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -134,7 +134,7 @@ interface(`dcc_domtrans_dbclean',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/ddclient.if b/policy/modules/services/ddclient.if index ead762a..0a1a61b 100644 --- a/policy/modules/services/ddclient.if +++ b/policy/modules/services/ddclient.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`ddclient_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/denyhosts.if b/policy/modules/services/denyhosts.if index de7e074..567865f 100644 --- a/policy/modules/services/denyhosts.if +++ b/policy/modules/services/denyhosts.if @@ -32,7 +32,7 @@ interface(`denyhosts_domtrans', ` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/dhcp.if b/policy/modules/services/dhcp.if index 0d9f10c..5e2cea8 100644 --- a/policy/modules/services/dhcp.if +++ b/policy/modules/services/dhcp.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -45,7 +45,7 @@ interface(`dhcpd_setattr_state_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if index a4840a7..9bd812b 100644 --- a/policy/modules/services/dnsmasq.if +++ b/policy/modules/services/dnsmasq.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`dnsmasq_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -102,7 +102,7 @@ interface(`dnsmasq_kill',` ## ## ## -## Domain allowed. +## Domain allowed access. ## ## # @@ -121,7 +121,7 @@ interface(`dnsmasq_read_config',` ## ## ## -## Domain allowed. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/dovecot.if b/policy/modules/services/dovecot.if index eed4e6c..e1d7dc5 100644 --- a/policy/modules/services/dovecot.if +++ b/policy/modules/services/dovecot.if @@ -25,7 +25,7 @@ interface(`dovecot_stream_connect_auth',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/exim.if b/policy/modules/services/exim.if index 88c5ede..6bef7f8 100644 --- a/policy/modules/services/exim.if +++ b/policy/modules/services/exim.if @@ -43,7 +43,7 @@ interface(`exim_dontaudit_read_tmp_files',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -102,7 +102,7 @@ interface(`exim_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/fail2ban.if b/policy/modules/services/fail2ban.if index 43dd962..f590a1f 100644 --- a/policy/modules/services/fail2ban.if +++ b/policy/modules/services/fail2ban.if @@ -103,7 +103,7 @@ interface(`fail2ban_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/finger.if b/policy/modules/services/finger.if index cda687c..b5dd671 100644 --- a/policy/modules/services/finger.if +++ b/policy/modules/services/finger.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/ftp.if b/policy/modules/services/ftp.if index dfa52fd..bc27421 100644 --- a/policy/modules/services/ftp.if +++ b/policy/modules/services/ftp.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -95,7 +95,7 @@ interface(`ftp_read_log',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -114,7 +114,7 @@ interface(`ftp_domtrans_ftpdctl',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -139,7 +139,7 @@ interface(`ftp_run_ftpdctl',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/gnomeclock.if b/policy/modules/services/gnomeclock.if index 3da830b..671d8fd 100644 --- a/policy/modules/services/gnomeclock.if +++ b/policy/modules/services/gnomeclock.if @@ -25,7 +25,7 @@ interface(`gnomeclock_domtrans',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/gpm.if b/policy/modules/services/gpm.if index 1fecb11..7d97298 100644 --- a/policy/modules/services/gpm.if +++ b/policy/modules/services/gpm.if @@ -48,7 +48,7 @@ interface(`gpm_getattr_gpmctl',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/gpsd.if b/policy/modules/services/gpsd.if index 8fe31eb..c0ee676 100644 --- a/policy/modules/services/gpsd.if +++ b/policy/modules/services/gpsd.if @@ -25,7 +25,7 @@ interface(`gpsd_domtrans',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/hal.if b/policy/modules/services/hal.if index 3707830..7cf6763 100644 --- a/policy/modules/services/hal.if +++ b/policy/modules/services/hal.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -42,7 +42,7 @@ interface(`hal_getattr',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -78,7 +78,7 @@ interface(`hal_ptrace',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -115,7 +115,7 @@ interface(`hal_dontaudit_use_fds',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -190,7 +190,7 @@ interface(`hal_stream_connect',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -248,7 +248,7 @@ interface(`hal_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -344,7 +344,7 @@ interface(`hal_read_tmp_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/icecast.if b/policy/modules/services/icecast.if index 96ab892..ecab47a 100644 --- a/policy/modules/services/icecast.if +++ b/policy/modules/services/icecast.if @@ -42,7 +42,7 @@ interface(`icecast_signal',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/inetd.if b/policy/modules/services/inetd.if index 59d9778..df48e5e 100644 --- a/policy/modules/services/inetd.if +++ b/policy/modules/services/inetd.if @@ -159,7 +159,7 @@ interface(`inetd_tcp_connect',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/inn.if b/policy/modules/services/inn.if index 1240337..ebc9e0d 100644 --- a/policy/modules/services/inn.if +++ b/policy/modules/services/inn.if @@ -162,7 +162,7 @@ interface(`inn_dgram_send',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/kerneloops.if b/policy/modules/services/kerneloops.if index 29f8c16..835b16b 100644 --- a/policy/modules/services/kerneloops.if +++ b/policy/modules/services/kerneloops.if @@ -47,7 +47,7 @@ interface(`kerneloops_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -67,7 +67,7 @@ interface(`kerneloops_dontaudit_dbus_chat',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/ksmtuned.if b/policy/modules/services/ksmtuned.if index 67e9269..6fd0b4c 100644 --- a/policy/modules/services/ksmtuned.if +++ b/policy/modules/services/ksmtuned.if @@ -24,7 +24,7 @@ interface(`ksmtuned_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/lpd.if b/policy/modules/services/lpd.if index d29dfdf..a4f32f5 100644 --- a/policy/modules/services/lpd.if +++ b/policy/modules/services/lpd.if @@ -40,7 +40,7 @@ interface(`lpd_role',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -59,7 +59,7 @@ interface(`lpd_domtrans_checkpc',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -182,7 +182,7 @@ interface(`lpd_read_config',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/mailman.if b/policy/modules/services/mailman.if index 9ad4c4e..67c7fdd 100644 --- a/policy/modules/services/mailman.if +++ b/policy/modules/services/mailman.if @@ -96,7 +96,7 @@ template(`mailman_domain_template', ` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -115,7 +115,7 @@ interface(`mailman_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -339,7 +339,7 @@ interface(`mailman_read_archive',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/mta.if b/policy/modules/services/mta.if index c57356a..343cee3 100644 --- a/policy/modules/services/mta.if +++ b/policy/modules/services/mta.if @@ -344,7 +344,7 @@ interface(`mta_mailserver_user_agent',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -380,7 +380,7 @@ interface(`mta_send_mail',` ## ## ## -## Domain to transition from. +## Domain allowed to transition. ## ## ## @@ -562,7 +562,7 @@ interface(`mta_rw_aliases',` ## ## ## -## Mail server domain. +## Domain to not audit. ## ## # @@ -580,7 +580,7 @@ interface(`mta_dontaudit_rw_delivery_tcp_sockets',` ## ## ## -## Mail server domain. +## Domain allowed access. ## ## # @@ -595,7 +595,7 @@ interface(`mta_tcp_connect_all_mailservers',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/munin.if b/policy/modules/services/munin.if index cb4832e..c358d8f 100644 --- a/policy/modules/services/munin.if +++ b/policy/modules/services/munin.if @@ -139,7 +139,7 @@ interface(`munin_search_lib',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/mysql.if b/policy/modules/services/mysql.if index 1e4b4d5..e9c0982 100644 --- a/policy/modules/services/mysql.if +++ b/policy/modules/services/mysql.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -261,7 +261,7 @@ interface(`mysql_write_log',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nagios.if b/policy/modules/services/nagios.if index b487ec9..8581040 100644 --- a/policy/modules/services/nagios.if +++ b/policy/modules/services/nagios.if @@ -164,7 +164,7 @@ interface(`nagios_read_tmp_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/networkmanager.if b/policy/modules/services/networkmanager.if index 18f657e..2324d9e 100644 --- a/policy/modules/services/networkmanager.if +++ b/policy/modules/services/networkmanager.if @@ -83,7 +83,7 @@ interface(`networkmanager_rw_routing_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -102,7 +102,7 @@ interface(`networkmanager_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nis.if b/policy/modules/services/nis.if index c7db858..abe3f7f 100644 --- a/policy/modules/services/nis.if +++ b/policy/modules/services/nis.if @@ -118,7 +118,7 @@ interface(`nis_authenticate',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -138,7 +138,7 @@ interface(`nis_domtrans_ypbind',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -285,7 +285,7 @@ interface(`nis_read_ypserv_config',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -304,7 +304,7 @@ interface(`nis_domtrans_ypxfr',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -323,7 +323,7 @@ interface(`nis_initrc_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nscd.if b/policy/modules/services/nscd.if index a63a657..85188dc 100644 --- a/policy/modules/services/nscd.if +++ b/policy/modules/services/nscd.if @@ -60,7 +60,7 @@ interface(`nscd_signull',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -159,7 +159,7 @@ interface(`nscd_shm_use',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -216,7 +216,7 @@ interface(`nscd_unconfined',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ## @@ -240,7 +240,7 @@ interface(`nscd_run',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nslcd.if b/policy/modules/services/nslcd.if index 01d6be9..23c769c 100644 --- a/policy/modules/services/nslcd.if +++ b/policy/modules/services/nslcd.if @@ -24,7 +24,7 @@ interface(`nslcd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -61,7 +61,7 @@ interface(`nslcd_read_pid_files',` ## ## ## -## Domain allowed to connect. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/ntp.if b/policy/modules/services/ntp.if index c42c7ab..e80f8c0 100644 --- a/policy/modules/services/ntp.if +++ b/policy/modules/services/ntp.if @@ -22,7 +22,7 @@ interface(`ntp_stub',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -42,7 +42,7 @@ interface(`ntp_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -67,7 +67,7 @@ interface(`ntp_run',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -86,7 +86,7 @@ interface(`ntp_domtrans_ntpdate',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nx.if b/policy/modules/services/nx.if index ccc68c7..79a225c 100644 --- a/policy/modules/services/nx.if +++ b/policy/modules/services/nx.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/oav.if b/policy/modules/services/oav.if index d44783f..7f0d644 100644 --- a/policy/modules/services/oav.if +++ b/policy/modules/services/oav.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`oav_domtrans_update',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/oddjob.if b/policy/modules/services/oddjob.if index 6433998..bd76ec2 100644 --- a/policy/modules/services/oddjob.if +++ b/policy/modules/services/oddjob.if @@ -91,7 +91,7 @@ interface(`oddjob_domtrans_mkhomedir',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/openca.if b/policy/modules/services/openca.if index 43bb38b..a8c1eef 100644 --- a/policy/modules/services/openca.if +++ b/policy/modules/services/openca.if @@ -7,7 +7,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/openvpn.if b/policy/modules/services/openvpn.if index ae74460..d883214 100644 --- a/policy/modules/services/openvpn.if +++ b/policy/modules/services/openvpn.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`openvpn_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/policykit.if b/policy/modules/services/policykit.if index 2ccacfa..48ff1e8 100644 --- a/policy/modules/services/policykit.if +++ b/policy/modules/services/policykit.if @@ -46,7 +46,7 @@ interface(`policykit_domtrans_auth',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -89,7 +89,7 @@ interface(`policykit_domtrans_grant',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/portmap.if b/policy/modules/services/portmap.if index af55ca0..374afcf 100644 --- a/policy/modules/services/portmap.if +++ b/policy/modules/services/portmap.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -27,7 +27,7 @@ interface(`portmap_domtrans_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/postfix.if b/policy/modules/services/postfix.if index 378cee1..c48b45b 100644 --- a/policy/modules/services/postfix.if +++ b/policy/modules/services/postfix.if @@ -263,7 +263,7 @@ interface(`postfix_rw_local_pipes',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -281,7 +281,7 @@ interface(`postfix_read_local_state',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -319,7 +319,7 @@ interface(`postfix_dontaudit_use_fds',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -338,7 +338,7 @@ interface(`postfix_domtrans_map',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -364,7 +364,7 @@ interface(`postfix_run_map',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -421,7 +421,7 @@ interface(`postfix_stream_connect_master',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -440,7 +440,7 @@ interface(`postfix_domtrans_postdrop',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -515,7 +515,7 @@ interface(`postfix_manage_private_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/postgresql.if b/policy/modules/services/postgresql.if index 394031b..539a7c9 100644 --- a/policy/modules/services/postgresql.if +++ b/policy/modules/services/postgresql.if @@ -223,7 +223,7 @@ interface(`postgresql_manage_db',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -241,7 +241,7 @@ interface(`postgresql_domtrans',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/postgrey.if b/policy/modules/services/postgrey.if index 3927880..ad15fde 100644 --- a/policy/modules/services/postgrey.if +++ b/policy/modules/services/postgrey.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed to talk to postgrey +## Domain allowed access. ## ## # @@ -26,7 +26,7 @@ interface(`postgrey_stream_connect',` ## ## ## -## Domain allowed access +## Domain allowed access. ## ## # diff --git a/policy/modules/services/ppp.if b/policy/modules/services/ppp.if index 4789268..b524673 100644 --- a/policy/modules/services/ppp.if +++ b/policy/modules/services/ppp.if @@ -117,7 +117,7 @@ interface(`ppp_signull',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -136,7 +136,7 @@ interface(`ppp_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -164,7 +164,7 @@ interface(`ppp_run_cond',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -326,7 +326,7 @@ interface(`ppp_pid_filetrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/prelude.if b/policy/modules/services/prelude.if index 737be4f..2316653 100644 --- a/policy/modules/services/prelude.if +++ b/policy/modules/services/prelude.if @@ -79,7 +79,7 @@ interface(`prelude_read_spool',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/procmail.if b/policy/modules/services/procmail.if index f68e025..b64b02f 100644 --- a/policy/modules/services/procmail.if +++ b/policy/modules/services/procmail.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/puppet.if b/policy/modules/services/puppet.if index 34946a2..2855a44 100644 --- a/policy/modules/services/puppet.if +++ b/policy/modules/services/puppet.if @@ -17,7 +17,7 @@ ## ## ## -## Domain allowed access +## Domain allowed access. ## ## # diff --git a/policy/modules/services/pyzor.if b/policy/modules/services/pyzor.if index 3745b62..494f7e2 100644 --- a/policy/modules/services/pyzor.if +++ b/policy/modules/services/pyzor.if @@ -55,7 +55,7 @@ interface(`pyzor_signal',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/qmail.if b/policy/modules/services/qmail.if index 27fd19e..a55bf44 100644 --- a/policy/modules/services/qmail.if +++ b/policy/modules/services/qmail.if @@ -53,7 +53,7 @@ template(`qmail_child_domain_template',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## # @@ -79,7 +79,7 @@ interface(`qmail_domtrans_inject',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/razor.if b/policy/modules/services/razor.if index f4a355f..f04a595 100644 --- a/policy/modules/services/razor.if +++ b/policy/modules/services/razor.if @@ -146,7 +146,7 @@ interface(`razor_role',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/remotelogin.if b/policy/modules/services/remotelogin.if index 114f2c2..31be971 100644 --- a/policy/modules/services/remotelogin.if +++ b/policy/modules/services/remotelogin.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rgmanager.if b/policy/modules/services/rgmanager.if index 4504355..7dc38d1 100644 --- a/policy/modules/services/rgmanager.if +++ b/policy/modules/services/rgmanager.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rhcs.if b/policy/modules/services/rhcs.if index 6b7eb35..de37806 100644 --- a/policy/modules/services/rhcs.if +++ b/policy/modules/services/rhcs.if @@ -120,7 +120,7 @@ interface(`rhcs_rw_dlm_controld_semaphores',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -180,7 +180,7 @@ interface(`rhcs_stream_connect_fenced',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -260,7 +260,7 @@ interface(`rhcs_stream_connect_gfs_controld',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -341,7 +341,7 @@ interface(`rhcs_rw_groupd_shm',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rhgb.if b/policy/modules/services/rhgb.if index 46681c8..96efae7 100644 --- a/policy/modules/services/rhgb.if +++ b/policy/modules/services/rhgb.if @@ -95,7 +95,7 @@ interface(`rhgb_rw_stream_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -167,7 +167,7 @@ interface(`rhgb_use_ptys',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/rlogin.if b/policy/modules/services/rlogin.if index ba3364d..63e78c6 100644 --- a/policy/modules/services/rlogin.if +++ b/policy/modules/services/rlogin.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rpc.if b/policy/modules/services/rpc.if index 005f516..cda37bb 100644 --- a/policy/modules/services/rpc.if +++ b/policy/modules/services/rpc.if @@ -143,7 +143,7 @@ interface(`rpc_udp_send',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -197,7 +197,7 @@ interface(`rpc_write_exports',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -215,7 +215,7 @@ interface(`rpc_domtrans_nfsd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -233,7 +233,7 @@ interface(`rpc_initrc_domtrans_nfsd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -252,7 +252,7 @@ interface(`rpc_domtrans_rpcd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rshd.if b/policy/modules/services/rshd.if index 92bcded..2e87d76 100644 --- a/policy/modules/services/rshd.if +++ b/policy/modules/services/rshd.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rsync.if b/policy/modules/services/rsync.if index 6a2d345..3386f29 100644 --- a/policy/modules/services/rsync.if +++ b/policy/modules/services/rsync.if @@ -35,7 +35,7 @@ interface(`rsync_entry_type',` ## ## ## -## Domain to transition from. +## Domain allowed to transition. ## ## ## @@ -68,7 +68,7 @@ interface(`rsync_entry_spec_domtrans',` ## ## ## -## Domain to transition from. +## Domain allowed to transition. ## ## ## @@ -110,7 +110,7 @@ interface(`rsync_exec',` ## ## ## -## Domain allowed. +## Domain allowed access. ## ## # @@ -129,7 +129,7 @@ interface(`rsync_read_config',` ## ## ## -## Domain allowed. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/samba.if b/policy/modules/services/samba.if index 6d974a7..82cb169 100644 --- a/policy/modules/services/samba.if +++ b/policy/modules/services/samba.if @@ -10,7 +10,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -46,7 +46,7 @@ interface(`samba_signal_nmbd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -64,7 +64,7 @@ interface(`samba_initrc_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -84,7 +84,7 @@ interface(`samba_domtrans_net',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -109,7 +109,7 @@ interface(`samba_run_net',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -129,7 +129,7 @@ interface(`samba_domtrans_smbmount',` ## ## ## -## Domain allowed acces. +## Domain allowed to transition. ## ## ## @@ -360,7 +360,7 @@ interface(`samba_read_var_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -440,7 +440,7 @@ interface(`samba_domtrans_smbcontrol',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ## @@ -464,7 +464,7 @@ interface(`samba_run_smbcontrol',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -554,7 +554,7 @@ interface(`samba_rw_smbmount_tcp_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -573,7 +573,7 @@ interface(`samba_domtrans_winbind_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/sendmail.if b/policy/modules/services/sendmail.if index e4f4051..7e94c7c 100644 --- a/policy/modules/services/sendmail.if +++ b/policy/modules/services/sendmail.if @@ -23,7 +23,7 @@ interface(`sendmail_stub',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -41,7 +41,7 @@ interface(`sendmail_rw_pipes',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -63,7 +63,7 @@ interface(`sendmail_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -162,7 +162,7 @@ interface(`sendmail_rw_unix_stream_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -257,7 +257,7 @@ interface(`sendmail_manage_tmp_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -277,7 +277,7 @@ interface(`sendmail_domtrans_unconfined',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/setroubleshoot.if b/policy/modules/services/setroubleshoot.if index c09053b..22dfeb4 100644 --- a/policy/modules/services/setroubleshoot.if +++ b/policy/modules/services/setroubleshoot.if @@ -27,7 +27,7 @@ interface(`setroubleshoot_stream_connect',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/slrnpull.if b/policy/modules/services/slrnpull.if index 66a80b3..d7e8289 100644 --- a/policy/modules/services/slrnpull.if +++ b/policy/modules/services/slrnpull.if @@ -6,7 +6,7 @@ ## ## ## -## domain allowed access +## Domain allowed access. ## ## # @@ -26,7 +26,7 @@ interface(`slrnpull_search_spool',` ## ## ## -## domain allowed access +## Domain allowed access. ## ## # diff --git a/policy/modules/services/smartmon.if b/policy/modules/services/smartmon.if index f3d8459..adea9f9 100644 --- a/policy/modules/services/smartmon.if +++ b/policy/modules/services/smartmon.if @@ -6,7 +6,7 @@ ## ## ## -## The process type reading the temporary files. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/smokeping.if b/policy/modules/services/smokeping.if index 6be6642..824d206 100644 --- a/policy/modules/services/smokeping.if +++ b/policy/modules/services/smokeping.if @@ -24,7 +24,7 @@ interface(`smokeping_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/spamassassin.if b/policy/modules/services/spamassassin.if index d159ef3..c954f31 100644 --- a/policy/modules/services/spamassassin.if +++ b/policy/modules/services/spamassassin.if @@ -101,7 +101,7 @@ interface(`spamassassin_exec_spamd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -138,7 +138,7 @@ interface(`spamassassin_exec_client',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/squid.if b/policy/modules/services/squid.if index 2fe24de..d2496bd 100644 --- a/policy/modules/services/squid.if +++ b/policy/modules/services/squid.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/ssh.if b/policy/modules/services/ssh.if index 567592d..5437ffb 100644 --- a/policy/modules/services/ssh.if +++ b/policy/modules/services/ssh.if @@ -572,7 +572,7 @@ interface(`ssh_tcp_connect',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -668,7 +668,7 @@ interface(`ssh_read_user_home_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -686,7 +686,7 @@ interface(`ssh_domtrans_keygen',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/sssd.if b/policy/modules/services/sssd.if index 5eff513..941380a 100644 --- a/policy/modules/services/sssd.if +++ b/policy/modules/services/sssd.if @@ -24,7 +24,7 @@ interface(`sssd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/tcpd.if b/policy/modules/services/tcpd.if index 9de6298..2075ebb 100644 --- a/policy/modules/services/tcpd.if +++ b/policy/modules/services/tcpd.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/ulogd.if b/policy/modules/services/ulogd.if index d04b833..b078bf7 100644 --- a/policy/modules/services/ulogd.if +++ b/policy/modules/services/ulogd.if @@ -66,7 +66,7 @@ interface(`ulogd_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/uucp.if b/policy/modules/services/uucp.if index 36b936a..a4fbe31 100644 --- a/policy/modules/services/uucp.if +++ b/policy/modules/services/uucp.if @@ -49,7 +49,7 @@ interface(`uucp_manage_spool',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/uwimap.if b/policy/modules/services/uwimap.if index 4334b28..8337684 100644 --- a/policy/modules/services/uwimap.if +++ b/policy/modules/services/uwimap.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/varnishd.if b/policy/modules/services/varnishd.if index 597679d..b4d90ac 100644 --- a/policy/modules/services/varnishd.if +++ b/policy/modules/services/varnishd.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/vhostmd.if b/policy/modules/services/vhostmd.if index a10dc80..1f872b5 100644 --- a/policy/modules/services/vhostmd.if +++ b/policy/modules/services/vhostmd.if @@ -24,7 +24,7 @@ interface(`vhostmd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -42,7 +42,7 @@ interface(`vhostmd_initrc_domtrans',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -80,7 +80,7 @@ interface(`vhostmd_dontaudit_read_tmpfs_files',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -99,7 +99,7 @@ interface(`vhostmd_rw_tmpfs_files',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -175,7 +175,7 @@ interface(`vhostmd_stream_connect',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if index 7bb17f6..7c5d8d8 100644 --- a/policy/modules/services/virt.if +++ b/policy/modules/services/virt.if @@ -200,7 +200,7 @@ interface(`virt_manage_config',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -353,7 +353,7 @@ interface(`virt_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # @@ -372,7 +372,7 @@ interface(`virt_append_log',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -392,7 +392,7 @@ interface(`virt_manage_log',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -450,7 +450,7 @@ interface(`virt_manage_svirt_cache',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if index 3b31efb..da2601a 100644 --- a/policy/modules/services/xserver.if +++ b/policy/modules/services/xserver.if @@ -535,7 +535,7 @@ interface(`xserver_use_user_fonts',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -864,7 +864,7 @@ interface(`xserver_xsession_entry_type',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -1061,7 +1061,7 @@ interface(`xserver_dontaudit_getattr_xdm_tmp_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -1155,7 +1155,7 @@ interface(`xserver_dontaudit_rw_tcp_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/zosremote.if b/policy/modules/services/zosremote.if index 6a5acd5..702e768 100644 --- a/policy/modules/services/zosremote.if +++ b/policy/modules/services/zosremote.if @@ -26,7 +26,7 @@ interface(`zosremote_domtrans',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ##