diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if
index 1a0701b..1bf0602 100644
--- a/policy/modules/services/virt.if
+++ b/policy/modules/services/virt.if
@@ -609,4 +609,3 @@ interface(`virt_dontaudit_write_pipes',`
dontaudit $1 virtd_t:fifo_file write_fifo_file_perms;
')
-
diff --git a/policy/modules/services/xfs.if b/policy/modules/services/xfs.if
index aa6e5a8..42a0efb 100644
--- a/policy/modules/services/xfs.if
+++ b/policy/modules/services/xfs.if
@@ -1,4 +1,4 @@
-## X Windows Font Server
+## X Windows Font Server
########################################
##
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
index fa4c4b5..8ed36f2 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -114,7 +114,7 @@ interface(`xserver_restricted_role',`
# Needed for escd, remove if we get escd policy
xserver_manage_xdm_tmp_files($2)
- ifdef(`hide_broken_symptoms', `
+ ifdef(`hide_broken_symptoms',`
dontaudit iceauth_t $2:socket_class_set { read write };
')
@@ -179,7 +179,6 @@ interface(`xserver_role',`
manage_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
relabel_dirs_pattern($2, user_fonts_config_t, user_fonts_config_t)
relabel_files_pattern($2, user_fonts_config_t, user_fonts_config_t)
-
')
#######################################
@@ -504,7 +503,7 @@ template(`xserver_user_x_domain_template',`
# for .xsession-errors
userdom_dontaudit_write_user_home_content_files($2)
- xserver_ro_session($2,$3)
+ xserver_ro_session($2, $3)
xserver_use_user_fonts($2)
xserver_read_xdm_tmp_files($2)
@@ -512,7 +511,7 @@ template(`xserver_user_x_domain_template',`
# X object manager
xserver_object_types_template($1)
- xserver_common_x_domain_template($1,$2)
+ xserver_common_x_domain_template($1, $2)
# Client write xserver shm
tunable_policy(`allow_write_xshm',`
@@ -584,7 +583,7 @@ interface(`xserver_domtrans_xauth',`
domtrans_pattern($1, xauth_exec_t, xauth_t)
- ifdef(`hide_broken_symptoms', `
+ ifdef(`hide_broken_symptoms',`
dontaudit xauth_t $1:socket_class_set { read write };
')
')
@@ -712,7 +711,7 @@ interface(`xserver_use_xdm_fds',`
type xdm_t;
')
- allow $1 xdm_t:fd use;
+ allow $1 xdm_t:fd use;
')
########################################
@@ -731,7 +730,7 @@ interface(`xserver_dontaudit_use_xdm_fds',`
type xdm_t;
')
- dontaudit $1 xdm_t:fd use;
+ dontaudit $1 xdm_t:fd use;
')
########################################
@@ -749,7 +748,7 @@ interface(`xserver_rw_xdm_pipes',`
type xdm_t;
')
- allow $1 xdm_t:fifo_file { getattr read write };
+ allow $1 xdm_t:fifo_file { getattr read write };
')
########################################
@@ -764,12 +763,11 @@ interface(`xserver_rw_xdm_pipes',`
##
#
interface(`xserver_dontaudit_rw_xdm_pipes',`
-
gen_require(`
type xdm_t;
')
- dontaudit $1 xdm_t:fifo_file rw_fifo_file_perms;
+ dontaudit $1 xdm_t:fifo_file rw_fifo_file_perms;
')
########################################
@@ -1039,7 +1037,7 @@ interface(`xserver_read_xdm_etc_files',`
type xdm_etc_t;
')
- files_search_etc($1)
+ files_search_etc($1)
read_files_pattern($1, xdm_etc_t, xdm_etc_t)
')
@@ -1058,7 +1056,7 @@ interface(`xserver_manage_xdm_etc_files',`
type xdm_etc_t;
')
- files_search_etc($1)
+ files_search_etc($1)
manage_files_pattern($1, xdm_etc_t, xdm_etc_t)
')
@@ -1077,7 +1075,7 @@ interface(`xserver_read_xdm_tmp_files',`
type xdm_tmp_t;
')
- files_search_tmp($1)
+ files_search_tmp($1)
read_files_pattern($1, xdm_tmp_t, xdm_tmp_t)
')
@@ -1171,7 +1169,7 @@ interface(`xserver_domtrans',`
type xserver_t, xserver_exec_t;
')
- allow $1 xserver_t:process siginh;
+ allow $1 xserver_t:process siginh;
domtrans_pattern($1, xserver_exec_t, xserver_t)
allow xserver_t $1:process getpgid;
@@ -1314,7 +1312,7 @@ interface(`xserver_read_tmp_files',`
##
## Interface to provide X object permissions on a given X server to
## an X client domain. Gives the domain permission to read the
-## virtual core keyboard and virtual core pointer devices.
+## virtual core keyboard and virtual core pointer devices.
##
##
##
@@ -1600,7 +1598,6 @@ interface(`xserver_search_xdm_lib',`
allow $1 xdm_var_lib_t:dir search_dir_perms;
')
-
########################################
##
## Make an X executable an entrypoint for the specified domain.
diff --git a/policy/modules/services/zabbix.if b/policy/modules/services/zabbix.if
index d77e631..4776863 100644
--- a/policy/modules/services/zabbix.if
+++ b/policy/modules/services/zabbix.if
@@ -5,9 +5,9 @@
## Execute a domain transition to run zabbix.
##
##
-##
+##
## Domain allowed to transition.
-##
+##
##
#
interface(`zabbix_domtrans',`
@@ -44,9 +44,9 @@ interface(`zabbix_read_log',`
## zabbix log files.
##
##
-##
+##
## Domain allowed access.
-##
+##
##
#
interface(`zabbix_append_log',`
diff --git a/policy/modules/services/zarafa.if b/policy/modules/services/zarafa.if
index bba3124..77367ec 100644
--- a/policy/modules/services/zarafa.if
+++ b/policy/modules/services/zarafa.if
@@ -1,15 +1,14 @@
-
## policy for zarafa services
######################################
##
-## Creates types and rules for a basic
-## zararfa init daemon domain.
+## Creates types and rules for a basic
+## zararfa init daemon domain.
##
##
-##
-## Prefix for the domain.
-##
+##
+## Prefix for the domain.
+##
##
#
template(`zarafa_domain_template',`
@@ -19,12 +18,12 @@ template(`zarafa_domain_template',`
')
##############################
- #
- # $1_t declarations
- #
+ #
+ # $1_t declarations
+ #
type zarafa_$1_t, zarafa_domain;
- type zarafa_$1_exec_t;
+ type zarafa_$1_exec_t;
init_daemon_domain(zarafa_$1_t, zarafa_$1_exec_t)
type zarafa_$1_log_t;
@@ -34,28 +33,28 @@ template(`zarafa_domain_template',`
files_pid_file(zarafa_$1_var_run_t)
##############################
- #
+ #
# $1_t local policy
- #
+ #
manage_files_pattern(zarafa_$1_t, zarafa_$1_var_run_t, zarafa_$1_var_run_t)
- manage_sock_files_pattern(zarafa_$1_t, zarafa_$1_var_run_t, zarafa_$1_var_run_t)
- files_pid_filetrans(zarafa_$1_t, zarafa_$1_var_run_t, { file sock_file })
+ manage_sock_files_pattern(zarafa_$1_t, zarafa_$1_var_run_t, zarafa_$1_var_run_t)
+ files_pid_filetrans(zarafa_$1_t, zarafa_$1_var_run_t, { file sock_file })
#stream_connect_pattern(zarafa_$1_t, $1_var_run_t, $1_var_run_t, virtd_t)
manage_files_pattern(zarafa_$1_t, zarafa_$1_log_t,zarafa_$1_log_t)
#manage_sock_files_pattern(zarafa_$1_t, zarafa_$1_log_t,zarafa_$1_log_t)
logging_log_filetrans(zarafa_$1_t,zarafa_$1_log_t,{ file })
-')
-
+')
+
########################################
##
## Execute a domain transition to run zarafa_server.
##
##
-##
+##
## Domain allowed to transition.
-##
+##
##
#
interface(`zarafa_server_domtrans',`
@@ -66,15 +65,14 @@ interface(`zarafa_server_domtrans',`
domtrans_pattern($1, zarafa_server_exec_t, zarafa_server_t)
')
-
########################################
##
## Execute a domain transition to run zarafa_deliver.
##
##
-##
+##
## Domain allowed to transition.
-##
+##
##
#
interface(`zarafa_deliver_domtrans',`
@@ -87,19 +85,19 @@ interface(`zarafa_deliver_domtrans',`
#######################################
##
-## Connect to zarafa-server unix domain stream socket.
+## Connect to zarafa-server unix domain stream socket.
##
##
-##
-## Domain allowed access.
-##
+##
+## Domain allowed access.
+##
##
##
#
interface(`zarafa_stream_connect_server',`
- gen_require(`
- type zarafa_server_t, zarafa_server_var_run_t;
- ')
+ gen_require(`
+ type zarafa_server_t, zarafa_server_var_run_t;
+ ')
- stream_connect_pattern($1, zarafa_server_t, zarafa_server_var_run_t, zarafa_server_t)
+ stream_connect_pattern($1, zarafa_server_t, zarafa_server_var_run_t, zarafa_server_t)
')
diff --git a/policy/modules/services/zosremote.if b/policy/modules/services/zosremote.if
index 702e768..1d24e1e 100644
--- a/policy/modules/services/zosremote.if
+++ b/policy/modules/services/zosremote.if
@@ -5,9 +5,9 @@
## Execute a domain transition to run audispd-zos-remote.
##
##
-##
+##
## Domain allowed to transition.
-##
+##
##
#
interface(`zosremote_domtrans',`