diff --git a/policy/modules/services/aisexec.if b/policy/modules/services/aisexec.if index 7fb41c2..4827f39 100644 --- a/policy/modules/services/aisexec.if +++ b/policy/modules/services/aisexec.if @@ -60,7 +60,7 @@ interface(`aisexec_read_log',` ###################################### ## -## All of the rules required to administrate +## All of the rules required to administrate ## an aisexec environment ## ## diff --git a/policy/modules/services/aisexec.te b/policy/modules/services/aisexec.te index 22f2004..c9cbdcf 100644 --- a/policy/modules/services/aisexec.te +++ b/policy/modules/services/aisexec.te @@ -56,7 +56,7 @@ files_var_lib_filetrans(aisexec_t, aisexec_var_lib_t, { file dir sock_file }) manage_files_pattern(aisexec_t, aisexec_var_log_t, aisexec_var_log_t) manage_sock_files_pattern(aisexec_t, aisexec_var_log_t, aisexec_var_log_t) -logging_log_filetrans(aisexec_t,aisexec_var_log_t,{ sock_file file }) +logging_log_filetrans(aisexec_t, aisexec_var_log_t, { sock_file file }) manage_files_pattern(aisexec_t, aisexec_var_run_t, aisexec_var_run_t) manage_sock_files_pattern(aisexec_t, aisexec_var_run_t, aisexec_var_run_t) diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if index 3626db1..5318dce 100644 --- a/policy/modules/services/corosync.if +++ b/policy/modules/services/corosync.if @@ -60,7 +60,7 @@ interface(`corosync_stream_connect',` ###################################### ## -## All of the rules required to administrate +## All of the rules required to administrate ## an corosync environment ## ## diff --git a/policy/modules/services/corosync.te b/policy/modules/services/corosync.te index ad8d017..726e98b 100644 --- a/policy/modules/services/corosync.te +++ b/policy/modules/services/corosync.te @@ -48,7 +48,7 @@ files_tmp_filetrans(corosync_t, corosync_tmp_t, { file dir }) manage_dirs_pattern(corosync_t, corosync_tmpfs_t, corosync_tmpfs_t) manage_files_pattern(corosync_t, corosync_tmpfs_t, corosync_tmpfs_t) -fs_tmpfs_filetrans(corosync_t, corosync_tmpfs_t,{ dir file }) +fs_tmpfs_filetrans(corosync_t, corosync_tmpfs_t, { dir file }) manage_files_pattern(corosync_t, corosync_var_lib_t, corosync_var_lib_t) manage_dirs_pattern(corosync_t, corosync_var_lib_t, corosync_var_lib_t) diff --git a/policy/modules/services/rgmanager.te b/policy/modules/services/rgmanager.te index 4bba0fb..00b4caf 100644 --- a/policy/modules/services/rgmanager.te +++ b/policy/modules/services/rgmanager.te @@ -51,7 +51,7 @@ files_tmp_filetrans(rgmanager_t, rgmanager_tmp_t, { file dir }) manage_dirs_pattern(rgmanager_t, rgmanager_tmpfs_t, rgmanager_tmpfs_t) manage_files_pattern(rgmanager_t, rgmanager_tmpfs_t, rgmanager_tmpfs_t) -fs_tmpfs_filetrans(rgmanager_t, rgmanager_tmpfs_t,{ dir file }) +fs_tmpfs_filetrans(rgmanager_t, rgmanager_tmpfs_t, { dir file }) manage_files_pattern(rgmanager_t, rgmanager_var_log_t, rgmanager_var_log_t) logging_log_filetrans(rgmanager_t, rgmanager_var_log_t, { file }) diff --git a/policy/modules/services/rhcs.if b/policy/modules/services/rhcs.if index c9ce9ab..6b7eb35 100644 --- a/policy/modules/services/rhcs.if +++ b/policy/modules/services/rhcs.if @@ -51,7 +51,7 @@ template(`rhcs_domain_template',` manage_fifo_files_pattern($1_t, $1_var_run_t, $1_var_run_t) manage_sock_files_pattern($1_t, $1_var_run_t, $1_var_run_t) files_pid_filetrans($1_t, $1_var_run_t, { file fifo_file }) - + ') ###################################### @@ -226,7 +226,7 @@ interface(`rhcs_rw_gfs_controld_semaphores',` # interface(`rhcs_rw_gfs_controld_shm',` gen_require(` - type gfs_controld_t, gfs_controld_tmpfs_t; + type gfs_controld_t, gfs_controld_tmpfs_t; ') allow $1 gfs_controld_t:shm { rw_shm_perms destroy };