[selinux-policy: 676/3172] change monolithic_policy to self_contained_policy for clarity
Daniel J Walsh
dwalsh at fedoraproject.org
Thu Oct 7 20:03:22 UTC 2010
commit 0e15cdfb508a39ab81b0b98d27902c905e8aae00
Author: Chris PeBenito <cpebenito at tresys.com>
Date: Wed Sep 21 13:26:30 2005 +0000
change monolithic_policy to self_contained_policy for clarity
refpolicy/Makefile | 6 +++---
refpolicy/Rules.modular | 2 +-
refpolicy/Rules.monolithic | 2 +-
refpolicy/policy/modules/system/locallogin.te | 6 ++----
refpolicy/policy/support/loadable_module.spt | 14 +++++++-------
5 files changed, 14 insertions(+), 16 deletions(-)
---
diff --git a/refpolicy/Makefile b/refpolicy/Makefile
index b7d13b8..e2bebb5 100644
--- a/refpolicy/Makefile
+++ b/refpolicy/Makefile
@@ -204,7 +204,7 @@ $(MODDIR)/kernel/corenetwork.if: $(MODDIR)/kernel/corenetwork.if.m4 $(MODDIR)/ke
@echo "#" >> $@
$(QUIET) cat $(MODDIR)/kernel/corenetwork.if.in >> $@
$(QUIET) egrep "^[[:blank:]]*network_(interface|node|port)\(.*\)" $(@:.if=.te).in \
- | m4 -D monolithic_policy $(M4PARAM) $(M4SUPPORT) $(MODDIR)/kernel/corenetwork.if.m4 - \
+ | m4 -D self_contained_policy $(M4PARAM) $(M4SUPPORT) $(MODDIR)/kernel/corenetwork.if.m4 - \
| sed -e 's/dollarsone/\$$1/g' -e 's/dollarszero/\$$0/g' >> $@
$(MODDIR)/kernel/corenetwork.te: $(MODDIR)/kernel/corenetwork.te.m4 $(MODDIR)/kernel/corenetwork.te.in
@@ -212,7 +212,7 @@ $(MODDIR)/kernel/corenetwork.te: $(MODDIR)/kernel/corenetwork.te.m4 $(MODDIR)/ke
@echo "# This is a generated file! Instead of modifying this file, the" >> $@
@echo "# $(notdir $@).in or $(notdir $@).m4 file should be modified." >> $@
@echo "#" >> $@
- $(QUIET) m4 -D monolithic_policy $(M4PARAM) $(M4SUPPORT) $^ \
+ $(QUIET) m4 -D self_contained_policy $(M4PARAM) $(M4SUPPORT) $^ \
| sed -e 's/dollarsone/\$$1/g' -e 's/dollarszero/\$$0/g' >> $@
########################################
@@ -261,7 +261,7 @@ $(USERPATH)/system.users: $(USER_FILES) tmp/generated_definitions.conf
@echo "# This file is replaced on reinstalls of this policy." >> tmp/system.users
@echo "# Please edit local.users to make local changes." >> tmp/system.users
@echo "#" >> tmp/system.users
- $(QUIET) m4 -D monolithic_policy $(M4PARAM) tmp/generated_definitions.conf $(USER_FILES) | \
+ $(QUIET) m4 -D self_contained_policy $(M4PARAM) tmp/generated_definitions.conf $(USER_FILES) | \
egrep -v "^[[:space:]]*($$|#)" >> tmp/system.users
$(QUIET) install -m 644 tmp/system.users $@
diff --git a/refpolicy/Rules.modular b/refpolicy/Rules.modular
index d8debf5..5a09de9 100644
--- a/refpolicy/Rules.modular
+++ b/refpolicy/Rules.modular
@@ -61,7 +61,7 @@ tmp/base.mod: base.conf
base.conf: $(BASE_SECTIONS)
@echo "Creating $(NAME) base module policy.conf"
# checkpolicy can use the #line directives provided by -s for error reporting:
- $(QUIET) m4 -D monolithic_policy $(M4PARAM) -s $^ > tmp/$@.tmp
+ $(QUIET) m4 -D self_contained_policy $(M4PARAM) -s $^ > tmp/$@.tmp
$(QUIET) sed -e /^portcon/d -e /^nodecon/d -e /^netifcon/d < tmp/$@.tmp > $@
# the ordering of these ocontexts matters:
$(QUIET) grep ^portcon tmp/$@.tmp >> $@ || true
diff --git a/refpolicy/Rules.monolithic b/refpolicy/Rules.monolithic
index 7153e1e..ac7fede 100644
--- a/refpolicy/Rules.monolithic
+++ b/refpolicy/Rules.monolithic
@@ -78,7 +78,7 @@ reload tmp/load: $(LOADPATH) $(FCPATH)
policy.conf: $(POLICY_SECTIONS)
@echo "Creating $(NAME) policy.conf"
# checkpolicy can use the #line directives provided by -s for error reporting:
- $(QUIET) m4 -D monolithic_policy $(M4PARAM) -s $^ > tmp/$@.tmp
+ $(QUIET) m4 -D self_contained_policy $(M4PARAM) -s $^ > tmp/$@.tmp
$(QUIET) sed -e /^portcon/d -e /^nodecon/d -e /^netifcon/d < tmp/$@.tmp > $@
# the ordering of these ocontexts matters:
$(QUIET) grep ^portcon tmp/$@.tmp >> $@ || true
diff --git a/refpolicy/policy/modules/system/locallogin.te b/refpolicy/policy/modules/system/locallogin.te
index 0c5d65e..00da42c 100644
--- a/refpolicy/policy/modules/system/locallogin.te
+++ b/refpolicy/policy/modules/system/locallogin.te
@@ -262,10 +262,8 @@ userdom_search_staff_home_dir(sulogin_t)
userdom_search_sysadm_home_dir(sulogin_t)
# suse and debian do not use pam with sulogin...
-ifdef(`monolithic_policy',`
- ifdef(`distro_suse', `define(`sulogin_no_pam')')
- ifdef(`distro_debian', `define(`sulogin_no_pam')')
-')
+ifdef(`distro_suse', `define(`sulogin_no_pam')')
+ifdef(`distro_debian', `define(`sulogin_no_pam')')
ifdef(`sulogin_no_pam', `
allow sulogin_t self:capability sys_tty_config;
diff --git a/refpolicy/policy/support/loadable_module.spt b/refpolicy/policy/support/loadable_module.spt
index 787957e..244acc0 100644
--- a/refpolicy/policy/support/loadable_module.spt
+++ b/refpolicy/policy/support/loadable_module.spt
@@ -9,7 +9,7 @@
# For adding the module statement
#
define(`policy_module',`
- ifdef(`monolithic_policy',`',`
+ ifdef(`self_contained_policy',`',`
module $1 $2;
require { all_kernel_class_perms }
@@ -21,7 +21,7 @@ define(`policy_module',`
# For use in interfaces, to optionally insert a require block
#
define(`gen_require',`
- ifdef(`monolithic_policy',`',`
+ ifdef(`self_contained_policy',`',`
define(`in_gen_require_block')
require {
$1
@@ -83,7 +83,7 @@ define(`policy_call_depth',0)
# Optional policy handling
#
define(`optional_policy',`
- ifdef(`monolithic_policy',`
+ ifdef(`self_contained_policy',`
ifdef(`$1',`$2',`$3')
',`
optional {
@@ -110,18 +110,18 @@ define(`dflt_or_overr',`ifdef(`$1',$1,$2)')
#
define(`gen_tunable',`
ifdef(`in_gen_require_block',`
- ifdef(`monolithic_policy',`
+ ifdef(`self_contained_policy',`
bool $1;
',`
# loadable module tunable
- # declaration will go here
+ # require will go here
# instead of bool when
# loadable modules support
# tunables
bool $1;
')
',`
- ifdef(`monolithic_policy',`
+ ifdef(`self_contained_policy',`
bool $1 dflt_or_overr(`$1'_conf,$2);
',`
# loadable module tunable
@@ -139,7 +139,7 @@ define(`gen_tunable',`
# Tunable policy handling
#
define(`tunable_policy',`
- ifdef(`monolithic_policy',`
+ ifdef(`self_contained_policy',`
if (`$1') {
$2
} else {
More information about the scm-commits
mailing list