[selinux-policy: 3027/3172] XML summary fixes.

Daniel J Walsh dwalsh at fedoraproject.org
Thu Oct 7 23:29:20 UTC 2010


commit 3c484f5bdc5e68add5745525764621c4ffd4404e
Author: Dominick Grift <domg472 at gmail.com>
Date:   Fri Sep 17 09:48:34 2010 +0200

    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.
    
    XML summary fixes.

 policy/modules/services/ajaxterm.if   |    2 +-
 policy/modules/services/apache.if     |    6 +++---
 policy/modules/services/automount.if  |    1 -
 policy/modules/services/bluetooth.if  |    2 +-
 policy/modules/services/certmaster.if |    2 +-
 policy/modules/services/chronyd.if    |    2 +-
 policy/modules/services/cobbler.if    |    2 +-
 policy/modules/services/corosync.if   |    2 +-
 policy/modules/services/cron.if       |    2 +-
 policy/modules/services/devicekit.if  |   10 ----------
 policy/modules/services/dnsmasq.if    |    1 -
 policy/modules/services/exim.if       |    2 +-
 12 files changed, 11 insertions(+), 23 deletions(-)
---
diff --git a/policy/modules/services/ajaxterm.if b/policy/modules/services/ajaxterm.if
index 2eee297..8e6e2c3 100644
--- a/policy/modules/services/ajaxterm.if
+++ b/policy/modules/services/ajaxterm.if
@@ -24,7 +24,7 @@ interface(`ajaxterm_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	The type of the process performing this action.
+##	Domain allowed to transition.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if
index 854d78d..9668cde 100644
--- a/policy/modules/services/apache.if
+++ b/policy/modules/services/apache.if
@@ -1046,7 +1046,7 @@ interface(`apache_domtrans_all_scripts',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	Role allowed access..
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -1224,7 +1224,7 @@ interface(`apache_read_tmp_files',`
 ## </summary>
 ## <param name="domain">
 ##  <summary>
-##  Domain allowed access.
+##  Domain to not audit.
 ##  </summary>
 ## </param>
 #
@@ -1375,7 +1375,7 @@ ifdef(`TODO',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed access.
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if
index f384848..617eead 100644
--- a/policy/modules/services/automount.if
+++ b/policy/modules/services/automount.if
@@ -29,7 +29,6 @@ interface(`automount_domtrans',`
 ##	</summary>
 ## </param>
 #
-#
 interface(`automount_signal',`
 	gen_require(`
 		type automount_t;
diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if
index 7c5d8c9..a01ce9f 100644
--- a/policy/modules/services/bluetooth.if
+++ b/policy/modules/services/bluetooth.if
@@ -179,7 +179,7 @@ interface(`bluetooth_run_helper',`
 
 ########################################
 ## <summary>
-##	Read bluetooth helper state files.
+##	Do not audit attempts to read bluetooth helper state files.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
diff --git a/policy/modules/services/certmaster.if b/policy/modules/services/certmaster.if
index 2704e81..ffd0da5 100644
--- a/policy/modules/services/certmaster.if
+++ b/policy/modules/services/certmaster.if
@@ -108,7 +108,7 @@ interface(`certmaster_manage_log',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed to manage the syslog domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if
index 49b5829..9811f7f 100644
--- a/policy/modules/services/chronyd.if
+++ b/policy/modules/services/chronyd.if
@@ -25,7 +25,7 @@ interface(`chronyd_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed access.
+##	Domain allowed to transition.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if
index 7fcf2fb..a4c26ff 100644
--- a/policy/modules/services/cobbler.if
+++ b/policy/modules/services/cobbler.if
@@ -153,7 +153,7 @@ interface(`cobbler_manage_lib_files',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed access.
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if
index 7614a00..a2e6830 100644
--- a/policy/modules/services/corosync.if
+++ b/policy/modules/services/corosync.if
@@ -24,7 +24,7 @@ interface(`corosync_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed to transition.
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if
index 3089b83..ffd5436 100644
--- a/policy/modules/services/cron.if
+++ b/policy/modules/services/cron.if
@@ -311,7 +311,7 @@ interface(`cron_exec',`
 
 ########################################
 ## <summary>
-##	Execute crond server in the nscd domain.
+##	Execute crond server in the crond domain.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
diff --git a/policy/modules/services/devicekit.if b/policy/modules/services/devicekit.if
index 70cf018..e20390f 100644
--- a/policy/modules/services/devicekit.if
+++ b/policy/modules/services/devicekit.if
@@ -147,16 +147,6 @@ interface(`devicekit_read_pid_files',`
 ##	Domain allowed access.
 ##	</summary>
 ## </param>
-## <param name="role">
-##	<summary>
-##	The role to be allowed to manage the devicekit domain.
-##	</summary>
-## </param>
-## <param name="terminal">
-##	<summary>
-##	The type of the user terminal.
-##	</summary>
-## </param>
 ## <rolecap/>
 #
 interface(`devicekit_admin',`
diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if
index 42cc08f..f5149c8 100644
--- a/policy/modules/services/dnsmasq.if
+++ b/policy/modules/services/dnsmasq.if
@@ -144,7 +144,6 @@ interface(`dnsmasq_write_config',`
 ##	</summary>
 ## </param>
 #
-#
 interface(`dnsmasq_delete_pid_files',`
 	gen_require(`
 		type dnsmasq_var_run_t;
diff --git a/policy/modules/services/exim.if b/policy/modules/services/exim.if
index 1685c5d..91f751d 100644
--- a/policy/modules/services/exim.if
+++ b/policy/modules/services/exim.if
@@ -24,7 +24,7 @@ interface(`exim_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed access.
+##	Domain allowed to transition.
 ##	</summary>
 ## </param>
 #


More information about the scm-commits mailing list