Gentoo Archives: gentoo-commits

From: Sven Vermeulen <swift@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/
Date: Mon, 30 Jun 2014 19:03:56
Message-Id: 1404154789.af754468a7fde0d8e230e2eb923489735112a5a1.swift@gentoo
1 commit: af754468a7fde0d8e230e2eb923489735112a5a1
2 Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
3 AuthorDate: Sat Jun 28 11:09:33 2014 +0000
4 Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org>
5 CommitDate: Mon Jun 30 18:59:49 2014 +0000
6 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=af754468
7
8 Use init_daemon_pid_file for contrib modules
9
10 Signed-off-by: Sven Vermeulen <sven.vermeulen <AT> siphos.be>
11
12 ---
13 policy/modules/contrib/asterisk.te | 2 +-
14 policy/modules/contrib/bind.te | 2 +-
15 policy/modules/contrib/consolekit.te | 2 +-
16 policy/modules/contrib/couchdb.te | 2 +-
17 policy/modules/contrib/cups.te | 2 +-
18 policy/modules/contrib/dbus.te | 2 +-
19 policy/modules/contrib/dkim.te | 2 +-
20 policy/modules/contrib/exim.te | 2 +-
21 policy/modules/contrib/mysql.te | 2 +-
22 policy/modules/contrib/nscd.te | 2 +-
23 policy/modules/contrib/nut.te | 2 +-
24 policy/modules/contrib/pcscd.te | 2 +-
25 policy/modules/contrib/puppet.te | 2 +-
26 policy/modules/contrib/readahead.te | 2 +-
27 policy/modules/contrib/rpcbind.te | 2 +-
28 policy/modules/contrib/shibboleth.te | 2 +-
29 policy/modules/contrib/snort.te | 2 +-
30 policy/modules/contrib/tor.te | 2 +-
31 policy/modules/contrib/xen.te | 2 +-
32 19 files changed, 19 insertions(+), 19 deletions(-)
33
34 diff --git a/policy/modules/contrib/asterisk.te b/policy/modules/contrib/asterisk.te
35 index e1ec6bb..2975acd 100644
36 --- a/policy/modules/contrib/asterisk.te
37 +++ b/policy/modules/contrib/asterisk.te
38 @@ -32,7 +32,7 @@ files_type(asterisk_var_lib_t)
39
40 type asterisk_var_run_t;
41 files_pid_file(asterisk_var_run_t)
42 -init_daemon_run_dir(asterisk_var_run_t, "asterisk")
43 +init_daemon_pid_file(asterisk_var_run_t, dir, "asterisk")
44
45 ########################################
46 #
47
48 diff --git a/policy/modules/contrib/bind.te b/policy/modules/contrib/bind.te
49 index 796c270..9ba5f03 100644
50 --- a/policy/modules/contrib/bind.te
51 +++ b/policy/modules/contrib/bind.te
52 @@ -55,7 +55,7 @@ files_tmp_file(named_tmp_t)
53
54 type named_var_run_t;
55 files_pid_file(named_var_run_t)
56 -init_daemon_run_dir(named_var_run_t, "named")
57 +init_daemon_pid_file(named_var_run_t, dir, "named")
58
59 # for primary zone files
60 type named_zone_t;
61
62 diff --git a/policy/modules/contrib/consolekit.te b/policy/modules/contrib/consolekit.te
63 index bd18063..25f444e 100644
64 --- a/policy/modules/contrib/consolekit.te
65 +++ b/policy/modules/contrib/consolekit.te
66 @@ -17,7 +17,7 @@ files_tmpfs_file(consolekit_tmpfs_t)
67
68 type consolekit_var_run_t;
69 files_pid_file(consolekit_var_run_t)
70 -init_daemon_run_dir(consolekit_var_run_t, "ConsoleKit")
71 +init_daemon_pid_file(consolekit_var_run_t, dir, "ConsoleKit")
72
73 ########################################
74 #
75
76 diff --git a/policy/modules/contrib/couchdb.te b/policy/modules/contrib/couchdb.te
77 index 9469b57..2248ede 100644
78 --- a/policy/modules/contrib/couchdb.te
79 +++ b/policy/modules/contrib/couchdb.te
80 @@ -30,7 +30,7 @@ files_type(couchdb_var_lib_t)
81
82 type couchdb_var_run_t;
83 files_pid_file(couchdb_var_run_t)
84 -init_daemon_run_dir(couchdb_var_run_t, "couchdb")
85 +init_daemon_pid_file(couchdb_var_run_t, dir, "couchdb")
86
87 ########################################
88 #
89
90 diff --git a/policy/modules/contrib/cups.te b/policy/modules/contrib/cups.te
91 index 5b06ce2..7ed33ac 100644
92 --- a/policy/modules/contrib/cups.te
93 +++ b/policy/modules/contrib/cups.te
94 @@ -59,7 +59,7 @@ files_tmp_file(cupsd_tmp_t)
95
96 type cupsd_var_run_t;
97 files_pid_file(cupsd_var_run_t)
98 -init_daemon_run_dir(cupsd_var_run_t, "cups")
99 +init_daemon_pid_file(cupsd_var_run_t, dir, "cups")
100 mls_trusted_object(cupsd_var_run_t)
101
102 type hplip_t;
103
104 diff --git a/policy/modules/contrib/dbus.te b/policy/modules/contrib/dbus.te
105 index 8075f85..6557312 100644
106 --- a/policy/modules/contrib/dbus.te
107 +++ b/policy/modules/contrib/dbus.te
108 @@ -41,7 +41,7 @@ files_type(system_dbusd_var_lib_t)
109
110 type system_dbusd_var_run_t;
111 files_pid_file(system_dbusd_var_run_t)
112 -init_daemon_run_dir(system_dbusd_var_run_t, "dbus")
113 +init_daemon_pid_file(system_dbusd_var_run_t, dir, "dbus")
114
115 ifdef(`enable_mcs',`
116 init_ranged_system_domain(system_dbusd_t, dbusd_exec_t, s0 - mcs_systemhigh)
117
118 diff --git a/policy/modules/contrib/dkim.te b/policy/modules/contrib/dkim.te
119 index 6a73d60..021a7ae 100644
120 --- a/policy/modules/contrib/dkim.te
121 +++ b/policy/modules/contrib/dkim.te
122 @@ -13,7 +13,7 @@ init_script_file(dkim_milter_initrc_exec_t)
123 type dkim_milter_private_key_t;
124 files_type(dkim_milter_private_key_t)
125
126 -init_daemon_run_dir(dkim_milter_data_t, "opendkim")
127 +init_daemon_pid_file(dkim_milter_data_t, dir, "opendkim")
128
129 ########################################
130 #
131
132 diff --git a/policy/modules/contrib/exim.te b/policy/modules/contrib/exim.te
133 index 768a69f..508504a 100644
134 --- a/policy/modules/contrib/exim.te
135 +++ b/policy/modules/contrib/exim.te
136 @@ -64,7 +64,7 @@ type exim_var_run_t;
137 files_pid_file(exim_var_run_t)
138
139 ifdef(`distro_debian',`
140 - init_daemon_run_dir(exim_var_run_t, "exim4")
141 + init_daemon_pid_file(exim_var_run_t, dir, "exim4")
142 ')
143
144 ########################################
145
146 diff --git a/policy/modules/contrib/mysql.te b/policy/modules/contrib/mysql.te
147 index 80d2c6f..f023642 100644
148 --- a/policy/modules/contrib/mysql.te
149 +++ b/policy/modules/contrib/mysql.te
150 @@ -27,7 +27,7 @@ init_daemon_domain(mysqld_safe_t, mysqld_safe_exec_t)
151
152 type mysqld_var_run_t;
153 files_pid_file(mysqld_var_run_t)
154 -init_daemon_run_dir(mysqld_var_run_t, "mysqld")
155 +init_daemon_pid_file(mysqld_var_run_t, dir, "mysqld")
156
157 type mysqld_db_t;
158 files_type(mysqld_db_t)
159
160 diff --git a/policy/modules/contrib/nscd.te b/policy/modules/contrib/nscd.te
161 index bcd7d0a..eaf1a56 100644
162 --- a/policy/modules/contrib/nscd.te
163 +++ b/policy/modules/contrib/nscd.te
164 @@ -21,7 +21,7 @@ attribute_role nscd_roles;
165
166 type nscd_var_run_t;
167 files_pid_file(nscd_var_run_t)
168 -init_daemon_run_dir(nscd_var_run_t, "nscd")
169 +init_daemon_pid_file(nscd_var_run_t, dir, "nscd")
170
171 type nscd_t;
172 type nscd_exec_t;
173
174 diff --git a/policy/modules/contrib/nut.te b/policy/modules/contrib/nut.te
175 index 5b2cb0d..4816f03 100644
176 --- a/policy/modules/contrib/nut.te
177 +++ b/policy/modules/contrib/nut.te
178 @@ -27,7 +27,7 @@ init_script_file(nut_initrc_exec_t)
179
180 type nut_var_run_t;
181 files_pid_file(nut_var_run_t)
182 -init_daemon_run_dir(nut_var_run_t, "nut")
183 +init_daemon_pid_file(nut_var_run_t, dir, "nut")
184
185 ########################################
186 #
187
188 diff --git a/policy/modules/contrib/pcscd.te b/policy/modules/contrib/pcscd.te
189 index 1af594e..16ceba4 100644
190 --- a/policy/modules/contrib/pcscd.te
191 +++ b/policy/modules/contrib/pcscd.te
192 @@ -14,7 +14,7 @@ init_script_file(pcscd_initrc_exec_t)
193
194 type pcscd_var_run_t;
195 files_pid_file(pcscd_var_run_t)
196 -init_daemon_run_dir(pcscd_var_run_t, "pcscd")
197 +init_daemon_pid_file(pcscd_var_run_t, dir, "pcscd")
198
199 ########################################
200 #
201
202 diff --git a/policy/modules/contrib/puppet.te b/policy/modules/contrib/puppet.te
203 index 86e3512..6fa9b91 100644
204 --- a/policy/modules/contrib/puppet.te
205 +++ b/policy/modules/contrib/puppet.te
206 @@ -37,7 +37,7 @@ files_type(puppet_var_lib_t)
207
208 type puppet_var_run_t;
209 files_pid_file(puppet_var_run_t)
210 -init_daemon_run_dir(puppet_var_run_t, "puppet")
211 +init_daemon_pid_file(puppet_var_run_t, dir, "puppet")
212
213 type puppetca_t;
214 type puppetca_exec_t;
215
216 diff --git a/policy/modules/contrib/readahead.te b/policy/modules/contrib/readahead.te
217 index c0b02c9..27e3bc5 100644
218 --- a/policy/modules/contrib/readahead.te
219 +++ b/policy/modules/contrib/readahead.te
220 @@ -15,7 +15,7 @@ typealias readahead_var_lib_t alias readahead_etc_rw_t;
221
222 type readahead_var_run_t;
223 files_pid_file(readahead_var_run_t)
224 -init_daemon_run_dir(readahead_var_run_t, "readahead")
225 +init_daemon_pid_file(readahead_var_run_t, dir, "readahead")
226
227 ########################################
228 #
229
230 diff --git a/policy/modules/contrib/rpcbind.te b/policy/modules/contrib/rpcbind.te
231 index 75f7e70..1f36970 100644
232 --- a/policy/modules/contrib/rpcbind.te
233 +++ b/policy/modules/contrib/rpcbind.te
234 @@ -14,7 +14,7 @@ init_script_file(rpcbind_initrc_exec_t)
235
236 type rpcbind_var_run_t;
237 files_pid_file(rpcbind_var_run_t)
238 -init_daemon_run_dir(rpcbind_var_run_t, "rpcbind")
239 +init_daemon_pid_file(rpcbind_var_run_t, dir, "rpcbind")
240
241 type rpcbind_var_lib_t;
242 files_type(rpcbind_var_lib_t)
243
244 diff --git a/policy/modules/contrib/shibboleth.te b/policy/modules/contrib/shibboleth.te
245 index 63950ea..23730ee 100644
246 --- a/policy/modules/contrib/shibboleth.te
247 +++ b/policy/modules/contrib/shibboleth.te
248 @@ -17,7 +17,7 @@ logging_log_file(shibboleth_log_t)
249
250 type shibboleth_var_run_t;
251 files_pid_file(shibboleth_var_run_t)
252 -init_daemon_run_dir(shibboleth_var_run_t, "shibboleth")
253 +init_daemon_pid_file(shibboleth_var_run_t, dir, "shibboleth")
254
255 ########################################
256 #
257
258 diff --git a/policy/modules/contrib/snort.te b/policy/modules/contrib/snort.te
259 index 42e685f..80d9713 100644
260 --- a/policy/modules/contrib/snort.te
261 +++ b/policy/modules/contrib/snort.te
262 @@ -23,7 +23,7 @@ files_tmp_file(snort_tmp_t)
263
264 type snort_var_run_t;
265 files_pid_file(snort_var_run_t)
266 -init_daemon_run_dir(snort_var_run_t, "snort")
267 +init_daemon_pid_file(snort_var_run_t, dir, "snort")
268
269 ########################################
270 #
271
272 diff --git a/policy/modules/contrib/tor.te b/policy/modules/contrib/tor.te
273 index 5ceacde..8db861b 100644
274 --- a/policy/modules/contrib/tor.te
275 +++ b/policy/modules/contrib/tor.te
276 @@ -31,7 +31,7 @@ logging_log_file(tor_var_log_t)
277
278 type tor_var_run_t;
279 files_pid_file(tor_var_run_t)
280 -init_daemon_run_dir(tor_var_run_t, "tor")
281 +init_daemon_pid_file(tor_var_run_t, dir, "tor")
282
283 ########################################
284 #
285
286 diff --git a/policy/modules/contrib/xen.te b/policy/modules/contrib/xen.te
287 index 6f736a9..3d95d69 100644
288 --- a/policy/modules/contrib/xen.te
289 +++ b/policy/modules/contrib/xen.te
290 @@ -105,7 +105,7 @@ logging_log_file(xenstored_var_log_t)
291
292 type xenstored_var_run_t;
293 files_pid_file(xenstored_var_run_t)
294 -init_daemon_run_dir(xenstored_var_run_t, "xenstored")
295 +init_daemon_pid_file(xenstored_var_run_t, dir, "xenstored")
296
297 type xenconsoled_t;
298 type xenconsoled_exec_t;