1 |
commit: af754468a7fde0d8e230e2eb923489735112a5a1 |
2 |
Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
3 |
AuthorDate: Sat Jun 28 11:09:33 2014 +0000 |
4 |
Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org> |
5 |
CommitDate: Mon Jun 30 18:59:49 2014 +0000 |
6 |
URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=af754468 |
7 |
|
8 |
Use init_daemon_pid_file for contrib modules |
9 |
|
10 |
Signed-off-by: Sven Vermeulen <sven.vermeulen <AT> siphos.be> |
11 |
|
12 |
--- |
13 |
policy/modules/contrib/asterisk.te | 2 +- |
14 |
policy/modules/contrib/bind.te | 2 +- |
15 |
policy/modules/contrib/consolekit.te | 2 +- |
16 |
policy/modules/contrib/couchdb.te | 2 +- |
17 |
policy/modules/contrib/cups.te | 2 +- |
18 |
policy/modules/contrib/dbus.te | 2 +- |
19 |
policy/modules/contrib/dkim.te | 2 +- |
20 |
policy/modules/contrib/exim.te | 2 +- |
21 |
policy/modules/contrib/mysql.te | 2 +- |
22 |
policy/modules/contrib/nscd.te | 2 +- |
23 |
policy/modules/contrib/nut.te | 2 +- |
24 |
policy/modules/contrib/pcscd.te | 2 +- |
25 |
policy/modules/contrib/puppet.te | 2 +- |
26 |
policy/modules/contrib/readahead.te | 2 +- |
27 |
policy/modules/contrib/rpcbind.te | 2 +- |
28 |
policy/modules/contrib/shibboleth.te | 2 +- |
29 |
policy/modules/contrib/snort.te | 2 +- |
30 |
policy/modules/contrib/tor.te | 2 +- |
31 |
policy/modules/contrib/xen.te | 2 +- |
32 |
19 files changed, 19 insertions(+), 19 deletions(-) |
33 |
|
34 |
diff --git a/policy/modules/contrib/asterisk.te b/policy/modules/contrib/asterisk.te |
35 |
index e1ec6bb..2975acd 100644 |
36 |
--- a/policy/modules/contrib/asterisk.te |
37 |
+++ b/policy/modules/contrib/asterisk.te |
38 |
@@ -32,7 +32,7 @@ files_type(asterisk_var_lib_t) |
39 |
|
40 |
type asterisk_var_run_t; |
41 |
files_pid_file(asterisk_var_run_t) |
42 |
-init_daemon_run_dir(asterisk_var_run_t, "asterisk") |
43 |
+init_daemon_pid_file(asterisk_var_run_t, dir, "asterisk") |
44 |
|
45 |
######################################## |
46 |
# |
47 |
|
48 |
diff --git a/policy/modules/contrib/bind.te b/policy/modules/contrib/bind.te |
49 |
index 796c270..9ba5f03 100644 |
50 |
--- a/policy/modules/contrib/bind.te |
51 |
+++ b/policy/modules/contrib/bind.te |
52 |
@@ -55,7 +55,7 @@ files_tmp_file(named_tmp_t) |
53 |
|
54 |
type named_var_run_t; |
55 |
files_pid_file(named_var_run_t) |
56 |
-init_daemon_run_dir(named_var_run_t, "named") |
57 |
+init_daemon_pid_file(named_var_run_t, dir, "named") |
58 |
|
59 |
# for primary zone files |
60 |
type named_zone_t; |
61 |
|
62 |
diff --git a/policy/modules/contrib/consolekit.te b/policy/modules/contrib/consolekit.te |
63 |
index bd18063..25f444e 100644 |
64 |
--- a/policy/modules/contrib/consolekit.te |
65 |
+++ b/policy/modules/contrib/consolekit.te |
66 |
@@ -17,7 +17,7 @@ files_tmpfs_file(consolekit_tmpfs_t) |
67 |
|
68 |
type consolekit_var_run_t; |
69 |
files_pid_file(consolekit_var_run_t) |
70 |
-init_daemon_run_dir(consolekit_var_run_t, "ConsoleKit") |
71 |
+init_daemon_pid_file(consolekit_var_run_t, dir, "ConsoleKit") |
72 |
|
73 |
######################################## |
74 |
# |
75 |
|
76 |
diff --git a/policy/modules/contrib/couchdb.te b/policy/modules/contrib/couchdb.te |
77 |
index 9469b57..2248ede 100644 |
78 |
--- a/policy/modules/contrib/couchdb.te |
79 |
+++ b/policy/modules/contrib/couchdb.te |
80 |
@@ -30,7 +30,7 @@ files_type(couchdb_var_lib_t) |
81 |
|
82 |
type couchdb_var_run_t; |
83 |
files_pid_file(couchdb_var_run_t) |
84 |
-init_daemon_run_dir(couchdb_var_run_t, "couchdb") |
85 |
+init_daemon_pid_file(couchdb_var_run_t, dir, "couchdb") |
86 |
|
87 |
######################################## |
88 |
# |
89 |
|
90 |
diff --git a/policy/modules/contrib/cups.te b/policy/modules/contrib/cups.te |
91 |
index 5b06ce2..7ed33ac 100644 |
92 |
--- a/policy/modules/contrib/cups.te |
93 |
+++ b/policy/modules/contrib/cups.te |
94 |
@@ -59,7 +59,7 @@ files_tmp_file(cupsd_tmp_t) |
95 |
|
96 |
type cupsd_var_run_t; |
97 |
files_pid_file(cupsd_var_run_t) |
98 |
-init_daemon_run_dir(cupsd_var_run_t, "cups") |
99 |
+init_daemon_pid_file(cupsd_var_run_t, dir, "cups") |
100 |
mls_trusted_object(cupsd_var_run_t) |
101 |
|
102 |
type hplip_t; |
103 |
|
104 |
diff --git a/policy/modules/contrib/dbus.te b/policy/modules/contrib/dbus.te |
105 |
index 8075f85..6557312 100644 |
106 |
--- a/policy/modules/contrib/dbus.te |
107 |
+++ b/policy/modules/contrib/dbus.te |
108 |
@@ -41,7 +41,7 @@ files_type(system_dbusd_var_lib_t) |
109 |
|
110 |
type system_dbusd_var_run_t; |
111 |
files_pid_file(system_dbusd_var_run_t) |
112 |
-init_daemon_run_dir(system_dbusd_var_run_t, "dbus") |
113 |
+init_daemon_pid_file(system_dbusd_var_run_t, dir, "dbus") |
114 |
|
115 |
ifdef(`enable_mcs',` |
116 |
init_ranged_system_domain(system_dbusd_t, dbusd_exec_t, s0 - mcs_systemhigh) |
117 |
|
118 |
diff --git a/policy/modules/contrib/dkim.te b/policy/modules/contrib/dkim.te |
119 |
index 6a73d60..021a7ae 100644 |
120 |
--- a/policy/modules/contrib/dkim.te |
121 |
+++ b/policy/modules/contrib/dkim.te |
122 |
@@ -13,7 +13,7 @@ init_script_file(dkim_milter_initrc_exec_t) |
123 |
type dkim_milter_private_key_t; |
124 |
files_type(dkim_milter_private_key_t) |
125 |
|
126 |
-init_daemon_run_dir(dkim_milter_data_t, "opendkim") |
127 |
+init_daemon_pid_file(dkim_milter_data_t, dir, "opendkim") |
128 |
|
129 |
######################################## |
130 |
# |
131 |
|
132 |
diff --git a/policy/modules/contrib/exim.te b/policy/modules/contrib/exim.te |
133 |
index 768a69f..508504a 100644 |
134 |
--- a/policy/modules/contrib/exim.te |
135 |
+++ b/policy/modules/contrib/exim.te |
136 |
@@ -64,7 +64,7 @@ type exim_var_run_t; |
137 |
files_pid_file(exim_var_run_t) |
138 |
|
139 |
ifdef(`distro_debian',` |
140 |
- init_daemon_run_dir(exim_var_run_t, "exim4") |
141 |
+ init_daemon_pid_file(exim_var_run_t, dir, "exim4") |
142 |
') |
143 |
|
144 |
######################################## |
145 |
|
146 |
diff --git a/policy/modules/contrib/mysql.te b/policy/modules/contrib/mysql.te |
147 |
index 80d2c6f..f023642 100644 |
148 |
--- a/policy/modules/contrib/mysql.te |
149 |
+++ b/policy/modules/contrib/mysql.te |
150 |
@@ -27,7 +27,7 @@ init_daemon_domain(mysqld_safe_t, mysqld_safe_exec_t) |
151 |
|
152 |
type mysqld_var_run_t; |
153 |
files_pid_file(mysqld_var_run_t) |
154 |
-init_daemon_run_dir(mysqld_var_run_t, "mysqld") |
155 |
+init_daemon_pid_file(mysqld_var_run_t, dir, "mysqld") |
156 |
|
157 |
type mysqld_db_t; |
158 |
files_type(mysqld_db_t) |
159 |
|
160 |
diff --git a/policy/modules/contrib/nscd.te b/policy/modules/contrib/nscd.te |
161 |
index bcd7d0a..eaf1a56 100644 |
162 |
--- a/policy/modules/contrib/nscd.te |
163 |
+++ b/policy/modules/contrib/nscd.te |
164 |
@@ -21,7 +21,7 @@ attribute_role nscd_roles; |
165 |
|
166 |
type nscd_var_run_t; |
167 |
files_pid_file(nscd_var_run_t) |
168 |
-init_daemon_run_dir(nscd_var_run_t, "nscd") |
169 |
+init_daemon_pid_file(nscd_var_run_t, dir, "nscd") |
170 |
|
171 |
type nscd_t; |
172 |
type nscd_exec_t; |
173 |
|
174 |
diff --git a/policy/modules/contrib/nut.te b/policy/modules/contrib/nut.te |
175 |
index 5b2cb0d..4816f03 100644 |
176 |
--- a/policy/modules/contrib/nut.te |
177 |
+++ b/policy/modules/contrib/nut.te |
178 |
@@ -27,7 +27,7 @@ init_script_file(nut_initrc_exec_t) |
179 |
|
180 |
type nut_var_run_t; |
181 |
files_pid_file(nut_var_run_t) |
182 |
-init_daemon_run_dir(nut_var_run_t, "nut") |
183 |
+init_daemon_pid_file(nut_var_run_t, dir, "nut") |
184 |
|
185 |
######################################## |
186 |
# |
187 |
|
188 |
diff --git a/policy/modules/contrib/pcscd.te b/policy/modules/contrib/pcscd.te |
189 |
index 1af594e..16ceba4 100644 |
190 |
--- a/policy/modules/contrib/pcscd.te |
191 |
+++ b/policy/modules/contrib/pcscd.te |
192 |
@@ -14,7 +14,7 @@ init_script_file(pcscd_initrc_exec_t) |
193 |
|
194 |
type pcscd_var_run_t; |
195 |
files_pid_file(pcscd_var_run_t) |
196 |
-init_daemon_run_dir(pcscd_var_run_t, "pcscd") |
197 |
+init_daemon_pid_file(pcscd_var_run_t, dir, "pcscd") |
198 |
|
199 |
######################################## |
200 |
# |
201 |
|
202 |
diff --git a/policy/modules/contrib/puppet.te b/policy/modules/contrib/puppet.te |
203 |
index 86e3512..6fa9b91 100644 |
204 |
--- a/policy/modules/contrib/puppet.te |
205 |
+++ b/policy/modules/contrib/puppet.te |
206 |
@@ -37,7 +37,7 @@ files_type(puppet_var_lib_t) |
207 |
|
208 |
type puppet_var_run_t; |
209 |
files_pid_file(puppet_var_run_t) |
210 |
-init_daemon_run_dir(puppet_var_run_t, "puppet") |
211 |
+init_daemon_pid_file(puppet_var_run_t, dir, "puppet") |
212 |
|
213 |
type puppetca_t; |
214 |
type puppetca_exec_t; |
215 |
|
216 |
diff --git a/policy/modules/contrib/readahead.te b/policy/modules/contrib/readahead.te |
217 |
index c0b02c9..27e3bc5 100644 |
218 |
--- a/policy/modules/contrib/readahead.te |
219 |
+++ b/policy/modules/contrib/readahead.te |
220 |
@@ -15,7 +15,7 @@ typealias readahead_var_lib_t alias readahead_etc_rw_t; |
221 |
|
222 |
type readahead_var_run_t; |
223 |
files_pid_file(readahead_var_run_t) |
224 |
-init_daemon_run_dir(readahead_var_run_t, "readahead") |
225 |
+init_daemon_pid_file(readahead_var_run_t, dir, "readahead") |
226 |
|
227 |
######################################## |
228 |
# |
229 |
|
230 |
diff --git a/policy/modules/contrib/rpcbind.te b/policy/modules/contrib/rpcbind.te |
231 |
index 75f7e70..1f36970 100644 |
232 |
--- a/policy/modules/contrib/rpcbind.te |
233 |
+++ b/policy/modules/contrib/rpcbind.te |
234 |
@@ -14,7 +14,7 @@ init_script_file(rpcbind_initrc_exec_t) |
235 |
|
236 |
type rpcbind_var_run_t; |
237 |
files_pid_file(rpcbind_var_run_t) |
238 |
-init_daemon_run_dir(rpcbind_var_run_t, "rpcbind") |
239 |
+init_daemon_pid_file(rpcbind_var_run_t, dir, "rpcbind") |
240 |
|
241 |
type rpcbind_var_lib_t; |
242 |
files_type(rpcbind_var_lib_t) |
243 |
|
244 |
diff --git a/policy/modules/contrib/shibboleth.te b/policy/modules/contrib/shibboleth.te |
245 |
index 63950ea..23730ee 100644 |
246 |
--- a/policy/modules/contrib/shibboleth.te |
247 |
+++ b/policy/modules/contrib/shibboleth.te |
248 |
@@ -17,7 +17,7 @@ logging_log_file(shibboleth_log_t) |
249 |
|
250 |
type shibboleth_var_run_t; |
251 |
files_pid_file(shibboleth_var_run_t) |
252 |
-init_daemon_run_dir(shibboleth_var_run_t, "shibboleth") |
253 |
+init_daemon_pid_file(shibboleth_var_run_t, dir, "shibboleth") |
254 |
|
255 |
######################################## |
256 |
# |
257 |
|
258 |
diff --git a/policy/modules/contrib/snort.te b/policy/modules/contrib/snort.te |
259 |
index 42e685f..80d9713 100644 |
260 |
--- a/policy/modules/contrib/snort.te |
261 |
+++ b/policy/modules/contrib/snort.te |
262 |
@@ -23,7 +23,7 @@ files_tmp_file(snort_tmp_t) |
263 |
|
264 |
type snort_var_run_t; |
265 |
files_pid_file(snort_var_run_t) |
266 |
-init_daemon_run_dir(snort_var_run_t, "snort") |
267 |
+init_daemon_pid_file(snort_var_run_t, dir, "snort") |
268 |
|
269 |
######################################## |
270 |
# |
271 |
|
272 |
diff --git a/policy/modules/contrib/tor.te b/policy/modules/contrib/tor.te |
273 |
index 5ceacde..8db861b 100644 |
274 |
--- a/policy/modules/contrib/tor.te |
275 |
+++ b/policy/modules/contrib/tor.te |
276 |
@@ -31,7 +31,7 @@ logging_log_file(tor_var_log_t) |
277 |
|
278 |
type tor_var_run_t; |
279 |
files_pid_file(tor_var_run_t) |
280 |
-init_daemon_run_dir(tor_var_run_t, "tor") |
281 |
+init_daemon_pid_file(tor_var_run_t, dir, "tor") |
282 |
|
283 |
######################################## |
284 |
# |
285 |
|
286 |
diff --git a/policy/modules/contrib/xen.te b/policy/modules/contrib/xen.te |
287 |
index 6f736a9..3d95d69 100644 |
288 |
--- a/policy/modules/contrib/xen.te |
289 |
+++ b/policy/modules/contrib/xen.te |
290 |
@@ -105,7 +105,7 @@ logging_log_file(xenstored_var_log_t) |
291 |
|
292 |
type xenstored_var_run_t; |
293 |
files_pid_file(xenstored_var_run_t) |
294 |
-init_daemon_run_dir(xenstored_var_run_t, "xenstored") |
295 |
+init_daemon_pid_file(xenstored_var_run_t, dir, "xenstored") |
296 |
|
297 |
type xenconsoled_t; |
298 |
type xenconsoled_exec_t; |