Lines Matching refs:domain
49 usage_dict = {' --newtype': ('-t [TYPES [TYPES ...]]',), ' --customize': ('-d DOMAIN', '-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --admin_user': ('[-r TRANSITION_ROLE ]', "[ -w WRITEPATHS ]",), ' --application': ('COMMAND', "[ -w WRITEPATHS ]",), ' --cgi': ('COMMAND', "[ -w WRITEPATHS ]",), ' --confined_admin': ('-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --dbus': ('COMMAND', "[ -w WRITEPATHS ]",), ' --desktop_user': ('', "[ -w WRITEPATHS ]",), ' --inetd': ('COMMAND', "[ -w WRITEPATHS ]",), ' --init': ('COMMAND', "[ -w WRITEPATHS ]",), ' --sandbox': ("[ -w WRITEPATHS ]",), ' --term_user': ("[ -w WRITEPATHS ]",), ' --x_user': ("[ -w WRITEPATHS ]",)}
86 raise ValueError("%s must be an SELinux process domain:\nValid domains: %s" % (v, ", ".join(booleans)))
106 raise ValueError("%s must be an SELinux process domain:\nValid domains: %s" % (values, ", ".join(domains)))
116 raise ValueError("%s must be an SELinux process domain:\nValid domains: %s" % (v, ", ".join(domains)))
144 raise ValueError("%s must be an SELinux admin domain:\nValid admin domains: %s" % (values, ", ".join(admins)))
301 args.domain.append(d)
303 for d in args.domain:
312 sepolicy.gui.SELinuxGui(args.domain, args.test)
321 gui.add_argument("-d", "--domain", default=None,
323 help=_("Domain name(s) of man pages to be created"))
341 test_domains = args.domain
343 for domain in test_domains:
344 m = ManPage(domain, path, args.root, args.source_files, args.web)
369 group.add_argument("-d", "--domain", nargs="+",
371 help=_("Domain name(s) of man pages to be created"))
389 group.add_argument("-d", "--domain", dest="domain", default=[],
391 help=_("show ports to which this domain can bind and/or connect"))
414 help=_("Source Domain"))
417 help=_("Target Domain"))
457 help=_('query SELinux Policy to see how a source process domain can transition to the target process domain'))
460 help=_("source process domain"))
463 help=_("target process domain"))
500 conflict_args = {'TYPES': (NEWTYPE,), 'DOMAIN': (EUSER,), 'ADMIN_DOMAIN': (AUSER, RUSER, EUSER,)}
527 if args.domain:
528 if args.policytype not in conflict_args['DOMAIN']:
548 mypolicy.set_existing_domains(args.domain)
589 pol.add_argument("-d", "--domain", dest="domain", default=[],
591 help=_("Enter domain type which you will be extending"))
594 help=_("Enter SELinux user(s) which will transition to this domain"))
597 help=_("Enter SELinux role(s) to which the administror domain will transition"))
600 help=_("Enter domain(s) which this confined admin will administrate"))