Home | History | Annotate | Download | only in sepolicy

Lines Matching refs:executable

34 from .templates import executable
523 return re.sub("TEMPLATETYPE", self.name, executable.te_uid_rules)
529 return re.sub("TEMPLATETYPE", self.name, executable.te_syslog_rules)
535 return re.sub("TEMPLATETYPE", self.name, executable.te_resolve_rules)
541 return re.sub("TEMPLATETYPE", self.name, executable.te_kerberos_rules)
547 return re.sub("TEMPLATETYPE", self.name, executable.te_manage_krb5_rcache_rules)
554 newte = re.sub("TEMPLATETYPE", self.name, executable.te_pam_rules)
560 newte = re.sub("TEMPLATETYPE", self.name, executable.te_audit_rules)
566 newte = re.sub("TEMPLATETYPE", self.name, executable.te_etc_rules)
572 newte = re.sub("TEMPLATETYPE", self.name, executable.te_fd_rules)
578 newte = re.sub("TEMPLATETYPE", self.name, executable.te_localization_rules)
584 newte = re.sub("TEMPLATETYPE", self.name, executable.te_dbus_rules)
590 newte = re.sub("TEMPLATETYPE", self.name, executable.te_mail_rules)
751 temp = re.sub("TEMPLATETYPE", self.name, executable.te_run_rules)
790 newif = re.sub("TEMPLATETYPE", self.name, executable.if_dbus_rules)
797 newif = re.sub("TEMPLATETYPE", self.name, executable.if_sandbox_rules)
804 newtypes += re.sub("TEMPLATETYPE", self.name, executable.if_initscript_admin_types)
805 newif += re.sub("TEMPLATETYPE", self.name, executable.if_initscript_admin)
812 ret = re.sub("TEMPLATETYPE", self.name, executable.if_begin_admin)
815 ret += re.sub("TEMPLATETYPE", self.name, executable.if_middle_admin)
817 ret += re.sub("TEMPLATETYPE", self.name, executable.if_end_admin)
823 return re.sub("TEMPLATETYPE", self.file_name, executable.te_cgi_types)
826 return re.sub("TEMPLATETYPE", self.file_name, executable.te_sandbox_types)
829 return re.sub("TEMPLATETYPE", self.name, executable.te_userapp_types)
832 return re.sub("TEMPLATETYPE", self.name, executable.te_inetd_types)
835 return re.sub("TEMPLATETYPE", self.name, executable.te_dbusd_types)
894 newte = re.sub("TEMPLATETYPE", self.name, executable.te_daemon_types)
896 newte += re.sub("TEMPLATETYPE", self.name, executable.te_initscript_types)
919 return re.sub("TEMPLATETYPE", self.name, executable.te_sandbox_types)
922 return re.sub("TEMPLATETYPE", self.name, executable.te_cgi_types)
925 newif = re.sub("TEMPLATETYPE", self.name, executable.te_daemon_rules)
954 return re.sub("TEMPLATETYPE", self.name, executable.te_userapp_rules)
957 return re.sub("TEMPLATETYPE", self.name, executable.te_inetd_rules)
960 return re.sub("TEMPLATETYPE", self.name, executable.te_dbusd_rules)
970 newte += re.sub("TEMPLATETYPE", self.name, executable.te_cgi_rules)
975 newte += re.sub("TEMPLATETYPE", self.name, executable.te_sandbox_rules)
981 newif = re.sub("TEMPLATETYPE", self.name, executable.if_user_program_rules)
984 newif += re.sub("TEMPLATETYPE", self.name, executable.if_role_change_rules)
989 newif += re.sub("TEMPLATETYPE", self.name, executable.if_heading_rules)
991 newif += re.sub("TEMPLATETYPE", self.name, executable.if_program_rules)
993 newif += re.sub("TEMPLATETYPE", self.name, executable.if_initscript_rules)
1111 return executable.fc_user
1114 raise ValueError(_("You must enter the executable path for your confined process"))
1117 t1 = re.sub("EXECUTABLE", self.program, executable.fc_program)
1121 t1 = re.sub("EXECUTABLE", self.initscript, executable.fc_initscript)