From 27d056afb8e588469fb762b338eb7753edbecbc9 Mon Sep 17 00:00:00 2001 From: Dan Walsh Date: Tue, 16 Jul 2013 11:53:03 -0400 Subject: [PATCH] Don't generate shell script or spec file for sepolicy generate --newtype - Update translations - Fix sepolicy generate --admin_user man page again - Fix setsebool to print less verbose error messages by default, add -V for ve --- policycoreutils-rhat.patch | 110807 ++++++++++++++-------------------- policycoreutils.spec | 36 +- 2 files changed, 44704 insertions(+), 66139 deletions(-) diff --git a/policycoreutils-rhat.patch b/policycoreutils-rhat.patch index 29cfc8c..e61c761 100644 --- a/policycoreutils-rhat.patch +++ b/policycoreutils-rhat.patch @@ -1009,18 +1009,39 @@ index 75117f4..aca0474 100644 sepolicy/sepolicy/transition.py sepolicy/sepolicy/templates/executable.py diff --git a/policycoreutils/po/af.po b/policycoreutils/po/af.po -index 961d921..3bb642f 100644 +index 961d921..c1e038c 100644 --- a/policycoreutils/po/af.po +++ b/policycoreutils/po/af.po -@@ -8,7 +8,7 @@ msgid "" +@@ -1,21 +1,21 @@ + # SOME DESCRIPTIVE TITLE. + # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER + # This file is distributed under the same license as the PACKAGE package. +-# FIRST AUTHOR , YEAR. +-# +-#, fuzzy ++# ++# Translators: + msgid "" msgstr "" - "Project-Id-Version: PACKAGE VERSION\n" +-"Project-Id-Version: PACKAGE VERSION\n" ++"Project-Id-Version: Policycoreutils\n" "Report-Msgid-Bugs-To: \n" -"POT-Creation-Date: 2013-01-04 12:01-0500\n" +-"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" +"POT-Creation-Date: 2013-07-10 16:36-0400\n" - "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" ++"PO-Revision-Date: 2012-03-30 18:14+0000\n" "Last-Translator: FULL NAME \n" - "Language-Team: LANGUAGE \n" +-"Language-Team: LANGUAGE \n" +-"Language: \n" ++"Language-Team: Afrikaans (http://www.transifex.com/projects/p/fedora/language/af/)\n" + "MIME-Version: 1.0\n" + "Content-Type: text/plain; charset=UTF-8\n" + "Content-Transfer-Encoding: 8bit\n" ++"Language: af\n" ++"Plural-Forms: nplurals=2; plural=(n != 1);\n" + + #: ../run_init/run_init.c:67 + msgid "" @@ -24,7 +24,7 @@ msgid "" " are the arguments to that script." msgstr "" @@ -1048,7 +1069,7 @@ index 961d921..3bb642f 100644 msgid "Could not list SELinux modules" msgstr "" -@@ -142,814 +142,829 @@ msgstr "" +@@ -142,814 +142,830 @@ msgstr "" msgid "Disabled" msgstr "" @@ -1851,7 +1872,9 @@ index 961d921..3bb642f 100644 +#: ../semanage/seobject.py:1758 #, python-format msgid "" - "File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' instead" +-"File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' instead" ++"File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' " ++"instead" msgstr "" -#: ../semanage/seobject.py:1755 @@ -2070,7 +2093,7 @@ index 961d921..3bb642f 100644 msgid "Description" msgstr "" -@@ -988,206 +1003,226 @@ msgstr "" +@@ -988,206 +1004,226 @@ msgstr "" msgid "Unable to clear environment\n" msgstr "" @@ -2338,7 +2361,7 @@ index 961d921..3bb642f 100644 msgid "failed to exec shell\n" msgstr "" -@@ -1414,7 +1449,7 @@ msgstr "" +@@ -1414,7 +1450,7 @@ msgstr "" msgid "Applications" msgstr "" @@ -2347,7 +2370,7 @@ index 961d921..3bb642f 100644 msgid "Standard Init Daemon" msgstr "" -@@ -1424,7 +1459,7 @@ msgid "" +@@ -1424,7 +1460,7 @@ msgid "" "requires a script in /etc/rc.d/init.d" msgstr "" @@ -2356,7 +2379,7 @@ index 961d921..3bb642f 100644 msgid "DBUS System Daemon" msgstr "" -@@ -1436,7 +1471,7 @@ msgstr "" +@@ -1436,7 +1472,7 @@ msgstr "" msgid "Internet Services Daemon are daemons started by xinetd" msgstr "" @@ -2365,7 +2388,7 @@ index 961d921..3bb642f 100644 msgid "Web Application/Script (CGI)" msgstr "" -@@ -1445,7 +1480,7 @@ msgid "" +@@ -1445,7 +1481,7 @@ msgid "" "Web Applications/Script (CGI) CGI scripts started by the web server (apache)" msgstr "" @@ -2374,7 +2397,7 @@ index 961d921..3bb642f 100644 msgid "User Application" msgstr "" -@@ -1455,7 +1490,7 @@ msgid "" +@@ -1455,7 +1491,7 @@ msgid "" "started by a user" msgstr "" @@ -2383,7 +2406,29 @@ index 961d921..3bb642f 100644 msgid "Sandbox" msgstr "" -@@ -1530,7 +1565,8 @@ msgstr "" +@@ -1507,8 +1543,8 @@ msgstr "" + + #: ../gui/polgen.glade:550 + msgid "" +-"User with full networking, no setuid applications without transition, no su, " +-"can sudo to Root Administration Roles" ++"User with full networking, no setuid applications without transition, no su," ++" can sudo to Root Administration Roles" + msgstr "" + + #: ../gui/polgen.glade:592 +@@ -1521,8 +1557,8 @@ msgstr "" + + #: ../gui/polgen.glade:627 + msgid "" +-"Select Root Administrator User Role, if this user will be used to administer " +-"the machine while running as root. This user will not be able to login to " ++"Select Root Administrator User Role, if this user will be used to administer" ++" the machine while running as root. This user will not be able to login to " + "the system directly." + msgstr "" + +@@ -1530,7 +1566,8 @@ msgstr "" msgid "Enter name of application or user role:" msgstr "" @@ -2393,7 +2438,17 @@ index 961d921..3bb642f 100644 msgid "Name" msgstr "" -@@ -1745,75 +1781,75 @@ msgstr "" +@@ -1590,7 +1627,8 @@ msgid "Select the user_roles that will transition to %s:" + msgstr "" + + #: ../gui/polgen.glade:1019 +-msgid "Select the user roles that will transiton to this applications domains." ++msgid "" ++"Select the user roles that will transiton to this applications domains." + msgstr "" + + #: ../gui/polgen.glade:1056 +@@ -1745,75 +1783,75 @@ msgstr "" msgid "Policy Directory" msgstr "" @@ -2485,7 +2540,7 @@ index 961d921..3bb642f 100644 msgid "Configue SELinux" msgstr "" -@@ -1828,6 +1864,8 @@ msgid "" +@@ -1828,6 +1866,8 @@ msgid "" msgstr "" #: ../gui/portsPage.py:91 ../gui/system-config-selinux.glade:363 @@ -2494,7 +2549,7 @@ index 961d921..3bb642f 100644 msgid "Protocol" msgstr "" -@@ -1837,7 +1875,8 @@ msgid "" +@@ -1837,7 +1877,8 @@ msgid "" "Level" msgstr "" @@ -2504,7 +2559,18 @@ index 961d921..3bb642f 100644 msgid "Port" msgstr "" -@@ -1967,6 +2006,9 @@ msgid "SELinux Administration" +@@ -1899,8 +1940,8 @@ msgid "" + "you later decide to turn SELinux back on, the system will be required to " + "relabel. If you just want to see if SELinux is causing a problem on your " + "system, you can go to permissive mode which will only log errors and not " +-"enforce SELinux policy. Permissive mode does not require a reboot Do you " +-"wish to continue?" ++"enforce SELinux policy. Permissive mode does not require a reboot Do you" ++" wish to continue?" + msgstr "" + + #: ../gui/statusPage.py:152 +@@ -1967,6 +2008,9 @@ msgid "SELinux Administration" msgstr "" #: ../gui/system-config-selinux.glade:1122 @@ -2514,7 +2580,7 @@ index 961d921..3bb642f 100644 msgid "Add" msgstr "" -@@ -2036,6 +2078,10 @@ msgstr "" +@@ -2036,6 +2080,10 @@ msgstr "" #: ../gui/system-config-selinux.glade:2467 #: ../gui/system-config-selinux.glade:2692 #: ../gui/system-config-selinux.glade:2867 @@ -2525,7 +2591,18 @@ index 961d921..3bb642f 100644 msgid "Filter" msgstr "" -@@ -2159,1315 +2205,1864 @@ msgstr "" +@@ -2130,8 +2178,8 @@ msgstr "" + + #: ../gui/system-config-selinux.glade:2661 + msgid "" +-"Enable/Disable additional audit rules, that are normally not reported in the " +-"log files." ++"Enable/Disable additional audit rules, that are normally not reported in the" ++" log files." + msgstr "" + + #: ../gui/system-config-selinux.glade:2781 +@@ -2159,1315 +2207,1869 @@ msgstr "" msgid "SELinux user '%s' is required" msgstr "" @@ -2703,8 +2780,9 @@ index 961d921..3bb642f 100644 -msgid "name of policy to generate" +#: booleans.py:27 +msgid "" -+"Deny user domains applications to map a memory region as both executable and " -+"writable, this is dangerous and the executable should be reported in bugzilla" ++"Deny user domains applications to map a memory region as both executable and" ++" writable, this is dangerous and the executable should be reported in " ++"bugzilla" msgstr "" -#: ../sepolicy/sepolicy.py:378 @@ -2807,8 +2885,8 @@ index 961d921..3bb642f 100644 -msgid "Confined Root Administrator Role" +#: booleans.py:42 +msgid "" -+"Determine whether ftpd can modify public files used for public file transfer " -+"services. Directories/Files must be labeled public_content_rw_t." ++"Determine whether ftpd can modify public files used for public file transfer" ++" services. Directories/Files must be labeled public_content_rw_t." msgstr "" -#: ../sepolicy/sepolicy/generate.py:187 @@ -2838,151 +2916,149 @@ index 961d921..3bb642f 100644 +#: booleans.py:46 +msgid "" +"Determine whether ftpd can use CIFS used for public file transfer services." - msgstr "" - --#: ../sepolicy/sepolicy/generate.py:355 --msgid "" --"Name must be alpha numberic with no spaces. Consider using option \"-n " --"MODULENAME\"" ++msgstr "" ++ +#: booleans.py:47 booleans.py:170 +msgid "Allow samba to export ntfs/fusefs volumes." msgstr "" --#: ../sepolicy/sepolicy/generate.py:447 --msgid "User Role types can not be assigned executables." +-#: ../sepolicy/sepolicy/generate.py:355 +#: booleans.py:48 -+msgid "" + msgid "" +-"Name must be alpha numberic with no spaces. Consider using option \"-n " +-"MODULENAME\"" +"Determine whether ftpd can use NFS used for public file transfer services." msgstr "" --#: ../sepolicy/sepolicy/generate.py:453 --msgid "Only Daemon apps can use an init script.." +-#: ../sepolicy/sepolicy/generate.py:447 +-msgid "User Role types can not be assigned executables." +#: booleans.py:49 +msgid "" +"Determine whether ftpd can bind to all unreserved ports for passive mode." msgstr "" --#: ../sepolicy/sepolicy/generate.py:471 --msgid "use_resolve must be a boolean value " +-#: ../sepolicy/sepolicy/generate.py:453 +-msgid "Only Daemon apps can use an init script.." +#: booleans.py:50 +msgid "Determine whether Git CGI can search home directories." msgstr "" --#: ../sepolicy/sepolicy/generate.py:477 --msgid "use_syslog must be a boolean value " +-#: ../sepolicy/sepolicy/generate.py:471 +-msgid "use_resolve must be a boolean value " +#: booleans.py:51 +msgid "Determine whether Git CGI can access cifs file systems." msgstr "" --#: ../sepolicy/sepolicy/generate.py:483 --msgid "use_kerberos must be a boolean value " +-#: ../sepolicy/sepolicy/generate.py:477 +-msgid "use_syslog must be a boolean value " +#: booleans.py:52 +msgid "Determine whether Git CGI can access nfs file systems." msgstr "" --#: ../sepolicy/sepolicy/generate.py:489 --msgid "manage_krb5_rcache must be a boolean value " +-#: ../sepolicy/sepolicy/generate.py:483 +-msgid "use_kerberos must be a boolean value " +#: booleans.py:53 +msgid "" +"Determine whether Git session daemon can bind TCP sockets to all unreserved " +"ports." msgstr "" --#: ../sepolicy/sepolicy/generate.py:519 --msgid "USER Types automatically get a tmp type" +-#: ../sepolicy/sepolicy/generate.py:489 +-msgid "manage_krb5_rcache must be a boolean value " +#: booleans.py:54 +msgid "" +"Determine whether calling user domains can execute Git daemon in the " +"git_session_t domain." msgstr "" --#: ../sepolicy/sepolicy/generate.py:857 --#, python-format --msgid "%s policy modules require existing domains" +-#: ../sepolicy/sepolicy/generate.py:519 +-msgid "USER Types automatically get a tmp type" +#: booleans.py:55 +msgid "Determine whether Git system daemon can search home directories." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1059 --msgid "You must enter the executable path for your confined process" +-#: ../sepolicy/sepolicy/generate.py:857 +-#, python-format +-msgid "%s policy modules require existing domains" +#: booleans.py:56 +msgid "Determine whether Git system daemon can access cifs file systems." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1321 --msgid "Type Enforcement file" +-#: ../sepolicy/sepolicy/generate.py:1059 +-msgid "You must enter the executable path for your confined process" +#: booleans.py:57 +msgid "Determine whether Git system daemon can access nfs file systems." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1322 --msgid "Interface file" +-#: ../sepolicy/sepolicy/generate.py:1321 +-msgid "Type Enforcement file" +#: booleans.py:58 +msgid "Determine whether Gitosis can send mail." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1323 --msgid "File Contexts file" +-#: ../sepolicy/sepolicy/generate.py:1322 +-msgid "Interface file" +#: booleans.py:59 +msgid "Enable reading of urandom for all domains." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1324 --msgid "Spec file" +-#: ../sepolicy/sepolicy/generate.py:1323 +-msgid "File Contexts file" +#: booleans.py:60 +msgid "" +"Allow glusterfsd to modify public files used for public file transfer " +"services. Files/Directories must be labeled public_content_rw_t." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1325 --msgid "Setup Script" +-#: ../sepolicy/sepolicy/generate.py:1324 +-msgid "Spec file" +#: booleans.py:61 +msgid "Allow glusterfsd to share any file/directory read only." msgstr "" --#: booleans.py:1 --msgid "" --"Allow ABRT to modify public files used for public file transfer services." +-#: ../sepolicy/sepolicy/generate.py:1325 +-msgid "Setup Script" +#: booleans.py:62 +msgid "Allow glusterfsd to share any file/directory read/write." msgstr "" --#: booleans.py:2 +-#: booleans.py:1 +#: booleans.py:63 msgid "" --"Allow ABRT to run in abrt_handle_event_t domain to handle ABRT event scripts" +-"Allow ABRT to modify public files used for public file transfer services." +"Allow usage of the gpg-agent --write-env-file option. This also allows gpg-" +"agent to manage user files." msgstr "" --#: booleans.py:3 --msgid "Allow amavis to use JIT compiler" +-#: booleans.py:2 +#: booleans.py:64 -+msgid "" + msgid "" +-"Allow ABRT to run in abrt_handle_event_t domain to handle ABRT event scripts" +"Allow gpg web domain to modify public files used for public file transfer " +"services." msgstr "" --#: booleans.py:4 --msgid "Allow antivirus programs to read non security files on a system" +-#: booleans.py:3 +-msgid "Allow amavis to use JIT compiler" +#: booleans.py:65 +msgid "Allow gssd to read temp directory. For access to kerberos tgt." msgstr "" --#: booleans.py:5 --msgid "Allow auditadm to exec content" +-#: booleans.py:4 +-msgid "Allow antivirus programs to read non security files on a system" +#: booleans.py:66 +msgid "Allow guest to exec content" msgstr "" --#: booleans.py:6 +-#: booleans.py:5 +-msgid "Allow auditadm to exec content" +#: booleans.py:67 +msgid "" +"Allow Apache to modify public files used for public file transfer services. " +"Directories/Files must be labeled public_content_rw_t." -+msgstr "" -+ + msgstr "" + +-#: booleans.py:6 +#: booleans.py:68 +msgid "Allow httpd to use built in scripting (usually php)" +msgstr "" @@ -3014,7 +3090,8 @@ index 961d921..3bb642f 100644 +msgstr "" + +#: booleans.py:75 -+msgid "Allow HTTPD scripts and modules to connect to cobbler over the network." ++msgid "" ++"Allow HTTPD scripts and modules to connect to cobbler over the network." +msgstr "" + +#: booleans.py:76 @@ -3508,7 +3585,8 @@ index 961d921..3bb642f 100644 +#: booleans.py:185 msgid "" -"Allow Cobbler to modify public files used for public file transfer services." -+"Allow confined users the ability to execute the ping and traceroute commands." ++"Allow confined users the ability to execute the ping and traceroute " ++"commands." msgstr "" -#: booleans.py:15 @@ -3535,8 +3613,8 @@ index 961d921..3bb642f 100644 -msgid "Allow collectd to connect to the network using TCP." +#: booleans.py:189 +msgid "" -+"Allow users to run TCP servers (bind to ports and accept connection from the " -+"same domain and outside users) disabling this forces FTP passive mode and " ++"Allow users to run TCP servers (bind to ports and accept connection from the" ++" same domain and outside users) disabling this forces FTP passive mode and " +"may change other protocols." msgstr "" @@ -3663,7 +3741,8 @@ index 961d921..3bb642f 100644 -#: booleans.py:35 -msgid "Allow the use of the audio devices as the source for the entropy feeds" +#: booleans.py:209 -+msgid "Allow the Telepathy connection managers to connect to any network port." ++msgid "" ++"Allow the Telepathy connection managers to connect to any network port." msgstr "" -#: booleans.py:36 @@ -3781,8 +3860,8 @@ index 961d921..3bb642f 100644 -msgid "Determine whether Git CGI can access nfs file systems." +#: booleans.py:227 +msgid "" -+"Determine whether attempts by vbetool to mmap low regions should be silently " -+"blocked." ++"Determine whether attempts by vbetool to mmap low regions should be silently" ++" blocked." msgstr "" -#: booleans.py:54 @@ -3829,20 +3908,12 @@ index 961d921..3bb642f 100644 -msgid "Enable reading of urandom for all domains." +#: booleans.py:234 +msgid "Allow confined virtual guests to interact with the sanlock" - msgstr "" - --#: booleans.py:61 --msgid "" --"Allow usage of the gpg-agent --write-env-file option. This also allows gpg-" --"agent to manage user files." ++msgstr "" ++ +#: booleans.py:235 +msgid "Allow confined virtual guests to use usb devices" - msgstr "" - --#: booleans.py:62 --msgid "" --"Allow gpg web domain to modify public files used for public file transfer " --"services." ++msgstr "" ++ +#: booleans.py:236 +msgid "Allow confined virtual guests to interact with the xserver" +msgstr "" @@ -3855,382 +3926,386 @@ index 961d921..3bb642f 100644 +msgid "Determine whether webadm can read generic user files." msgstr "" --#: booleans.py:63 --msgid "Allow gssd to read temp directory. For access to kerberos tgt." +-#: booleans.py:61 +#: booleans.py:239 -+msgid "" + msgid "" +-"Allow usage of the gpg-agent --write-env-file option. This also allows gpg-" +-"agent to manage user files." +"Determine whether attempts by wine to mmap low regions should be silently " +"blocked." msgstr "" --#: booleans.py:64 --msgid "Allow guest to exec content" +-#: booleans.py:62 +-msgid "" +-"Allow gpg web domain to modify public files used for public file transfer " +-"services." +#: booleans.py:240 +msgid "Allow the graphical login program to execute bootloader" msgstr "" --#: booleans.py:65 +-#: booleans.py:63 +-msgid "Allow gssd to read temp directory. For access to kerberos tgt." +#: booleans.py:241 - msgid "" --"Allow Apache to modify public files used for public file transfer services. " --"Directories/Files must be labeled public_content_rw_t." ++msgid "" +"Allow the graphical login program to login directly as sysadm_r:sysadm_t" msgstr "" --#: booleans.py:66 --msgid "Allow httpd to use built in scripting (usually php)" +-#: booleans.py:64 +-msgid "Allow guest to exec content" +#: booleans.py:242 +msgid "" -+"Allow the graphical login program to create files in HOME dirs as xdm_home_t." ++"Allow the graphical login program to create files in HOME dirs as " ++"xdm_home_t." msgstr "" --#: booleans.py:67 --msgid "Allow http daemon to check spam" +-#: booleans.py:65 +-msgid "" +-"Allow Apache to modify public files used for public file transfer services. " +-"Directories/Files must be labeled public_content_rw_t." +#: booleans.py:243 +msgid "Allow xen to manage nfs files" msgstr "" --#: booleans.py:68 +-#: booleans.py:66 +-msgid "Allow httpd to use built in scripting (usually php)" +#: booleans.py:244 - msgid "" --"Allow httpd to act as a FTP client connecting to the ftp port and ephemeral " --"ports" ++msgid "" +"Allow xend to run blktapctrl/tapdisk. Not required if using dedicated " +"logical volumes for disk images." msgstr "" --#: booleans.py:69 --msgid "Allow httpd to connect to the ldap port" +-#: booleans.py:67 +-msgid "Allow http daemon to check spam" +#: booleans.py:245 +msgid "Allow xend to run qemu-dm. Not required if using paravirt and no vfb." msgstr "" --#: booleans.py:70 --msgid "Allow http daemon to connect to zabbix" +-#: booleans.py:68 +#: booleans.py:246 -+msgid "" + msgid "" +-"Allow httpd to act as a FTP client connecting to the ftp port and ephemeral " +-"ports" +"Allow xguest users to configure Network Manager and connect to apache ports" msgstr "" --#: booleans.py:71 --msgid "Allow HTTPD scripts and modules to connect to the network using TCP." +-#: booleans.py:69 +-msgid "Allow httpd to connect to the ldap port" +#: booleans.py:247 +msgid "Allow xguest to exec content" msgstr "" --#: booleans.py:72 --msgid "Allow HTTPD scripts and modules to connect to cobbler over the network." +-#: booleans.py:70 +-msgid "Allow http daemon to connect to zabbix" +#: booleans.py:248 +msgid "Allow xguest users to mount removable media" msgstr "" +-#: booleans.py:71 +-msgid "Allow HTTPD scripts and modules to connect to the network using TCP." ++#: booleans.py:249 ++msgid "Allow xguest to use blue tooth devices" + msgstr "" + +-#: booleans.py:72 +-msgid "Allow HTTPD scripts and modules to connect to cobbler over the network." ++#: booleans.py:250 ++msgid "Allows clients to write to the X server shared memory segments." + msgstr "" + -#: booleans.py:73 -msgid "" -"Allow HTTPD scripts and modules to connect to databases over the network." -+#: booleans.py:249 -+msgid "Allow xguest to use blue tooth devices" - msgstr "" - --#: booleans.py:74 --msgid "Allow httpd to connect to memcache server" -+#: booleans.py:250 -+msgid "Allows clients to write to the X server shared memory segments." - msgstr "" - --#: booleans.py:75 --msgid "Allow httpd to act as a relay" +#: booleans.py:251 +msgid "Allows XServer to execute writable memory" msgstr "" --#: booleans.py:76 --msgid "Allow http daemon to send mail" +-#: booleans.py:74 +-msgid "Allow httpd to connect to memcache server" +#: booleans.py:252 +msgid "Support X userspace object manager" msgstr "" --#: booleans.py:77 --msgid "Allow Apache to communicate with avahi service via dbus" +-#: booleans.py:75 +-msgid "Allow httpd to act as a relay" +#: booleans.py:253 +msgid "Determine whether zabbix can connect to all TCP ports" msgstr "" --#: booleans.py:78 --msgid "Allow httpd cgi support" +-#: booleans.py:76 +-msgid "Allow http daemon to send mail" +#: booleans.py:254 +msgid "Allow zebra daemon to write it configuration files" msgstr "" --#: booleans.py:79 --msgid "Allow httpd to act as a FTP server by listening on the ftp port." +-#: booleans.py:77 +-msgid "Allow Apache to communicate with avahi service via dbus" +#: booleans.py:255 +msgid "" +"Allow ZoneMinder to modify public files used for public file transfer " +"services." msgstr "" --#: booleans.py:80 --msgid "Allow httpd to read home directories" +-#: booleans.py:78 +-msgid "Allow httpd cgi support" +#: booleans.py:256 +msgid "Allow ZoneMinder to run su/sudo." msgstr "" --#: booleans.py:81 --msgid "Allow httpd scripts and modules execmem/execstack" +-#: booleans.py:79 +-msgid "Allow httpd to act as a FTP server by listening on the ftp port." +#: ../sepolicy/sepolicy.py:194 +#, python-format +msgid "Interface %s does not exist." msgstr "" --#: booleans.py:82 --msgid "Allow HTTPD to connect to port 80 for graceful shutdown" +-#: booleans.py:80 +-msgid "Allow httpd to read home directories" +#: ../sepolicy/sepolicy.py:281 +msgid "Graphical User Interface for SELinux Policy" msgstr "" --#: booleans.py:83 --msgid "Allow httpd processes to manage IPA content" +-#: booleans.py:81 +-msgid "Allow httpd scripts and modules execmem/execstack" +#: ../sepolicy/sepolicy.py:305 +msgid "Generate SELinux man pages" msgstr "" --#: booleans.py:84 --msgid "Allow Apache to use mod_auth_ntlm_winbind" +-#: booleans.py:82 +-msgid "Allow HTTPD to connect to port 80 for graceful shutdown" +#: ../sepolicy/sepolicy.py:308 +msgid "path in which the generated SELinux man pages will be stored" msgstr "" --#: booleans.py:85 --msgid "Allow Apache to use mod_auth_pam" +-#: booleans.py:83 +-msgid "Allow httpd processes to manage IPA content" +#: ../sepolicy/sepolicy.py:310 +msgid "name of the OS for man pages" msgstr "" --#: booleans.py:86 --msgid "Allow httpd to read user content" +-#: booleans.py:84 +-msgid "Allow Apache to use mod_auth_ntlm_winbind" +#: ../sepolicy/sepolicy.py:312 +msgid "Generate HTML man pages structure for selected SELinux man page" msgstr "" --#: booleans.py:87 --msgid "Allow Apache to run in stickshift mode, not transition to passenger" +-#: booleans.py:85 +-msgid "Allow Apache to use mod_auth_pam" +#: ../sepolicy/sepolicy.py:314 +msgid "Alternate root directory, defaults to /" msgstr "" --#: booleans.py:88 --msgid "Allow httpd daemon to change its resource limits" +-#: booleans.py:86 +-msgid "Allow httpd to read user content" +#: ../sepolicy/sepolicy.py:318 +msgid "All domains" msgstr "" +-#: booleans.py:87 +-msgid "Allow Apache to run in stickshift mode, not transition to passenger" ++#: ../sepolicy/sepolicy.py:321 ++msgid "Domain name(s) of man pages to be created" + msgstr "" + +-#: booleans.py:88 +-msgid "Allow httpd daemon to change its resource limits" ++#: ../sepolicy/sepolicy.py:326 ++msgid "Query SELinux policy network information" + msgstr "" + -#: booleans.py:89 -msgid "" -"Allow HTTPD to run SSI executables in the same domain as system CGI scripts." -+#: ../sepolicy/sepolicy.py:321 -+msgid "Domain name(s) of man pages to be created" ++#: ../sepolicy/sepolicy.py:331 ++msgid "list all SELinux port types" msgstr "" -#: booleans.py:90 -msgid "" -"Allow apache scripts to write to public content, directories/files must be " -"labeled public_rw_content_t." -+#: ../sepolicy/sepolicy.py:326 -+msgid "Query SELinux policy network information" ++#: ../sepolicy/sepolicy.py:334 ++msgid "show SELinux type related to the port" msgstr "" -#: booleans.py:91 -msgid "Allow Apache to execute tmp content." -+#: ../sepolicy/sepolicy.py:331 -+msgid "list all SELinux port types" ++#: ../sepolicy/sepolicy.py:337 ++msgid "Show ports defined for this SELinux type" msgstr "" -#: booleans.py:92 -msgid "" -"Unify HTTPD to communicate with the terminal. Needed for entering the " -"passphrase for certificates at the terminal." -+#: ../sepolicy/sepolicy.py:334 -+msgid "show SELinux type related to the port" - msgstr "" - --#: booleans.py:93 --msgid "Unify HTTPD handling of all content files." -+#: ../sepolicy/sepolicy.py:337 -+msgid "Show ports defined for this SELinux type" - msgstr "" - --#: booleans.py:94 --msgid "Allow httpd to access cifs file systems" +#: ../sepolicy/sepolicy.py:340 +msgid "show ports to which this domain can bind and/or connect" msgstr "" --#: booleans.py:95 --msgid "Allow httpd to access FUSE file systems" +-#: booleans.py:93 +-msgid "Unify HTTPD handling of all content files." +#: ../sepolicy/sepolicy.py:355 +msgid "query SELinux policy to see if domains can communicate with each other" msgstr "" --#: booleans.py:96 --msgid "Allow httpd to run gpg" +-#: booleans.py:94 +-msgid "Allow httpd to access cifs file systems" +#: ../sepolicy/sepolicy.py:358 +msgid "Source Domain" msgstr "" --#: booleans.py:97 --msgid "Allow httpd to access nfs file systems" +-#: booleans.py:95 +-msgid "Allow httpd to access FUSE file systems" +#: ../sepolicy/sepolicy.py:361 +msgid "Target Domain" msgstr "" --#: booleans.py:98 --msgid "Allow httpd to communicate with oddjob to start up a service" +-#: booleans.py:96 +-msgid "Allow httpd to run gpg" +#: ../sepolicy/sepolicy.py:380 +msgid "query SELinux Policy to see description of booleans" msgstr "" --#: booleans.py:99 --msgid "Allow httpd to access openstack ports" +-#: booleans.py:97 +-msgid "Allow httpd to access nfs file systems" +#: ../sepolicy/sepolicy.py:384 +msgid "get all booleans descriptions" msgstr "" --#: booleans.py:100 --msgid "Allow Apache to query NS records" +-#: booleans.py:98 +-msgid "Allow httpd to communicate with oddjob to start up a service" +#: ../sepolicy/sepolicy.py:387 +msgid "boolean to get description" msgstr "" --#: booleans.py:101 --msgid "Allow icecast to connect to all ports, not just sound ports." +-#: booleans.py:99 +-msgid "Allow httpd to access openstack ports" +#: ../sepolicy/sepolicy.py:397 +msgid "" +"query SELinux Policy to see how a source process domain can transition to " +"the target process domain" msgstr "" --#: booleans.py:102 --msgid "" --"Allow the Irssi IRC Client to connect to any port, and to bind to any " --"unreserved port." +-#: booleans.py:100 +-msgid "Allow Apache to query NS records" +#: ../sepolicy/sepolicy.py:400 +msgid "source process domain" msgstr "" --#: booleans.py:103 --msgid "Allow confined applications to run with kerberos." +-#: booleans.py:101 +-msgid "Allow icecast to connect to all ports, not just sound ports." +#: ../sepolicy/sepolicy.py:403 +msgid "target process domain" msgstr "" --#: booleans.py:104 --msgid "Allow syslogd daemon to send mail" +-#: booleans.py:102 +-msgid "" +-"Allow the Irssi IRC Client to connect to any port, and to bind to any " +-"unreserved port." +#: ../sepolicy/sepolicy.py:445 +#, python-format +msgid "sepolicy generate: error: one of the arguments %s is required" msgstr "" --#: booleans.py:105 --msgid "Allow syslogd the ability to read/write terminals" +-#: booleans.py:103 +-msgid "Allow confined applications to run with kerberos." +#: ../sepolicy/sepolicy.py:450 +msgid "Command required for this type of policy" msgstr "" --#: booleans.py:106 --msgid "Allow logging in and using the system from /dev/console." +-#: booleans.py:104 +-msgid "Allow syslogd daemon to send mail" +#: ../sepolicy/sepolicy.py:461 +msgid "" +"-t option can not be used with this option. Read usage for more details." msgstr "" --#: booleans.py:107 +-#: booleans.py:105 +-msgid "Allow syslogd the ability to read/write terminals" +#: ../sepolicy/sepolicy.py:466 - msgid "" --"Control the ability to mmap a low area of the address space, as configured " --"by /proc/sys/kernel/mmap_min_addr." ++msgid "" +"-d option can not be used with this option. Read usage for more details." msgstr "" --#: booleans.py:108 --msgid "Allow mock to read files in home directories." +-#: booleans.py:106 +-msgid "Allow logging in and using the system from /dev/console." +#: ../sepolicy/sepolicy.py:470 +msgid "" +"-a option can not be used with this option. Read usage for more details." msgstr "" --#: booleans.py:109 --msgid "Allow the mount command to mount any directory or file." +-#: booleans.py:107 +-msgid "" +-"Control the ability to mmap a low area of the address space, as configured " +-"by /proc/sys/kernel/mmap_min_addr." +#: ../sepolicy/sepolicy.py:490 +msgid "List SELinux Policy interfaces" msgstr "" --#: booleans.py:110 --msgid "Allow mozilla plugin domain to connect to the network using TCP." +-#: booleans.py:108 +-msgid "Allow mock to read files in home directories." +#: ../sepolicy/sepolicy.py:510 +msgid "Enter interface names, you wish to query" msgstr "" +-#: booleans.py:109 +-msgid "Allow the mount command to mount any directory or file." ++#: ../sepolicy/sepolicy.py:519 ++msgid "Generate SELinux Policy module template" + msgstr "" + +-#: booleans.py:110 +-msgid "Allow mozilla plugin domain to connect to the network using TCP." ++#: ../sepolicy/sepolicy.py:522 ++msgid "Enter domain type which you will be extending" + msgstr "" + -#: booleans.py:111 -msgid "" -"Allow mozilla_plugins to create random content in the users home directory" -+#: ../sepolicy/sepolicy.py:519 -+msgid "Generate SELinux Policy module template" - msgstr "" - --#: booleans.py:112 --msgid "Allow confined web browsers to read home directory content" -+#: ../sepolicy/sepolicy.py:522 -+msgid "Enter domain type which you will be extending" - msgstr "" - --#: booleans.py:113 --msgid "Allow mplayer executable stack" +#: ../sepolicy/sepolicy.py:525 +msgid "Enter SELinux user(s) which will transition to this domain" msgstr "" --#: booleans.py:114 --msgid "Allow mysqld to connect to all ports" +-#: booleans.py:112 +-msgid "Allow confined web browsers to read home directory content" +#: ../sepolicy/sepolicy.py:528 +msgid "Enter SELinux role(s) to which the administror domain will transition" msgstr "" --#: booleans.py:115 --msgid "Allow BIND to bind apache port." +-#: booleans.py:113 +-msgid "Allow mplayer executable stack" +#: ../sepolicy/sepolicy.py:531 +msgid "Enter domain(s) which this confined admin will administrate" msgstr "" +-#: booleans.py:114 +-msgid "Allow mysqld to connect to all ports" ++#: ../sepolicy/sepolicy.py:534 ++msgid "name of policy to generate" + msgstr "" + +-#: booleans.py:115 +-msgid "Allow BIND to bind apache port." ++#: ../sepolicy/sepolicy.py:541 ++msgid "path in which the generated policy files will be stored" + msgstr "" + -#: booleans.py:116 -msgid "" -"Allow BIND to write the master zone files. Generally this is used for " -"dynamic DNS or zone transfers." -+#: ../sepolicy/sepolicy.py:534 -+msgid "name of policy to generate" - msgstr "" - --#: booleans.py:117 --msgid "Allow any files/directories to be exported read/only via NFS." -+#: ../sepolicy/sepolicy.py:541 -+msgid "path in which the generated policy files will be stored" - msgstr "" - --#: booleans.py:118 --msgid "Allow any files/directories to be exported read/write via NFS." +#: ../sepolicy/sepolicy.py:543 +msgid "path to which the confined processes will need to write" msgstr "" --#: booleans.py:119 --msgid "" --"Allow nfs servers to modify public files used for public file transfer " --"services. Files/Directories must be labeled public_content_rw_t." +-#: booleans.py:117 +-msgid "Allow any files/directories to be exported read/only via NFS." +#: ../sepolicy/sepolicy.py:544 +msgid "Policy types which require a command" msgstr "" --#: booleans.py:120 --msgid "Allow system to run with NIS" +-#: booleans.py:118 +-msgid "Allow any files/directories to be exported read/write via NFS." +#: ../sepolicy/sepolicy.py:548 ../sepolicy/sepolicy.py:551 +#: ../sepolicy/sepolicy.py:554 ../sepolicy/sepolicy.py:557 +#: ../sepolicy/sepolicy.py:560 ../sepolicy/sepolicy.py:566 @@ -4241,163 +4316,169 @@ index 961d921..3bb642f 100644 +msgid "Generate '%s' policy" msgstr "" --#: booleans.py:121 --msgid "Allow confined applications to use nscd shared memory." +-#: booleans.py:119 +-msgid "" +-"Allow nfs servers to modify public files used for public file transfer " +-"services. Files/Directories must be labeled public_content_rw_t." +#: ../sepolicy/sepolicy.py:575 +#, python-format +msgid "Generate '%s' policy " msgstr "" --#: booleans.py:122 --msgid "Allow openshift to lockdown app" +-#: booleans.py:120 +-msgid "Allow system to run with NIS" +#: ../sepolicy/sepolicy.py:589 +msgid "executable to confine" msgstr "" --#: booleans.py:123 --msgid "Allow openvpn to read home directories" +-#: booleans.py:121 +-msgid "Allow confined applications to use nscd shared memory." +#: ../sepolicy/sepolicy.py:594 +msgid "commands" msgstr "" --#: booleans.py:124 --msgid "Allow piranha-lvs domain to connect to the network using TCP." +-#: booleans.py:122 +-msgid "Allow openshift to lockdown app" +#: ../sepolicy/sepolicy.py:597 +msgid "Alternate SELinux policy, defaults to /sys/fs/selinux/policy" msgstr "" --#: booleans.py:125 --msgid "Allow polipo to connect to all ports > 1023" +-#: booleans.py:123 +-msgid "Allow openvpn to read home directories" +#: ../sepolicy/sepolicy/__init__.py:167 ../sepolicy/sepolicy/gui.py:479 +msgid "all files" msgstr "" +-#: booleans.py:124 +-msgid "Allow piranha-lvs domain to connect to the network using TCP." ++#: ../sepolicy/sepolicy/__init__.py:168 ++msgid "regular file" + msgstr "" + +-#: booleans.py:125 +-msgid "Allow polipo to connect to all ports > 1023" ++#: ../sepolicy/sepolicy/__init__.py:169 ++msgid "directory" + msgstr "" + -#: booleans.py:126 -msgid "" -"Determine whether Polipo session daemon can bind tcp sockets to all " -"unreserved ports." -+#: ../sepolicy/sepolicy/__init__.py:168 -+msgid "regular file" ++#: ../sepolicy/sepolicy/__init__.py:170 ++msgid "character device" msgstr "" -#: booleans.py:127 -msgid "" -"Determine whether calling user domains can execute Polipo daemon in the " -"polipo_session_t domain." -+#: ../sepolicy/sepolicy/__init__.py:169 -+msgid "directory" - msgstr "" - --#: booleans.py:128 --msgid "Determine whether polipo can access cifs file systems." -+#: ../sepolicy/sepolicy/__init__.py:170 -+msgid "character device" - msgstr "" - --#: booleans.py:129 --msgid "Determine whether Polipo can access nfs file systems." +#: ../sepolicy/sepolicy/__init__.py:171 +msgid "block device" msgstr "" --#: booleans.py:130 --msgid "Enable polyinstantiated directory support." +-#: booleans.py:128 +-msgid "Determine whether polipo can access cifs file systems." +#: ../sepolicy/sepolicy/__init__.py:172 +msgid "socket file" msgstr "" --#: booleans.py:131 --msgid "Allow postfix_local domain full write access to mail_spool directories" +-#: booleans.py:129 +-msgid "Determine whether Polipo can access nfs file systems." +#: ../sepolicy/sepolicy/__init__.py:173 +msgid "symbolic link" msgstr "" --#: booleans.py:132 --msgid "Allow postgresql to use ssh and rsync for point-in-time recovery" +-#: booleans.py:130 +-msgid "Enable polyinstantiated directory support." +#: ../sepolicy/sepolicy/__init__.py:174 +msgid "named pipe" msgstr "" --#: booleans.py:133 --msgid "Allow transmit client label to foreign database" +-#: booleans.py:131 +-msgid "Allow postfix_local domain full write access to mail_spool directories" +#: ../sepolicy/sepolicy/__init__.py:306 +msgid "No SELinux Policy installed" msgstr "" --#: booleans.py:134 --msgid "Allow database admins to execute DML statement" +-#: booleans.py:132 +-msgid "Allow postgresql to use ssh and rsync for point-in-time recovery" +#: ../sepolicy/sepolicy/__init__.py:386 +msgid "You must regenerate interface info by running /usr/bin/sepolgen-ifgen" msgstr "" --#: booleans.py:135 --msgid "Allow unprivileged users to execute DDL statement" +-#: booleans.py:133 +-msgid "Allow transmit client label to foreign database" +#: ../sepolicy/sepolicy/__init__.py:591 +#, python-format +msgid "Failed to read %s policy file" msgstr "" --#: booleans.py:136 --msgid "Allow pppd to load kernel modules for certain modems" +-#: booleans.py:134 +-msgid "Allow database admins to execute DML statement" +#: ../sepolicy/sepolicy/__init__.py:695 +msgid "unknown" msgstr "" --#: booleans.py:137 --msgid "Allow pppd to be run for a regular user" +-#: booleans.py:135 +-msgid "Allow unprivileged users to execute DDL statement" +#: ../sepolicy/sepolicy/generate.py:132 +msgid "Internet Services Daemon" msgstr "" +-#: booleans.py:136 +-msgid "Allow pppd to load kernel modules for certain modems" ++#: ../sepolicy/sepolicy/generate.py:136 ++msgid "Existing Domain Type" + msgstr "" + +-#: booleans.py:137 +-msgid "Allow pppd to be run for a regular user" ++#: ../sepolicy/sepolicy/generate.py:137 ++msgid "Minimal Terminal Login User Role" + msgstr "" + -#: booleans.py:138 -msgid "" -"Allow privoxy to connect to all ports, not just HTTP, FTP, and Gopher ports." -+#: ../sepolicy/sepolicy/generate.py:136 -+msgid "Existing Domain Type" - msgstr "" - --#: booleans.py:139 --msgid "Allow Puppet client to manage all file types." -+#: ../sepolicy/sepolicy/generate.py:137 -+msgid "Minimal Terminal Login User Role" - msgstr "" - --#: booleans.py:140 --msgid "Allow Puppet master to use connect to MySQL and PostgreSQL database" +#: ../sepolicy/sepolicy/generate.py:138 +msgid "Minimal X Windows Login User Role" msgstr "" --#: booleans.py:141 --msgid "Allow racoon to read shadow" +-#: booleans.py:139 +-msgid "Allow Puppet client to manage all file types." +#: ../sepolicy/sepolicy/generate.py:139 +msgid "Desktop Login User Role" msgstr "" --#: booleans.py:142 --msgid "Allow rgmanager domain to connect to the network using TCP." +-#: booleans.py:140 +-msgid "Allow Puppet master to use connect to MySQL and PostgreSQL database" +#: ../sepolicy/sepolicy/generate.py:140 +msgid "Administrator Login User Role" msgstr "" +-#: booleans.py:141 +-msgid "Allow racoon to read shadow" ++#: ../sepolicy/sepolicy/generate.py:141 ++msgid "Confined Root Administrator Role" + msgstr "" + +-#: booleans.py:142 +-msgid "Allow rgmanager domain to connect to the network using TCP." ++#: ../sepolicy/sepolicy/generate.py:142 ++msgid "Module information for a new type" + msgstr "" + -#: booleans.py:143 -msgid "" -"Allow rsync to modify public files used for public file transfer services. " -"Files/Directories must be labeled public_content_rw_t." -+#: ../sepolicy/sepolicy/generate.py:141 -+msgid "Confined Root Administrator Role" ++#: ../sepolicy/sepolicy/generate.py:147 ++msgid "Valid Types:\n" msgstr "" -#: booleans.py:144 -msgid "Allow rsync to run as a client" -+#: ../sepolicy/sepolicy/generate.py:142 -+msgid "Module information for a new type" -+msgstr "" -+ -+#: ../sepolicy/sepolicy/generate.py:147 -+msgid "Valid Types:\n" -+msgstr "" -+ +#: ../sepolicy/sepolicy/generate.py:181 +#, python-format +msgid "Ports must be numbers or ranges of numbers from 1 to %d " @@ -4853,8 +4934,8 @@ index 961d921..3bb642f 100644 +#: ../sepolicy/sepolicy/sepolicy.glade:1280 +#: ../sepolicy/sepolicy/sepolicy.glade:1337 +msgid "" -+"Executables which will transition to the 'selected domain', when executing a " -+"selected domains entrypoint." ++"Executables which will transition to the 'selected domain', when executing a" ++" selected domains entrypoint." msgstr "" -#: booleans.py:208 @@ -5086,18 +5167,39 @@ index 961d921..3bb642f 100644 +msgid "Boolean %s Allow Rules" msgstr "" diff --git a/policycoreutils/po/am.po b/policycoreutils/po/am.po -index 961d921..3bb642f 100644 +index 961d921..2a3ad0d 100644 --- a/policycoreutils/po/am.po +++ b/policycoreutils/po/am.po -@@ -8,7 +8,7 @@ msgid "" +@@ -1,21 +1,21 @@ + # SOME DESCRIPTIVE TITLE. + # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER + # This file is distributed under the same license as the PACKAGE package. +-# FIRST AUTHOR , YEAR. +-# +-#, fuzzy ++# ++# Translators: + msgid "" msgstr "" - "Project-Id-Version: PACKAGE VERSION\n" +-"Project-Id-Version: PACKAGE VERSION\n" ++"Project-Id-Version: Policycoreutils\n" "Report-Msgid-Bugs-To: \n" -"POT-Creation-Date: 2013-01-04 12:01-0500\n" +-"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" +"POT-Creation-Date: 2013-07-10 16:36-0400\n" - "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" ++"PO-Revision-Date: 2012-03-30 18:14+0000\n" "Last-Translator: FULL NAME \n" - "Language-Team: LANGUAGE \n" +-"Language-Team: LANGUAGE \n" +-"Language: \n" ++"Language-Team: Amharic (http://www.transifex.com/projects/p/fedora/language/am/)\n" + "MIME-Version: 1.0\n" + "Content-Type: text/plain; charset=UTF-8\n" + "Content-Transfer-Encoding: 8bit\n" ++"Language: am\n" ++"Plural-Forms: nplurals=2; plural=(n > 1);\n" + + #: ../run_init/run_init.c:67 + msgid "" @@ -24,7 +24,7 @@ msgid "" " are the arguments to that script." msgstr "" @@ -5125,7 +5227,7 @@ index 961d921..3bb642f 100644 msgid "Could not list SELinux modules" msgstr "" -@@ -142,814 +142,829 @@ msgstr "" +@@ -142,814 +142,830 @@ msgstr "" msgid "Disabled" msgstr "" @@ -5928,7 +6030,9 @@ index 961d921..3bb642f 100644 +#: ../semanage/seobject.py:1758 #, python-format msgid "" - "File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' instead" +-"File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' instead" ++"File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' " ++"instead" msgstr "" -#: ../semanage/seobject.py:1755 @@ -6147,7 +6251,7 @@ index 961d921..3bb642f 100644 msgid "Description" msgstr "" -@@ -988,206 +1003,226 @@ msgstr "" +@@ -988,206 +1004,226 @@ msgstr "" msgid "Unable to clear environment\n" msgstr "" @@ -6415,7 +6519,7 @@ index 961d921..3bb642f 100644 msgid "failed to exec shell\n" msgstr "" -@@ -1414,7 +1449,7 @@ msgstr "" +@@ -1414,7 +1450,7 @@ msgstr "" msgid "Applications" msgstr "" @@ -6424,7 +6528,7 @@ index 961d921..3bb642f 100644 msgid "Standard Init Daemon" msgstr "" -@@ -1424,7 +1459,7 @@ msgid "" +@@ -1424,7 +1460,7 @@ msgid "" "requires a script in /etc/rc.d/init.d" msgstr "" @@ -6433,7 +6537,7 @@ index 961d921..3bb642f 100644 msgid "DBUS System Daemon" msgstr "" -@@ -1436,7 +1471,7 @@ msgstr "" +@@ -1436,7 +1472,7 @@ msgstr "" msgid "Internet Services Daemon are daemons started by xinetd" msgstr "" @@ -6442,7 +6546,7 @@ index 961d921..3bb642f 100644 msgid "Web Application/Script (CGI)" msgstr "" -@@ -1445,7 +1480,7 @@ msgid "" +@@ -1445,7 +1481,7 @@ msgid "" "Web Applications/Script (CGI) CGI scripts started by the web server (apache)" msgstr "" @@ -6451,7 +6555,7 @@ index 961d921..3bb642f 100644 msgid "User Application" msgstr "" -@@ -1455,7 +1490,7 @@ msgid "" +@@ -1455,7 +1491,7 @@ msgid "" "started by a user" msgstr "" @@ -6460,7 +6564,29 @@ index 961d921..3bb642f 100644 msgid "Sandbox" msgstr "" -@@ -1530,7 +1565,8 @@ msgstr "" +@@ -1507,8 +1543,8 @@ msgstr "" + + #: ../gui/polgen.glade:550 + msgid "" +-"User with full networking, no setuid applications without transition, no su, " +-"can sudo to Root Administration Roles" ++"User with full networking, no setuid applications without transition, no su," ++" can sudo to Root Administration Roles" + msgstr "" + + #: ../gui/polgen.glade:592 +@@ -1521,8 +1557,8 @@ msgstr "" + + #: ../gui/polgen.glade:627 + msgid "" +-"Select Root Administrator User Role, if this user will be used to administer " +-"the machine while running as root. This user will not be able to login to " ++"Select Root Administrator User Role, if this user will be used to administer" ++" the machine while running as root. This user will not be able to login to " + "the system directly." + msgstr "" + +@@ -1530,7 +1566,8 @@ msgstr "" msgid "Enter name of application or user role:" msgstr "" @@ -6470,7 +6596,17 @@ index 961d921..3bb642f 100644 msgid "Name" msgstr "" -@@ -1745,75 +1781,75 @@ msgstr "" +@@ -1590,7 +1627,8 @@ msgid "Select the user_roles that will transition to %s:" + msgstr "" + + #: ../gui/polgen.glade:1019 +-msgid "Select the user roles that will transiton to this applications domains." ++msgid "" ++"Select the user roles that will transiton to this applications domains." + msgstr "" + + #: ../gui/polgen.glade:1056 +@@ -1745,75 +1783,75 @@ msgstr "" msgid "Policy Directory" msgstr "" @@ -6562,7 +6698,7 @@ index 961d921..3bb642f 100644 msgid "Configue SELinux" msgstr "" -@@ -1828,6 +1864,8 @@ msgid "" +@@ -1828,6 +1866,8 @@ msgid "" msgstr "" #: ../gui/portsPage.py:91 ../gui/system-config-selinux.glade:363 @@ -6571,7 +6707,7 @@ index 961d921..3bb642f 100644 msgid "Protocol" msgstr "" -@@ -1837,7 +1875,8 @@ msgid "" +@@ -1837,7 +1877,8 @@ msgid "" "Level" msgstr "" @@ -6581,7 +6717,18 @@ index 961d921..3bb642f 100644 msgid "Port" msgstr "" -@@ -1967,6 +2006,9 @@ msgid "SELinux Administration" +@@ -1899,8 +1940,8 @@ msgid "" + "you later decide to turn SELinux back on, the system will be required to " + "relabel. If you just want to see if SELinux is causing a problem on your " + "system, you can go to permissive mode which will only log errors and not " +-"enforce SELinux policy. Permissive mode does not require a reboot Do you " +-"wish to continue?" ++"enforce SELinux policy. Permissive mode does not require a reboot Do you" ++" wish to continue?" + msgstr "" + + #: ../gui/statusPage.py:152 +@@ -1967,6 +2008,9 @@ msgid "SELinux Administration" msgstr "" #: ../gui/system-config-selinux.glade:1122 @@ -6591,7 +6738,7 @@ index 961d921..3bb642f 100644 msgid "Add" msgstr "" -@@ -2036,6 +2078,10 @@ msgstr "" +@@ -2036,6 +2080,10 @@ msgstr "" #: ../gui/system-config-selinux.glade:2467 #: ../gui/system-config-selinux.glade:2692 #: ../gui/system-config-selinux.glade:2867 @@ -6602,7 +6749,18 @@ index 961d921..3bb642f 100644 msgid "Filter" msgstr "" -@@ -2159,1315 +2205,1864 @@ msgstr "" +@@ -2130,8 +2178,8 @@ msgstr "" + + #: ../gui/system-config-selinux.glade:2661 + msgid "" +-"Enable/Disable additional audit rules, that are normally not reported in the " +-"log files." ++"Enable/Disable additional audit rules, that are normally not reported in the" ++" log files." + msgstr "" + + #: ../gui/system-config-selinux.glade:2781 +@@ -2159,1315 +2207,1869 @@ msgstr "" msgid "SELinux user '%s' is required" msgstr "" @@ -6780,8 +6938,9 @@ index 961d921..3bb642f 100644 -msgid "name of policy to generate" +#: booleans.py:27 +msgid "" -+"Deny user domains applications to map a memory region as both executable and " -+"writable, this is dangerous and the executable should be reported in bugzilla" ++"Deny user domains applications to map a memory region as both executable and" ++" writable, this is dangerous and the executable should be reported in " ++"bugzilla" msgstr "" -#: ../sepolicy/sepolicy.py:378 @@ -6884,8 +7043,8 @@ index 961d921..3bb642f 100644 -msgid "Confined Root Administrator Role" +#: booleans.py:42 +msgid "" -+"Determine whether ftpd can modify public files used for public file transfer " -+"services. Directories/Files must be labeled public_content_rw_t." ++"Determine whether ftpd can modify public files used for public file transfer" ++" services. Directories/Files must be labeled public_content_rw_t." msgstr "" -#: ../sepolicy/sepolicy/generate.py:187 @@ -6915,151 +7074,149 @@ index 961d921..3bb642f 100644 +#: booleans.py:46 +msgid "" +"Determine whether ftpd can use CIFS used for public file transfer services." - msgstr "" - --#: ../sepolicy/sepolicy/generate.py:355 --msgid "" --"Name must be alpha numberic with no spaces. Consider using option \"-n " --"MODULENAME\"" ++msgstr "" ++ +#: booleans.py:47 booleans.py:170 +msgid "Allow samba to export ntfs/fusefs volumes." msgstr "" --#: ../sepolicy/sepolicy/generate.py:447 --msgid "User Role types can not be assigned executables." +-#: ../sepolicy/sepolicy/generate.py:355 +#: booleans.py:48 -+msgid "" + msgid "" +-"Name must be alpha numberic with no spaces. Consider using option \"-n " +-"MODULENAME\"" +"Determine whether ftpd can use NFS used for public file transfer services." msgstr "" --#: ../sepolicy/sepolicy/generate.py:453 --msgid "Only Daemon apps can use an init script.." +-#: ../sepolicy/sepolicy/generate.py:447 +-msgid "User Role types can not be assigned executables." +#: booleans.py:49 +msgid "" +"Determine whether ftpd can bind to all unreserved ports for passive mode." msgstr "" --#: ../sepolicy/sepolicy/generate.py:471 --msgid "use_resolve must be a boolean value " +-#: ../sepolicy/sepolicy/generate.py:453 +-msgid "Only Daemon apps can use an init script.." +#: booleans.py:50 +msgid "Determine whether Git CGI can search home directories." msgstr "" --#: ../sepolicy/sepolicy/generate.py:477 --msgid "use_syslog must be a boolean value " +-#: ../sepolicy/sepolicy/generate.py:471 +-msgid "use_resolve must be a boolean value " +#: booleans.py:51 +msgid "Determine whether Git CGI can access cifs file systems." msgstr "" --#: ../sepolicy/sepolicy/generate.py:483 --msgid "use_kerberos must be a boolean value " +-#: ../sepolicy/sepolicy/generate.py:477 +-msgid "use_syslog must be a boolean value " +#: booleans.py:52 +msgid "Determine whether Git CGI can access nfs file systems." msgstr "" --#: ../sepolicy/sepolicy/generate.py:489 --msgid "manage_krb5_rcache must be a boolean value " +-#: ../sepolicy/sepolicy/generate.py:483 +-msgid "use_kerberos must be a boolean value " +#: booleans.py:53 +msgid "" +"Determine whether Git session daemon can bind TCP sockets to all unreserved " +"ports." msgstr "" --#: ../sepolicy/sepolicy/generate.py:519 --msgid "USER Types automatically get a tmp type" +-#: ../sepolicy/sepolicy/generate.py:489 +-msgid "manage_krb5_rcache must be a boolean value " +#: booleans.py:54 +msgid "" +"Determine whether calling user domains can execute Git daemon in the " +"git_session_t domain." msgstr "" --#: ../sepolicy/sepolicy/generate.py:857 --#, python-format --msgid "%s policy modules require existing domains" +-#: ../sepolicy/sepolicy/generate.py:519 +-msgid "USER Types automatically get a tmp type" +#: booleans.py:55 +msgid "Determine whether Git system daemon can search home directories." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1059 --msgid "You must enter the executable path for your confined process" +-#: ../sepolicy/sepolicy/generate.py:857 +-#, python-format +-msgid "%s policy modules require existing domains" +#: booleans.py:56 +msgid "Determine whether Git system daemon can access cifs file systems." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1321 --msgid "Type Enforcement file" +-#: ../sepolicy/sepolicy/generate.py:1059 +-msgid "You must enter the executable path for your confined process" +#: booleans.py:57 +msgid "Determine whether Git system daemon can access nfs file systems." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1322 --msgid "Interface file" +-#: ../sepolicy/sepolicy/generate.py:1321 +-msgid "Type Enforcement file" +#: booleans.py:58 +msgid "Determine whether Gitosis can send mail." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1323 --msgid "File Contexts file" +-#: ../sepolicy/sepolicy/generate.py:1322 +-msgid "Interface file" +#: booleans.py:59 +msgid "Enable reading of urandom for all domains." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1324 --msgid "Spec file" +-#: ../sepolicy/sepolicy/generate.py:1323 +-msgid "File Contexts file" +#: booleans.py:60 +msgid "" +"Allow glusterfsd to modify public files used for public file transfer " +"services. Files/Directories must be labeled public_content_rw_t." msgstr "" --#: ../sepolicy/sepolicy/generate.py:1325 --msgid "Setup Script" +-#: ../sepolicy/sepolicy/generate.py:1324 +-msgid "Spec file" +#: booleans.py:61 +msgid "Allow glusterfsd to share any file/directory read only." msgstr "" --#: booleans.py:1 --msgid "" --"Allow ABRT to modify public files used for public file transfer services." +-#: ../sepolicy/sepolicy/generate.py:1325 +-msgid "Setup Script" +#: booleans.py:62 +msgid "Allow glusterfsd to share any file/directory read/write." msgstr "" --#: booleans.py:2 +-#: booleans.py:1 +#: booleans.py:63 msgid "" --"Allow ABRT to run in abrt_handle_event_t domain to handle ABRT event scripts" +-"Allow ABRT to modify public files used for public file transfer services." +"Allow usage of the gpg-agent --write-env-file option. This also allows gpg-" +"agent to manage user files." msgstr "" --#: booleans.py:3 --msgid "Allow amavis to use JIT compiler" +-#: booleans.py:2 +#: booleans.py:64 -+msgid "" + msgid "" +-"Allow ABRT to run in abrt_handle_event_t domain to handle ABRT event scripts" +"Allow gpg web domain to modify public files used for public file transfer " +"services." msgstr "" --#: booleans.py:4 --msgid "Allow antivirus programs to read non security files on a system" +-#: booleans.py:3 +-msgid "Allow amavis to use JIT compiler" +#: booleans.py:65 +msgid "Allow gssd to read temp directory. For access to kerberos tgt." msgstr "" --#: booleans.py:5 --msgid "Allow auditadm to exec content" +-#: booleans.py:4 +-msgid "Allow antivirus programs to read non security files on a system" +#: booleans.py:66 +msgid "Allow guest to exec content" msgstr "" --#: booleans.py:6 +-#: booleans.py:5 +-msgid "Allow auditadm to exec content" +#: booleans.py:67 +msgid "" +"Allow Apache to modify public files used for public file transfer services. " +"Directories/Files must be labeled public_content_rw_t." -+msgstr "" -+ + msgstr "" + +-#: booleans.py:6 +#: booleans.py:68 +msgid "Allow httpd to use built in scripting (usually php)" +msgstr "" @@ -7091,7 +7248,8 @@ index 961d921..3bb642f 100644 +msgstr "" + +#: booleans.py:75 -+msgid "Allow HTTPD scripts and modules to connect to cobbler over the network." ++msgid "" ++"Allow HTTPD scripts and modules to connect to cobbler over the network." +msgstr "" + +#: booleans.py:76 @@ -7585,7 +7743,8 @@ index 961d921..3bb642f 100644 +#: booleans.py:185 msgid "" -"Allow Cobbler to modify public files used for public file transfer services." -+"Allow confined users the ability to execute the ping and traceroute commands." ++"Allow confined users the ability to execute the ping and traceroute " ++"commands." msgstr "" -#: booleans.py:15 @@ -7612,8 +7771,8 @@ index 961d921..3bb642f 100644 -msgid "Allow collectd to connect to the network using TCP." +#: booleans.py:189 +msgid "" -+"Allow users to run TCP servers (bind to ports and accept connection from the " -+"same domain and outside users) disabling this forces FTP passive mode and " ++"Allow users to run TCP servers (bind to ports and accept connection from the" ++" same domain and outside users) disabling this forces FTP passive mode and " +"may change other protocols." msgstr "" @@ -7740,7 +7899,8 @@ index 961d921..3bb642f 100644 -#: booleans.py:35 -msgid "Allow the use of the audio devices as the source for the entropy feeds" +#: booleans.py:209 -+msgid "Allow the Telepathy connection managers to connect to any network port." ++msgid "" ++"Allow the Telepathy connection managers to connect to any network port." msgstr "" -#: booleans.py:36 @@ -7858,8 +8018,8 @@ index 961d921..3bb642f 100644 -msgid "Determine whether Git CGI can access nfs file systems." +#: booleans.py:227 +msgid "" -+"Determine whether attempts by vbetool to mmap low regions should be silently " -+"blocked." ++"Determine whether attempts by vbetool to mmap low regions should be silently" ++" blocked." msgstr "" -#: booleans.py:54 @@ -7906,20 +8066,12 @@ index 961d921..3bb642f 100644 -msgid "Enable reading of urandom for all domains." +#: booleans.py:234 +msgid "Allow confined virtual guests to interact with the sanlock" - msgstr "" - --#: booleans.py:61 --msgid "" --"Allow usage of the gpg-agent --write-env-file option. This also allows gpg-" --"agent to manage user files." ++msgstr "" ++ +#: booleans.py:235 +msgid "Allow confined virtual guests to use usb devices" - msgstr "" - --#: booleans.py:62 --msgid "" --"Allow gpg web domain to modify public files used for public file transfer " --"services." ++msgstr "" ++ +#: booleans.py:236 +msgid "Allow confined virtual guests to interact with the xserver" +msgstr "" @@ -7932,382 +8084,386 @@ index 961d921..3bb642f 100644 +msgid "Determine whether webadm can read generic user files." msgstr "" --#: booleans.py:63 --msgid "Allow gssd to read temp directory. For access to kerberos tgt." +-#: booleans.py:61 +#: booleans.py:239 -+msgid "" + msgid "" +-"Allow usage of the gpg-agent --write-env-file option. This also allows gpg-" +-"agent to manage user files." +"Determine whether attempts by wine to mmap low regions should be silently " +"blocked." msgstr "" --#: booleans.py:64 --msgid "Allow guest to exec content" +-#: booleans.py:62 +-msgid "" +-"Allow gpg web domain to modify public files used for public file transfer " +-"services." +#: booleans.py:240 +msgid "Allow the graphical login program to execute bootloader" msgstr "" --#: booleans.py:65 +-#: booleans.py:63 +-msgid "Allow gssd to read temp directory. For access to kerberos tgt." +#: booleans.py:241 - msgid "" --"Allow Apache to modify public files used for public file transfer services. " --"Directories/Files must be labeled public_content_rw_t." ++msgid "" +"Allow the graphical login program to login directly as sysadm_r:sysadm_t" msgstr "" --#: booleans.py:66 --msgid "Allow httpd to use built in scripting (usually php)" +-#: booleans.py:64 +-msgid "Allow guest to exec content" +#: booleans.py:242 +msgid "" -+"Allow the graphical login program to create files in HOME dirs as xdm_home_t." ++"Allow the graphical login program to create files in HOME dirs as " ++"xdm_home_t." msgstr "" --#: booleans.py:67 --msgid "Allow http daemon to check spam" +-#: booleans.py:65 +-msgid "" +-"Allow Apache to modify public files used for public file transfer services. " +-"Directories/Files must be labeled public_content_rw_t." +#: booleans.py:243 +msgid "Allow xen to manage nfs files" msgstr "" --#: booleans.py:68 +-#: booleans.py:66 +-msgid "Allow httpd to use built in scripting (usually php)" +#: booleans.py:244 - msgid "" --"Allow httpd to act as a FTP client connecting to the ftp port and ephemeral " --"ports" ++msgid "" +"Allow xend to run blktapctrl/tapdisk. Not required if using dedicated " +"logical volumes for disk images." msgstr "" --#: booleans.py:69 --msgid "Allow httpd to connect to the ldap port" +-#: booleans.py:67 +-msgid "Allow http daemon to check spam" +#: booleans.py:245 +msgid "Allow xend to run qemu-dm. Not required if using paravirt and no vfb." msgstr "" --#: booleans.py:70 --msgid "Allow http daemon to connect to zabbix" +-#: booleans.py:68 +#: booleans.py:246 -+msgid "" + msgid "" +-"Allow httpd to act as a FTP client connecting to the ftp port and ephemeral " +-"ports" +"Allow xguest users to configure Network Manager and connect to apache ports" msgstr "" --#: booleans.py:71 --msgid "Allow HTTPD scripts and modules to connect to the network using TCP." +-#: booleans.py:69 +-msgid "Allow httpd to connect to the ldap port" +#: booleans.py:247 +msgid "Allow xguest to exec content" msgstr "" --#: booleans.py:72 --msgid "Allow HTTPD scripts and modules to connect to cobbler over the network." +-#: booleans.py:70 +-msgid "Allow http daemon to connect to zabbix" +#: booleans.py:248 +msgid "Allow xguest users to mount removable media" msgstr "" +-#: booleans.py:71 +-msgid "Allow HTTPD scripts and modules to connect to the network using TCP." ++#: booleans.py:249 ++msgid "Allow xguest to use blue tooth devices" + msgstr "" + +-#: booleans.py:72 +-msgid "Allow HTTPD scripts and modules to connect to cobbler over the network." ++#: booleans.py:250 ++msgid "Allows clients to write to the X server shared memory segments." + msgstr "" + -#: booleans.py:73 -msgid "" -"Allow HTTPD scripts and modules to connect to databases over the network." -+#: booleans.py:249 -+msgid "Allow xguest to use blue tooth devices" - msgstr "" - --#: booleans.py:74 --msgid "Allow httpd to connect to memcache server" -+#: booleans.py:250 -+msgid "Allows clients to write to the X server shared memory segments." - msgstr "" - --#: booleans.py:75 --msgid "Allow httpd to act as a relay" +#: booleans.py:251 +msgid "Allows XServer to execute writable memory" msgstr "" --#: booleans.py:76 --msgid "Allow http daemon to send mail" +-#: booleans.py:74 +-msgid "Allow httpd to connect to memcache server" +#: booleans.py:252 +msgid "Support X userspace object manager" msgstr "" --#: booleans.py:77 --msgid "Allow Apache to communicate with avahi service via dbus" +-#: booleans.py:75 +-msgid "Allow httpd to act as a relay" +#: booleans.py:253 +msgid "Determine whether zabbix can connect to all TCP ports" msgstr "" --#: booleans.py:78 --msgid "Allow httpd cgi support" +-#: booleans.py:76 +-msgid "Allow http daemon to send mail" +#: booleans.py:254 +msgid "Allow zebra daemon to write it configuration files" msgstr "" --#: booleans.py:79 --msgid "Allow httpd to act as a FTP server by listening on the ftp port." +-#: booleans.py:77 +-msgid "Allow Apache to communicate with avahi service via dbus" +#: booleans.py:255 +msgid "" +"Allow ZoneMinder to modify public files used for public file transfer " +"services." msgstr "" --#: booleans.py:80 --msgid "Allow httpd to read home directories" +-#: booleans.py:78 +-msgid "Allow httpd cgi support" +#: booleans.py:256 +msgid "Allow ZoneMinder to run su/sudo." msgstr "" --#: booleans.py:81 --msgid "Allow httpd scripts and modules execmem/execstack" +-#: booleans.py:79 +-msgid "Allow httpd to act as a FTP server by listening on the ftp port." +#: ../sepolicy/sepolicy.py:194 +#, python-format +msgid "Interface %s does not exist." msgstr "" --#: booleans.py:82 --msgid "Allow HTTPD to connect to port 80 for graceful shutdown" +-#: booleans.py:80 +-msgid "Allow httpd to read home directories" +#: ../sepolicy/sepolicy.py:281 +msgid "Graphical User Interface for SELinux Policy" msgstr "" --#: booleans.py:83 --msgid "Allow httpd processes to manage IPA content" +-#: booleans.py:81 +-msgid "Allow httpd scripts and modules execmem/execstack" +#: ../sepolicy/sepolicy.py:305 +msgid "Generate SELinux man pages" msgstr "" --#: booleans.py:84 --msgid "Allow Apache to use mod_auth_ntlm_winbind" +-#: booleans.py:82 +-msgid "Allow HTTPD to connect to port 80 for graceful shutdown" +#: ../sepolicy/sepolicy.py:308 +msgid "path in which the generated SELinux man pages will be stored" msgstr "" --#: booleans.py:85 --msgid "Allow Apache to use mod_auth_pam" +-#: booleans.py:83 +-msgid "Allow httpd processes to manage IPA content" +#: ../sepolicy/sepolicy.py:310 +msgid "name of the OS for man pages" msgstr "" --#: booleans.py:86 --msgid "Allow httpd to read user content" +-#: booleans.py:84 +-msgid "Allow Apache to use mod_auth_ntlm_winbind" +#: ../sepolicy/sepolicy.py:312 +msgid "Generate HTML man pages structure for selected SELinux man page" msgstr "" --#: booleans.py:87 --msgid "Allow Apache to run in stickshift mode, not transition to passenger" +-#: booleans.py:85 +-msgid "Allow Apache to use mod_auth_pam" +#: ../sepolicy/sepolicy.py:314 +msgid "Alternate root directory, defaults to /" msgstr "" --#: booleans.py:88 --msgid "Allow httpd daemon to change its resource limits" +-#: booleans.py:86 +-msgid "Allow httpd to read user content" +#: ../sepolicy/sepolicy.py:318 +msgid "All domains" msgstr "" +-#: booleans.py:87 +-msgid "Allow Apache to run in stickshift mode, not transition to passenger" ++#: ../sepolicy/sepolicy.py:321 ++msgid "Domain name(s) of man pages to be created" + msgstr "" + +-#: booleans.py:88 +-msgid "Allow httpd daemon to change its resource limits" ++#: ../sepolicy/sepolicy.py:326 ++msgid "Query SELinux policy network information" + msgstr "" + -#: booleans.py:89 -msgid "" -"Allow HTTPD to run SSI executables in the same domain as system CGI scripts." -+#: ../sepolicy/sepolicy.py:321 -+msgid "Domain name(s) of man pages to be created" ++#: ../sepolicy/sepolicy.py:331 ++msgid "list all SELinux port types" msgstr "" -#: booleans.py:90 -msgid "" -"Allow apache scripts to write to public content, directories/files must be " -"labeled public_rw_content_t." -+#: ../sepolicy/sepolicy.py:326 -+msgid "Query SELinux policy network information" ++#: ../sepolicy/sepolicy.py:334 ++msgid "show SELinux type related to the port" msgstr "" -#: booleans.py:91 -msgid "Allow Apache to execute tmp content." -+#: ../sepolicy/sepolicy.py:331 -+msgid "list all SELinux port types" ++#: ../sepolicy/sepolicy.py:337 ++msgid "Show ports defined for this SELinux type" msgstr "" -#: booleans.py:92 -msgid "" -"Unify HTTPD to communicate with the terminal. Needed for entering the " -"passphrase for certificates at the terminal." -+#: ../sepolicy/sepolicy.py:334 -+msgid "show SELinux type related to the port" - msgstr "" - --#: booleans.py:93 --msgid "Unify HTTPD handling of all content files." -+#: ../sepolicy/sepolicy.py:337 -+msgid "Show ports defined for this SELinux type" - msgstr "" - --#: booleans.py:94 --msgid "Allow httpd to access cifs file systems" +#: ../sepolicy/sepolicy.py:340 +msgid "show ports to which this domain can bind and/or connect" msgstr "" --#: booleans.py:95 --msgid "Allow httpd to access FUSE file systems" +-#: booleans.py:93 +-msgid "Unify HTTPD handling of all content files." +#: ../sepolicy/sepolicy.py:355 +msgid "query SELinux policy to see if domains can communicate with each other" msgstr "" --#: booleans.py:96 --msgid "Allow httpd to run gpg" +-#: booleans.py:94 +-msgid "Allow httpd to access cifs file systems" +#: ../sepolicy/sepolicy.py:358 +msgid "Source Domain" msgstr "" --#: booleans.py:97 --msgid "Allow httpd to access nfs file systems" +-#: booleans.py:95 +-msgid "Allow httpd to access FUSE file systems" +#: ../sepolicy/sepolicy.py:361 +msgid "Target Domain" msgstr "" --#: booleans.py:98 --msgid "Allow httpd to communicate with oddjob to start up a service" +-#: booleans.py:96 +-msgid "Allow httpd to run gpg" +#: ../sepolicy/sepolicy.py:380 +msgid "query SELinux Policy to see description of booleans" msgstr "" --#: booleans.py:99 --msgid "Allow httpd to access openstack ports" +-#: booleans.py:97 +-msgid "Allow httpd to access nfs file systems" +#: ../sepolicy/sepolicy.py:384 +msgid "get all booleans descriptions" msgstr "" --#: booleans.py:100 --msgid "Allow Apache to query NS records" +-#: booleans.py:98 +-msgid "Allow httpd to communicate with oddjob to start up a service" +#: ../sepolicy/sepolicy.py:387 +msgid "boolean to get description" msgstr "" --#: booleans.py:101 --msgid "Allow icecast to connect to all ports, not just sound ports." +-#: booleans.py:99 +-msgid "Allow httpd to access openstack ports" +#: ../sepolicy/sepolicy.py:397 +msgid "" +"query SELinux Policy to see how a source process domain can transition to " +"the target process domain" msgstr "" --#: booleans.py:102 --msgid "" --"Allow the Irssi IRC Client to connect to any port, and to bind to any " --"unreserved port." +-#: booleans.py:100 +-msgid "Allow Apache to query NS records" +#: ../sepolicy/sepolicy.py:400 +msgid "source process domain" msgstr "" --#: booleans.py:103 --msgid "Allow confined applications to run with kerberos." +-#: booleans.py:101 +-msgid "Allow icecast to connect to all ports, not just sound ports." +#: ../sepolicy/sepolicy.py:403 +msgid "target process domain" msgstr "" --#: booleans.py:104 --msgid "Allow syslogd daemon to send mail" +-#: booleans.py:102 +-msgid "" +-"Allow the Irssi IRC Client to connect to any port, and to bind to any " +-"unreserved port." +#: ../sepolicy/sepolicy.py:445 +#, python-format +msgid "sepolicy generate: error: one of the arguments %s is required" msgstr "" --#: booleans.py:105 --msgid "Allow syslogd the ability to read/write terminals" +-#: booleans.py:103 +-msgid "Allow confined applications to run with kerberos." +#: ../sepolicy/sepolicy.py:450 +msgid "Command required for this type of policy" msgstr "" --#: booleans.py:106 --msgid "Allow logging in and using the system from /dev/console." +-#: booleans.py:104 +-msgid "Allow syslogd daemon to send mail" +#: ../sepolicy/sepolicy.py:461 +msgid "" +"-t option can not be used with this option. Read usage for more details." msgstr "" --#: booleans.py:107 +-#: booleans.py:105 +-msgid "Allow syslogd the ability to read/write terminals" +#: ../sepolicy/sepolicy.py:466 - msgid "" --"Control the ability to mmap a low area of the address space, as configured " --"by /proc/sys/kernel/mmap_min_addr." ++msgid "" +"-d option can not be used with this option. Read usage for more details." msgstr "" --#: booleans.py:108 --msgid "Allow mock to read files in home directories." +-#: booleans.py:106 +-msgid "Allow logging in and using the system from /dev/console." +#: ../sepolicy/sepolicy.py:470 +msgid "" +"-a option can not be used with this option. Read usage for more details." msgstr "" --#: booleans.py:109 --msgid "Allow the mount command to mount any directory or file." +-#: booleans.py:107 +-msgid "" +-"Control the ability to mmap a low area of the address space, as configured " +-"by /proc/sys/kernel/mmap_min_addr." +#: ../sepolicy/sepolicy.py:490 +msgid "List SELinux Policy interfaces" msgstr "" --#: booleans.py:110 --msgid "Allow mozilla plugin domain to connect to the network using TCP." +-#: booleans.py:108 +-msgid "Allow mock to read files in home directories." +#: ../sepolicy/sepolicy.py:510 +msgid "Enter interface names, you wish to query" msgstr "" +-#: booleans.py:109 +-msgid "Allow the mount command to mount any directory or file." ++#: ../sepolicy/sepolicy.py:519 ++msgid "Generate SELinux Policy module template" + msgstr "" + +-#: booleans.py:110 +-msgid "Allow mozilla plugin domain to connect to the network using TCP." ++#: ../sepolicy/sepolicy.py:522 ++msgid "Enter domain type which you will be extending" + msgstr "" + -#: booleans.py:111 -msgid "" -"Allow mozilla_plugins to create random content in the users home directory" -+#: ../sepolicy/sepolicy.py:519 -+msgid "Generate SELinux Policy module template" - msgstr "" - --#: booleans.py:112 --msgid "Allow confined web browsers to read home directory content" -+#: ../sepolicy/sepolicy.py:522 -+msgid "Enter domain type which you will be extending" - msgstr "" - --#: booleans.py:113 --msgid "Allow mplayer executable stack" +#: ../sepolicy/sepolicy.py:525 +msgid "Enter SELinux user(s) which will transition to this domain" msgstr "" --#: booleans.py:114 --msgid "Allow mysqld to connect to all ports" +-#: booleans.py:112 +-msgid "Allow confined web browsers to read home directory content" +#: ../sepolicy/sepolicy.py:528 +msgid "Enter SELinux role(s) to which the administror domain will transition" msgstr "" --#: booleans.py:115 --msgid "Allow BIND to bind apache port." +-#: booleans.py:113 +-msgid "Allow mplayer executable stack" +#: ../sepolicy/sepolicy.py:531 +msgid "Enter domain(s) which this confined admin will administrate" msgstr "" +-#: booleans.py:114 +-msgid "Allow mysqld to connect to all ports" ++#: ../sepolicy/sepolicy.py:534 ++msgid "name of policy to generate" + msgstr "" + +-#: booleans.py:115 +-msgid "Allow BIND to bind apache port." ++#: ../sepolicy/sepolicy.py:541 ++msgid "path in which the generated policy files will be stored" + msgstr "" + -#: booleans.py:116 -msgid "" -"Allow BIND to write the master zone files. Generally this is used for " -"dynamic DNS or zone transfers." -+#: ../sepolicy/sepolicy.py:534 -+msgid "name of policy to generate" - msgstr "" - --#: booleans.py:117 --msgid "Allow any files/directories to be exported read/only via NFS." -+#: ../sepolicy/sepolicy.py:541 -+msgid "path in which the generated policy files will be stored" - msgstr "" - --#: booleans.py:118 --msgid "Allow any files/directories to be exported read/write via NFS." +#: ../sepolicy/sepolicy.py:543 +msgid "path to which the confined processes will need to write" msgstr "" --#: booleans.py:119 --msgid "" --"Allow nfs servers to modify public files used for public file transfer " --"services. Files/Directories must be labeled public_content_rw_t." +-#: booleans.py:117 +-msgid "Allow any files/directories to be exported read/only via NFS." +#: ../sepolicy/sepolicy.py:544 +msgid "Policy types which require a command" msgstr "" --#: booleans.py:120 --msgid "Allow system to run with NIS" +-#: booleans.py:118 +-msgid "Allow any files/directories to be exported read/write via NFS." +#: ../sepolicy/sepolicy.py:548 ../sepolicy/sepolicy.py:551 +#: ../sepolicy/sepolicy.py:554 ../sepolicy/sepolicy.py:557 +#: ../sepolicy/sepolicy.py:560 ../sepolicy/sepolicy.py:566 @@ -8318,163 +8474,169 @@ index 961d921..3bb642f 100644 +msgid "Generate '%s' policy" msgstr "" --#: booleans.py:121 --msgid "Allow confined applications to use nscd shared memory." +-#: booleans.py:119 +-msgid "" +-"Allow nfs servers to modify public files used for public file transfer " +-"services. Files/Directories must be labeled public_content_rw_t." +#: ../sepolicy/sepolicy.py:575 +#, python-format +msgid "Generate '%s' policy " msgstr "" --#: booleans.py:122 --msgid "Allow openshift to lockdown app" +-#: booleans.py:120 +-msgid "Allow system to run with NIS" +#: ../sepolicy/sepolicy.py:589 +msgid "executable to confine" msgstr "" --#: booleans.py:123 --msgid "Allow openvpn to read home directories" +-#: booleans.py:121 +-msgid "Allow confined applications to use nscd shared memory." +#: ../sepolicy/sepolicy.py:594 +msgid "commands" msgstr "" --#: booleans.py:124 --msgid "Allow piranha-lvs domain to connect to the network using TCP." +-#: booleans.py:122 +-msgid "Allow openshift to lockdown app" +#: ../sepolicy/sepolicy.py:597 +msgid "Alternate SELinux policy, defaults to /sys/fs/selinux/policy" msgstr "" --#: booleans.py:125 --msgid "Allow polipo to connect to all ports > 1023" +-#: booleans.py:123 +-msgid "Allow openvpn to read home directories" +#: ../sepolicy/sepolicy/__init__.py:167 ../sepolicy/sepolicy/gui.py:479 +msgid "all files" msgstr "" +-#: booleans.py:124 +-msgid "Allow piranha-lvs domain to connect to the network using TCP." ++#: ../sepolicy/sepolicy/__init__.py:168 ++msgid "regular file" + msgstr "" + +-#: booleans.py:125 +-msgid "Allow polipo to connect to all ports > 1023" ++#: ../sepolicy/sepolicy/__init__.py:169 ++msgid "directory" + msgstr "" + -#: booleans.py:126 -msgid "" -"Determine whether Polipo session daemon can bind tcp sockets to all " -"unreserved ports." -+#: ../sepolicy/sepolicy/__init__.py:168 -+msgid "regular file" ++#: ../sepolicy/sepolicy/__init__.py:170 ++msgid "character device" msgstr "" -#: booleans.py:127 -msgid "" -"Determine whether calling user domains can execute Polipo daemon in the " -"polipo_session_t domain." -+#: ../sepolicy/sepolicy/__init__.py:169 -+msgid "directory" - msgstr "" - --#: booleans.py:128 --msgid "Determine whether polipo can access cifs file systems." -+#: ../sepolicy/sepolicy/__init__.py:170 -+msgid "character device" - msgstr "" - --#: booleans.py:129 --msgid "Determine whether Polipo can access nfs file systems." +#: ../sepolicy/sepolicy/__init__.py:171 +msgid "block device" msgstr "" --#: booleans.py:130 --msgid "Enable polyinstantiated directory support." +-#: booleans.py:128 +-msgid "Determine whether polipo can access cifs file systems." +#: ../sepolicy/sepolicy/__init__.py:172 +msgid "socket file" msgstr "" --#: booleans.py:131 --msgid "Allow postfix_local domain full write access to mail_spool directories" +-#: booleans.py:129 +-msgid "Determine whether Polipo can access nfs file systems." +#: ../sepolicy/sepolicy/__init__.py:173 +msgid "symbolic link" msgstr "" --#: booleans.py:132 --msgid "Allow postgresql to use ssh and rsync for point-in-time recovery" +-#: booleans.py:130 +-msgid "Enable polyinstantiated directory support." +#: ../sepolicy/sepolicy/__init__.py:174 +msgid "named pipe" msgstr "" --#: booleans.py:133 --msgid "Allow transmit client label to foreign database" +-#: booleans.py:131 +-msgid "Allow postfix_local domain full write access to mail_spool directories" +#: ../sepolicy/sepolicy/__init__.py:306 +msgid "No SELinux Policy installed" msgstr "" --#: booleans.py:134 --msgid "Allow database admins to execute DML statement" +-#: booleans.py:132 +-msgid "Allow postgresql to use ssh and rsync for point-in-time recovery" +#: ../sepolicy/sepolicy/__init__.py:386 +msgid "You must regenerate interface info by running /usr/bin/sepolgen-ifgen" msgstr "" --#: booleans.py:135 --msgid "Allow unprivileged users to execute DDL statement" +-#: booleans.py:133 +-msgid "Allow transmit client label to foreign database" +#: ../sepolicy/sepolicy/__init__.py:591 +#, python-format +msgid "Failed to read %s policy file" msgstr "" --#: booleans.py:136 --msgid "Allow pppd to load kernel modules for certain modems" +-#: booleans.py:134 +-msgid "Allow database admins to execute DML statement" +#: ../sepolicy/sepolicy/__init__.py:695 +msgid "unknown" msgstr "" --#: booleans.py:137 --msgid "Allow pppd to be run for a regular user" +-#: booleans.py:135 +-msgid "Allow unprivileged users to execute DDL statement" +#: ../sepolicy/sepolicy/generate.py:132 +msgid "Internet Services Daemon" msgstr "" +-#: booleans.py:136 +-msgid "Allow pppd to load kernel modules for certain modems" ++#: ../sepolicy/sepolicy/generate.py:136 ++msgid "Existing Domain Type" + msgstr "" + +-#: booleans.py:137 +-msgid "Allow pppd to be run for a regular user" ++#: ../sepolicy/sepolicy/generate.py:137 ++msgid "Minimal Terminal Login User Role" + msgstr "" + -#: booleans.py:138 -msgid "" -"Allow privoxy to connect to all ports, not just HTTP, FTP, and Gopher ports." -+#: ../sepolicy/sepolicy/generate.py:136 -+msgid "Existing Domain Type" - msgstr "" - --#: booleans.py:139 --msgid "Allow Puppet client to manage all file types." -+#: ../sepolicy/sepolicy/generate.py:137 -+msgid "Minimal Terminal Login User Role" - msgstr "" - --#: booleans.py:140 --msgid "Allow Puppet master to use connect to MySQL and PostgreSQL database" +#: ../sepolicy/sepolicy/generate.py:138 +msgid "Minimal X Windows Login User Role" msgstr "" --#: booleans.py:141 --msgid "Allow racoon to read shadow" +-#: booleans.py:139 +-msgid "Allow Puppet client to manage all file types." +#: ../sepolicy/sepolicy/generate.py:139 +msgid "Desktop Login User Role" msgstr "" --#: booleans.py:142 --msgid "Allow rgmanager domain to connect to the network using TCP." +-#: booleans.py:140 +-msgid "Allow Puppet master to use connect to MySQL and PostgreSQL database" +#: ../sepolicy/sepolicy/generate.py:140 +msgid "Administrator Login User Role" msgstr "" +-#: booleans.py:141 +-msgid "Allow racoon to read shadow" ++#: ../sepolicy/sepolicy/generate.py:141 ++msgid "Confined Root Administrator Role" + msgstr "" + +-#: booleans.py:142 +-msgid "Allow rgmanager domain to connect to the network using TCP." ++#: ../sepolicy/sepolicy/generate.py:142 ++msgid "Module information for a new type" + msgstr "" + -#: booleans.py:143 -msgid "" -"Allow rsync to modify public files used for public file transfer services. " -"Files/Directories must be labeled public_content_rw_t." -+#: ../sepolicy/sepolicy/generate.py:141 -+msgid "Confined Root Administrator Role" ++#: ../sepolicy/sepolicy/generate.py:147 ++msgid "Valid Types:\n" msgstr "" -#: booleans.py:144 -msgid "Allow rsync to run as a client" -+#: ../sepolicy/sepolicy/generate.py:142 -+msgid "Module information for a new type" -+msgstr "" -+ -+#: ../sepolicy/sepolicy/generate.py:147 -+msgid "Valid Types:\n" -+msgstr "" -+ +#: ../sepolicy/sepolicy/generate.py:181 +#, python-format +msgid "Ports must be numbers or ranges of numbers from 1 to %d " @@ -8930,8 +9092,8 @@ index 961d921..3bb642f 100644 +#: ../sepolicy/sepolicy/sepolicy.glade:1280 +#: ../sepolicy/sepolicy/sepolicy.glade:1337 +msgid "" -+"Executables which will transition to the 'selected domain', when executing a " -+"selected domains entrypoint." ++"Executables which will transition to the 'selected domain', when executing a" ++" selected domains entrypoint." msgstr "" -#: booleans.py:208 @@ -9163,54 +9325,44 @@ index 961d921..3bb642f 100644 +msgid "Boolean %s Allow Rules" msgstr "" diff --git a/policycoreutils/po/ar.po b/policycoreutils/po/ar.po -index 151ca6a..5cdc32d 100644 +index 151ca6a..741ff63 100644 --- a/policycoreutils/po/ar.po +++ b/policycoreutils/po/ar.po -@@ -1,7 +1,7 @@ - # SOME DESCRIPTIVE TITLE. - # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER +@@ -3,17 +3,17 @@ # This file is distributed under the same license as the PACKAGE package. --# -+# + # # Translators: - # Ali Al-Ammari , 2010. - # Amjad Al-Obaili , 2010. -@@ -12,24 +12,28 @@ msgid "" +-# Ali Al-Ammari , 2010. +-# Amjad Al-Obaili , 2010. +-# Majed Abdullah , 2010. +-# Munzir Taha , 2012. +-# Saud Al-Otaibi , 2010. ++# Ali Al-Ammari , 2010 ++# Amjad Al-Obaili , 2010 ++# Majed Abdullah , 2010 ++# Munzir Taha , 2012 ++# Saud Al-Otaibi , 2010 + msgid "" msgstr "" "Project-Id-Version: Policycoreutils\n" "Report-Msgid-Bugs-To: \n" -"POT-Creation-Date: 2013-01-04 12:01-0500\n" -"PO-Revision-Date: 2013-01-04 17:02+0000\n" +"POT-Creation-Date: 2013-07-10 16:36-0400\n" -+"PO-Revision-Date: 2013-04-08 19:09+0000\n" ++"PO-Revision-Date: 2013-07-10 20:44+0000\n" "Last-Translator: dwalsh \n" "Language-Team: Arabic \n" -+"Language: ar\n" "MIME-Version: 1.0\n" - "Content-Type: text/plain; charset=UTF-8\n" - "Content-Transfer-Encoding: 8bit\n" --"Language: ar\n" --"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" -+"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 " -+"&& n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" - - #: ../run_init/run_init.c:67 - msgid "" - "USAGE: run_init