[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH 5/5] flask/policy: comment out unused xenstore example


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  • Date: Mon, 23 May 2016 11:05:33 -0400
  • Cc: steve@xxxxxxxxxxxx, Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>, cardoe@xxxxxxxxxx
  • Delivery-date: Mon, 23 May 2016 15:06:19 +0000
  • Ironport-phdr: 9a23:NkmXQhwn2Cg7qBHXCy+O+j09IxM/srCxBDY+r6Qd0eweIJqq85mqBkHD//Il1AaPBtWKrakVwLWJ+4nbGkU+or+5+EgYd5JNUxJXwe43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6anHS+4HYoFwnlMkItf6KuSt+U1JX8iL/60qaQSjsLrQL1Wal1IhSyoFeZnegtqqwmFJwMzADUqGBDYeVcyDAgD1uSmxHh+pX4p8Y7oGxtofZpy+psGeW/Jfx5HvRkC2E2PmZw6MD1uB3rSQqU+mBaQmgQigBPAQXO8Ff9RJiinDH9s79R0S+bMMm+Yb18di6r5qkjHBPnhCoILTcR7HDciss2irlS5h2muUoskMbvfIiJOa8mLevmdtQASD8EBJ5c
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>

Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
---
 tools/flask/policy/policy/access_vectors   | 32 +++++++++++++++---------------
 tools/flask/policy/policy/security_classes |  2 +-
 2 files changed, 17 insertions(+), 17 deletions(-)

diff --git a/tools/flask/policy/policy/access_vectors 
b/tools/flask/policy/policy/access_vectors
index 4fd61f1..8cca192 100644
--- a/tools/flask/policy/policy/access_vectors
+++ b/tools/flask/policy/policy/access_vectors
@@ -6,19 +6,19 @@
 # Note: this is an example; the xenstore daemon provided with Xen does
 # not yet include XSM support, and the exact permissions may be defined
 # differently if such support is added.
-class xenstore {
-       # read from keys owned by the target domain (if permissions allow)
-       read
-       # write to keys owned by the target domain (if permissions allow)
-       write
-       # change permissions of a key owned by the target domain
-       chmod
-       # change the owner of a key which was owned by the target domain
-       chown_from
-       # change the owner of a key to the target domain
-       chown_to
-       # access a key owned by the target domain without permission
-       override
-       # introduce a domain
-       introduce
-}
+#class xenstore {
+#      # read from keys owned by the target domain (if permissions allow)
+#      read
+#      # write to keys owned by the target domain (if permissions allow)
+#      write
+#      # change permissions of a key owned by the target domain
+#      chmod
+#      # change the owner of a key which was owned by the target domain
+#      chown_from
+#      # change the owner of a key to the target domain
+#      chown_to
+#      # access a key owned by the target domain without permission
+#      override
+#      # introduce a domain
+#      introduce
+#}
diff --git a/tools/flask/policy/policy/security_classes 
b/tools/flask/policy/policy/security_classes
index 56595e8..069faea 100644
--- a/tools/flask/policy/policy/security_classes
+++ b/tools/flask/policy/policy/security_classes
@@ -5,4 +5,4 @@
 # security policy.
 #
 # Access vectors for these classes must be defined in the access_vectors file.
-class xenstore
+#class xenstore
-- 
2.5.5


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.