|
From: <ssm...@us...> - 2008-01-23 20:25:20
|
Revision: 2742
http://selinux.svn.sourceforge.net/selinux/?rev=2742&view=rev
Author: ssmalley
Date: 2008-01-23 12:25:18 -0800 (Wed, 23 Jan 2008)
Log Message:
-----------
Tidy up the output.
Modified Paths:
--------------
trunk/policycoreutils/audit2allow/audit2allow
Modified: trunk/policycoreutils/audit2allow/audit2allow
===================================================================
--- trunk/policycoreutils/audit2allow/audit2allow 2008-01-23 20:24:15 UTC (rev 2741)
+++ trunk/policycoreutils/audit2allow/audit2allow 2008-01-23 20:25:18 UTC (rev 2742)
@@ -249,18 +249,18 @@
continue
if rc == audit2why.BOOLEAN:
if len(bools) > 1:
- print "\tOne of the following booleans being set incorrectly."
+ print "\tOne of the following booleans was set incorrectly."
for b in bools:
print "\n\tBoolean %s is %d. Allow access by executing:" % (b[0], not b[1])
print "\t# setsebool -P %s %d" % (b[0], b[1])
else:
- print "\tThe boolean %s set incorrectly. Allow access by executing:" % bools[0][0]
+ print "\tThe boolean %s was set incorrectly. Allow access by executing:" % bools[0][0]
print "\t# setsebool -P %s %d\n" % (bools[0][0], bools[0][1])
continue
if rc == audit2why.TERULE:
- print "\t\tMissing or disabled type enforcingment (TE) allow rule.\n"
+ print "\t\tMissing or disabled type enforcing (TE) allow rule.\n"
print "\t\tYou can use audit2allow to generate the missing allow rules and/or load policy to allow this access.\n"
continue
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
|