mirror of
git://git.code.sf.net/p/zsh/code
synced 2025-06-10 18:58:03 +02:00
52770: handle newrole in SELinux completions
This commit is contained in:
parent
1e995cbb38
commit
93334b207f
2 changed files with 25 additions and 8 deletions
|
@ -1,5 +1,7 @@
|
||||||
2024-03-18 Oliver Kiddle <opk@zsh.org>
|
2024-03-18 Oliver Kiddle <opk@zsh.org>
|
||||||
|
|
||||||
|
* 52770: Completion/Linux/Command/_selinux: handle newrole
|
||||||
|
|
||||||
* 52769: Completion/Unix/Command/_ansible: fix completion of
|
* 52769: Completion/Unix/Command/_ansible: fix completion of
|
||||||
ansible keywords and --step option
|
ansible keywords and --step option
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
#compdef audit2allow audit2why avcstat chcon checkmodule checkpolicy fixfiles getpidprevcon getsebool matchpathcon restorecon runcon sealert secon sedta seinfo selinuxconlist selinuxdefcon selinuxexeccon semanage semodule semodule_unpackage sepolgen sepolicy sesearch sestatus setenforce setsebool validatetrans
|
#compdef audit2allow audit2why avcstat chcon checkmodule checkpolicy fixfiles getpidprevcon getsebool matchpathcon newrole restorecon runcon sealert secon sedta seinfo selinuxconlist selinuxdefcon selinuxexeccon semanage semodule semodule_unpackage sepolgen sepolicy sesearch sestatus setenforce setsebool validatetrans
|
||||||
|
|
||||||
# encompasses checkpolicy libselinux-utils policycoreutils
|
# encompasses checkpolicy libselinux-utils policycoreutils
|
||||||
# policycoreutils-devel policycoreutils-python-utils setools-console
|
# policycoreutils-devel policycoreutils-python-utils setools-console
|
||||||
|
@ -251,6 +251,21 @@ case $service in
|
||||||
)
|
)
|
||||||
;;
|
;;
|
||||||
|
|
||||||
|
newrole)
|
||||||
|
local cmd cpp
|
||||||
|
cmd="$words[1]"
|
||||||
|
cpp='_comp_priv_prefix=( $cmd ${(kv)opt_args[(I)-([rtl]|-role|-type|-level)]} )'
|
||||||
|
args=(
|
||||||
|
'(-r --role)'{-r+,--role=}'[specify role]: :_selinux_roles'
|
||||||
|
'(-t --type)'{-t+,--type=}'[specify type]: :_selinux_types'
|
||||||
|
'(-l --level)'{-l+,--range=}'[specify level]:level'
|
||||||
|
'(-p --preserve-environment)'{-p,--preserve-environment}"[don't create new minimal environment]"
|
||||||
|
"${ign}(-)"{-V,--version}'[display version information]'
|
||||||
|
"(-)1: :{ $cpp; _command_names -e }" \
|
||||||
|
"*:: :{ $cpp; _normal }"
|
||||||
|
)
|
||||||
|
;;
|
||||||
|
|
||||||
restorecon)
|
restorecon)
|
||||||
args=(
|
args=(
|
||||||
'*-e+[exclude a directory]:directory:_directories'
|
'*-e+[exclude a directory]:directory:_directories'
|
||||||
|
@ -276,10 +291,10 @@ case $service in
|
||||||
runcon)
|
runcon)
|
||||||
args=(
|
args=(
|
||||||
'(1 -c --compute)'{-c,--compute}'[compute process transition context before modifying]'
|
'(1 -c --compute)'{-c,--compute}'[compute process transition context before modifying]'
|
||||||
'(1 -t --type=TYPE)'{-t+,--type=}'[specify type]: :_selinux_types'
|
'(1 -t --type)'{-t+,--type=}'[specify type]: :_selinux_types'
|
||||||
'(1 -u --user=USER)'{-u+,--user=}'[specify user identity]: :_selinux_users'
|
'(1 -u --user)'{-u+,--user=}'[specify user identity]: :_selinux_users'
|
||||||
'(1 -r --role=ROLE)'{-r+,--role=}'[specify role]: :_selinux_roles'
|
'(1 -r --role)'{-r+,--role=}'[specify role]: :_selinux_roles'
|
||||||
'(1 -l --range=RANGE)'{-l+,--range=}'[specify level range]:range'
|
'(1 -l --range)'{-l+,--range=}'[specify level range]:range'
|
||||||
'(-)1:security context:_selinux_contexts'
|
'(-)1:security context:_selinux_contexts'
|
||||||
'*:::args:_normal'
|
'*:::args:_normal'
|
||||||
)
|
)
|
||||||
|
@ -460,7 +475,7 @@ case $service in
|
||||||
'(-E --extract)'{-E,--extract}'[extract customizable commands, for use within a transaction]'
|
'(-E --extract)'{-E,--extract}'[extract customizable commands, for use within a transaction]'
|
||||||
)
|
)
|
||||||
;|
|
;|
|
||||||
boolean|dontaudit|export|import)
|
fcontext|ibendport|ibpkey|interface|login|module|node|permissive|port|user)
|
||||||
args+=( '(-a --add)'{-a,--add}'[add a record]' )
|
args+=( '(-a --add)'{-a,--add}'[add a record]' )
|
||||||
;|
|
;|
|
||||||
boolean|fcontext|ibendport|ibpkey|interface|login|node|permissive|port|user)
|
boolean|fcontext|ibendport|ibpkey|interface|login|node|permissive|port|user)
|
||||||
|
@ -573,8 +588,8 @@ case $service in
|
||||||
\*{-B,--build}'[build and reload policy]'
|
\*{-B,--build}'[build and reload policy]'
|
||||||
\*'--refresh[like --build but reuse existing linked policy if module files unchanged]'
|
\*'--refresh[like --build but reuse existing linked policy if module files unchanged]'
|
||||||
\*{-D,--disable_dontaudit}'[remove dontaudits from policy]'
|
\*{-D,--disable_dontaudit}'[remove dontaudits from policy]'
|
||||||
\*{-i+,--install=}'[install a new module]:module package:_files -g "*.pp(-.)"'
|
\*{-i+,--install=}'[install a new module]:module package:_files -g "*.(pp|cil)(-.)"'
|
||||||
\!{-b,--base,-u,--upgrade}':module package:_files -g "*.pp(-.)"'
|
\!{-b,--base,-u,--upgrade}':module package:_files -g "*.(pp|cil)(-.)"'
|
||||||
\*{-r+,--remove=}'[remove existing module at desired priority]:module name:_selinux_modules'
|
\*{-r+,--remove=}'[remove existing module at desired priority]:module name:_selinux_modules'
|
||||||
\*{-l+,--list-modules=-}'[display list of installed modules]::kind:((
|
\*{-l+,--list-modules=-}'[display list of installed modules]::kind:((
|
||||||
standard\:highest\ priority,\ enabled\ modules
|
standard\:highest\ priority,\ enabled\ modules
|
||||||
|
|
Loading…
Reference in a new issue