selinux-policy/policy/modules/services/bugzilla.if

82 lines
2.0 KiB
Plaintext
Raw Normal View History

2010-08-26 13:41:21 +00:00
## <summary>Bugzilla server</summary>
########################################
## <summary>
## Allow the specified domain to search
## bugzilla directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`bugzilla_search_dirs',`
gen_require(`
type httpd_bugzilla_content_t;
')
allow $1 httpd_bugzilla_content_t:dir search_dir_perms;
')
########################################
## <summary>
## Do not audit attempts to read and write
## bugzilla script unix domain stream sockets.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`bugzilla_dontaudit_rw_script_stream_sockets',`
gen_require(`
type httpd_bugzilla_script_t;
')
dontaudit $1 httpd_bugzilla_script_t:unix_stream_socket { read write };
')
########################################
## <summary>
## All of the rules required to administrate
## an bugzilla environment
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="role">
## <summary>
## The role to be allowed to manage the bugzilla domain.
## </summary>
## </param>
## <rolecap/>
#
interface(`bugzilla_admin',`
gen_require(`
type httpd_bugzilla_script_t;
type httpd_bugzilla_content_t, httpd_bugzilla_ra_content_t;
type httpd_bugzilla_rw_content_t, httpd_bugzilla_tmp_t;
type httpd_bugzilla_script_exec_t, httpd_bugzilla_htaccess_t;
')
allow $1 httpd_bugzilla_script_t:process { ptrace signal_perms };
ps_process_pattern($1, httpd_bugzilla_script_t)
files_list_tmp($1)
admin_pattern($1, httpd_bugzilla_tmp_t)
files_search_var_lib(httpd_bugzilla_script_t)
apache_search_sys_content($1)
admin_pattern($1, httpd_bugzilla_script_exec_t)
admin_pattern($1, httpd_bugzilla_script_t)
admin_pattern($1, httpd_bugzilla_content_t)
admin_pattern($1, httpd_bugzilla_htaccess_t)
admin_pattern($1, httpd_bugzilla_rw_content_t)
admin_pattern($1, httpd_bugzilla_ra_content_t)
')