selinux-policy/policy/modules/system/miscfiles.if

772 lines
16 KiB
Plaintext
Raw Normal View History

2005-06-07 22:36:07 +00:00
## <summary>Miscelaneous files.</summary>
2005-04-20 19:07:16 +00:00
2005-05-05 21:36:53 +00:00
########################################
2005-07-19 18:40:31 +00:00
## <summary>
## Make the specified type usable as a cert file.
## </summary>
## <desc>
## <p>
## Make the specified type usable for cert files.
## This will also make the type usable for files, making
## calls to files_type() redundant. Failure to use this interface
## for a temporary file may result in problems with
## cert management tools.
## </p>
## <p>
## Related interfaces:
## </p>
## <ul>
## <li>files_type()</li>
## </ul>
## <p>
## Example:
## </p>
## <p>
## type mycertfile_t;
## cert_type(mycertfile_t)
## allow mydomain_t mycertfile_t:file read_file_perms;
## files_search_etc(mydomain_t)
## </p>
## </desc>
## <param name="type">
## <summary>
## Type to be used for files.
## </summary>
## </param>
## <infoflow type="none"/>
#
interface(`miscfiles_cert_type',`
gen_require(`
attribute cert_type;
')
typeattribute $1 cert_type;
files_type($1)
')
########################################
## <summary>
## Read all SSL certificates.
2005-10-05 21:17:22 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-10-05 21:17:22 +00:00
## </param>
#
interface(`miscfiles_read_all_certs',`
gen_require(`
attribute cert_type;
')
allow $1 cert_type:dir list_dir_perms;
read_files_pattern($1, cert_type, cert_type)
read_lnk_files_pattern($1, cert_type, cert_type)
')
########################################
## <summary>
## Read generic SSL certificates.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_read_generic_certs',`
2005-10-05 21:17:22 +00:00
gen_require(`
type cert_t;
')
2006-12-12 20:08:08 +00:00
allow $1 cert_t:dir list_dir_perms;
2009-06-26 14:40:13 +00:00
read_files_pattern($1, cert_t, cert_t)
read_lnk_files_pattern($1, cert_t, cert_t)
2005-10-05 21:17:22 +00:00
')
2009-03-20 13:58:15 +00:00
########################################
## <summary>
## Manage generic SSL certificates.
2009-03-20 13:58:15 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_manage_generic_cert_dirs',`
2009-03-20 13:58:15 +00:00
gen_require(`
type cert_t;
')
manage_dirs_pattern($1, cert_t, cert_t)
')
########################################
## <summary>
## Manage generic SSL certificates.
2009-03-20 13:58:15 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_manage_generic_cert_files',`
2009-03-20 13:58:15 +00:00
gen_require(`
type cert_t;
')
manage_files_pattern($1, cert_t, cert_t)
read_lnk_files_pattern($1, cert_t, cert_t)
')
########################################
## <summary>
## Read SSL certificates.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_read_certs',`
miscfiles_read_generic_certs($1)
refpolicywarn(`$0() has been deprecated, please use miscfiles_read_generic_certs() instead.')
')
########################################
## <summary>
## Manage SSL certificates.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_manage_cert_dirs',`
miscfiles_manage_generic_cert_dirs($1)
refpolicywarn(`$0() has been deprecated, please use miscfiles_manage_generic_cert_dirs() instead.')
')
########################################
## <summary>
## Manage SSL certificates.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_manage_cert_files',`
miscfiles_manage_generic_cert_files($1)
refpolicywarn(`$0() has been deprecated, please use miscfiles_manage_generic_cert_files() instead.')
')
2005-10-05 21:17:22 +00:00
########################################
## <summary>
## Read fonts.
2005-07-19 18:40:31 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-07-19 18:40:31 +00:00
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
2005-05-05 21:36:53 +00:00
#
interface(`miscfiles_read_fonts',`
2005-06-17 17:59:26 +00:00
gen_require(`
2010-03-09 15:44:55 +00:00
type fonts_t, fonts_cache_t;
2005-06-17 17:59:26 +00:00
')
2005-11-25 19:09:08 +00:00
# cjp: fonts can be in either of these dirs
2005-06-17 17:59:26 +00:00
files_search_usr($1)
libs_search_lib($1)
2006-12-12 20:08:08 +00:00
allow $1 fonts_t:dir list_dir_perms;
2009-06-26 14:40:13 +00:00
read_files_pattern($1, fonts_t, fonts_t)
read_lnk_files_pattern($1, fonts_t, fonts_t)
2010-03-09 15:44:55 +00:00
allow $1 fonts_cache_t:dir list_dir_perms;
read_files_pattern($1, fonts_cache_t, fonts_cache_t)
read_lnk_files_pattern($1, fonts_cache_t, fonts_cache_t)
2005-05-05 21:36:53 +00:00
')
2009-11-24 14:04:48 +00:00
########################################
## <summary>
## Set the attributes on a fonts directory.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`miscfiles_setattr_fonts_dirs',`
gen_require(`
type fonts_t;
')
allow $1 fonts_t:dir setattr;
')
########################################
## <summary>
## Do not audit attempts to set the attributes
## on a fonts directory.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
2009-11-24 14:04:48 +00:00
## </summary>
## </param>
## <rolecap/>
#
interface(`miscfiles_dontaudit_setattr_fonts_dirs',`
gen_require(`
type fonts_t;
')
dontaudit $1 fonts_t:dir setattr;
')
2007-11-15 20:10:26 +00:00
########################################
## <summary>
## Do not audit attempts to write fonts.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
2007-11-15 20:10:26 +00:00
## </summary>
## </param>
## <rolecap/>
#
interface(`miscfiles_dontaudit_write_fonts',`
gen_require(`
type fonts_t;
')
2009-03-20 13:58:15 +00:00
dontaudit $1 fonts_t:dir { write setattr };
2007-11-15 20:10:26 +00:00
dontaudit $1 fonts_t:file write;
')
2005-11-25 19:09:08 +00:00
########################################
## <summary>
## Create, read, write, and delete fonts.
## </summary>
## <param name="domain">
## <summary>
2005-11-25 19:09:08 +00:00
## Domain allowed access.
## </summary>
2005-11-25 19:09:08 +00:00
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
2005-11-25 19:09:08 +00:00
#
interface(`miscfiles_manage_fonts',`
gen_require(`
type fonts_t;
')
# cjp: fonts can be in either of these dirs
files_search_usr($1)
libs_search_lib($1)
2009-06-26 14:40:13 +00:00
manage_dirs_pattern($1, fonts_t, fonts_t)
manage_files_pattern($1, fonts_t, fonts_t)
manage_lnk_files_pattern($1, fonts_t, fonts_t)
2005-11-25 19:09:08 +00:00
')
2010-03-09 15:44:55 +00:00
########################################
## <summary>
## Set the attributes on a fonts cache directory.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_setattr_fonts_cache_dirs',`
gen_require(`
type fonts_cache_t;
')
allow $1 fonts_cache_t:dir setattr;
')
########################################
## <summary>
## Do not audit attempts to set the attributes
## on a fonts cache directory.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
2010-03-09 15:44:55 +00:00
## </summary>
## </param>
#
interface(`miscfiles_dontaudit_setattr_fonts_cache_dirs',`
gen_require(`
type fonts_cache_t;
')
dontaudit $1 fonts_cache_t:dir setattr;
')
########################################
## <summary>
## Create, read, write, and delete fonts cache.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`miscfiles_manage_fonts_cache',`
gen_require(`
type fonts_cache_t;
')
files_search_var($1)
manage_dirs_pattern($1, fonts_cache_t, fonts_cache_t)
manage_files_pattern($1, fonts_cache_t, fonts_cache_t)
manage_lnk_files_pattern($1, fonts_cache_t, fonts_cache_t)
')
########################################
## <summary>
## Read hardware identification data.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_read_hwdata',`
gen_require(`
type hwdata_t;
')
2006-12-12 20:08:08 +00:00
allow $1 hwdata_t:dir list_dir_perms;
2009-06-26 14:40:13 +00:00
read_files_pattern($1, hwdata_t, hwdata_t)
read_lnk_files_pattern($1, hwdata_t, hwdata_t)
')
########################################
## <summary>
## Allow process to setattr localization info
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_setattr_localization',`
gen_require(`
type locale_t;
')
files_search_usr($1)
allow $1 locale_t:dir list_dir_perms;
allow $1 locale_t:file setattr;
')
2005-04-14 20:18:17 +00:00
########################################
2005-07-19 18:40:31 +00:00
## <summary>
## Allow process to read localization information.
2005-07-19 18:40:31 +00:00
## </summary>
## <desc>
## <p>
## Allow the specified domain to read the localization files.
## This is typically for time zone configuration files, such as
## /etc/localtime and files in /usr/share/zoneinfo.
## Typically, any domain which needs to know the GMT/UTC
## offset of the current timezone will need access
## to these files. Generally, it should be safe for any
## domain to read these files.
## </p>
## </desc>
2005-07-19 18:40:31 +00:00
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-07-19 18:40:31 +00:00
## </param>
## <infoflow type="read" weight="10"/>
2005-04-14 20:18:17 +00:00
#
interface(`miscfiles_read_localization',`
2005-06-17 17:59:26 +00:00
gen_require(`
type locale_t;
')
2006-09-13 18:08:17 +00:00
files_read_etc_symlinks($1)
2005-06-17 17:59:26 +00:00
files_search_usr($1)
2006-12-12 20:08:08 +00:00
allow $1 locale_t:dir list_dir_perms;
2009-06-26 14:40:13 +00:00
read_files_pattern($1, locale_t, locale_t)
read_lnk_files_pattern($1, locale_t, locale_t)
2005-05-11 15:46:51 +00:00
# why?
2006-02-02 21:08:12 +00:00
libs_read_lib_files($1)
2005-04-14 20:18:17 +00:00
')
########################################
## <summary>
## Allow process to write localization info
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_rw_localization',`
gen_require(`
type locale_t;
')
files_search_usr($1)
allow $1 locale_t:dir list_dir_perms;
2009-06-26 14:40:13 +00:00
rw_files_pattern($1, locale_t, locale_t)
')
########################################
## <summary>
## Allow process to relabel localization info
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_relabel_localization',`
gen_require(`
type locale_t;
')
files_search_usr($1)
2009-06-26 14:40:13 +00:00
relabel_files_pattern($1, locale_t, locale_t)
')
2005-05-05 20:33:35 +00:00
########################################
2005-07-19 18:40:31 +00:00
## <summary>
## Allow process to read legacy time localization info
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-07-19 18:40:31 +00:00
## </param>
2005-05-05 20:33:35 +00:00
#
interface(`miscfiles_legacy_read_localization',`
2005-06-17 17:59:26 +00:00
gen_require(`
type locale_t;
')
miscfiles_read_localization($1)
allow $1 locale_t:file execute;
2005-05-05 20:33:35 +00:00
')
2009-11-24 14:04:48 +00:00
########################################
## <summary>
## Search man pages.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
2009-11-24 14:04:48 +00:00
## </summary>
## </param>
#
interface(`miscfiles_search_man_pages',`
gen_require(`
type man_t;
')
allow $1 man_t:dir search_dir_perms;
files_search_usr($1)
')
2005-10-23 20:18:36 +00:00
########################################
## <summary>
## Do not audit attempts to search man pages.
## </summary>
## <param name="domain">
## <summary>
2005-10-23 20:18:36 +00:00
## Domain to not audit.
## </summary>
2005-10-23 20:18:36 +00:00
## </param>
#
interface(`miscfiles_dontaudit_search_man_pages',`
gen_require(`
type man_t;
')
2009-11-24 14:04:48 +00:00
dontaudit $1 man_t:dir search_dir_perms;
2005-10-23 20:18:36 +00:00
')
2005-05-11 19:05:15 +00:00
########################################
2005-07-19 18:40:31 +00:00
## <summary>
2005-09-16 21:20:37 +00:00
## Read man pages
2005-07-19 18:40:31 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-09-16 21:20:37 +00:00
## Domain allowed access.
## </summary>
2005-07-19 18:40:31 +00:00
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
2005-05-11 19:05:15 +00:00
#
interface(`miscfiles_read_man_pages',`
2005-06-17 17:59:26 +00:00
gen_require(`
type man_t;
')
files_search_usr($1)
2006-12-12 20:08:08 +00:00
allow $1 man_t:dir list_dir_perms;
2009-06-26 14:40:13 +00:00
read_files_pattern($1, man_t, man_t)
read_lnk_files_pattern($1, man_t, man_t)
2005-05-11 19:05:15 +00:00
')
2005-07-19 18:40:31 +00:00
########################################
2005-09-16 21:20:37 +00:00
## <summary>
## Delete man pages
## </summary>
## <param name="domain">
## <summary>
2005-09-16 21:20:37 +00:00
## Domain allowed access.
## </summary>
2005-09-16 21:20:37 +00:00
## </param>
# cjp: added for tmpreaper
#
interface(`miscfiles_delete_man_pages',`
gen_require(`
type man_t;
')
files_search_usr($1)
2006-12-12 20:08:08 +00:00
allow $1 man_t:dir setattr;
2007-11-15 20:10:26 +00:00
# RH bug #309351
allow $1 man_t:dir list_dir_perms;
2009-06-26 14:40:13 +00:00
delete_dirs_pattern($1, man_t, man_t)
delete_files_pattern($1, man_t, man_t)
delete_lnk_files_pattern($1, man_t, man_t)
2005-09-16 21:20:37 +00:00
')
########################################
## <summary>
## Create, read, write, and delete man pages
## </summary>
## <param name="domain">
## <summary>
2005-09-16 21:20:37 +00:00
## Domain allowed access.
## </summary>
2005-09-16 21:20:37 +00:00
## </param>
#
interface(`miscfiles_manage_man_pages',`
gen_require(`
type man_t;
')
files_search_usr($1)
2009-06-26 14:40:13 +00:00
manage_dirs_pattern($1, man_t, man_t)
manage_files_pattern($1, man_t, man_t)
read_lnk_files_pattern($1, man_t, man_t)
2005-09-16 21:20:37 +00:00
')
########################################
## <summary>
## Read public files used for file
## transfer services.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
#
interface(`miscfiles_read_public_files',`
gen_require(`
2005-10-24 21:33:46 +00:00
type public_content_t, public_content_rw_t;
')
2006-12-12 20:08:08 +00:00
allow $1 { public_content_t public_content_rw_t }:dir list_dir_perms;
2009-11-24 16:11:38 +00:00
read_files_pattern($1, { public_content_t public_content_rw_t }, { public_content_t public_content_rw_t })
read_lnk_files_pattern($1, { public_content_t public_content_rw_t }, { public_content_t public_content_rw_t })
')
########################################
## <summary>
## Create, read, write, and delete public files
## and directories used for file transfer services.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
#
interface(`miscfiles_manage_public_files',`
gen_require(`
type public_content_rw_t;
')
2009-06-26 14:40:13 +00:00
manage_dirs_pattern($1, public_content_rw_t, public_content_rw_t)
manage_files_pattern($1, public_content_rw_t, public_content_rw_t)
manage_lnk_files_pattern($1, public_content_rw_t, public_content_rw_t)
')
2005-09-16 21:20:37 +00:00
########################################
2005-07-19 18:40:31 +00:00
## <summary>
## Read TeX data
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-07-19 18:40:31 +00:00
## </param>
#
interface(`miscfiles_read_tetex_data',`
gen_require(`
type tetex_data_t;
')
files_search_var($1)
files_search_var_lib($1)
# cjp: TeX data can be in either of the above dirs
2006-12-12 20:08:08 +00:00
allow $1 tetex_data_t:dir list_dir_perms;
2009-06-26 14:40:13 +00:00
read_files_pattern($1, tetex_data_t, tetex_data_t)
read_lnk_files_pattern($1, tetex_data_t, tetex_data_t)
2005-07-19 18:40:31 +00:00
')
########################################
## <summary>
## Execute TeX data programs in the caller domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-07-19 18:40:31 +00:00
## </param>
#
interface(`miscfiles_exec_tetex_data',`
gen_require(`
type fonts_t;
type tetex_data_t;
2005-07-19 18:40:31 +00:00
')
files_search_var($1)
files_search_var_lib($1)
# cjp: TeX data can be in either of the above dirs
2006-12-12 20:08:08 +00:00
allow $1 tetex_data_t:dir list_dir_perms;
2009-06-26 14:40:13 +00:00
exec_files_pattern($1, tetex_data_t, tetex_data_t)
2005-07-19 18:40:31 +00:00
')
########################################
## <summary>
## Let test files be an entry point for
## a specified domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_domain_entry_test_files',`
gen_require(`
type test_file_t;
')
domain_entry_file($1, test_file_t)
')
########################################
## <summary>
## Read test files and directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_read_test_files',`
gen_require(`
type test_file_t;
')
2009-06-26 14:40:13 +00:00
read_files_pattern($1, test_file_t, test_file_t)
read_lnk_files_pattern($1, test_file_t, test_file_t)
')
########################################
## <summary>
## Execute test files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_exec_test_files',`
gen_require(`
type test_file_t;
')
2009-06-26 14:40:13 +00:00
exec_files_pattern($1, test_file_t, test_file_t)
read_lnk_files_pattern($1, test_file_t, test_file_t)
')
########################################
## <summary>
## Execute test files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`miscfiles_etc_filetrans_localization',`
gen_require(`
type locale_t;
')
files_etc_filetrans($1, locale_t, file)
')
########################################
## <summary>
## Create, read, write, and delete localization
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`miscfiles_manage_localization',`
gen_require(`
type locale_t;
')
2009-06-26 14:40:13 +00:00
manage_dirs_pattern($1, locale_t, locale_t)
manage_files_pattern($1, locale_t, locale_t)
manage_lnk_files_pattern($1, locale_t, locale_t)
')