2010-05-24 19:32:01 +00:00
|
|
|
policy_module(nslcd, 1.1.0)
|
2009-09-08 14:31:19 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# Declarations
|
|
|
|
#
|
|
|
|
|
|
|
|
type nslcd_t;
|
|
|
|
type nslcd_exec_t;
|
|
|
|
init_daemon_domain(nslcd_t, nslcd_exec_t)
|
|
|
|
|
|
|
|
type nslcd_initrc_exec_t;
|
|
|
|
init_script_file(nslcd_initrc_exec_t)
|
|
|
|
|
|
|
|
type nslcd_var_run_t;
|
|
|
|
files_pid_file(nslcd_var_run_t)
|
|
|
|
|
|
|
|
type nslcd_conf_t;
|
|
|
|
files_type(nslcd_conf_t)
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# nslcd local policy
|
|
|
|
#
|
|
|
|
|
|
|
|
allow nslcd_t self:capability { setgid setuid dac_override };
|
|
|
|
allow nslcd_t self:process signal;
|
|
|
|
allow nslcd_t self:unix_stream_socket create_stream_socket_perms;
|
|
|
|
|
|
|
|
allow nslcd_t nslcd_conf_t:file read_file_perms;
|
|
|
|
|
|
|
|
manage_dirs_pattern(nslcd_t, nslcd_var_run_t, nslcd_var_run_t)
|
|
|
|
manage_files_pattern(nslcd_t, nslcd_var_run_t, nslcd_var_run_t)
|
|
|
|
manage_sock_files_pattern(nslcd_t, nslcd_var_run_t, nslcd_var_run_t)
|
|
|
|
files_pid_filetrans(nslcd_t, nslcd_var_run_t, { file dir })
|
|
|
|
|
2010-08-30 15:40:00 +00:00
|
|
|
kernel_read_system_state(nslcd_t)
|
|
|
|
|
2009-09-08 14:31:19 +00:00
|
|
|
files_read_etc_files(nslcd_t)
|
|
|
|
|
|
|
|
auth_use_nsswitch(nslcd_t)
|
|
|
|
|
|
|
|
logging_send_syslog_msg(nslcd_t)
|
|
|
|
|
|
|
|
miscfiles_read_localization(nslcd_t)
|