trunk: small fixes for gentoo system.

This commit is contained in:
Chris PeBenito 2008-03-20 14:55:17 +00:00
parent 6e2123fc72
commit 2ed4f5aedf
5 changed files with 70 additions and 6 deletions

View File

@ -1,5 +1,5 @@
policy_module(init,1.9.2) policy_module(init,1.9.3)
gen_require(` gen_require(`
class passwd rootok; class passwd rootok;
@ -427,6 +427,11 @@ ifdef(`distro_gentoo',`
# happens during boot (/sbin/rc execs init scripts) # happens during boot (/sbin/rc execs init scripts)
seutil_read_default_contexts(initrc_t) seutil_read_default_contexts(initrc_t)
# /lib/rcscripts/net/system.sh rewrites resolv.conf :(
sysnet_create_config(initrc_t)
sysnet_write_config(initrc_t)
sysnet_setattr_config(initrc_t)
optional_policy(` optional_policy(`
arpwatch_manage_data_files(initrc_t) arpwatch_manage_data_files(initrc_t)
') ')

View File

@ -20,6 +20,8 @@
/usr/sbin/syslog-ng -- gen_context(system_u:object_r:syslogd_exec_t,s0) /usr/sbin/syslog-ng -- gen_context(system_u:object_r:syslogd_exec_t,s0)
/usr/sbin/syslogd -- gen_context(system_u:object_r:syslogd_exec_t,s0) /usr/sbin/syslogd -- gen_context(system_u:object_r:syslogd_exec_t,s0)
/var/lib/syslog-ng.persist -- gen_context(system_u:object_r:syslogd_var_lib_t,s0)
ifdef(`distro_suse', ` ifdef(`distro_suse', `
/var/lib/stunnel/dev/log -s gen_context(system_u:object_r:devlog_t,s0) /var/lib/stunnel/dev/log -s gen_context(system_u:object_r:devlog_t,s0)
') ')

View File

@ -1,5 +1,5 @@
policy_module(logging,1.9.1) policy_module(logging,1.9.2)
######################################## ########################################
# #

View File

@ -203,11 +203,30 @@ interface(`sysnet_read_dhcpc_state',`
####################################### #######################################
## <summary> ## <summary>
## Allow network init to read network config files. ## Set the attributes of network config files.
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
## The type of the process performing this action. ## Domain allowed access.
## </summary>
## </param>
#
interface(`sysnet_setattr_config',`
gen_require(`
type net_conf_t;
')
files_search_etc($1)
allow $1 net_conf_t:file setattr;
')
#######################################
## <summary>
## Read network config files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary> ## </summary>
## </param> ## </param>
# #
@ -238,6 +257,44 @@ interface(`sysnet_dontaudit_read_config',`
dontaudit $1 net_conf_t:file read_file_perms; dontaudit $1 net_conf_t:file read_file_perms;
') ')
#######################################
## <summary>
## Write network config files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`sysnet_write_config',`
gen_require(`
type net_conf_t;
')
files_search_etc($1)
allow $1 net_conf_t:file write_file_perms;
')
#######################################
## <summary>
## Create network config files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`sysnet_create_config',`
gen_require(`
type net_conf_t;
')
files_search_etc($1)
allow $1 net_conf_t:file create_file_perms;
')
####################################### #######################################
## <summary> ## <summary>
## Create files in /etc with the type used for ## Create files in /etc with the type used for

View File

@ -1,5 +1,5 @@
policy_module(sysnetwork,1.5.0) policy_module(sysnetwork,1.5.1)
######################################## ########################################
# #
@ -50,7 +50,7 @@ allow dhcpc_t self:fifo_file rw_file_perms;
allow dhcpc_t self:tcp_socket create_stream_socket_perms; allow dhcpc_t self:tcp_socket create_stream_socket_perms;
allow dhcpc_t self:udp_socket create_socket_perms; allow dhcpc_t self:udp_socket create_socket_perms;
allow dhcpc_t self:packet_socket create_socket_perms; allow dhcpc_t self:packet_socket create_socket_perms;
allow dhcpc_t self:netlink_route_socket { create_socket_perms nlmsg_read }; allow dhcpc_t self:netlink_route_socket { create_socket_perms nlmsg_read nlmsg_write };
allow dhcpc_t dhcp_etc_t:dir list_dir_perms; allow dhcpc_t dhcp_etc_t:dir list_dir_perms;
read_lnk_files_pattern(dhcpc_t,dhcp_etc_t,dhcp_etc_t) read_lnk_files_pattern(dhcpc_t,dhcp_etc_t,dhcp_etc_t)