trunk: a pile of misc fixes.

This commit is contained in:
Chris PeBenito 2008-10-13 13:36:50 +00:00
parent 06099da657
commit aa7c463e5d
12 changed files with 57 additions and 39 deletions

View File

@ -30,12 +30,8 @@ interface(`automount_domtrans',`
## </param>
#
interface(`automount_exec_config',`
gen_require(`
type automount_etc_t;
')
corecmd_search_bin($1)
can_exec($1, automount_etc_t)
refpolicywarn(`$0(): has been deprecated, please use files_exec_etc_files() instead.')
files_exec_etc_files($1)
')
########################################

View File

@ -265,6 +265,16 @@ interface(`bind_udp_chat_named',`
## Domain allowed access.
## </summary>
## </param>
## <param name="role">
## <summary>
## Role allowed access.
## </summary>
## </param>
## <param name="terminal">
## <summary>
## The type of the terminal.
## </summary>
## </param>
## <rolecap/>
#
interface(`bind_admin',`

View File

@ -584,6 +584,26 @@ interface(`mta_read_aliases',`
allow $1 etc_aliases_t:file read_file_perms;
')
########################################
## <summary>
## Create, read, write, and delete mail address aliases.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`mta_manage_aliases',`
gen_require(`
type etc_aliases_t;
')
files_search_etc($1)
manage_files_pattern($1, etc_aliases_t, etc_aliases_t)
manage_lnk_files_pattern($1, etc_aliases_t, etc_aliases_t)
')
########################################
## <summary>
## Type transition files created in /etc

View File

@ -1,5 +1,5 @@
policy_module(mta, 1.10.1)
policy_module(mta, 1.10.2)
########################################
#

View File

@ -74,7 +74,7 @@ interface(`ntp_domtrans_ntpdate',`
interface(`ntp_admin',`
gen_require(`
type ntpd_t, ntpd_tmp_t, ntpd_log_t;
type ntpd_key_t, ntpd_var_lib_t, ntpd_var_run_t;
type ntpd_key_t, ntpd_var_run_t;
type ntpd_initrc_exec_t;
')

View File

@ -39,7 +39,7 @@
## </summary>
## </param>
#
template(`oidentd_per_role_template', `
template(`oident_per_role_template', `
########################################
#
@ -51,17 +51,17 @@ template(`oidentd_per_role_template', `
')
type $1_oidentd_home_t, oidentd_user_content_type;
userdom_user_home_content($1, oidentd_$1_content_t)
userdom_user_home_content($1, $1_oidentd_home_t)
typeattribute oidentd_$1_content_t oidentd_user_content_type;
typeattribute $1_oidentd_home_t oidentd_user_content_type;
########################################
#
# Oident daemon shared policy
#
allow $2 oidentd_$1_content_t:file manage_file_perms;
allow $2 oidentd_$1_content_t:file relabel_file_perms;
allow $2 $1_oidentd_home_t:file manage_file_perms;
allow $2 $1_oidentd_home_t:file relabel_file_perms;
')
########################################
@ -75,7 +75,7 @@ template(`oidentd_per_role_template', `
## </summary>
## </param>
#
interface(`oidentd_read_all_user_content', `
interface(`oident_read_all_user_content', `
gen_require(`
attribute oidentd_user_content_type;
')

View File

@ -56,7 +56,7 @@ miscfiles_read_localization(oidentd_t)
sysnet_read_config(oidentd_t)
oidentd_read_all_user_content(oidentd_t)
oident_read_all_user_content(oidentd_t)
optional_policy(`
nis_use_ypbind(oidentd_t)

View File

@ -182,6 +182,12 @@ seutil_dontaudit_search_config(postfix_master_t)
mta_rw_aliases(postfix_master_t)
mta_read_sendmail_bin(postfix_master_t)
ifdef(`distro_redhat',`
# for newer main.cf that uses /etc/aliases
mta_manage_aliases(postfix_master_t)
mta_etc_filetrans_aliases(postfix_master_t)
')
optional_policy(`
cyrus_stream_connect(postfix_master_t)
')
@ -199,22 +205,6 @@ optional_policy(`
sendmail_signal(postfix_master_t)
')
###########################################################
#
# Partially converted rules. THESE ARE ONLY TEMPORARY
#
ifdef(`distro_redhat',`
# for newer main.cf that uses /etc/aliases
allow postfix_master_t etc_aliases_t:dir manage_dir_perms;
allow postfix_master_t etc_aliases_t:file manage_file_perms;
allow postfix_master_t etc_aliases_t:lnk_file manage_lnk_file_perms;
mta_etc_filetrans_aliases(postfix_master_t)
filetrans_pattern(postfix_master_t, postfix_etc_t, etc_aliases_t, { dir file lnk_file })
')
# end partially converted rules
########################################
#
# Postfix bounce local policy

View File

@ -29,6 +29,11 @@ interface(`sasl_connect',`
## Domain allowed access.
## </summary>
## </param>
## <param name="role">
## <summary>
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`sasl_admin',`

View File

@ -68,7 +68,7 @@ interface(`virt_read_pid_files',`
## </summary>
## </param>
#
interface(`virt_manage_pids_files',`
interface(`virt_manage_pid_files',`
gen_require(`
type virt_var_run_t;
')
@ -167,7 +167,7 @@ interface(`virt_read_log',`
#
interface(`virt_append_log',`
gen_require(`
type var_log_t, virt_log_t;
type virt_log_t;
')
logging_search_logs($1)

View File

@ -535,10 +535,6 @@ optional_policy(`
apache_list_modules(initrc_t)
')
optional_policy(`
automount_exec_config(initrc_t)
')
optional_policy(`
bind_read_config(initrc_t)

View File

@ -136,5 +136,6 @@ optional_policy(`
# Create device files in /tmp.
# cjp: why is this created all over the place?
allow cardmgr_t { var_run_t cardmgr_var_run_t tmp_t }:dir rw_dir_perms;
type_transition cardmgr_t { var_run_t cardmgr_var_run_t tmp_t }:{ chr_file blk_file } cardmgr_dev_t;
files_pid_filetrans(cardmgr_t, cardmgr_dev_t, { chr_file blk_file })
files_tmp_filetrans(cardmgr_t, cardmgr_dev_t, { chr_file blk_file })
filetrans_pattern(cardmgr_t, cardmgr_var_run_t, cardmgr_dev_t, { chr_file blk_file })