trunk: a pile of misc fixes.

This commit is contained in:
Chris PeBenito 2008-10-13 13:36:50 +00:00
parent 06099da657
commit aa7c463e5d
12 changed files with 57 additions and 39 deletions

View File

@ -30,12 +30,8 @@ interface(`automount_domtrans',`
## </param> ## </param>
# #
interface(`automount_exec_config',` interface(`automount_exec_config',`
gen_require(` refpolicywarn(`$0(): has been deprecated, please use files_exec_etc_files() instead.')
type automount_etc_t; files_exec_etc_files($1)
')
corecmd_search_bin($1)
can_exec($1, automount_etc_t)
') ')
######################################## ########################################

View File

@ -265,6 +265,16 @@ interface(`bind_udp_chat_named',`
## Domain allowed access. ## Domain allowed access.
## </summary> ## </summary>
## </param> ## </param>
## <param name="role">
## <summary>
## Role allowed access.
## </summary>
## </param>
## <param name="terminal">
## <summary>
## The type of the terminal.
## </summary>
## </param>
## <rolecap/> ## <rolecap/>
# #
interface(`bind_admin',` interface(`bind_admin',`

View File

@ -584,6 +584,26 @@ interface(`mta_read_aliases',`
allow $1 etc_aliases_t:file read_file_perms; allow $1 etc_aliases_t:file read_file_perms;
') ')
########################################
## <summary>
## Create, read, write, and delete mail address aliases.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`mta_manage_aliases',`
gen_require(`
type etc_aliases_t;
')
files_search_etc($1)
manage_files_pattern($1, etc_aliases_t, etc_aliases_t)
manage_lnk_files_pattern($1, etc_aliases_t, etc_aliases_t)
')
######################################## ########################################
## <summary> ## <summary>
## Type transition files created in /etc ## Type transition files created in /etc

View File

@ -1,5 +1,5 @@
policy_module(mta, 1.10.1) policy_module(mta, 1.10.2)
######################################## ########################################
# #

View File

@ -74,7 +74,7 @@ interface(`ntp_domtrans_ntpdate',`
interface(`ntp_admin',` interface(`ntp_admin',`
gen_require(` gen_require(`
type ntpd_t, ntpd_tmp_t, ntpd_log_t; type ntpd_t, ntpd_tmp_t, ntpd_log_t;
type ntpd_key_t, ntpd_var_lib_t, ntpd_var_run_t; type ntpd_key_t, ntpd_var_run_t;
type ntpd_initrc_exec_t; type ntpd_initrc_exec_t;
') ')

View File

@ -39,7 +39,7 @@
## </summary> ## </summary>
## </param> ## </param>
# #
template(`oidentd_per_role_template', ` template(`oident_per_role_template', `
######################################## ########################################
# #
@ -51,17 +51,17 @@ template(`oidentd_per_role_template', `
') ')
type $1_oidentd_home_t, oidentd_user_content_type; type $1_oidentd_home_t, oidentd_user_content_type;
userdom_user_home_content($1, oidentd_$1_content_t) userdom_user_home_content($1, $1_oidentd_home_t)
typeattribute oidentd_$1_content_t oidentd_user_content_type; typeattribute $1_oidentd_home_t oidentd_user_content_type;
######################################## ########################################
# #
# Oident daemon shared policy # Oident daemon shared policy
# #
allow $2 oidentd_$1_content_t:file manage_file_perms; allow $2 $1_oidentd_home_t:file manage_file_perms;
allow $2 oidentd_$1_content_t:file relabel_file_perms; allow $2 $1_oidentd_home_t:file relabel_file_perms;
') ')
######################################## ########################################
@ -75,7 +75,7 @@ template(`oidentd_per_role_template', `
## </summary> ## </summary>
## </param> ## </param>
# #
interface(`oidentd_read_all_user_content', ` interface(`oident_read_all_user_content', `
gen_require(` gen_require(`
attribute oidentd_user_content_type; attribute oidentd_user_content_type;
') ')

View File

@ -56,7 +56,7 @@ miscfiles_read_localization(oidentd_t)
sysnet_read_config(oidentd_t) sysnet_read_config(oidentd_t)
oidentd_read_all_user_content(oidentd_t) oident_read_all_user_content(oidentd_t)
optional_policy(` optional_policy(`
nis_use_ypbind(oidentd_t) nis_use_ypbind(oidentd_t)

View File

@ -182,6 +182,12 @@ seutil_dontaudit_search_config(postfix_master_t)
mta_rw_aliases(postfix_master_t) mta_rw_aliases(postfix_master_t)
mta_read_sendmail_bin(postfix_master_t) mta_read_sendmail_bin(postfix_master_t)
ifdef(`distro_redhat',`
# for newer main.cf that uses /etc/aliases
mta_manage_aliases(postfix_master_t)
mta_etc_filetrans_aliases(postfix_master_t)
')
optional_policy(` optional_policy(`
cyrus_stream_connect(postfix_master_t) cyrus_stream_connect(postfix_master_t)
') ')
@ -199,22 +205,6 @@ optional_policy(`
sendmail_signal(postfix_master_t) sendmail_signal(postfix_master_t)
') ')
###########################################################
#
# Partially converted rules. THESE ARE ONLY TEMPORARY
#
ifdef(`distro_redhat',`
# for newer main.cf that uses /etc/aliases
allow postfix_master_t etc_aliases_t:dir manage_dir_perms;
allow postfix_master_t etc_aliases_t:file manage_file_perms;
allow postfix_master_t etc_aliases_t:lnk_file manage_lnk_file_perms;
mta_etc_filetrans_aliases(postfix_master_t)
filetrans_pattern(postfix_master_t, postfix_etc_t, etc_aliases_t, { dir file lnk_file })
')
# end partially converted rules
######################################## ########################################
# #
# Postfix bounce local policy # Postfix bounce local policy

View File

@ -29,6 +29,11 @@ interface(`sasl_connect',`
## Domain allowed access. ## Domain allowed access.
## </summary> ## </summary>
## </param> ## </param>
## <param name="role">
## <summary>
## Role allowed access.
## </summary>
## </param>
## <rolecap/> ## <rolecap/>
# #
interface(`sasl_admin',` interface(`sasl_admin',`

View File

@ -68,7 +68,7 @@ interface(`virt_read_pid_files',`
## </summary> ## </summary>
## </param> ## </param>
# #
interface(`virt_manage_pids_files',` interface(`virt_manage_pid_files',`
gen_require(` gen_require(`
type virt_var_run_t; type virt_var_run_t;
') ')
@ -167,7 +167,7 @@ interface(`virt_read_log',`
# #
interface(`virt_append_log',` interface(`virt_append_log',`
gen_require(` gen_require(`
type var_log_t, virt_log_t; type virt_log_t;
') ')
logging_search_logs($1) logging_search_logs($1)

View File

@ -535,10 +535,6 @@ optional_policy(`
apache_list_modules(initrc_t) apache_list_modules(initrc_t)
') ')
optional_policy(`
automount_exec_config(initrc_t)
')
optional_policy(` optional_policy(`
bind_read_config(initrc_t) bind_read_config(initrc_t)

View File

@ -136,5 +136,6 @@ optional_policy(`
# Create device files in /tmp. # Create device files in /tmp.
# cjp: why is this created all over the place? # cjp: why is this created all over the place?
allow cardmgr_t { var_run_t cardmgr_var_run_t tmp_t }:dir rw_dir_perms; files_pid_filetrans(cardmgr_t, cardmgr_dev_t, { chr_file blk_file })
type_transition cardmgr_t { var_run_t cardmgr_var_run_t tmp_t }:{ chr_file blk_file } cardmgr_dev_t; files_tmp_filetrans(cardmgr_t, cardmgr_dev_t, { chr_file blk_file })
filetrans_pattern(cardmgr_t, cardmgr_var_run_t, cardmgr_dev_t, { chr_file blk_file })