clean up networkmanager hacks
This commit is contained in:
parent
cf0ff557b2
commit
d828b5ca8f
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(apm,1.0)
|
policy_module(apm,1.0.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -138,6 +138,7 @@ libs_use_shared_libs(apmd_t)
|
|||||||
logging_send_syslog_msg(apmd_t)
|
logging_send_syslog_msg(apmd_t)
|
||||||
|
|
||||||
miscfiles_read_localization(apmd_t)
|
miscfiles_read_localization(apmd_t)
|
||||||
|
miscfiles_read_hwdata(apmd_t)
|
||||||
|
|
||||||
modutils_domtrans_insmod(apmd_t)
|
modutils_domtrans_insmod(apmd_t)
|
||||||
modutils_read_module_conf(apmd_t)
|
modutils_read_module_conf(apmd_t)
|
||||||
@ -168,7 +169,6 @@ ifdef(`distro_redhat',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
',`
|
',`
|
||||||
|
|
||||||
# for ifconfig which is run all the time
|
# for ifconfig which is run all the time
|
||||||
kernel_dontaudit_search_sysctl(apmd_t)
|
kernel_dontaudit_search_sysctl(apmd_t)
|
||||||
')
|
')
|
||||||
@ -195,6 +195,14 @@ optional_policy(`cron',`
|
|||||||
cron_domtrans_anacron_system_job(apmd_t)
|
cron_domtrans_anacron_system_job(apmd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`dbus',`
|
||||||
|
dbus_stub(apmd_t)
|
||||||
|
|
||||||
|
optional_policy(`networkmanager',`
|
||||||
|
networkmanager_dbus_chat(apmd_t)
|
||||||
|
')
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`logrotate',`
|
optional_policy(`logrotate',`
|
||||||
logrotate_use_fd(apmd_t)
|
logrotate_use_fd(apmd_t)
|
||||||
')
|
')
|
||||||
@ -227,7 +235,4 @@ allow apmd_t user_tty_type:chr_file { ioctl read getattr lock write append };
|
|||||||
optional_policy(`cron',`
|
optional_policy(`cron',`
|
||||||
allow apmd_t crond_t:fifo_file { getattr read write ioctl };
|
allow apmd_t crond_t:fifo_file { getattr read write ioctl };
|
||||||
')
|
')
|
||||||
|
|
||||||
r_dir_file(apmd_t, hwdata_t)
|
|
||||||
|
|
||||||
')
|
')
|
||||||
|
@ -1,5 +1,19 @@
|
|||||||
## <summary>Desktop messaging bus</summary>
|
## <summary>Desktop messaging bus</summary>
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## DBUS stub interface. No access allowed.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain" optional="true">
|
||||||
|
## N/A
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`dbus_stub',`
|
||||||
|
gen_require(`
|
||||||
|
type system_dbusd_t;
|
||||||
|
')
|
||||||
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## The per user domain template for the dbus module.
|
## The per user domain template for the dbus module.
|
||||||
@ -173,9 +187,6 @@ template(`dbus_system_bus_client_template',`
|
|||||||
gen_require(`
|
gen_require(`
|
||||||
type system_dbusd_t, system_dbusd_t;
|
type system_dbusd_t, system_dbusd_t;
|
||||||
type system_dbusd_var_run_t;
|
type system_dbusd_var_run_t;
|
||||||
class dir search;
|
|
||||||
class sock_file write;
|
|
||||||
class unix_stream_socket connectto;
|
|
||||||
class dbus send_msg;
|
class dbus send_msg;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -34,6 +34,7 @@ role system_r types dovecot_auth_t;
|
|||||||
#
|
#
|
||||||
# dovecot local policy
|
# dovecot local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
allow dovecot_t self:capability { dac_override dac_read_search chown net_bind_service setgid setuid sys_chroot };
|
allow dovecot_t self:capability { dac_override dac_read_search chown net_bind_service setgid setuid sys_chroot };
|
||||||
dontaudit dovecot_t self:capability sys_tty_config;
|
dontaudit dovecot_t self:capability sys_tty_config;
|
||||||
allow dovecot_t self:process { setrlimit signal_perms };
|
allow dovecot_t self:process { setrlimit signal_perms };
|
||||||
@ -141,6 +142,7 @@ optional_policy(`udev',`
|
|||||||
#
|
#
|
||||||
# dovecot auth local policy
|
# dovecot auth local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
allow dovecot_auth_t self:capability { setgid setuid };
|
allow dovecot_auth_t self:capability { setgid setuid };
|
||||||
allow dovecot_auth_t self:process signal_perms;
|
allow dovecot_auth_t self:process signal_perms;
|
||||||
allow dovecot_auth_t self:fifo_file rw_file_perms;
|
allow dovecot_auth_t self:fifo_file rw_file_perms;
|
||||||
|
@ -137,10 +137,13 @@ optional_policy(`cups',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`dbus',`
|
optional_policy(`dbus',`
|
||||||
allow hald_t self:dbus send_msg;
|
|
||||||
dbus_system_bus_client_template(hald,hald_t)
|
dbus_system_bus_client_template(hald,hald_t)
|
||||||
dbus_send_system_bus_msg(hald_t)
|
dbus_send_system_bus_msg(hald_t)
|
||||||
dbus_connect_system_bus(hald_t)
|
dbus_connect_system_bus(hald_t)
|
||||||
|
|
||||||
|
optional_policy(`networkmanager',`
|
||||||
|
networkmanager_dbus_chat(hald_t)
|
||||||
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`dmidecode',`
|
optional_policy(`dmidecode',`
|
||||||
|
@ -1 +1,17 @@
|
|||||||
## <summary>Port of Apple Rendezvous multicast DNS</summary>
|
## <summary>Port of Apple Rendezvous multicast DNS</summary>
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Send generic signals to howl.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`howl_signal',`
|
||||||
|
gen_require(`
|
||||||
|
type howl_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 howl_t:process signal;
|
||||||
|
')
|
||||||
|
@ -1 +1,20 @@
|
|||||||
## <summary>Manager for dynamically switching between networks.</summary>
|
## <summary>Manager for dynamically switching between networks.</summary>
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Send and receive messages from
|
||||||
|
## NetworkManager over dbus.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`networkmanager_dbus_chat',`
|
||||||
|
gen_require(`
|
||||||
|
type NetworkManager_t;
|
||||||
|
class dbus send_msg;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 NetworkManager_t:dbus send_msg;
|
||||||
|
allow NetworkManager_t $1:dbus send_msg;
|
||||||
|
')
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(networkmanager,0.9)
|
policy_module(networkmanager,1.0.0)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -65,6 +65,8 @@ fs_search_auto_mountpoints(NetworkManager_t)
|
|||||||
|
|
||||||
mls_file_read_up(NetworkManager_t)
|
mls_file_read_up(NetworkManager_t)
|
||||||
|
|
||||||
|
selinux_dontaudit_search_fs(NetworkManager_t)
|
||||||
|
|
||||||
term_dontaudit_use_console(NetworkManager_t)
|
term_dontaudit_use_console(NetworkManager_t)
|
||||||
|
|
||||||
corecmd_exec_shell(NetworkManager_t)
|
corecmd_exec_shell(NetworkManager_t)
|
||||||
@ -98,12 +100,16 @@ seutil_read_config(NetworkManager_t)
|
|||||||
sysnet_domtrans_ifconfig(NetworkManager_t)
|
sysnet_domtrans_ifconfig(NetworkManager_t)
|
||||||
sysnet_domtrans_dhcpc(NetworkManager_t)
|
sysnet_domtrans_dhcpc(NetworkManager_t)
|
||||||
sysnet_signal_dhcpc(NetworkManager_t)
|
sysnet_signal_dhcpc(NetworkManager_t)
|
||||||
|
sysnet_read_dhcpc_pid(NetworkManager_t)
|
||||||
|
sysnet_delete_dhcpc_pid(NetworkManager_t)
|
||||||
|
sysnet_search_dhcp_state(NetworkManager_t)
|
||||||
# in /etc created by NetworkManager will be labelled net_conf_t.
|
# in /etc created by NetworkManager will be labelled net_conf_t.
|
||||||
sysnet_manage_config(NetworkManager_t)
|
sysnet_manage_config(NetworkManager_t)
|
||||||
sysnet_create_config(NetworkManager_t)
|
sysnet_create_config(NetworkManager_t)
|
||||||
|
|
||||||
userdom_dontaudit_use_unpriv_user_fd(NetworkManager_t)
|
userdom_dontaudit_use_unpriv_user_fd(NetworkManager_t)
|
||||||
userdom_dontaudit_search_sysadm_home_dir(NetworkManager_t)
|
userdom_dontaudit_search_sysadm_home_dir(NetworkManager_t)
|
||||||
|
userdom_dontaudit_use_unpriv_user_tty(NetworkManager_t)
|
||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(NetworkManager_t)
|
term_dontaudit_use_unallocated_tty(NetworkManager_t)
|
||||||
@ -119,6 +125,16 @@ optional_policy(`consoletype',`
|
|||||||
consoletype_exec(NetworkManager_t)
|
consoletype_exec(NetworkManager_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`dbus',`
|
||||||
|
dbus_system_bus_client_template(NetworkManager,NetworkManager_t)
|
||||||
|
dbus_connect_system_bus(NetworkManager_t)
|
||||||
|
dbus_send_system_bus_msg(NetworkManager_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
optional_policy(`howl',`
|
||||||
|
howl_signal(NetworkManager_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`mount',`
|
optional_policy(`mount',`
|
||||||
mount_send_nfs_client_request(NetworkManager_t)
|
mount_send_nfs_client_request(NetworkManager_t)
|
||||||
')
|
')
|
||||||
@ -142,48 +158,3 @@ optional_policy(`udev',`
|
|||||||
optional_policy(`vpn',`
|
optional_policy(`vpn',`
|
||||||
vpn_domtrans(NetworkManager_t)
|
vpn_domtrans(NetworkManager_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
###########################################################
|
|
||||||
#
|
|
||||||
# Partially converted rules. THESE ARE ONLY TEMPORARY
|
|
||||||
#
|
|
||||||
|
|
||||||
optional_policy(`dbus',`
|
|
||||||
gen_require(`
|
|
||||||
class dbus send_msg;
|
|
||||||
')
|
|
||||||
|
|
||||||
allow NetworkManager_t self:dbus send_msg;
|
|
||||||
|
|
||||||
allow NetworkManager_t userdomain:dbus send_msg;
|
|
||||||
allow userdomain NetworkManager_t:dbus send_msg;
|
|
||||||
|
|
||||||
allow NetworkManager_t initrc_t:dbus send_msg;
|
|
||||||
allow initrc_t NetworkManager_t:dbus send_msg;
|
|
||||||
|
|
||||||
allow NetworkManager_t apmd_t:dbus send_msg;
|
|
||||||
allow apmd_t NetworkManager_t:dbus send_msg;
|
|
||||||
|
|
||||||
dbus_system_bus_client_template(NetworkManager,NetworkManager_t)
|
|
||||||
dbus_connect_system_bus(NetworkManager_t)
|
|
||||||
dbus_send_system_bus_msg(NetworkManager_t)
|
|
||||||
|
|
||||||
ifdef(`targeted_policy',`
|
|
||||||
allow NetworkManager_t unconfined_t:dbus send_msg;
|
|
||||||
allow unconfined_t NetworkManager_t:dbus send_msg;
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`hal',`
|
|
||||||
allow NetworkManager_t hald_t:dbus send_msg;
|
|
||||||
allow hald_t NetworkManager_t:dbus send_msg;
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
|
||||||
allow NetworkManager_t howl_t:process signal;
|
|
||||||
|
|
||||||
allow NetworkManager_t dhcp_state_t:dir search;
|
|
||||||
allow NetworkManager_t dhcpc_var_run_t:file { getattr read unlink };
|
|
||||||
|
|
||||||
allow NetworkManager_t var_lib_t:dir search;
|
|
||||||
dontaudit NetworkManager_t user_ttynode:chr_file { read write };
|
|
||||||
dontaudit NetworkManager_t security_t:dir search;
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(init,1.0)
|
policy_module(init,1.0.1)
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
class passwd rootok;
|
class passwd rootok;
|
||||||
@ -497,14 +497,10 @@ optional_policy(`cpucontrol',`
|
|||||||
optional_policy(`dbus',`
|
optional_policy(`dbus',`
|
||||||
dbus_connect_system_bus(initrc_t)
|
dbus_connect_system_bus(initrc_t)
|
||||||
dbus_send_system_bus_msg(initrc_t)
|
dbus_send_system_bus_msg(initrc_t)
|
||||||
|
dbus_system_bus_client_template(initrc,initrc_t)
|
||||||
|
|
||||||
# FIXME
|
optional_policy(`networkmanager',`
|
||||||
allow initrc_t system_dbusd_t:unix_stream_socket connectto;
|
networkmanager_dbus_chat(initrc_t)
|
||||||
allow initrc_t system_dbusd_var_run_t:sock_file write;
|
|
||||||
|
|
||||||
ifdef(`targeted_policy',`
|
|
||||||
allow unconfined_t initrc_t:dbus { acquire_svc send_msg };
|
|
||||||
allow initrc_t unconfined_t:dbus { acquire_svc send_msg };
|
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -57,6 +57,14 @@ ifdef(`targeted_policy',`
|
|||||||
bluetooth_domtrans_helper(unconfined_t)
|
bluetooth_domtrans_helper(unconfined_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`dbus',`
|
||||||
|
dbus_stub(unconfined_t)
|
||||||
|
|
||||||
|
optional_policy(`networkmanager',`
|
||||||
|
networkmanager_dbus_chat(unconfined_t)
|
||||||
|
')
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`dmidecode',`
|
optional_policy(`dmidecode',`
|
||||||
dmidecode_domtrans(unconfined_t)
|
dmidecode_domtrans(unconfined_t)
|
||||||
')
|
')
|
||||||
|
@ -310,6 +310,10 @@ template(`base_user_template',`
|
|||||||
|
|
||||||
optional_policy(`dbus',`
|
optional_policy(`dbus',`
|
||||||
dbus_system_bus_client_template($1,$1_t)
|
dbus_system_bus_client_template($1,$1_t)
|
||||||
|
|
||||||
|
optional_policy(`networkmanager',`
|
||||||
|
networkmanager_dbus_chat($1_t)
|
||||||
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`dictd',`
|
optional_policy(`dictd',`
|
||||||
@ -2466,7 +2470,7 @@ interface(`userdom_write_unpriv_user_tmp',`
|
|||||||
#
|
#
|
||||||
interface(`userdom_dontaudit_use_unpriv_user_tty',`
|
interface(`userdom_dontaudit_use_unpriv_user_tty',`
|
||||||
ifdef(`targeted_policy',`
|
ifdef(`targeted_policy',`
|
||||||
term_dontaudit_use_generic_pty($1)
|
term_dontaudit_use_unallocated_tty($1)
|
||||||
',`
|
',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
attribute user_ttynode;
|
attribute user_ttynode;
|
||||||
|
Loading…
Reference in New Issue
Block a user