Improve documentation on files_read_etc_files().
This commit is contained in:
parent
611bc9311d
commit
fca4a96bae
@ -2111,11 +2111,45 @@ interface(`files_manage_etc_dirs',`
|
|||||||
## <summary>
|
## <summary>
|
||||||
## Read generic files in /etc.
|
## Read generic files in /etc.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Allow the specified domain to read generic
|
||||||
|
## files in /etc. These files are typically
|
||||||
|
## general system configuration files that do
|
||||||
|
## not have more specific SELinux types. Some
|
||||||
|
## examples of these files are:
|
||||||
|
## </p>
|
||||||
|
## <ul>
|
||||||
|
## <li>/etc/fstab</li>
|
||||||
|
## <li>/etc/passwd</li>
|
||||||
|
## <li>/etc/services</li>
|
||||||
|
## <li>/etc/shells</li>
|
||||||
|
## </ul>
|
||||||
|
## <p>
|
||||||
|
## This interface does not include access to /etc/shadow.
|
||||||
|
## </p>
|
||||||
|
## <p>
|
||||||
|
## Generally, it is safe for many domains to have
|
||||||
|
## this access. However, since this interface provides
|
||||||
|
## access to the /etc/passwd file, caution must be
|
||||||
|
## exercised, as user account names can be leaked
|
||||||
|
## through this access.
|
||||||
|
## </p>
|
||||||
|
## <p>
|
||||||
|
## Related interfaces:
|
||||||
|
## </p>
|
||||||
|
## <ul>
|
||||||
|
## <li>auth_read_shadow()</li>
|
||||||
|
## <li>files_read_etc_runtime_files()</li>
|
||||||
|
## <li>seutil_read_config()</li>
|
||||||
|
## </ul>
|
||||||
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
|
## <infoflow type="read" weight="10"/>
|
||||||
#
|
#
|
||||||
interface(`files_read_etc_files',`
|
interface(`files_read_etc_files',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
|
Loading…
Reference in New Issue
Block a user