selinux-policy/policy/modules/services/pingd.if
Dominick Grift 1976ddda24 Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.

Whitespace, newline and tab fixes.
2010-09-20 18:15:28 +02:00

97 lines
2.0 KiB
Plaintext

## <summary>Pingd of the Whatsup cluster node up/down detection utility</summary>
########################################
## <summary>
## Execute a domain transition to run pingd.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`pingd_domtrans',`
gen_require(`
type pingd_t, pingd_exec_t;
')
domtrans_pattern($1, pingd_exec_t, pingd_t)
')
#######################################
## <summary>
## Read pingd etc configuration files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`pingd_read_config',`
gen_require(`
type pingd_etc_t;
')
files_search_etc($1)
read_files_pattern($1, pingd_etc_t, pingd_etc_t)
')
#######################################
## <summary>
## Manage pingd etc configuration files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`pingd_manage_config',`
gen_require(`
type pingd_etc_t;
')
files_search_etc($1)
manage_dirs_pattern($1, pingd_etc_t, pingd_etc_t)
manage_files_pattern($1, pingd_etc_t, pingd_etc_t)
')
#######################################
## <summary>
## All of the rules required to administrate
## an pingd environment
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="role">
## <summary>
## The role to be allowed to manage the pingd domain.
## </summary>
## </param>
## <rolecap/>
#
interface(`pingd_admin',`
gen_require(`
type pingd_t, pingd_etc_t;
type pingd_initrc_exec_t, pingd_modules_t;
')
allow $1 pingd_t:process { ptrace signal_perms };
ps_process_pattern($1, pingd_t)
init_labeled_script_domtrans($1, pingd_initrc_exec_t)
domain_system_change_exemption($1)
role_transition $2 pingd_initrc_exec_t system_r;
allow $2 system_r;
files_list_etc($1)
admin_pattern($1, pingd_etc_t)
files_list_usr($1)
admin_pattern($1, pingd_modules_t)
')