selinux-policy/policy/modules/services/dovecot.if
Dominick Grift 1e92803c62 Search parent directory to be able to interact with targets content.
Search parent directory to be able to interact with targets content.

Search parent directory to be able to interact with targets content.

Search parent directory to be able to interact with targets content.

Search parent directory to be able to interact with targets content.

Search parent directory to be able to interact with targets content.

Search parent directory to be able to interact with targets content.

Search parent directory to be able to interact with targets content.

Search parent directory to be able to interact with targets content.

Search parent directory to be able to interact with targets content.
2010-09-17 14:32:47 +02:00

140 lines
3.1 KiB
Plaintext

## <summary>Dovecot POP and IMAP mail server</summary>
########################################
## <summary>
## Connect to dovecot auth unix domain stream socket.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dovecot_stream_connect_auth',`
gen_require(`
type dovecot_auth_t, dovecot_var_run_t;
')
files_search_pids($1)
stream_connect_pattern($1, dovecot_var_run_t, dovecot_var_run_t, dovecot_auth_t)
')
########################################
## <summary>
## Execute dovecot_deliver in the dovecot_deliver domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`dovecot_domtrans_deliver',`
gen_require(`
type dovecot_deliver_t, dovecot_deliver_exec_t;
')
domtrans_pattern($1, dovecot_deliver_exec_t, dovecot_deliver_t)
')
########################################
## <summary>
## Create, read, write, and delete the dovecot spool files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dovecot_manage_spool',`
gen_require(`
type dovecot_spool_t;
')
files_search_spool($1)
manage_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
manage_lnk_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
')
########################################
## <summary>
## Do not audit attempts to delete dovecot lib files.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dovecot_dontaudit_unlink_lib_files',`
gen_require(`
type dovecot_var_lib_t;
')
dontaudit $1 dovecot_var_lib_t:file unlink;
')
########################################
## <summary>
## All of the rules required to administrate
## an dovecot environment
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="role">
## <summary>
## The role to be allowed to manage the dovecot domain.
## </summary>
## </param>
## <rolecap/>
#
interface(`dovecot_admin',`
gen_require(`
type dovecot_t, dovecot_etc_t, dovecot_auth_tmp_t;
type dovecot_spool_t, dovecot_var_lib_t;
type dovecot_var_run_t, dovecot_tmp_t;
type dovecot_var_log_t;
type dovecot_cert_t, dovecot_passwd_t;
type dovecot_initrc_exec_t;
type dovecot_keytab_t;
')
allow $1 dovecot_t:process { ptrace signal_perms };
ps_process_pattern($1, dovecot_t)
init_labeled_script_domtrans($1, dovecot_initrc_exec_t)
domain_system_change_exemption($1)
role_transition $2 dovecot_initrc_exec_t system_r;
allow $2 system_r;
files_list_etc($1)
admin_pattern($1, dovecot_etc_t)
files_list_tmp($1)
admin_pattern($1, dovecot_auth_tmp_t)
admin_pattern($1, dovecot_tmp_t)
admin_pattern($1, dovecot_keytab_t)
files_list_spool($1)
admin_pattern($1, dovecot_spool_t)
files_list_var_lib($1)
admin_pattern($1, dovecot_var_lib_t)
logging_search_logs($1)
admin_pattern($1, dovecot_var_log_t)
files_list_pids($1)
admin_pattern($1, dovecot_var_run_t)
admin_pattern($1, dovecot_cert_t)
admin_pattern($1, dovecot_passwd_t)
')