selinux-policy/strict/macros/program/lpr_macros.te
2005-04-29 17:45:15 +00:00

135 lines
3.6 KiB
Plaintext

#
# Macros for lpr domains.
#
#
# Authors: Stephen Smalley <sds@epoch.ncsc.mil> and Timothy Fraser
#
#
# lpr_domain(domain_prefix)
#
# Define a derived domain for the lpr/lpq/lprm programs when executed
# by a user domain.
#
# The type declaration for the executable type for this program is
# provided separately in domains/program/lpr.te.
#
undefine(`lpr_domain')
define(`lpr_domain',`
# Derived domain based on the calling user domain and the program
type $1_lpr_t, domain, privlog, nscd_client_domain;
# Transition from the user domain to the derived domain.
domain_auto_trans($1_t, lpr_exec_t, $1_lpr_t)
allow $1_t $1_lpr_t:process signull;
# allow using shared objects, accessing root dir, etc
uses_shlib($1_lpr_t)
read_locale($1_lpr_t)
# The user role is authorized for this domain.
role $1_r types $1_lpr_t;
# This domain is granted permissions common to most domains (including can_net)
can_network_client($1_lpr_t)
can_ypbind($1_lpr_t)
# Use capabilities.
allow $1_lpr_t $1_lpr_t:capability { setuid dac_override net_bind_service chown };
allow $1_lpr_t self:unix_stream_socket create_stream_socket_perms;
# for lpd config files (should have a new type)
r_dir_file($1_lpr_t, etc_t)
# for test print
r_dir_file($1_lpr_t, usr_t)
ifdef(`lpd.te', `
r_dir_file($1_lpr_t, printconf_t)
')
tmp_domain($1_lpr)
r_dir_file($1_lpr_t, $1_tmp_t)
# Type for spool files.
type $1_print_spool_t, file_type, sysadmfile;
# Use this type when creating files in /var/spool/lpd and /var/spool/cups.
file_type_auto_trans($1_lpr_t, print_spool_t, $1_print_spool_t, file)
allow $1_lpr_t var_spool_t:dir search;
# for /dev/null
allow $1_lpr_t device_t:dir search;
# Access the terminal.
access_terminal($1_lpr_t, $1)
# Inherit and use descriptors from gnome-pty-helper.
ifdef(`gnome-pty-helper.te', `allow $1_lpr_t $1_gph_t:fd use;')
allow $1_lpr_t privfd:fd use;
# Read user files.
allow sysadm_lpr_t { home_root_t $1_home_t $1_home_dir_t }:dir search;
allow sysadm_lpr_t $1_home_t:{ file lnk_file } r_file_perms;
allow $1_lpr_t { home_root_t $1_home_t $1_home_dir_t }:dir search;
allow $1_lpr_t $1_home_t:{ file lnk_file } r_file_perms;
if (use_nfs_home_dirs) {
r_dir_file($1_lpr_t, nfs_t)
}
if (use_samba_home_dirs) {
r_dir_file($1_lpr_t, cifs_t)
}
# Read and write shared files in the spool directory.
allow $1_lpr_t print_spool_t:file rw_file_perms;
# lpr can run in lightweight mode, without a local print spooler. If the
# lpd policy is present, grant some permissions for this domain and the lpd
# domain to interact.
ifdef(`lpd.te', `
allow $1_lpr_t { var_t var_run_t }:dir search;
allow $1_lpr_t lpd_var_run_t:dir search;
allow $1_lpr_t lpd_var_run_t:sock_file write;
# Allow lpd to read, rename, and unlink spool files.
allow lpd_t $1_print_spool_t:file r_file_perms;
allow lpd_t $1_print_spool_t:file link_file_perms;
# Connect to lpd via a Unix domain socket.
allow $1_lpr_t printer_t:sock_file rw_file_perms;
can_unix_connect($1_lpr_t, lpd_t)
dontaudit $1_lpr_t $1_t:unix_stream_socket { read write };
# Connect to lpd via a TCP socket.
can_tcp_connect($1_lpr_t, lpd_t)
allow $1_lpr_t fs_t:filesystem getattr;
# Send SIGHUP to lpd.
allow $1_lpr_t lpd_t:process signal;
')dnl end if lpd.te
ifdef(`xdm.te', `
allow $1_lpr_t xdm_t:fd use;
allow $1_lpr_t xdm_t:fifo_file write;
')
ifdef(`cups.te', `
allow { $1_lpr_t $1_t } cupsd_etc_t:dir search;
allow $1_lpr_t { cupsd_etc_t cupsd_rw_etc_t }:file { getattr read };
can_tcp_connect({ $1_lpr_t $1_t }, cupsd_t)
')dnl end ifdef cups.te
ifdef(`hide_broken_symptoms', `
# thunderbird causes these
dontaudit $1_lpr_t $1_t:tcp_socket { read write };
dontaudit $1_lpr_t { $1_home_t $1_tmp_t }:file write;
')
')dnl end macro definition