Oreon-Lime-R2/selinux-policy/selinux-policy-d9f4a2b/selinux-policy-d9f4a2bbeb91fd95d0c35a90936efb9ea99d2455/policy/modules/contrib/mandb.te

90 lines
2 KiB
Text
Raw Normal View History

policy_module(mandb, 1.1.1)
########################################
#
# Declarations
#
attribute_role mandb_roles;
roleattribute system_r mandb_roles;
type mandb_t;
type mandb_exec_t;
init_daemon_domain(mandb_t, mandb_exec_t)
role mandb_roles types mandb_t;
type mandb_cache_t;
files_type(mandb_cache_t)
type mandb_home_t;
userdom_user_home_content(mandb_home_t)
type mandb_lock_t;
files_lock_file(mandb_lock_t)
########################################
#
# Local policy
#
allow mandb_t self:capability { dac_read_search dac_override setuid setgid fsetid };
allow mandb_t self:process { setsched signal };
allow mandb_t self:fifo_file rw_fifo_file_perms;
allow mandb_t self:unix_stream_socket create_stream_socket_perms;
manage_dirs_pattern(mandb_t, mandb_cache_t, mandb_cache_t)
manage_files_pattern(mandb_t, mandb_cache_t, mandb_cache_t)
manage_lnk_files_pattern(mandb_t, mandb_cache_t, mandb_cache_t)
files_var_filetrans(mandb_t, mandb_cache_t, { dir file lnk_file })
can_exec(mandb_t, mandb_exec_t)
allow mandb_t mandb_cache_t:file map;
userdom_search_user_home_dirs(mandb_t)
allow mandb_t mandb_home_t:file read_file_perms;
allow mandb_t mandb_lock_t:file manage_file_perms;
files_lock_filetrans(mandb_t, mandb_lock_t, file)
kernel_read_kernel_sysctls(mandb_t)
kernel_read_system_state(mandb_t)
auth_read_passwd(mandb_t)
corecmd_exec_bin(mandb_t)
corecmd_exec_shell(mandb_t)
dev_search_sysfs(mandb_t)
domain_use_interactive_fds(mandb_t)
files_search_locks(mandb_t)
files_dontaudit_search_all_mountpoints(mandb_t)
fs_getattr_all_fs(mandb_t)
miscfiles_manage_man_cache(mandb_t)
miscfiles_setattr_man_pages(mandb_t)
miscfiles_read_man_pages(mandb_t)
ifdef(`distro_debian',`
optional_policy(`
apt_exec(mandb_t)
apt_read_db(mandb_t)
')
optional_policy(`
dpkg_exec(mandb_t)
dpkg_read_db(mandb_t)
userdom_dontaudit_search_user_home_dirs(mandb_t)
')
')
optional_policy(`
cron_system_entry(mandb_t, mandb_exec_t)
')
optional_policy(`
sssd_read_public_files(mandb_t)
sssd_stream_connect(mandb_t)
')