Oreon-Lime-R2/selinux-policy/selinux-policy-d9f4a2b/selinux-policy-d9f4a2bbeb91fd95d0c35a90936efb9ea99d2455/policy/modules/contrib/targetd.te

200 lines
4.9 KiB
Text
Raw Normal View History

policy_module(targetd, 1.0.0)
########################################
#
# Declarations
#
type targetd_t;
type targetd_exec_t;
init_daemon_domain(targetd_t, targetd_exec_t)
type targetclid_t;
type targetclid_exec_t;
init_daemon_domain(targetclid_t, targetclid_exec_t)
type targetd_etc_rw_t;
files_type(targetd_etc_rw_t)
type targetd_unit_file_t;
systemd_unit_file(targetd_unit_file_t)
type targetclid_unit_file_t;
systemd_unit_file(targetclid_unit_file_t)
type targetd_var_t;
files_type(targetd_var_t)
type targetd_tmp_t;
files_tmp_file(targetd_tmp_t)
type targetclid_tmp_t;
files_tmp_file(targetclid_tmp_t)
type targetclid_home_t;
userdom_user_home_content(targetclid_home_t)
type targetclid_var_run_t;
files_pid_file(targetclid_var_run_t)
########################################
#
# targetd local policy
#
allow targetd_t self:capability { chown ipc_lock sys_admin sys_nice };
allow targetd_t self:fifo_file rw_fifo_file_perms;
allow targetd_t self:unix_stream_socket create_stream_socket_perms;
allow targetd_t self:unix_dgram_socket create_socket_perms;
allow targetd_t self:tcp_socket { accept listen };
allow targetd_t self:netlink_route_socket r_netlink_socket_perms;
allow targetd_t self:process { setfscreate setsched };
manage_dirs_pattern(targetd_t, targetd_etc_rw_t, targetd_etc_rw_t)
manage_files_pattern(targetd_t, targetd_etc_rw_t, targetd_etc_rw_t)
files_etc_filetrans(targetd_t, targetd_etc_rw_t, { dir file })
manage_dirs_pattern(targetd_t, targetd_tmp_t, targetd_tmp_t)
manage_files_pattern(targetd_t, targetd_tmp_t, targetd_tmp_t)
files_tmp_filetrans(targetd_t, targetd_tmp_t, { file dir })
files_rw_isid_type_dirs(targetd_t)
files_setattr_isid_type_dirs(targetd_t)
fs_getattr_xattr_fs(targetd_t)
fs_manage_configfs_files(targetd_t)
fs_manage_configfs_lnk_files(targetd_t)
fs_manage_configfs_dirs(targetd_t)
fs_read_nfsd_files(targetd_t)
kernel_rw_rpc_sysctls(targetd_t)
kernel_get_sysvipc_info(targetd_t)
kernel_read_system_state(targetd_t)
kernel_read_network_state(targetd_t)
kernel_read_net_sysctls(targetd_t)
kernel_load_module(targetd_t)
kernel_request_load_module(targetd_t)
kernel_dgram_send(targetd_t)
rpc_manage_exports(targetd_t)
storage_raw_rw_fixed_disk(targetd_t)
auth_use_nsswitch(targetd_t)
corecmd_exec_shell(targetd_t)
corecmd_exec_bin(targetd_t)
corenet_tcp_bind_generic_node(targetd_t)
corenet_tcp_bind_lsm_plugin_port(targetd_t)
dev_rw_sysfs(targetd_t)
dev_read_urand(targetd_t)
dev_rw_lvm_control(targetd_t)
dev_getattr_loop_control(targetd_t)
libs_exec_ldconfig(targetd_t)
seutil_dontaudit_read_module_store(targetd_t)
storage_raw_read_fixed_disk(targetd_t)
storage_raw_read_removable_device(targetd_t)
sysnet_read_config(targetd_t)
optional_policy(`
apache_dontaudit_search_config(targetd_t)
')
optional_policy(`
gnome_read_generic_data_home_dirs(targetd_t)
')
optional_policy(`
logging_write_syslog_pid_socket(targetd_t)
')
optional_policy(`
lvm_domtrans(targetd_t)
')
optional_policy(`
modutils_read_module_config(targetd_t)
')
optional_policy(`
rpc_manage_nfs_state_data(targetd_t)
')
optional_policy(`
rpm_dontaudit_read_db(targetd_t)
rpm_dontaudit_exec(targetd_t)
')
optional_policy(`
udev_read_pid_files(targetd_t)
')
########################################
#
# targetclid local policy
#
allow targetclid_t self:capability dac_override;
allow targetclid_t self:fifo_file rw_fifo_file_perms;
allow targetclid_t self:system module_load;
allow targetclid_t self:unix_stream_socket create_stream_socket_perms;
manage_dirs_pattern(targetclid_t, targetclid_home_t, targetclid_home_t)
manage_files_pattern(targetclid_t, targetclid_home_t, targetclid_home_t)
userdom_admin_home_dir_filetrans(targetclid_t, targetclid_home_t, dir, ".targetcli")
manage_files_pattern(targetclid_t, targetclid_tmp_t, targetclid_tmp_t)
files_tmp_filetrans(targetclid_t, targetclid_tmp_t, { file })
list_dirs_pattern(targetclid_t, targetd_var_t, targetd_var_t)
read_files_pattern(targetclid_t, targetd_var_t, targetd_var_t)
manage_files_pattern(targetclid_t, targetclid_var_run_t, targetclid_var_run_t)
manage_sock_files_pattern(targetclid_t, targetclid_var_run_t, targetclid_var_run_t)
files_pid_filetrans(targetclid_t, targetclid_var_run_t, { file sock_file })
manage_dirs_pattern(targetclid_t, targetd_etc_rw_t, targetd_etc_rw_t)
kernel_load_module(targetclid_t)
kernel_read_all_proc(targetclid_t)
corecmd_exec_bin(targetclid_t)
dev_read_sysfs(targetclid_t)
domain_use_interactive_fds(targetclid_t)
files_getattr_all_dirs(targetclid_t)
files_read_etc_files(targetclid_t)
fs_manage_configfs_dirs(targetclid_t)
fs_manage_configfs_files(targetclid_t)
optional_policy(`
auth_read_passwd(targetclid_t)
')
optional_policy(`
dbus_system_bus_client(targetclid_t)
')
optional_policy(`
libs_exec_ldconfig(targetclid_t)
')
optional_policy(`
miscfiles_read_generic_certs(targetclid_t)
miscfiles_read_localization(targetclid_t)
')
optional_policy(`
modutils_exec_kmod(targetclid_t)
modutils_read_module_config(targetclid_t)
modutils_read_module_deps(targetclid_t)
')