## APC UPS monitoring daemon. ######################################## ## ## Execute a domain transition to ## run apcupsd. ## ## ## ## Domain allowed to transition. ## ## # interface(`apcupsd_domtrans',` gen_require(` type apcupsd_t, apcupsd_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, apcupsd_exec_t, apcupsd_t) ') ######################################## ## ## Execute apcupsd server in the ## apcupsd domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`apcupsd_initrc_domtrans',` gen_require(` type apcupsd_initrc_exec_t; ') init_labeled_script_domtrans($1, apcupsd_initrc_exec_t) ') ######################################## ## ## Read apcupsd PID files. ## ## ## ## Domain allowed access. ## ## # interface(`apcupsd_read_pid_files',` gen_require(` type apcupsd_var_run_t; ') files_search_pids($1) allow $1 apcupsd_var_run_t:file read_file_perms; ') ######################################## ## ## Read apcupsd power files. ## ## ## ## Domain allowed access. ## ## # interface(`apcupsd_read_power_files',` gen_require(` type apcupsd_power_t; ') allow $1 apcupsd_power_t:file read_file_perms; ') ######################################## ## ## Read apcupsd log files. ## ## ## ## Domain allowed access. ## ## ## # interface(`apcupsd_read_log',` gen_require(` type apcupsd_log_t; ') logging_search_logs($1) allow $1 apcupsd_log_t:dir list_dir_perms; allow $1 apcupsd_log_t:file read_file_perms; ') ######################################## ## ## Append apcupsd log files. ## ## ## ## Domain allowed access. ## ## # interface(`apcupsd_append_log',` gen_require(` type apcupsd_log_t; ') logging_search_logs($1) allow $1 apcupsd_log_t:dir list_dir_perms; allow $1 apcupsd_log_t:file append_file_perms; ') ######################################## ## ## Execute a domain transition to ## run apcupsd_cgi_script. ## ## ## ## Domain allowed to transition. ## ## # interface(`apcupsd_cgi_script_domtrans',` gen_require(` type apcupsd_cgi_script_t, apcupsd_cgi_script_exec_t; ') files_search_var($1) domtrans_pattern($1, apcupsd_cgi_script_exec_t, apcupsd_cgi_script_t) optional_policy(` apache_search_sys_content($1) ') ') ######################################## ## ## Execute apcupsd server in the apcupsd domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`apcupsd_systemctl',` gen_require(` type apcupsd_t; type apcupsd_unit_file_t; ') systemd_exec_systemctl($1) init_reload_services($1) allow $1 apcupsd_unit_file_t:file read_file_perms; allow $1 apcupsd_unit_file_t:service manage_service_perms; ps_process_pattern($1, apcupsd_t) ') ######################################## ## ## Create configuration files in /var/lock ## with a named file type transition. ## ## ## ## Domain allowed access. ## ## # interface(`apcupsd_filetrans_named_content',` gen_require(` type apcupsd_lock_t; ') files_lock_filetrans($1, apcupsd_lock_t, file, "apcupsd") files_lock_filetrans($1, apcupsd_lock_t, file, "LCK..") ') ######################################## ## ## All of the rules required to ## administrate an apcupsd environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`apcupsd_admin',` gen_require(` type apcupsd_t, apcupsd_tmp_t, apcupsd_log_t; type apcupsd_var_run_t, apcupsd_initrc_exec_t, apcupsd_lock_t; type apcupsd_unit_file_t; type apcupsd_power_t; ') allow $1 apcupsd_t:process signal_perms; ps_process_pattern($1, apcupsd_t) tunable_policy(`deny_ptrace',`',` allow $1 apcupsd_t:process ptrace; ') apcupsd_initrc_domtrans($1, apcupsd_initrc_exec_t) domain_system_change_exemption($1) role_transition $2 apcupsd_initrc_exec_t system_r; allow $2 system_r; files_list_var($1) admin_pattern($1, apcupsd_lock_t) logging_list_logs($1) admin_pattern($1, apcupsd_log_t) files_list_tmp($1) admin_pattern($1, apcupsd_tmp_t) files_list_pids($1) admin_pattern($1, apcupsd_var_run_t) apcupsd_systemctl($1) admin_pattern($1, apcupsd_unit_file_t) allow $1 apcupsd_unit_file_t:service all_service_perms; manage_files_pattern($1, apcupsd_power_t, apcupsd_power_t) files_etc_filetrans(apcupsd_t, apcupsd_power_t, file, "powerfail") ')