## pkcs11proxyd-softhsm-ctl - manage the isolated PKCS #11 daemon with softhsm ######################################## ## ## Execute pkcs11proxyd_exec_t in the pkcs11proxyd domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`pkcs11proxyd_domtrans',` gen_require(` type pkcs11proxyd_t, pkcs11proxyd_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, pkcs11proxyd_exec_t, pkcs11proxyd_t) ') ###################################### ## ## Execute pkcs11proxyd in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`pkcs11proxyd_exec',` gen_require(` type pkcs11proxyd_exec_t; ') corecmd_search_bin($1) can_exec($1, pkcs11proxyd_exec_t) ') ######################################## ## ## Search pkcs11proxyd lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`pkcs11proxyd_search_lib',` gen_require(` type pkcs11proxyd_var_lib_t; ') allow $1 pkcs11proxyd_var_lib_t:dir search_dir_perms; files_search_var_lib($1) ') ######################################## ## ## Read pkcs11proxyd lib files. ## ## ## ## Domain allowed access. ## ## # interface(`pkcs11proxyd_read_lib_files',` gen_require(` type pkcs11proxyd_var_lib_t; ') files_search_var_lib($1) read_files_pattern($1, pkcs11proxyd_var_lib_t, pkcs11proxyd_var_lib_t) ') ######################################## ## ## Manage pkcs11proxyd lib files. ## ## ## ## Domain allowed access. ## ## # interface(`pkcs11proxyd_manage_lib_files',` gen_require(` type pkcs11proxyd_var_lib_t; ') files_search_var_lib($1) manage_files_pattern($1, pkcs11proxyd_var_lib_t, pkcs11proxyd_var_lib_t) ') ######################################## ## ## Manage pkcs11proxyd lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`pkcs11proxyd_manage_lib_dirs',` gen_require(` type pkcs11proxyd_var_lib_t; ') files_search_var_lib($1) manage_dirs_pattern($1, pkcs11proxyd_var_lib_t, pkcs11proxyd_var_lib_t) ') ######################################## ## ## All of the rules required to administrate ## an pkcs11proxyd environment ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`pkcs11proxyd_admin',` gen_require(` type pkcs11proxyd_t; type pkcs11proxyd_var_lib_t; ') allow $1 pkcs11proxyd_t:process { signal_perms }; ps_process_pattern($1, pkcs11proxyd_t) tunable_policy(`deny_ptrace',`',` allow $1 pkcs11proxyd_t:process ptrace; ') files_search_var_lib($1) admin_pattern($1, pkcs11proxyd_var_lib_t) optional_policy(` systemd_passwd_agent_exec($1) systemd_read_fifo_file_passwd_run($1) ') ') ######################################## ## ## Connect to pkcs11proxyd over an unix ## stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`pkcs11proxyd_stream_connect',` gen_require(` type pkcs11proxyd_t, pkcs11proxyd_var_run_t; ') files_search_pids($1) stream_connect_pattern($1, pkcs11proxyd_var_run_t, pkcs11proxyd_var_run_t, pkcs11proxyd_t) ')