Oreon-Lime-R2/selinux-policy/selinux-policy-d9f4a2b/selinux-policy-d9f4a2bbeb91fd95d0c35a90936efb9ea99d2455/policy/modules/roles/staff.te

484 lines
8.1 KiB
Text

policy_module(staff, 2.4.0)
########################################
#
# Declarations
#
role staff_r;
userdom_unpriv_user_template(staff)
fs_exec_noxattr(staff_t)
## <desc>
## <p>
## allow staff user to create and transition to svirt domains.
## </p>
## </desc>
gen_tunable(staff_use_svirt, false)
########################################
#
# Local policy
#
allow staff_t self:cap_userns { setpcap };
allow staff_t self:netlink_generic_socket { create_socket_perms };
corenet_ib_access_unlabeled_pkeys(staff_t)
kernel_read_ring_buffer(staff_t)
kernel_getattr_core_if(staff_t)
kernel_getattr_message_if(staff_t)
kernel_read_software_raid_state(staff_t)
kernel_read_fs_sysctls(staff_t)
kernel_read_numa_state(staff_t)
kernel_write_numa_state(staff_t)
fs_read_hugetlbfs_files(staff_t)
files_dontaudit_read_all_symlinks(staff_t)
files_dontaudit_manage_boot_dirs(staff_t)
fs_read_tmpfs_files(staff_t)
fs_read_binfmt_misc(staff_t)
dev_read_cpuid(staff_t)
dev_read_kmsg(staff_t)
dev_map_video_dev(staff_t)
dev_rwx_zero(staff_t)
dev_setattr_generic_usb_dev(staff_t)
domain_read_all_domains_state(staff_t)
domain_getcap_all_domains(staff_t)
domain_getsched_all_domains(staff_t)
domain_getattr_all_domains(staff_t)
domain_obj_id_change_exemption(staff_t)
files_read_kernel_modules(staff_t)
seutil_read_module_store(staff_t)
seutil_run_newrole(staff_t, staff_r)
seutil_dbus_chat_semanage(staff_t)
seutil_read_login_config(staff_t)
storage_read_scsi_generic(staff_t)
storage_write_scsi_generic(staff_t)
term_use_unallocated_ttys(staff_t)
term_use_generic_ptys(staff_t)
auth_run_pam_console(staff_t, staff_r)
init_dbus_chat(staff_t)
init_dbus_chat_script(staff_t)
init_getattr_pid_blk_file(staff_t)
init_getattr_pid_chr_file(staff_t)
init_status(staff_t)
miscfiles_read_hwdata(staff_t)
mount_sigkill(staff_t)
mount_signal(staff_t)
mount_run_ecryptmount(staff_t, staff_r)
ifndef(`enable_mls',`
selinux_read_policy(staff_t)
')
optional_policy(`
abrt_read_cache(staff_t)
abrt_map_cache(staff_t)
')
optional_policy(`
accountsd_read_lib_files(staff_t)
')
optional_policy(`
apache_role(staff_r, staff_t)
')
optional_policy(`
auditadm_role_change(staff_r)
')
optional_policy(`
blueman_dbus_chat(staff_t)
')
optional_policy(`
boltd_write_var_run_pipes(staff_t)
')
optional_policy(`
kdumpgui_dbus_chat(staff_t)
')
optional_policy(`
bluetooth_role(staff_r, staff_t)
')
optional_policy(`
chrome_role(staff_r, staff_t)
')
optional_policy(`
colord_dbus_chat(staff_t)
')
optional_policy(`
dbadm_role_change(staff_r)
')
optional_policy(`
container_stream_connect(staff_t)
container_runtime_exec(staff_t)
')
optional_policy(`
dirsrv_stream_connect(staff_t)
dirsrv_manage_log(staff_t)
dirsrv_manage_var_lib(staff_t)
dirsrv_manage_var_run(staff_t)
dirsrv_manage_config(staff_t)
')
optional_policy(`
dnsmasq_read_pid_files(staff_t)
')
optional_policy(`
dmesg_exec(staff_t)
')
optional_policy(`
firewalld_dbus_chat(staff_t)
')
optional_policy(`
firewallgui_dbus_chat(staff_t)
')
optional_policy(`
freqset_run(staff_t, staff_r)
')
optional_policy(`
fwupd_dbus_chat(staff_t)
fwupd_read_cache_files(staff_t)
')
optional_policy(`
gnome_filetrans_fontconfig_home_content(staff_t)
')
optional_policy(`
irc_role(staff_r, staff_t)
')
optional_policy(`
journalctl_role(staff_r, staff_t)
')
optional_policy(`
kerberos_read_keytab(staff_t)
')
optional_policy(`
kerneloops_dbus_chat(staff_t)
')
optional_policy(`
kpatch_run(staff_t, staff_r)
')
optional_policy(`
iotop_run(staff_t, staff_r)
')
optional_policy(`
iptables_systemctl(staff_t)
iptables_run(staff_t, staff_r)
')
optional_policy(`
iotop_run(staff_t, staff_r)
')
optional_policy(`
logadm_role_change(staff_r)
')
optional_policy(`
lpd_list_spool(staff_t)
')
optional_policy(`
mandb_map_cache_files(staff_t)
')
optional_policy(`
mock_role(staff_r, staff_t)
')
optional_policy(`
mozilla_run_plugin(staff_t, staff_r)
')
optional_policy(`
modutils_read_module_config(staff_t)
modutils_read_module_deps(staff_t)
')
optional_policy(`
netutils_run_ping(staff_t, staff_r)
netutils_run_traceroute(staff_t, staff_r)
netutils_signal_ping(staff_t)
netutils_kill_ping(staff_t)
')
optional_policy(`
oident_manage_user_content(staff_t)
oident_relabel_user_content(staff_t)
')
optional_policy(`
mta_role(staff_r, staff_t)
')
optional_policy(`
mysql_exec(staff_t)
')
optional_policy(`
polipo_role(staff_r, staff_t)
polipo_named_filetrans_cache_home_dirs(staff_t)
polipo_named_filetrans_config_home_files(staff_t)
')
optional_policy(`
openvpn_exec(staff_t)
')
optional_policy(`
postgresql_role(staff_r, staff_t)
')
optional_policy(`
rtkit_scheduled(staff_t)
')
optional_policy(`
rpm_dbus_chat(staff_t)
')
optional_policy(`
rwho_read_spool_files(staff_t)
')
optional_policy(`
secadm_role_change(staff_r)
')
optional_policy(`
sandbox_transition(staff_t, staff_r)
')
optional_policy(`
sandbox_x_transition(staff_t, staff_r)
')
optional_policy(`
screen_role_template(staff, staff_r, staff_t)
')
optional_policy(`
sysadm_role_change(staff_r)
userdom_dontaudit_use_user_terminals(staff_t)
userdom_dontaudit_read_admin_home_files(staff_t)
')
optional_policy(`
systemd_config_all_services(staff_t)
systemd_dbus_chat_machined(staff_t)
systemd_exec_systemctl(staff_t)
systemd_hwdb_mmap_config(staff_t)
systemd_manage_all_unit_files(staff_t)
systemd_manage_unit_dirs(staff_t)
')
optional_policy(`
setroubleshoot_stream_connect(staff_t)
setroubleshoot_dbus_chat(staff_t)
setroubleshoot_dbus_chat_fixit(staff_t)
')
optional_policy(`
rpc_rw_gssd_keys(staff_t)
')
optional_policy(`
ssh_role_template(staff, staff_r, staff_t)
')
optional_policy(`
sudo_role_template(staff, staff_r, staff_t)
')
optional_policy(`
userhelper_console_role_template(staff, staff_r, staff_t)
')
optional_policy(`
unconfined_role_change(staff_r)
')
optional_policy(`
usbmuxd_stream_connect(staff_t)
')
optional_policy(`
virt_getattr_exec(staff_t)
virt_search_images(staff_t)
virt_stream_connect(staff_t)
')
optional_policy(`
vlock_run(staff_t, staff_r)
')
optional_policy(`
vmtools_run_helper(staff_t, staff_r)
')
optional_policy(`
vnstatd_read_lib_files(staff_t)
')
optional_policy(`
webadm_role_change(staff_r)
')
optional_policy(`
wireshark_role(staff_r, staff_t)
wireshark_rw_shm(staff_t)
')
optional_policy(`
xserver_read_log(staff_t)
xserver_run(staff_t, staff_r)
')
ifndef(`distro_redhat',`
optional_policy(`
auth_role(staff_r, staff_t)
')
optional_policy(`
cdrecord_role(staff_r, staff_t)
')
optional_policy(`
cron_role(staff_r, staff)
')
optional_policy(`
dbus_role_template(staff, staff_r, staff_t)
')
optional_policy(`
evolution_role(staff_r, staff_t)
')
optional_policy(`
games_role(staff_r, staff_t)
')
optional_policy(`
gpg_role(staff_r, staff_t)
')
optional_policy(`
java_role(staff_r, staff_t)
')
optional_policy(`
lockdev_role(staff_r, staff_t)
')
optional_policy(`
lpd_role(staff_r, staff_t)
')
optional_policy(`
mozilla_role(staff_r, staff_t)
')
optional_policy(`
mplayer_role(staff_r, staff_t)
')
optional_policy(`
pyzor_role(staff_r, staff_t)
')
optional_policy(`
razor_role(staff_r, staff_t)
')
optional_policy(`
rssh_role(staff_r, staff_t)
')
optional_policy(`
spamassassin_role(staff_r, staff_t)
')
optional_policy(`
systemd_systemctl_entrypoint(staff_t)
')
optional_policy(`
thunderbird_role(staff_r, staff_t)
')
optional_policy(`
tvtime_role(staff_r, staff_t)
')
optional_policy(`
uml_role(staff_r, staff_t)
')
optional_policy(`
userhelper_role_template(staff, staff_r, staff_t)
')
optional_policy(`
vmware_role(staff_r, staff_t)
')
optional_policy(`
wireshark_role(staff_r, staff_t)
')
')
tunable_policy(`selinuxuser_execmod',`
userdom_execmod_user_home_files(staff_t)
')
optional_policy(`
virt_transition_svirt(staff_t, staff_r)
virt_filetrans_home_content(staff_t)
')
optional_policy(`
tunable_policy(`staff_use_svirt',`
allow staff_t self:fifo_file relabelfrom;
dev_rw_kvm(staff_t)
virt_manage_images(staff_t)
virt_stream_connect_svirt(staff_t)
virt_systemctl(staff_t)
virt_rw_stream_sockets_svirt(staff_t)
virt_exec(staff_t)
')
')