Oreon-Lime-R2/selinux-policy/selinux-policy-bc228bd/selinux-policy-bc228bd0c249a9e4aa3dcf238c2b1bb138943b07/policy/modules/contrib/rsync.if

282 lines
5.4 KiB
Text

## <summary>Fast incremental file transfer for synchronization</summary>
#######################################
## <summary>
## Sendmail stub interface. No access allowed.
## </summary>
## <param name="domain" unused="true">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`rsync_stub',`
gen_require(`
type rsync_t;
')
')
########################################
## <summary>
## Make rsync an entry point for
## the specified domain.
## </summary>
## <param name="domain">
## <summary>
## The domain for which init scripts are an entrypoint.
## </summary>
## </param>
# cjp: added for portage
interface(`rsync_entry_type',`
gen_require(`
type rsync_exec_t;
')
domain_entry_file($1, rsync_exec_t)
')
########################################
## <summary>
## Execute a rsync in a specified domain.
## </summary>
## <desc>
## <p>
## Execute a rsync in a specified domain.
## </p>
## <p>
## No interprocess communication (signals, pipes,
## etc.) is provided by this interface since
## the domains are not owned by this module.
## </p>
## </desc>
## <param name="source_domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
## <param name="target_domain">
## <summary>
## Domain to transition to.
## </summary>
## </param>
# cjp: added for portage
interface(`rsync_entry_spec_domtrans',`
gen_require(`
type rsync_exec_t;
')
domain_trans($1, rsync_exec_t, $2)
')
########################################
## <summary>
## Execute a rsync in a specified domain.
## </summary>
## <desc>
## <p>
## Execute a rsync in a specified domain.
## </p>
## <p>
## No interprocess communication (signals, pipes,
## etc.) is provided by this interface since
## the domains are not owned by this module.
## </p>
## </desc>
## <param name="source_domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
## <param name="target_domain">
## <summary>
## Domain to transition to.
## </summary>
## </param>
# cjp: added for portage
interface(`rsync_entry_domtrans',`
gen_require(`
type rsync_exec_t;
')
domain_auto_trans($1, rsync_exec_t, $2)
')
########################################
## <summary>
## Execute rsync in the caller domain domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`rsync_exec',`
gen_require(`
type rsync_exec_t;
')
can_exec($1, rsync_exec_t)
')
## <summary>
## Allow the specified domain to ioctl an
## rsync with a unix domain stream socket.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`rsync_ioctl_stream_sockets',`
gen_require(`
type rsync_t;
')
allow $1 rsync_t:unix_stream_socket ioctl;
')
########################################
## <summary>
## Read rsync config files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`rsync_read_config',`
gen_require(`
type rsync_etc_t;
')
read_files_pattern($1, rsync_etc_t, rsync_etc_t)
files_search_etc($1)
')
########################################
## <summary>
## Read rsync data files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`rsync_read_data',`
gen_require(`
type rsync_data_t;
')
read_files_pattern($1, rsync_data_t, rsync_data_t)
')
########################################
## <summary>
## Read and write rsync unix_stream_sockets.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`rsync_rw_unix_stream_sockets',`
gen_require(`
type rsync_t;
')
allow $1 rsync_t:unix_stream_socket rw_socket_perms;
')
########################################
## <summary>
## Write to rsync config files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`rsync_write_config',`
gen_require(`
type rsync_etc_t;
')
write_files_pattern($1, rsync_etc_t, rsync_etc_t)
files_search_etc($1)
')
########################################
## <summary>
## Manage rsync config files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`rsync_manage_config',`
gen_require(`
type rsync_etc_t;
')
manage_files_pattern($1, rsync_etc_t, rsync_etc_t)
files_search_etc($1)
')
########################################
## <summary>
## Create objects in etc directories
## with rsync etc type.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
## <param name="object_class">
## <summary>
## Class of the object being created.
## </summary>
## </param>
## <param name="name" optional="true">
## <summary>
## The name of the object being created.
## </summary>
## </param>
#
interface(`rsync_etc_filetrans_config',`
gen_require(`
type rsync_etc_t;
')
files_etc_filetrans($1, rsync_etc_t, $2, $3)
')
########################################
## <summary>
## Transition to rsync named content
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`rsync_filetrans_named_content',`
gen_require(`
type rsync_etc_t;
type rsync_var_run_t;
')
files_etc_filetrans($1, rsync_etc_t, file, "rsyncd.conf")
files_pid_filetrans($1, rsync_var_run_t, file, "swift_server.lock")
files_pid_filetrans($1, rsync_var_run_t, file, "rsyncd.lock")
')