484 lines
8.1 KiB
Text
484 lines
8.1 KiB
Text
policy_module(staff, 2.4.0)
|
|
|
|
########################################
|
|
#
|
|
# Declarations
|
|
#
|
|
|
|
role staff_r;
|
|
|
|
userdom_unpriv_user_template(staff)
|
|
fs_exec_noxattr(staff_t)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## allow staff user to create and transition to svirt domains.
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(staff_use_svirt, false)
|
|
|
|
########################################
|
|
#
|
|
# Local policy
|
|
#
|
|
|
|
allow staff_t self:cap_userns { setpcap };
|
|
allow staff_t self:netlink_generic_socket { create_socket_perms };
|
|
|
|
corenet_ib_access_unlabeled_pkeys(staff_t)
|
|
|
|
kernel_read_ring_buffer(staff_t)
|
|
kernel_getattr_core_if(staff_t)
|
|
kernel_getattr_message_if(staff_t)
|
|
kernel_read_software_raid_state(staff_t)
|
|
kernel_read_fs_sysctls(staff_t)
|
|
kernel_read_numa_state(staff_t)
|
|
kernel_write_numa_state(staff_t)
|
|
|
|
fs_read_hugetlbfs_files(staff_t)
|
|
files_dontaudit_read_all_symlinks(staff_t)
|
|
files_dontaudit_manage_boot_dirs(staff_t)
|
|
fs_read_tmpfs_files(staff_t)
|
|
fs_read_binfmt_misc(staff_t)
|
|
|
|
dev_read_cpuid(staff_t)
|
|
dev_read_kmsg(staff_t)
|
|
dev_map_video_dev(staff_t)
|
|
dev_rwx_zero(staff_t)
|
|
dev_setattr_generic_usb_dev(staff_t)
|
|
|
|
domain_read_all_domains_state(staff_t)
|
|
domain_getcap_all_domains(staff_t)
|
|
domain_getsched_all_domains(staff_t)
|
|
domain_getattr_all_domains(staff_t)
|
|
domain_obj_id_change_exemption(staff_t)
|
|
|
|
files_read_kernel_modules(staff_t)
|
|
|
|
seutil_read_module_store(staff_t)
|
|
seutil_run_newrole(staff_t, staff_r)
|
|
seutil_dbus_chat_semanage(staff_t)
|
|
seutil_read_login_config(staff_t)
|
|
|
|
storage_read_scsi_generic(staff_t)
|
|
storage_write_scsi_generic(staff_t)
|
|
|
|
term_use_unallocated_ttys(staff_t)
|
|
term_use_generic_ptys(staff_t)
|
|
|
|
auth_run_pam_console(staff_t, staff_r)
|
|
|
|
init_dbus_chat(staff_t)
|
|
init_dbus_chat_script(staff_t)
|
|
init_getattr_pid_blk_file(staff_t)
|
|
init_getattr_pid_chr_file(staff_t)
|
|
init_status(staff_t)
|
|
|
|
miscfiles_read_hwdata(staff_t)
|
|
|
|
mount_sigkill(staff_t)
|
|
mount_signal(staff_t)
|
|
mount_run_ecryptmount(staff_t, staff_r)
|
|
|
|
ifndef(`enable_mls',`
|
|
selinux_read_policy(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
abrt_read_cache(staff_t)
|
|
abrt_map_cache(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
accountsd_read_lib_files(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
apache_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
auditadm_role_change(staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
blueman_dbus_chat(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
boltd_write_var_run_pipes(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
kdumpgui_dbus_chat(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
bluetooth_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
chrome_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
colord_dbus_chat(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
dbadm_role_change(staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
container_stream_connect(staff_t)
|
|
container_runtime_exec(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
dirsrv_stream_connect(staff_t)
|
|
dirsrv_manage_log(staff_t)
|
|
dirsrv_manage_var_lib(staff_t)
|
|
dirsrv_manage_var_run(staff_t)
|
|
dirsrv_manage_config(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
dnsmasq_read_pid_files(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
dmesg_exec(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
firewalld_dbus_chat(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
firewallgui_dbus_chat(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
freqset_run(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
fwupd_dbus_chat(staff_t)
|
|
fwupd_read_cache_files(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
gnome_filetrans_fontconfig_home_content(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
irc_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
journalctl_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
kerberos_read_keytab(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
kerneloops_dbus_chat(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
kpatch_run(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
iotop_run(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
iptables_systemctl(staff_t)
|
|
iptables_run(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
iotop_run(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
logadm_role_change(staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
lpd_list_spool(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mandb_map_cache_files(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mock_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mozilla_run_plugin(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
modutils_read_module_config(staff_t)
|
|
modutils_read_module_deps(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
netutils_run_ping(staff_t, staff_r)
|
|
netutils_run_traceroute(staff_t, staff_r)
|
|
netutils_signal_ping(staff_t)
|
|
netutils_kill_ping(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
oident_manage_user_content(staff_t)
|
|
oident_relabel_user_content(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mta_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mysql_exec(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
polipo_role(staff_r, staff_t)
|
|
polipo_named_filetrans_cache_home_dirs(staff_t)
|
|
polipo_named_filetrans_config_home_files(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
openvpn_exec(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
postgresql_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
rtkit_scheduled(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
rpm_dbus_chat(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
rwho_read_spool_files(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
secadm_role_change(staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
sandbox_transition(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
sandbox_x_transition(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
screen_role_template(staff, staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
sysadm_role_change(staff_r)
|
|
userdom_dontaudit_use_user_terminals(staff_t)
|
|
userdom_dontaudit_read_admin_home_files(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
systemd_config_all_services(staff_t)
|
|
systemd_dbus_chat_machined(staff_t)
|
|
systemd_exec_systemctl(staff_t)
|
|
systemd_hwdb_mmap_config(staff_t)
|
|
systemd_manage_all_unit_files(staff_t)
|
|
systemd_manage_unit_dirs(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
setroubleshoot_stream_connect(staff_t)
|
|
setroubleshoot_dbus_chat(staff_t)
|
|
setroubleshoot_dbus_chat_fixit(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
rpc_rw_gssd_keys(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
ssh_role_template(staff, staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
sudo_role_template(staff, staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
userhelper_console_role_template(staff, staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
unconfined_role_change(staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
usbmuxd_stream_connect(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
virt_getattr_exec(staff_t)
|
|
virt_search_images(staff_t)
|
|
virt_stream_connect(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
vlock_run(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
vmtools_run_helper(staff_t, staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
vnstatd_read_lib_files(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
webadm_role_change(staff_r)
|
|
')
|
|
|
|
optional_policy(`
|
|
wireshark_role(staff_r, staff_t)
|
|
wireshark_rw_shm(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
xserver_read_log(staff_t)
|
|
xserver_run(staff_t, staff_r)
|
|
')
|
|
|
|
ifndef(`distro_redhat',`
|
|
optional_policy(`
|
|
auth_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
cdrecord_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
cron_role(staff_r, staff)
|
|
')
|
|
|
|
optional_policy(`
|
|
dbus_role_template(staff, staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
evolution_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
games_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
gpg_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
java_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
lockdev_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
lpd_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mozilla_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mplayer_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
pyzor_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
razor_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
rssh_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
spamassassin_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
systemd_systemctl_entrypoint(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
thunderbird_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
tvtime_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
uml_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
userhelper_role_template(staff, staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
vmware_role(staff_r, staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
wireshark_role(staff_r, staff_t)
|
|
')
|
|
')
|
|
|
|
tunable_policy(`selinuxuser_execmod',`
|
|
userdom_execmod_user_home_files(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
virt_transition_svirt(staff_t, staff_r)
|
|
virt_filetrans_home_content(staff_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
tunable_policy(`staff_use_svirt',`
|
|
allow staff_t self:fifo_file relabelfrom;
|
|
dev_rw_kvm(staff_t)
|
|
virt_manage_images(staff_t)
|
|
virt_stream_connect_svirt(staff_t)
|
|
virt_systemctl(staff_t)
|
|
virt_rw_stream_sockets_svirt(staff_t)
|
|
virt_exec(staff_t)
|
|
')
|
|
')
|