selinux-refpolicy/policy/modules/roles/staff.te

220 lines
3.2 KiB
Plaintext
Raw Normal View History

2019-02-01 20:03:42 +00:00
policy_module(staff, 2.10.0)
########################################
#
# Declarations
#
#role staff_r;
userdom_unpriv_user_template(staff)
########################################
#
# Local policy
#
corenet_ib_access_unlabeled_pkeys(staff_t)
optional_policy(`
2008-11-05 16:10:46 +00:00
apache_role(staff_r, staff_t)
')
optional_policy(`
2008-11-05 16:10:46 +00:00
auditadm_role_change(staff_r)
')
2010-08-19 12:41:39 +00:00
optional_policy(`
dbadm_role_change(staff_r)
')
optional_policy(`
git_role(staff_r, staff_t)
')
optional_policy(`
modemmanager_dbus_chat(staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
postgresql_role(staff_r, staff_t)
2008-11-05 16:10:46 +00:00
')
optional_policy(`
secadm_role_change(staff_r)
2008-11-05 16:10:46 +00:00
')
optional_policy(`
ssh_role_template(staff, staff_r, staff_t)
2008-11-05 16:10:46 +00:00
')
optional_policy(`
sudo_role_template(staff, staff_r, staff_t)
2008-11-05 16:10:46 +00:00
')
optional_policy(`
sysadm_role_change(staff_r)
userdom_dontaudit_use_user_terminals(staff_t)
2008-11-05 16:10:46 +00:00
')
optional_policy(`
syncthing_role(staff_r, staff_t)
')
optional_policy(`
2010-11-01 15:22:07 +00:00
vlock_run(staff_t, staff_r)
')
optional_policy(`
xscreensaver_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
xserver_role(staff_r, staff_t)
2008-11-05 16:10:46 +00:00
')
ifndef(`distro_redhat',`
optional_policy(`
auth_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
bluetooth_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
cdrecord_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
chromium There are several nacl binaries that need labels. Put an ifdef debian for some chromium paths. Git policy misses chromium_role() lines, were they in another patch that was submitted at the same time? I don't know what this is for but doesn't seem harmful to allow it: type=PROCTITLE msg=audit(28/01/19 19:31:42.361:3218) : proctitle=/bin/bash /usr/bin/google-chrome type=SYSCALL msg=audit(28/01/19 19:31:42.361:3218) : arch=x86_64 syscall=openat success=yes exit=3 a0=0xffffff9c a1=0x563328f7b590 a2=O_WRONLY|O_CREAT|O_TRUNC a3=0x1b6 items=0 ppid=5158 pid=5166 auid=test uid=test gid=test euid=test suid=test fsuid=test egid=test sgid=test fsgid=test tty=pts7 ses=232 comm=google-chrome exe=/bin/bash subj=user_u:user_r:chromium_t:s0 key=(null) type=AVC msg=audit(28/01/19 19:31:42.361:3218) : avc: granted { associate } for pid=5166 comm=google-chrome name=63 scontext=user_u:object_r:chromium_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=filesystem type=AVC msg=audit(28/01/19 19:31:42.361:3218) : avc: granted { create } for pid=5166 comm=google-chrome name=63 scontext=user_u:user_r:chromium_t:s0 tcontext=user_u:object_r:chromium_t:s0 tclass=file type=AVC msg=audit(28/01/19 19:31:42.361:3218) : avc: granted { add_name } for pid=5166 comm=google-chrome name=63 scontext=user_u:user_r:chromium_t:s0 tcontext=user_u:user_r:chromium_t:s0 tclass=dir Allow domain_use_interactive_fds() for running via ssh -X. Allow managing xdg data, cache, and config. Allow reading public data from apt and dpkg, probably from lsb_release or some other shell script. How does the whold naclhelper thing work anyway? I'm nervous about process share access involving chromium_sandbox_t, is that really what we want? Added lots of other stuff like searching cgroup dirs etc.
2019-01-28 08:46:49 +00:00
optional_policy(`
chromium_role(staff_r, staff_t)
')
optional_policy(`
cron_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
dbus_role_template(staff, staff_r, staff_t)
optional_policy(`
gnome_role_template(staff, staff_r, staff_t)
')
optional_policy(`
telepathy_role_template(staff, staff_r, staff_t)
')
optional_policy(`
wm_role_template(staff, staff_r, staff_t)
')
')
2008-11-05 16:10:46 +00:00
2017-05-26 15:59:31 +00:00
optional_policy(`
dirmngr_role(staff_r, staff_t)
')
optional_policy(`
evolution_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
games_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
gift_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
gpg_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
irc_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
java_role(staff_r, staff_t)
')
2010-02-08 15:34:08 +00:00
optional_policy(`
libmtp_role(staff_r, staff_t)
')
optional_policy(`
lockdev_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
lpd_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
mozilla_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
mplayer_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
mta_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
ooffice_role(staff_r, staff_t)
')
optional_policy(`
pulseaudio_role(staff_r, staff_t)
')
optional_policy(`
pyzor_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
razor_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
rssh_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
screen_role_template(staff, staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
spamassassin_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
su_role_template(staff, staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
optional_policy(`
thunderbird_role(staff_r, staff_t)
')
optional_policy(`
tvtime_role(staff_r, staff_t)
')
optional_policy(`
uml_role(staff_r, staff_t)
')
optional_policy(`
userhelper_role_template(staff, staff_r, staff_t)
')
optional_policy(`
vmware_role(staff_r, staff_t)
')
optional_policy(`
wireshark_role(staff_r, staff_t)
')
2008-11-05 16:10:46 +00:00
')