2018-06-23 13:00:56 +00:00
|
|
|
## <summary>D-BUS service which runs odd jobs on behalf of client applications.</summary>
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute a domain transition to run oddjob.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
2021-06-30 08:03:44 +00:00
|
|
|
## <summary>
|
2018-06-23 13:00:56 +00:00
|
|
|
## Domain allowed to transition.
|
2021-06-30 08:03:44 +00:00
|
|
|
## </summary>
|
2018-06-23 13:00:56 +00:00
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`oddjob_domtrans',`
|
|
|
|
gen_require(`
|
|
|
|
type oddjob_t, oddjob_exec_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
corecmd_search_bin($1)
|
|
|
|
domtrans_pattern($1, oddjob_exec_t, oddjob_t)
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Make the specified program domain
|
2020-08-11 13:01:34 +00:00
|
|
|
## accessible from the oddjob.
|
2018-06-23 13:00:56 +00:00
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## The type of the process to transition to.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
## <param name="entrypoint">
|
|
|
|
## <summary>
|
|
|
|
## The type of the file used as an entrypoint to this domain.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`oddjob_system_entry',`
|
|
|
|
gen_require(`
|
|
|
|
type oddjob_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
domtrans_pattern(oddjob_t, $2, $1)
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Send and receive messages from
|
|
|
|
## oddjob over dbus.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`oddjob_dbus_chat',`
|
|
|
|
gen_require(`
|
|
|
|
type oddjob_t;
|
|
|
|
class dbus send_msg;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 oddjob_t:dbus send_msg;
|
|
|
|
allow oddjob_t $1:dbus send_msg;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute a domain transition to
|
|
|
|
## run oddjob mkhomedir.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed to transition.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`oddjob_domtrans_mkhomedir',`
|
|
|
|
gen_require(`
|
|
|
|
type oddjob_mkhomedir_t, oddjob_mkhomedir_exec_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
corecmd_search_bin($1)
|
|
|
|
domtrans_pattern($1, oddjob_mkhomedir_exec_t, oddjob_mkhomedir_t)
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute oddjob mkhomedir in the
|
|
|
|
## oddjob mkhomedir domain and allow
|
|
|
|
## the specified role the oddjob
|
|
|
|
## mkhomedir domain.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed to transition.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
## <param name="role">
|
|
|
|
## <summary>
|
|
|
|
## Role allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
## <rolecap/>
|
|
|
|
#
|
|
|
|
interface(`oddjob_run_mkhomedir',`
|
|
|
|
gen_require(`
|
|
|
|
attribute_role oddjob_mkhomedir_roles;
|
|
|
|
')
|
|
|
|
|
|
|
|
oddjob_domtrans_mkhomedir($1)
|
|
|
|
roleattribute $2 oddjob_mkhomedir_roles;
|
|
|
|
')
|
|
|
|
|
|
|
|
#####################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to read and write
|
|
|
|
## oddjob fifo files.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain to not audit.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`oddjob_dontaudit_rw_fifo_files',`
|
|
|
|
gen_require(`
|
|
|
|
type oddjob_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 oddjob_t:fifo_file rw_fifo_file_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
######################################
|
|
|
|
## <summary>
|
|
|
|
## Send child terminated signals to oddjob.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`oddjob_sigchld',`
|
|
|
|
gen_require(`
|
|
|
|
type oddjob_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 oddjob_t:process sigchld;
|
|
|
|
')
|