mirror of
https://github.com/SELinuxProject/refpolicy
synced 2025-02-21 15:07:02 +00:00
Rearrange interfaces in fail2ban.
This commit is contained in:
parent
580279da88
commit
bf140fc32c
@ -18,6 +18,44 @@ interface(`fail2ban_domtrans',`
|
|||||||
domtrans_pattern($1, fail2ban_exec_t, fail2ban_t)
|
domtrans_pattern($1, fail2ban_exec_t, fail2ban_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
#####################################
|
||||||
|
## <summary>
|
||||||
|
## Connect to fail2ban over a unix domain
|
||||||
|
## stream socket.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`fail2ban_stream_connect',`
|
||||||
|
gen_require(`
|
||||||
|
type fail2ban_t, fail2ban_var_run_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_pids($1)
|
||||||
|
stream_connect_pattern($1, fail2ban_var_run_t, fail2ban_var_run_t, fail2ban_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Read and write to an fail2ban unix stream socket.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`fail2ban_rw_stream_sockets',`
|
||||||
|
gen_require(`
|
||||||
|
type fail2ban_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 fail2ban_t:unix_stream_socket rw_stream_socket_perms;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read fail2ban lib files.
|
## Read fail2ban lib files.
|
||||||
@ -98,26 +136,6 @@ interface(`fail2ban_read_pid_files',`
|
|||||||
allow $1 fail2ban_var_run_t:file read_file_perms;
|
allow $1 fail2ban_var_run_t:file read_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
#####################################
|
|
||||||
## <summary>
|
|
||||||
## Connect to fail2ban over a unix domain
|
|
||||||
## stream socket.
|
|
||||||
## </summary>
|
|
||||||
## <param name="domain">
|
|
||||||
## <summary>
|
|
||||||
## Domain allowed access.
|
|
||||||
## </summary>
|
|
||||||
## </param>
|
|
||||||
#
|
|
||||||
interface(`fail2ban_stream_connect',`
|
|
||||||
gen_require(`
|
|
||||||
type fail2ban_t, fail2ban_var_run_t;
|
|
||||||
')
|
|
||||||
|
|
||||||
files_search_pids($1)
|
|
||||||
stream_connect_pattern($1, fail2ban_var_run_t, fail2ban_var_run_t, fail2ban_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## All of the rules required to administrate
|
## All of the rules required to administrate
|
||||||
@ -155,21 +173,3 @@ interface(`fail2ban_admin',`
|
|||||||
files_list_pids($1)
|
files_list_pids($1)
|
||||||
admin_pattern($1, fail2ban_var_run_t)
|
admin_pattern($1, fail2ban_var_run_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
|
||||||
## <summary>
|
|
||||||
## Read and write to an fail2ban unix stream socket.
|
|
||||||
## </summary>
|
|
||||||
## <param name="domain">
|
|
||||||
## <summary>
|
|
||||||
## Domain allowed access.
|
|
||||||
## </summary>
|
|
||||||
## </param>
|
|
||||||
#
|
|
||||||
interface(`fail2ban_rw_stream_sockets',`
|
|
||||||
gen_require(`
|
|
||||||
type fail2ban_t;
|
|
||||||
')
|
|
||||||
|
|
||||||
allow $1 fail2ban_t:unix_stream_socket rw_stream_socket_perms;
|
|
||||||
')
|
|
||||||
|
Loading…
Reference in New Issue
Block a user