64 lines
1.4 KiB
Plaintext
64 lines
1.4 KiB
Plaintext
policy_module(nslcd, 1.8.0)
|
|
|
|
########################################
|
|
#
|
|
# Declarations
|
|
#
|
|
|
|
type nslcd_t;
|
|
type nslcd_exec_t;
|
|
init_daemon_domain(nslcd_t, nslcd_exec_t)
|
|
|
|
type nslcd_initrc_exec_t;
|
|
init_script_file(nslcd_initrc_exec_t)
|
|
|
|
type nslcd_var_run_t;
|
|
files_pid_file(nslcd_var_run_t)
|
|
|
|
type nslcd_conf_t;
|
|
files_config_file(nslcd_conf_t)
|
|
|
|
########################################
|
|
#
|
|
# Local policy
|
|
#
|
|
|
|
allow nslcd_t self:capability { dac_override setgid setuid };
|
|
allow nslcd_t self:process signal;
|
|
allow nslcd_t self:unix_stream_socket { accept listen };
|
|
|
|
allow nslcd_t nslcd_conf_t:file read_file_perms;
|
|
|
|
manage_dirs_pattern(nslcd_t, nslcd_var_run_t, nslcd_var_run_t)
|
|
manage_files_pattern(nslcd_t, nslcd_var_run_t, nslcd_var_run_t)
|
|
manage_sock_files_pattern(nslcd_t, nslcd_var_run_t, nslcd_var_run_t)
|
|
files_pid_filetrans(nslcd_t, nslcd_var_run_t, { file dir })
|
|
|
|
kernel_read_system_state(nslcd_t)
|
|
|
|
corenet_all_recvfrom_unlabeled(nslcd_t)
|
|
corenet_all_recvfrom_netlabel(nslcd_t)
|
|
corenet_tcp_sendrecv_generic_if(nslcd_t)
|
|
corenet_tcp_sendrecv_generic_node(nslcd_t)
|
|
|
|
corenet_sendrecv_ldap_client_packets(nslcd_t)
|
|
corenet_tcp_connect_ldap_port(nslcd_t)
|
|
corenet_tcp_sendrecv_ldap_port(nslcd_t)
|
|
|
|
dev_read_sysfs(nslcd_t)
|
|
|
|
files_read_usr_symlinks(nslcd_t)
|
|
files_list_tmp(nslcd_t)
|
|
|
|
auth_use_nsswitch(nslcd_t)
|
|
|
|
logging_send_syslog_msg(nslcd_t)
|
|
|
|
miscfiles_read_localization(nslcd_t)
|
|
|
|
userdom_read_user_tmp_files(nslcd_t)
|
|
|
|
optional_policy(`
|
|
ldap_stream_connect(nslcd_t)
|
|
')
|