Add sigrok contrib module
Add a SELinux Reference Policy module for the sigrok signal analysis software suite (command-line interface). Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
This commit is contained in:
parent
65b7fa3f43
commit
9e6febb049
1
policy/modules/apps/sigrok.fc
Normal file
1
policy/modules/apps/sigrok.fc
Normal file
@ -0,0 +1 @@
|
||||
/usr/bin/sigrok-cli -- gen_context(system_u:object_r:sigrok_exec_t,s0)
|
37
policy/modules/apps/sigrok.if
Normal file
37
policy/modules/apps/sigrok.if
Normal file
@ -0,0 +1,37 @@
|
||||
## <summary>sigrok signal analysis software suite.</summary>
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Execute sigrok in its domain.
|
||||
## </summary>
|
||||
## <param name="role">
|
||||
## <summary>
|
||||
## Role allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## User domain for the role.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`sigrok_run',`
|
||||
gen_require(`
|
||||
type sigrok_t, sigrok_exec_t;
|
||||
attribute_role sigrok_roles;
|
||||
')
|
||||
|
||||
########################################
|
||||
#
|
||||
# Declarations
|
||||
#
|
||||
|
||||
roleattribute $1 sigrok_roles;
|
||||
|
||||
########################################
|
||||
#
|
||||
# Policy
|
||||
#
|
||||
|
||||
domtrans_pattern($2, sigrok_exec_t, sigrok_t)
|
||||
')
|
39
policy/modules/apps/sigrok.te
Normal file
39
policy/modules/apps/sigrok.te
Normal file
@ -0,0 +1,39 @@
|
||||
policy_module(sigrok, 1.0.0)
|
||||
|
||||
########################################
|
||||
#
|
||||
# Declarations
|
||||
#
|
||||
|
||||
attribute_role sigrok_roles;
|
||||
roleattribute system_r sigrok_roles;
|
||||
|
||||
type sigrok_t;
|
||||
type sigrok_exec_t;
|
||||
userdom_user_application_domain(sigrok_t, sigrok_exec_t)
|
||||
role sigrok_roles types sigrok_t;
|
||||
|
||||
########################################
|
||||
#
|
||||
# Local policy
|
||||
#
|
||||
|
||||
allow sigrok_t self:fifo_file rw_fifo_file_perms;
|
||||
allow sigrok_t self:netlink_kobject_uevent_socket create_socket_perms;
|
||||
allow sigrok_t self:tcp_socket create_socket_perms;
|
||||
|
||||
corenet_tcp_connect_all_unreserved_ports(sigrok_t)
|
||||
|
||||
dev_getattr_sysfs_dirs(sigrok_t)
|
||||
dev_read_sysfs(sigrok_t)
|
||||
dev_rw_generic_usb_dev(sigrok_t)
|
||||
|
||||
files_read_etc_files(sigrok_t)
|
||||
|
||||
term_use_unallocated_ttys(sigrok_t)
|
||||
|
||||
userdom_use_user_ptys(sigrok_t)
|
||||
|
||||
optional_policy(`
|
||||
udev_read_pid_files(sigrok_t)
|
||||
')
|
@ -149,6 +149,10 @@ ifndef(`distro_redhat',`
|
||||
rssh_role(user_r, user_t)
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
sigrok_run(user_r, user_t)
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
spamassassin_role(user_r, user_t)
|
||||
')
|
||||
|
Loading…
Reference in New Issue
Block a user