d387e79989
Signed-off-by: Chris PeBenito <pebenito@ieee.org>
125 lines
3.3 KiB
Plaintext
125 lines
3.3 KiB
Plaintext
policy_module(apcupsd, 1.15.0)
|
|
|
|
########################################
|
|
#
|
|
# Declarations
|
|
#
|
|
|
|
type apcupsd_t;
|
|
type apcupsd_exec_t;
|
|
init_daemon_domain(apcupsd_t, apcupsd_exec_t)
|
|
|
|
type apcupsd_lock_t;
|
|
files_lock_file(apcupsd_lock_t)
|
|
|
|
type apcupsd_initrc_exec_t;
|
|
init_script_file(apcupsd_initrc_exec_t)
|
|
|
|
type apcupsd_log_t;
|
|
logging_log_file(apcupsd_log_t)
|
|
|
|
type apcupsd_runtime_t alias apcupsd_var_run_t;
|
|
files_runtime_file(apcupsd_runtime_t)
|
|
|
|
type apcupsd_tmp_t;
|
|
files_tmp_file(apcupsd_tmp_t)
|
|
|
|
type apcupsd_unit_t;
|
|
init_unit_file(apcupsd_unit_t)
|
|
|
|
########################################
|
|
#
|
|
# Local policy
|
|
#
|
|
|
|
allow apcupsd_t self:capability { dac_override setgid sys_tty_config };
|
|
allow apcupsd_t self:process signal;
|
|
allow apcupsd_t self:fifo_file rw_fifo_file_perms;
|
|
allow apcupsd_t self:unix_stream_socket create_stream_socket_perms;
|
|
allow apcupsd_t self:tcp_socket create_stream_socket_perms;
|
|
|
|
allow apcupsd_t apcupsd_lock_t:file manage_file_perms;
|
|
files_lock_filetrans(apcupsd_t, apcupsd_lock_t, file)
|
|
|
|
append_files_pattern(apcupsd_t, apcupsd_log_t, apcupsd_log_t)
|
|
create_files_pattern(apcupsd_t, apcupsd_log_t, apcupsd_log_t)
|
|
setattr_files_pattern(apcupsd_t, apcupsd_log_t, apcupsd_log_t)
|
|
logging_log_filetrans(apcupsd_t, apcupsd_log_t, file)
|
|
|
|
manage_files_pattern(apcupsd_t, apcupsd_tmp_t, apcupsd_tmp_t)
|
|
files_tmp_filetrans(apcupsd_t, apcupsd_tmp_t, file)
|
|
|
|
manage_files_pattern(apcupsd_t, apcupsd_runtime_t, apcupsd_runtime_t)
|
|
files_runtime_filetrans(apcupsd_t, apcupsd_runtime_t, file)
|
|
|
|
kernel_read_system_state(apcupsd_t)
|
|
|
|
corecmd_exec_bin(apcupsd_t)
|
|
corecmd_exec_shell(apcupsd_t)
|
|
|
|
corenet_all_recvfrom_netlabel(apcupsd_t)
|
|
corenet_tcp_sendrecv_generic_if(apcupsd_t)
|
|
corenet_tcp_sendrecv_generic_node(apcupsd_t)
|
|
corenet_tcp_bind_generic_node(apcupsd_t)
|
|
corenet_udp_sendrecv_generic_if(apcupsd_t)
|
|
corenet_udp_sendrecv_generic_node(apcupsd_t)
|
|
corenet_udp_bind_generic_node(apcupsd_t)
|
|
|
|
corenet_tcp_bind_apcupsd_port(apcupsd_t)
|
|
corenet_sendrecv_apcupsd_server_packets(apcupsd_t)
|
|
corenet_tcp_connect_apcupsd_port(apcupsd_t)
|
|
|
|
corenet_udp_bind_snmp_port(apcupsd_t)
|
|
corenet_sendrecv_snmp_server_packets(apcupsd_t)
|
|
|
|
dev_rw_generic_usb_dev(apcupsd_t)
|
|
|
|
files_read_etc_files(apcupsd_t)
|
|
files_manage_etc_runtime_files(apcupsd_t)
|
|
files_etc_filetrans_etc_runtime(apcupsd_t, file, "nologin")
|
|
|
|
term_use_unallocated_ttys(apcupsd_t)
|
|
|
|
logging_send_syslog_msg(apcupsd_t)
|
|
|
|
miscfiles_read_localization(apcupsd_t)
|
|
|
|
sysnet_dns_name_resolve(apcupsd_t)
|
|
|
|
userdom_use_user_ttys(apcupsd_t)
|
|
|
|
optional_policy(`
|
|
hostname_exec(apcupsd_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mta_send_mail(apcupsd_t)
|
|
mta_system_content(apcupsd_tmp_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
shutdown_domtrans(apcupsd_t)
|
|
')
|
|
|
|
########################################
|
|
#
|
|
# CGI local policy
|
|
#
|
|
|
|
optional_policy(`
|
|
apache_content_template(apcupsd_cgi)
|
|
|
|
allow httpd_apcupsd_cgi_script_t self:tcp_socket create_stream_socket_perms;
|
|
allow httpd_apcupsd_cgi_script_t self:udp_socket create_socket_perms;
|
|
|
|
corenet_all_recvfrom_netlabel(httpd_apcupsd_cgi_script_t)
|
|
corenet_tcp_sendrecv_generic_if(httpd_apcupsd_cgi_script_t)
|
|
corenet_tcp_sendrecv_generic_node(httpd_apcupsd_cgi_script_t)
|
|
corenet_sendrecv_apcupsd_client_packets(httpd_apcupsd_cgi_script_t)
|
|
corenet_tcp_connect_apcupsd_port(httpd_apcupsd_cgi_script_t)
|
|
corenet_udp_sendrecv_generic_if(httpd_apcupsd_cgi_script_t)
|
|
corenet_udp_sendrecv_generic_node(httpd_apcupsd_cgi_script_t)
|
|
|
|
sysnet_dns_name_resolve(httpd_apcupsd_cgi_script_t)
|
|
')
|