~ubuntu-branches/ubuntu/natty/refpolicy-ubuntu/natty

« back to all changes in this revision

Viewing changes to policy/modules/services/oddjob.te

  • Committer: Bazaar Package Importer
  • Author(s): Caleb Case
  • Date: 2009-10-19 01:48:39 UTC
  • mfrom: (1.1.1 upstream)
  • Revision ID: james.westby@ubuntu.com-20091019014839-0rpi67ygkrjya30k
Tags: 0.2.20090730-0ubuntu1
* Updated to upstream release 2.20090730
* Handle Upstart direct execution of daemons.
* Pre-depend on selinux to ensure that the trigger is handled (LP: #434084).

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
1
 
2
 
policy_module(oddjob, 1.6.0)
 
2
policy_module(oddjob, 1.6.1)
3
3
 
4
4
########################################
5
5
#
10
10
type oddjob_exec_t;
11
11
domain_type(oddjob_t)
12
12
init_daemon_domain(oddjob_t, oddjob_exec_t)
 
13
domain_obj_id_change_exemption(oddjob_t)
 
14
domain_role_change_exemption(oddjob_t)
13
15
domain_subj_id_change_exemption(oddjob_t)
14
16
 
15
17
type oddjob_mkhomedir_t;
16
18
type oddjob_mkhomedir_exec_t;
17
19
domain_type(oddjob_mkhomedir_t)
18
 
init_daemon_domain(oddjob_mkhomedir_t, oddjob_mkhomedir_exec_t)
 
20
domain_obj_id_change_exemption(oddjob_mkhomedir_t)
 
21
init_system_domain(oddjob_mkhomedir_t, oddjob_mkhomedir_exec_t)
19
22
oddjob_system_entry(oddjob_mkhomedir_t, oddjob_mkhomedir_exec_t)
20
23
 
21
24
# pid files
22
25
type oddjob_var_run_t;
23
26
files_pid_file(oddjob_var_run_t)
24
27
 
 
28
ifdef(`enable_mcs',`
 
29
        init_ranged_daemon_domain(oddjob_t, oddjob_exec_t, s0 - mcs_systemhigh)
 
30
')
 
31
 
25
32
########################################
26
33
#
27
34
# oddjob local policy
65
72
# oddjob_mkhomedir local policy
66
73
#
67
74
 
 
75
allow oddjob_mkhomedir_t self:capability { chown fowner fsetid dac_override };
 
76
allow oddjob_mkhomedir_t self:process setfscreate;
68
77
allow oddjob_mkhomedir_t self:fifo_file rw_fifo_file_perms;
69
78
allow oddjob_mkhomedir_t self:unix_stream_socket create_stream_socket_perms;
70
79
 
 
80
kernel_read_system_state(oddjob_mkhomedir_t)
 
81
 
71
82
files_read_etc_files(oddjob_mkhomedir_t)
72
83
 
 
84
auth_use_nsswitch(oddjob_mkhomedir_t)
 
85
 
 
86
logging_send_syslog_msg(oddjob_mkhomedir_t)
 
87
 
73
88
miscfiles_read_localization(oddjob_mkhomedir_t)
74
89
 
 
90
selinux_get_fs_mount(oddjob_mkhomedir_t)
 
91
selinux_validate_context(oddjob_mkhomedir_t)
 
92
selinux_compute_access_vector(oddjob_mkhomedir_t)
 
93
selinux_compute_create_context(oddjob_mkhomedir_t)
 
94
selinux_compute_relabel_context(oddjob_mkhomedir_t)
 
95
selinux_compute_user_contexts(oddjob_mkhomedir_t)
 
96
 
 
97
seutil_read_config(oddjob_mkhomedir_t)
 
98
seutil_read_file_contexts(oddjob_mkhomedir_t)
 
99
seutil_read_default_contexts(oddjob_mkhomedir_t)
 
100
 
75
101
# Add/remove user home directories
76
102
userdom_home_filetrans_user_home_dir(oddjob_mkhomedir_t)
77
103
userdom_manage_user_home_content_dirs(oddjob_mkhomedir_t)