signaling.te 1.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051
  1. policy_module(signaling, 0.0.2)
  2. ########################################
  3. #
  4. # Declarations
  5. #
  6. type signaling_t;
  7. type signaling_exec_t;
  8. init_daemon_domain(signaling_t, signaling_exec_t)
  9. type signaling_etc_t;
  10. files_config_file(signaling_etc_t);
  11. allow signaling_t self:fifo_file { read write };
  12. allow signaling_t self:process { getsched signal };
  13. allow signaling_t self:tcp_socket { accept bind connect create getattr getopt listen read setopt write };
  14. allow signaling_t self:udp_socket { connect create getattr read setopt write };
  15. allow signaling_t self:unix_dgram_socket { connect create };
  16. corenet_tcp_bind_http_cache_port(signaling_t)
  17. corenet_tcp_connect_http_port(signaling_t)
  18. corenet_tcp_bind_generic_node(signaling_t)
  19. corenet_tcp_connect_all_unreserved_ports(signaling_t)
  20. miscfiles_read_all_certs(signaling_t)
  21. miscfiles_read_localization(signaling_t)
  22. read_files_pattern(signaling_t, signaling_etc_t, signaling_etc_t)
  23. search_dirs_pattern(signaling_t, signaling_etc_t, signaling_etc_t)
  24. sysnet_read_config(signaling_t)
  25. kernel_read_net_sysctls(signaling_t)
  26. dev_read_sysfs(signaling_t)
  27. optional_policy(`
  28. gen_require(`
  29. type supervisor_t;
  30. ')
  31. supervisor_service_domain(signaling_t,signaling_exec_t)
  32. allow signaling_t supervisor_t:fifo_file lock;
  33. ')
  34. optional_policy(`
  35. gen_require(`
  36. type usr_t;
  37. ')
  38. read_files_pattern(usr_t, signaling_t, signaling_t)
  39. ')