jabber_additional.te 1.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
  1. policy_module(jabber_additional, 0.0.6)
  2. require {
  3. type jabberd_t;
  4. type jabberd_var_lib_t;
  5. type faillog_t;
  6. type initrc_runtime_t;
  7. }
  8. type jabber_unit_t;
  9. init_unit_file(jabber_unit_t)
  10. type jabberd_var_cache_t;
  11. files_type(jabberd_var_cache_t)
  12. allow jabberd_t self:process { getsched setsched };
  13. allow jabberd_t self:capability { dac_read_search setgid setuid chown fowner };
  14. manage_dirs_pattern(jabberd_t, jabberd_var_cache_t, jabberd_var_cache_t)
  15. manage_files_pattern(jabberd_t, jabberd_var_cache_t, jabberd_var_cache_t)
  16. type_transition jabberd_t jabberd_var_cache_t:{ file dir } jabberd_var_cache_t;
  17. allow jabberd_t initrc_runtime_t:file { lock open read };
  18. kernel_read_vm_overcommit_sysctl(jabberd_t)
  19. files_search_spool(jabberd_t)
  20. su_exec(jabberd_t)
  21. auth_domtrans_chk_passwd(jabberd_t)
  22. selinux_compute_access_vector(jabberd_t)
  23. auth_read_shadow(jabberd_t)
  24. miscfiles_read_generic_certs(jabberd_t)
  25. corecmd_exec_shell(jabberd_t)
  26. corenet_tcp_bind_epmd_port(jabberd_t)
  27. corenet_tcp_connect_epmd_port(jabberd_t)
  28. corenet_tcp_connect_ldap_port(jabberd_t)
  29. corenet_tcp_bind_all_unreserved_ports(jabberd_t)
  30. corenet_udp_bind_all_unreserved_ports(jabberd_t)
  31. corenet_tcp_connect_all_unreserved_ports(jabberd_t)
  32. files_read_generic_tmp_files(jabberd_t)
  33. auth_rw_faillog(jabberd_t)
  34. manage_dirs_pattern(jabberd_t, faillog_t, faillog_t)
  35. manage_files_pattern(jabberd_t, faillog_t, faillog_t)