|
Chris PeBenito |
0fbfa5 |
#DESC cyrus-imapd
|
|
Chris PeBenito |
0fbfa5 |
#
|
|
Chris PeBenito |
0fbfa5 |
# Authors: Dan Walsh <dwalsh@redhat.com>
|
|
Chris PeBenito |
0fbfa5 |
#
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# cyrusd_exec_t is the type of the cyrusd executable.
|
|
Chris PeBenito |
0fbfa5 |
# cyrusd_key_t is the type of the cyrus private key files
|
|
Chris PeBenito |
0fbfa5 |
daemon_domain(cyrus)
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
general_domain_access(cyrus_t)
|
|
Chris PeBenito |
0fbfa5 |
file_type_auto_trans(cyrus_t, var_run_t, cyrus_var_run_t, sock_file)
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
type cyrus_var_lib_t, file_type, sysadmfile;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t self:capability { dac_override net_bind_service setgid setuid sys_resource };
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t self:process setrlimit;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
can_network(cyrus_t)
|
|
Chris PeBenito |
2705f9 |
allow cyrus_t port_type:tcp_socket name_connect;
|
|
Chris PeBenito |
0fbfa5 |
can_ypbind(cyrus_t)
|
|
Chris PeBenito |
0fbfa5 |
can_exec(cyrus_t, bin_t)
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t cyrus_var_lib_t:dir create_dir_perms;
|
|
Chris PeBenito |
a08248 |
allow cyrus_t cyrus_var_lib_t:{file sock_file lnk_file} create_file_perms;
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t etc_t:file { getattr read };
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t lib_t:file { execute execute_no_trans getattr read };
|
|
Chris PeBenito |
0fbfa5 |
read_locale(cyrus_t)
|
|
Chris PeBenito |
0fbfa5 |
read_sysctl(cyrus_t)
|
|
Chris PeBenito |
0fbfa5 |
tmp_domain(cyrus)
|
|
Chris PeBenito |
2705f9 |
allow cyrus_t { mail_port_t pop_port_t }:tcp_socket name_bind;
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t proc_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t proc_t:file { getattr read };
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t sysadm_devpts_t:chr_file { read write };
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t var_lib_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow cyrus_t etc_runtime_t:file { read getattr };
|
|
Chris PeBenito |
0fbfa5 |
ifdef(`crond.te', `
|
|
Chris PeBenito |
0fbfa5 |
system_crond_entry(cyrus_exec_t, cyrus_t)
|
|
Chris PeBenito |
0fbfa5 |
allow system_crond_t cyrus_var_lib_t:dir rw_dir_perms;
|
|
Chris PeBenito |
0fbfa5 |
allow system_crond_t cyrus_var_lib_t:file create_file_perms;
|
|
Chris PeBenito |
0fbfa5 |
')
|
|
Chris PeBenito |
2705f9 |
create_dir_file(cyrus_t, mail_spool_t)
|
|
Chris PeBenito |
2705f9 |
allow cyrus_t var_spool_t:dir search;
|
|
Chris PeBenito |
2705f9 |
|
|
Chris PeBenito |
77f6e2 |
ifdef(`saslauthd.te', `
|
|
Chris PeBenito |
a08248 |
allow cyrus_t saslauthd_var_run_t:dir search;
|
|
Chris PeBenito |
a08248 |
allow cyrus_t saslauthd_var_run_t:sock_file { read write };
|
|
Chris PeBenito |
a08248 |
allow cyrus_t saslauthd_t:unix_stream_socket { connectto };
|
|
Chris PeBenito |
a08248 |
')
|
|
Chris PeBenito |
a08248 |
|
|
Chris PeBenito |
a08248 |
r_dir_file(cyrus_t, cert_t)
|
|
Chris PeBenito |
a08248 |
allow cyrus_t { urandom_device_t random_device_t }:chr_file { read getattr };
|