Blob Blame History Raw
# macros for the cdrecord domain
# Author: Thomas Bleher <ThomasBleher@gmx.de>

define(`cdrecord_domain', `
type $1_cdrecord_t, domain, privlog;

domain_auto_trans($1_t, cdrecord_exec_t, $1_cdrecord_t)

# The user role is authorized for this domain.
role $1_r types $1_cdrecord_t;

uses_shlib($1_cdrecord_t)
read_locale($1_cdrecord_t)

# allow ps to show cdrecord and allow the user to kill it 
can_ps($1_t, $1_cdrecord_t)
allow $1_t $1_cdrecord_t:process signal;

# write to the user domain tty.
access_terminal($1_cdrecord_t, $1)
allow $1_cdrecord_t privfd:fd use;

allow $1_cdrecord_t $1_t:unix_stream_socket { getattr read write ioctl };

allow $1_cdrecord_t self:unix_dgram_socket create_socket_perms;
allow $1_cdrecord_t self:unix_stream_socket create_stream_socket_perms;

can_resmgrd_connect($1_cdrecord_t)

read_content($1_cdrecord_t, $1, cdrecord) 

allow $1_cdrecord_t etc_t:file { getattr read };

# allow searching for cdrom-drive
allow $1_cdrecord_t device_t:dir r_dir_perms;
allow $1_cdrecord_t device_t:lnk_file { getattr read };

# allow cdrecord to write the CD
allow $1_cdrecord_t removable_device_t:blk_file { getattr read write ioctl };
allow $1_cdrecord_t scsi_generic_device_t:chr_file { getattr read write ioctl };

allow $1_cdrecord_t self:capability { ipc_lock sys_nice setuid dac_override sys_rawio };
allow $1_cdrecord_t self:process { getsched setsched fork sigchld sigkill };
can_access_pty($1_cdrecord_t, $1)
allow $1_cdrecord_t $1_home_t:dir search;
allow $1_cdrecord_t $1_home_dir_t:dir r_dir_perms;
allow $1_cdrecord_t $1_home_t:file r_file_perms;
')