diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if index d4c517d..89bccaa 100644 --- a/policy/modules/services/automount.if +++ b/policy/modules/services/automount.if @@ -30,12 +30,8 @@ interface(`automount_domtrans',` ## # interface(`automount_exec_config',` - gen_require(` - type automount_etc_t; - ') - - corecmd_search_bin($1) - can_exec($1, automount_etc_t) + refpolicywarn(`$0(): has been deprecated, please use files_exec_etc_files() instead.') + files_exec_etc_files($1) ') ######################################## diff --git a/policy/modules/services/bind.if b/policy/modules/services/bind.if index 52f2d2c..0c67198 100644 --- a/policy/modules/services/bind.if +++ b/policy/modules/services/bind.if @@ -265,6 +265,16 @@ interface(`bind_udp_chat_named',` ## Domain allowed access. ## ## +## +## +## Role allowed access. +## +## +## +## +## The type of the terminal. +## +## ## # interface(`bind_admin',` diff --git a/policy/modules/services/mta.if b/policy/modules/services/mta.if index a47a55d..f5c6a87 100644 --- a/policy/modules/services/mta.if +++ b/policy/modules/services/mta.if @@ -586,6 +586,26 @@ interface(`mta_read_aliases',` ######################################## ## +## Create, read, write, and delete mail address aliases. +## +## +## +## Domain allowed access. +## +## +# +interface(`mta_manage_aliases',` + gen_require(` + type etc_aliases_t; + ') + + files_search_etc($1) + manage_files_pattern($1, etc_aliases_t, etc_aliases_t) + manage_lnk_files_pattern($1, etc_aliases_t, etc_aliases_t) +') + +######################################## +## ## Type transition files created in /etc ## to the mail address aliases type. ## diff --git a/policy/modules/services/mta.te b/policy/modules/services/mta.te index a0f10f8..2c29ac0 100644 --- a/policy/modules/services/mta.te +++ b/policy/modules/services/mta.te @@ -1,5 +1,5 @@ -policy_module(mta, 1.10.1) +policy_module(mta, 1.10.2) ######################################## # diff --git a/policy/modules/services/ntp.if b/policy/modules/services/ntp.if index 87dbda3..d47ebff 100644 --- a/policy/modules/services/ntp.if +++ b/policy/modules/services/ntp.if @@ -74,7 +74,7 @@ interface(`ntp_domtrans_ntpdate',` interface(`ntp_admin',` gen_require(` type ntpd_t, ntpd_tmp_t, ntpd_log_t; - type ntpd_key_t, ntpd_var_lib_t, ntpd_var_run_t; + type ntpd_key_t, ntpd_var_run_t; type ntpd_initrc_exec_t; ') diff --git a/policy/modules/services/oident.if b/policy/modules/services/oident.if index 7cff0d8..c9beafe 100644 --- a/policy/modules/services/oident.if +++ b/policy/modules/services/oident.if @@ -39,7 +39,7 @@ ## ## # -template(`oidentd_per_role_template', ` +template(`oident_per_role_template', ` ######################################## # @@ -51,17 +51,17 @@ template(`oidentd_per_role_template', ` ') type $1_oidentd_home_t, oidentd_user_content_type; - userdom_user_home_content($1, oidentd_$1_content_t) + userdom_user_home_content($1, $1_oidentd_home_t) - typeattribute oidentd_$1_content_t oidentd_user_content_type; + typeattribute $1_oidentd_home_t oidentd_user_content_type; ######################################## # # Oident daemon shared policy # - allow $2 oidentd_$1_content_t:file manage_file_perms; - allow $2 oidentd_$1_content_t:file relabel_file_perms; + allow $2 $1_oidentd_home_t:file manage_file_perms; + allow $2 $1_oidentd_home_t:file relabel_file_perms; ') ######################################## @@ -75,7 +75,7 @@ template(`oidentd_per_role_template', ` ## ## # -interface(`oidentd_read_all_user_content', ` +interface(`oident_read_all_user_content', ` gen_require(` attribute oidentd_user_content_type; ') diff --git a/policy/modules/services/oident.te b/policy/modules/services/oident.te index 2b8070c..e0898be 100644 --- a/policy/modules/services/oident.te +++ b/policy/modules/services/oident.te @@ -56,7 +56,7 @@ miscfiles_read_localization(oidentd_t) sysnet_read_config(oidentd_t) -oidentd_read_all_user_content(oidentd_t) +oident_read_all_user_content(oidentd_t) optional_policy(` nis_use_ypbind(oidentd_t) diff --git a/policy/modules/services/postfix.te b/policy/modules/services/postfix.te index 8c11bf2..3f2cb82 100644 --- a/policy/modules/services/postfix.te +++ b/policy/modules/services/postfix.te @@ -182,6 +182,12 @@ seutil_dontaudit_search_config(postfix_master_t) mta_rw_aliases(postfix_master_t) mta_read_sendmail_bin(postfix_master_t) +ifdef(`distro_redhat',` + # for newer main.cf that uses /etc/aliases + mta_manage_aliases(postfix_master_t) + mta_etc_filetrans_aliases(postfix_master_t) +') + optional_policy(` cyrus_stream_connect(postfix_master_t) ') @@ -199,22 +205,6 @@ optional_policy(` sendmail_signal(postfix_master_t) ') -########################################################### -# -# Partially converted rules. THESE ARE ONLY TEMPORARY -# - -ifdef(`distro_redhat',` - # for newer main.cf that uses /etc/aliases - allow postfix_master_t etc_aliases_t:dir manage_dir_perms; - allow postfix_master_t etc_aliases_t:file manage_file_perms; - allow postfix_master_t etc_aliases_t:lnk_file manage_lnk_file_perms; - mta_etc_filetrans_aliases(postfix_master_t) - filetrans_pattern(postfix_master_t, postfix_etc_t, etc_aliases_t, { dir file lnk_file }) -') - -# end partially converted rules - ######################################## # # Postfix bounce local policy diff --git a/policy/modules/services/sasl.if b/policy/modules/services/sasl.if index 5a70491..f1aea88 100644 --- a/policy/modules/services/sasl.if +++ b/policy/modules/services/sasl.if @@ -29,6 +29,11 @@ interface(`sasl_connect',` ## Domain allowed access. ## ## +## +## +## Role allowed access. +## +## ## # interface(`sasl_admin',` diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if index efc0fb6..d4542a8 100644 --- a/policy/modules/services/virt.if +++ b/policy/modules/services/virt.if @@ -68,7 +68,7 @@ interface(`virt_read_pid_files',` ## ## # -interface(`virt_manage_pids_files',` +interface(`virt_manage_pid_files',` gen_require(` type virt_var_run_t; ') @@ -167,7 +167,7 @@ interface(`virt_read_log',` # interface(`virt_append_log',` gen_require(` - type var_log_t, virt_log_t; + type virt_log_t; ') logging_search_logs($1) diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te index 3e03dac..ab73da5 100644 --- a/policy/modules/system/init.te +++ b/policy/modules/system/init.te @@ -536,10 +536,6 @@ optional_policy(` ') optional_policy(` - automount_exec_config(initrc_t) -') - -optional_policy(` bind_read_config(initrc_t) # for chmod in start script diff --git a/policy/modules/system/pcmcia.te b/policy/modules/system/pcmcia.te index 6de3bb8..d5b9391 100644 --- a/policy/modules/system/pcmcia.te +++ b/policy/modules/system/pcmcia.te @@ -136,5 +136,6 @@ optional_policy(` # Create device files in /tmp. # cjp: why is this created all over the place? -allow cardmgr_t { var_run_t cardmgr_var_run_t tmp_t }:dir rw_dir_perms; -type_transition cardmgr_t { var_run_t cardmgr_var_run_t tmp_t }:{ chr_file blk_file } cardmgr_dev_t; +files_pid_filetrans(cardmgr_t, cardmgr_dev_t, { chr_file blk_file }) +files_tmp_filetrans(cardmgr_t, cardmgr_dev_t, { chr_file blk_file }) +filetrans_pattern(cardmgr_t, cardmgr_var_run_t, cardmgr_dev_t, { chr_file blk_file })