]> git.ipfire.org Git - people/stevee/selinux-policy.git/blobdiff - policy/modules/apps/podsleuth.te
Remove module for podsleuth.
[people/stevee/selinux-policy.git] / policy / modules / apps / podsleuth.te
diff --git a/policy/modules/apps/podsleuth.te b/policy/modules/apps/podsleuth.te
deleted file mode 100644 (file)
index 9f88c3a..0000000
+++ /dev/null
@@ -1,90 +0,0 @@
-policy_module(podsleuth, 1.4.1)
-
-########################################
-#
-# Declarations
-#
-
-type podsleuth_t;
-type podsleuth_exec_t;
-application_domain(podsleuth_t, podsleuth_exec_t)
-role system_r types podsleuth_t;
-
-type podsleuth_cache_t;
-files_type(podsleuth_cache_t)
-ubac_constrained(podsleuth_cache_t)
-
-type podsleuth_tmp_t;
-files_tmp_file(podsleuth_tmp_t)
-ubac_constrained(podsleuth_tmp_t)
-
-type podsleuth_tmpfs_t;
-files_tmpfs_file(podsleuth_tmpfs_t)
-ubac_constrained(podsleuth_tmpfs_t)
-
-########################################
-#
-# podsleuth local policy
-#
-allow podsleuth_t self:capability { kill dac_override sys_admin sys_rawio };
-allow podsleuth_t self:process { signal signull getsched execheap execmem execstack };
-
-allow podsleuth_t self:fifo_file rw_file_perms;
-allow podsleuth_t self:unix_stream_socket create_stream_socket_perms;
-allow podsleuth_t self:sem create_sem_perms;
-allow podsleuth_t self:tcp_socket create_stream_socket_perms;
-allow podsleuth_t self:udp_socket create_socket_perms;
-
-manage_dirs_pattern(podsleuth_t, podsleuth_cache_t, podsleuth_cache_t)
-manage_files_pattern(podsleuth_t, podsleuth_cache_t, podsleuth_cache_t)
-files_var_filetrans(podsleuth_t, podsleuth_cache_t, { file dir })
-
-allow podsleuth_t podsleuth_tmp_t:dir mounton;
-manage_dirs_pattern(podsleuth_t, podsleuth_tmp_t, podsleuth_tmp_t)
-manage_files_pattern(podsleuth_t, podsleuth_tmp_t, podsleuth_tmp_t)
-files_tmp_filetrans(podsleuth_t, podsleuth_tmp_t, { file dir })
-
-manage_dirs_pattern(podsleuth_t, podsleuth_tmpfs_t, podsleuth_tmpfs_t)
-manage_files_pattern(podsleuth_t, podsleuth_tmpfs_t, podsleuth_tmpfs_t)
-manage_lnk_files_pattern(podsleuth_t, podsleuth_tmpfs_t, podsleuth_tmpfs_t)
-fs_tmpfs_filetrans(podsleuth_t, podsleuth_tmpfs_t, { dir file lnk_file })
-
-kernel_read_system_state(podsleuth_t)
-kernel_request_load_module(podsleuth_t)
-
-corecmd_exec_bin(podsleuth_t)
-
-corenet_tcp_connect_http_port(podsleuth_t)
-
-dev_read_urand(podsleuth_t)
-
-files_read_etc_files(podsleuth_t)
-
-fs_mount_dos_fs(podsleuth_t)
-fs_unmount_dos_fs(podsleuth_t)
-fs_getattr_dos_fs(podsleuth_t)
-fs_read_dos_files(podsleuth_t)
-fs_search_dos(podsleuth_t)
-fs_getattr_tmpfs(podsleuth_t)
-fs_list_tmpfs(podsleuth_t)
-fs_rw_removable_blk_files(podsleuth_t)
-
-miscfiles_read_localization(podsleuth_t)
-
-sysnet_dns_name_resolve(podsleuth_t)
-
-userdom_signal_unpriv_users(podsleuth_t)
-userdom_signull_unpriv_users(podsleuth_t)
-userdom_read_user_tmpfs_files(podsleuth_t)
-
-optional_policy(`
-       dbus_system_bus_client(podsleuth_t)
-
-       optional_policy(`
-               hal_dbus_chat(podsleuth_t)
-       ')
-')
-
-optional_policy(`
-       mono_exec(podsleuth_t)
-')