1 ## <summary>System Security Services Daemon</summary>
3 ########################################
5 ## Execute a domain transition to run sssd.
7 ## <param name="domain">
9 ## Domain allowed to transition.
13 interface(`sssd_domtrans',`
15 type sssd_t, sssd_exec_t;
18 domtrans_pattern($1, sssd_exec_t, sssd_t)
21 ########################################
23 ## Execute sssd server in the sssd domain.
25 ## <param name="domain">
27 ## Domain allowed to transition.
31 interface(`sssd_initrc_domtrans',`
33 type sssd_initrc_exec_t;
36 init_labeled_script_domtrans($1, sssd_initrc_exec_t)
39 ########################################
41 ## Read sssd public files.
43 ## <param name="domain">
45 ## Domain allowed access.
49 interface(`sssd_read_public_files',`
55 read_files_pattern($1, sssd_public_t, sssd_public_t)
58 ########################################
60 ## Read sssd PID files.
62 ## <param name="domain">
64 ## Domain allowed access.
68 interface(`sssd_read_pid_files',`
74 allow $1 sssd_var_run_t:file read_file_perms;
77 ########################################
79 ## Manage sssd var_run files.
81 ## <param name="domain">
83 ## Domain allowed access.
87 interface(`sssd_manage_pids',`
93 manage_dirs_pattern($1, sssd_var_run_t, sssd_var_run_t)
94 manage_files_pattern($1, sssd_var_run_t, sssd_var_run_t)
97 ########################################
99 ## Search sssd lib directories.
101 ## <param name="domain">
103 ## Domain allowed access.
107 interface(`sssd_search_lib',`
112 allow $1 sssd_var_lib_t:dir search_dir_perms;
113 files_search_var_lib($1)
116 ########################################
118 ## Do not audit attempts to search sssd lib directories.
120 ## <param name="domain">
122 ## Domain to not audit.
126 interface(`sssd_dontaudit_search_lib',`
131 dontaudit $1 sssd_var_lib_t:dir search_dir_perms;
134 ########################################
136 ## Read sssd lib files.
138 ## <param name="domain">
140 ## Domain allowed access.
144 interface(`sssd_read_lib_files',`
149 files_search_var_lib($1)
150 read_files_pattern($1, sssd_var_lib_t, sssd_var_lib_t)
153 ########################################
155 ## Create, read, write, and delete
158 ## <param name="domain">
160 ## Domain allowed access.
164 interface(`sssd_manage_lib_files',`
169 files_search_var_lib($1)
170 manage_files_pattern($1, sssd_var_lib_t, sssd_var_lib_t)
173 ########################################
175 ## Send and receive messages from
178 ## <param name="domain">
180 ## Domain allowed access.
184 interface(`sssd_dbus_chat',`
190 allow $1 sssd_t:dbus send_msg;
191 allow sssd_t $1:dbus send_msg;
194 ########################################
196 ## Connect to sssd over an unix stream socket.
198 ## <param name="domain">
200 ## Domain allowed access.
204 interface(`sssd_stream_connect',`
206 type sssd_t, sssd_var_lib_t;
209 files_search_pids($1)
210 stream_connect_pattern($1, sssd_var_lib_t, sssd_var_lib_t, sssd_t)
213 ########################################
215 ## All of the rules required to administrate
216 ## an sssd environment
218 ## <param name="domain">
220 ## Domain allowed access.
223 ## <param name="role">
225 ## The role to be allowed to manage the sssd domain.
230 interface(`sssd_admin',`
232 type sssd_t, sssd_public_t, sssd_initrc_exec_t;
235 allow $1 sssd_t:process { ptrace signal_perms };
236 ps_process_pattern($1, sssd_t)
238 # Allow sssd_t to restart the apache service
239 sssd_initrc_domtrans($1)
240 domain_system_change_exemption($1)
241 role_transition $2 sssd_initrc_exec_t system_r;
246 sssd_manage_lib_files($1)
248 admin_pattern($1, sssd_public_t)