]> git.ipfire.org Git - people/stevee/selinux-policy.git/commitdiff
move rhgb_domain into TODO so modules can compile as binary modules
authorChris PeBenito <cpebenito@tresys.com>
Thu, 1 Sep 2005 13:52:59 +0000 (13:52 +0000)
committerChris PeBenito <cpebenito@tresys.com>
Thu, 1 Sep 2005 13:52:59 +0000 (13:52 +0000)
16 files changed:
refpolicy/policy/modules/admin/acct.te
refpolicy/policy/modules/admin/quota.te
refpolicy/policy/modules/admin/updfstab.te
refpolicy/policy/modules/services/bind.te
refpolicy/policy/modules/services/dbus.te
refpolicy/policy/modules/services/gpm.te
refpolicy/policy/modules/services/howl.te
refpolicy/policy/modules/services/inetd.te
refpolicy/policy/modules/services/ldap.te
refpolicy/policy/modules/services/mysql.te
refpolicy/policy/modules/services/nscd.te
refpolicy/policy/modules/services/privoxy.te
refpolicy/policy/modules/services/ssh.te
refpolicy/policy/modules/system/ipsec.te
refpolicy/policy/modules/system/pcmcia.te
refpolicy/policy/modules/system/raid.te

index c8098d73310f5a804d6c8574d2e811555332e4ef..88b7c599fa2813d50d097ee2ebb791b74e48c88a 100644 (file)
@@ -85,10 +85,6 @@ optional_policy(`cron.te',`
        cron_system_entry(acct_t,acct_exec_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(acct_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(acct_t)
 ')
@@ -96,3 +92,9 @@ optional_policy(`selinuxutil.te',`
 optional_policy(`udev.te', `
        udev_read_db(acct_t)
 ')
+
+ifdef(`TODO',`
+optional_policy(`rhgb.te',`
+       rhgb_domain(acct_t)
+')
+')
index 4005a807b728764c6566c17f2c56ac4a6a1a1796..f4b52460a1799f002df8eaa3d52765a327972dec 100644 (file)
@@ -67,10 +67,6 @@ ifdef(`targeted_policy',`
        files_dontaudit_read_root_file(quota_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(quota_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(quota_t)
 ')
@@ -86,4 +82,7 @@ file_type_auto_trans(quota_t, { root_t home_root_t var_t usr_t src_t var_spool_t
 allow quota_t file_t:file quotaon;
 
 allow quota_t proc_t:file getattr;
+optional_policy(`rhgb.te',`
+       rhgb_domain(quota_t)
+')
 ') dnl end TODO
index 4c15864cfc046eae271b2e1697fea9d187b72244..ad6ffc923b8f200577e5353a61872b31cf79898b 100644 (file)
@@ -104,10 +104,6 @@ optional_policy(`modutils.te',`
        modutils_read_mods_deps(updfstab_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(updfstab_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(updfstab_t)
 ')
@@ -115,3 +111,9 @@ optional_policy(`selinuxutil.te',`
 optional_policy(`udev.te',`
        udev_read_db(updfstab_t)
 ')
+
+ifdef(`TODO',`
+optional_policy(`rhgb.te',`
+       rhgb_domain(updfstab_t)
+')
+')
index 49c4a5848a1df1deed779759ef2be6b2fa842435..cf278f83c950c857e7181469dad586b9a594ae43 100644 (file)
@@ -146,10 +146,6 @@ optional_policy(`nscd.te',`
        nscd_use_socket(named_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(named_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(named_t)
 ')
@@ -158,6 +154,15 @@ optional_policy(`udev.te',`
        udev_read_db(named_t)
 ')
 
+ifdef(`TODO',`
+can_udp_send(domain, named_t)
+can_udp_send(named_t, domain)
+can_tcp_connect(domain, named_t)
+optional_policy(`rhgb.te',`
+       rhgb_domain(named_t)
+')
+')
+
 ########################################
 #
 # NDC local policy
@@ -241,9 +246,3 @@ optional_policy(`nis.te',`
 optional_policy(`nscd.te',`
        nscd_use_socket(ndc_t)
 ')
-
-ifdef(`TODO',`
-can_udp_send(domain, named_t)
-can_udp_send(named_t, domain)
-can_tcp_connect(domain, named_t)
-')
index f2c4688576b16c358a6e56ece250cf3cd00d647c..0ceff77ecb8b7d8cb14add7d2c44899c4393f3e5 100644 (file)
@@ -125,10 +125,12 @@ optional_policy(`nscd.te',`
        nscd_use_socket(system_dbusd_t)
 ')
 
+optional_policy(`udev.te', `
+       udev_read_db(system_dbusd_t)
+')
+
+ifdef(`TODO',`
 optional_policy(`rhgb.te',`
        rhgb_domain(system_dbusd_t)
 ')
-
-optional_policy(`udev.te', `
-       udev_read_db(system_dbusd_t)
 ')
index 44c5c0366050cee0fb0264a76b282bbad671a8b5..151087d443eb4566c45777833173d0471e64873b 100644 (file)
@@ -83,10 +83,6 @@ ifdef(`targeted_policy', `
        files_dontaudit_read_root_file(gpm_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(gpm_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(gpm_t)
 ')
@@ -99,4 +95,7 @@ ifdef(`TODO',`
 # Access the mouse.
 # cjp: why write?
 allow gpm_t { event_device_t mouse_device_t }:chr_file rw_file_perms;
+optional_policy(`rhgb.te',`
+       rhgb_domain(gpm_t)
+')
 ')
index 8e6ed7dd538c84daa943f4fb9a5aeeb00fb60cd9..ae49234f8e8e8cc89203dc94537626bd22beaa96 100644 (file)
@@ -79,10 +79,6 @@ optional_policy(`nis.te',`
        nis_use_ypbind(howl_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(howl_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(howl_t)
 ')
@@ -90,3 +86,9 @@ optional_policy(`selinuxutil.te',`
 optional_policy(`udev.te', `
        udev_read_db(howl_t)
 ')
+
+ifdef(`TODO',`
+optional_policy(`rhgb.te',`
+       rhgb_domain(howl_t)
+')
+')
index 9919d1d33b94f3e95323a560c9ef170d0a30822f..924a4805ccd7af1199cfa62fb59aac2f15f6ceec 100644 (file)
@@ -147,13 +147,6 @@ optional_policy(`rhgb.te',`
        rhgb_domain(inetd_t)
 ')
 
-# Bind to the telnet, ftp, rlogin and rsh ports.
-# cjp: these ports currently dont exist in the NSA example
-ifdef(`talk.te', `
-allow inetd_t talk_port_t:tcp_socket name_bind;
-allow inetd_t ntalk_port_t:tcp_socket name_bind;
-')
-
 # Communicate with the portmapper.
 ifdef(`portmap.te', `can_udp_send(inetd_t, portmap_t)')
 ') dnl TODO
index a7ffb9cf29321699c0e5d83df4d28d6a797cf479..91f5b8ebcad9fbb61890f90025d30d396b4c9ad9 100644 (file)
@@ -110,10 +110,6 @@ optional_policy(`nis.te',`
        nis_use_ypbind(slapd_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(slapd_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(slapd_t)
 ')
@@ -123,6 +119,9 @@ optional_policy(`udev.te', `
 ')
 
 ifdef(`TODO',`
+optional_policy(`rhgb.te',`
+       rhgb_domain(slapd_t)
+')
 # allow any domain to connect to the LDAP server
 # cjp: how does this relate to the old can_ldap() macro?
 can_tcp_connect(domain, slapd_t)
index 2f489853151642bca02bec1649c4601d6aac29f2..d8b8374c28959a1755643e94b6674db03e1bd0d0 100644 (file)
@@ -111,10 +111,6 @@ optional_policy(`nis.te',`
        nis_use_ypbind(mysqld_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(mysqld_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(mysqld_t)
 ')
@@ -123,7 +119,10 @@ optional_policy(`udev.te', `
        udev_read_db(mysqld_t)
 ')
 
-ifdef(`TODO',
+ifdef(`TODO',`
+optional_policy(`rhgb.te',`
+       rhgb_domain(mysqld_t)
+')
 optional_policy(`daemontools.te',`
        domain_auto_trans( svc_run_t, mysqld_exec_t, mysqld_t)
        mysqld_signal(svc_start_t)
index 792d14a821f655d14bd3766b5fba3098d78ad7fe..4c54c2c4de1e90dfa27aa8e8e12f98010ee97964 100644 (file)
@@ -95,10 +95,6 @@ optional_policy(`nis.te',`
        nis_use_ypbind(nscd_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(nscd_t)
-')
-
 optional_policy(`selinuxutils.te',`
        seutil_sigchld_newrole(nscd_t)
 ')
@@ -119,7 +115,9 @@ optional_policy(`winbind.te', `
        allow nscd_t samba_var_t:dir search;
        allow nscd_t winbind_var_run_t:dir { getattr search };
 ')
-
+optional_policy(`rhgb.te',`
+       rhgb_domain(nscd_t)
+')
 allow nscd_t tmp_t:dir { search getattr };
 allow nscd_t tmp_t:lnk_file read;
 ') dnl end TODO
index d1c5f3e1f4245a50601994b569f7f652048c1bcd..36ee8a50b2f44a5dcfc91dec7346fb722aebad0e 100644 (file)
@@ -83,10 +83,6 @@ optional_policy(`mount.te',`
        mount_send_nfs_client_request(privoxy_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(privoxy_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(privoxy_t)
 ')
@@ -94,3 +90,9 @@ optional_policy(`selinuxutil.te',`
 optional_policy(`udev.te', `
        udev_read_db(privoxy_t)
 ')
+
+ifdef(`TODO',`
+optional_policy(`rhgb.te',`
+       rhgb_domain(privoxy_t)
+')
+')
index 139c5248a0740fcb08233813d69419be189bd968..85491677eeffccf6383970b3ab79e0962e4c7b54 100644 (file)
@@ -24,7 +24,7 @@ role system_r types ssh_keygen_t;
 ssh_server_template(sshd)
 
 optional_policy(`inetd.te',`
-# CJP: commenting this out until typeattribute works in a conditional
+# cjp: commenting this out until typeattribute works in a conditional
 #      tunable_policy(`run_ssh_inetd',`
                inetd_tcp_service_domain(sshd_t,sshd_exec_t)
 #      ',`
@@ -221,10 +221,6 @@ ifdef(`targeted_policy', `
        files_dontaudit_read_root_file(ssh_keygen_t)
 ')
 
-optional_policy(`rhgb.te', `
-       rhgb_domain(ssh_keygen_t)
-')
-
 optional_policy(`selinuxutil.te',`
        seutil_sigchld_newrole(ssh_keygen_t)
 ')
@@ -232,3 +228,9 @@ optional_policy(`selinuxutil.te',`
 optional_policy(`udev.te', `
        udev_read_db(ssh_keygen_t)
 ')
+
+ifdef(`TODO',`
+optional_policy(`rhgb.te', `
+       rhgb_domain(ssh_keygen_t)
+')
+')
index cc06b3e604480d8560404f821785c20a228052ff..a30a31465d3c253c0dc50bad93928436aa34b770 100644 (file)
@@ -128,10 +128,6 @@ optional_policy(`nis.te',`
        nis_use_ypbind(ipsec_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(ipsec_t)
-')
-
 optional_policy(`selinuxutils.te',`
        seutil_sigchld_newrole(ipsec_t)
 ')
@@ -140,6 +136,12 @@ optional_policy(`udev.te', `
        udev_read_db(ipsec_t)
 ')
 
+ifdef(`TODO',`
+optional_policy(`rhgb.te',`
+       rhgb_domain(ipsec_t)
+')
+')
+
 ########################################
 #
 # ipsec_mgmt Local policy
index 133694adee4733e5cc31711c7ee690ef35a9052b..025c886bdd849402c248c1d9d247300189a1e9a1 100644 (file)
@@ -116,10 +116,6 @@ ifdef(`targeted_policy', `
        files_dontaudit_read_root_file(cardmgr_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(cardmgr_t)
-')
-
 optional_policy(`selinuxutils.te',`
        seutil_sigchld_newrole(cardmgr_t)
 ')
@@ -157,4 +153,7 @@ optional_policy(`pcmcia.te',`
        pcmcia_manage_pid(hald_t)
        pcmcia_manage_runtime_chr(hald_t)
 ')
+optional_policy(`rhgb.te',`
+       rhgb_domain(cardmgr_t)
+')
 ') dnl end TODO
index a8a2f469d1d674b7019f62669a97a6ad8f2a86a7..c58e7af4568e0d4d3503bd00088f01550c1ab49a 100644 (file)
@@ -73,10 +73,6 @@ ifdef(`targeted_policy',`
        files_dontaudit_read_root_file(mdadm_t)
 ')
 
-optional_policy(`rhgb.te',`
-       rhgb_domain(mdadm_t)
-')
-
 optional_policy(`selinux.te',`
        seutil_sigchld_newrole(mdadm_t)
 ')
@@ -90,4 +86,7 @@ ifdef(`TODO',`
 dontaudit mdadm_t device_t:{ fifo_file file chr_file blk_file } { read getattr };
 
 allow mdadm_t var_t:dir getattr;
+optional_policy(`rhgb.te',`
+       rhgb_domain(mdadm_t)
+')
 ') dnl TODO