]> git.ipfire.org Git - people/stevee/selinux-policy.git/commitdiff
Remove module for usernetctl.
authorStefan Schantl <stefan.schantl@ipfire.org>
Sat, 14 Jan 2012 19:06:34 +0000 (20:06 +0100)
committerStefan Schantl <stefan.schantl@ipfire.org>
Sat, 14 Jan 2012 19:06:34 +0000 (20:06 +0100)
policy/modules/apps/usernetctl.fc [deleted file]
policy/modules/apps/usernetctl.if [deleted file]
policy/modules/apps/usernetctl.te [deleted file]

diff --git a/policy/modules/apps/usernetctl.fc b/policy/modules/apps/usernetctl.fc
deleted file mode 100644 (file)
index aa07e1e..0000000
+++ /dev/null
@@ -1,2 +0,0 @@
-
-/usr/sbin/usernetctl   --      gen_context(system_u:object_r:usernetctl_exec_t,s0)
diff --git a/policy/modules/apps/usernetctl.if b/policy/modules/apps/usernetctl.if
deleted file mode 100644 (file)
index 09ae47c..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-## <summary>User network interface configuration helper</summary>
-
-########################################
-## <summary>
-##     Execute usernetctl in the usernetctl domain.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-#
-interface(`usernetctl_domtrans',`
-       gen_require(`
-               type usernetctl_t, usernetctl_exec_t;
-       ')
-
-       domtrans_pattern($1, usernetctl_exec_t, usernetctl_t)
-')
-
-########################################
-## <summary>
-##     Execute usernetctl in the usernetctl domain, and
-##     allow the specified role the usernetctl domain.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <rolecap/>
-#
-interface(`usernetctl_run',`
-       gen_require(`
-               type usernetctl_t;
-       ')
-
-       usernetctl_domtrans($1)
-       role $2 types usernetctl_t;
-
-       sysnet_run_ifconfig(usernetctl_t, $2)
-       sysnet_run_dhcpc(usernetctl_t, $2)
-
-       optional_policy(`
-               iptables_run(usernetctl_t, $2)
-       ')
-
-       optional_policy(`
-               modutils_run_insmod(usernetctl_t, $2)
-       ')
-
-       optional_policy(`
-               ppp_run(usernetctl_t, $2)
-       ')
-')
diff --git a/policy/modules/apps/usernetctl.te b/policy/modules/apps/usernetctl.te
deleted file mode 100644 (file)
index 93edd6b..0000000
+++ /dev/null
@@ -1,73 +0,0 @@
-policy_module(usernetctl, 1.5.0)
-
-########################################
-#
-# Declarations
-#
-
-type usernetctl_t;
-type usernetctl_exec_t;
-application_domain(usernetctl_t, usernetctl_exec_t)
-domain_interactive_fd(usernetctl_t)
-
-########################################
-#
-# Local policy
-#
-
-allow usernetctl_t self:capability { setuid setgid dac_override };
-allow usernetctl_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap };
-allow usernetctl_t self:fd use;
-allow usernetctl_t self:fifo_file rw_fifo_file_perms;
-allow usernetctl_t self:shm create_shm_perms;
-allow usernetctl_t self:sem create_sem_perms;
-allow usernetctl_t self:msgq create_msgq_perms;
-allow usernetctl_t self:msg { send receive };
-allow usernetctl_t self:unix_dgram_socket create_socket_perms;
-allow usernetctl_t self:unix_stream_socket create_stream_socket_perms;
-allow usernetctl_t self:unix_dgram_socket sendto;
-allow usernetctl_t self:unix_stream_socket connectto;
-
-can_exec(usernetctl_t, usernetctl_exec_t)
-
-kernel_read_system_state(usernetctl_t)
-kernel_read_kernel_sysctls(usernetctl_t)
-
-corecmd_list_bin(usernetctl_t)
-corecmd_exec_bin(usernetctl_t)
-corecmd_exec_shell(usernetctl_t)
-
-domain_dontaudit_read_all_domains_state(usernetctl_t)
-
-files_read_etc_files(usernetctl_t)
-files_exec_etc_files(usernetctl_t)
-files_read_etc_runtime_files(usernetctl_t)
-files_list_pids(usernetctl_t)
-files_list_home(usernetctl_t)
-files_read_usr_files(usernetctl_t)
-
-fs_search_auto_mountpoints(usernetctl_t)
-
-auth_use_nsswitch(usernetctl_t)
-
-logging_send_syslog_msg(usernetctl_t)
-
-miscfiles_read_localization(usernetctl_t)
-
-seutil_read_config(usernetctl_t)
-
-sysnet_read_config(usernetctl_t)
-
-userdom_use_inherited_user_terminals(usernetctl_t)
-
-optional_policy(`
-       consoletype_exec(usernetctl_t)
-')
-
-optional_policy(`
-       hostname_exec(usernetctl_t)
-')
-
-optional_policy(`
-       nis_use_ypbind(usernetctl_t)
-')