+++ /dev/null
-## <summary>User network interface configuration helper</summary>
-
-########################################
-## <summary>
-## Execute usernetctl in the usernetctl domain.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed to transition.
-## </summary>
-## </param>
-#
-interface(`usernetctl_domtrans',`
- gen_require(`
- type usernetctl_t, usernetctl_exec_t;
- ')
-
- domtrans_pattern($1, usernetctl_exec_t, usernetctl_t)
-')
-
-########################################
-## <summary>
-## Execute usernetctl in the usernetctl domain, and
-## allow the specified role the usernetctl domain.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed to transition.
-## </summary>
-## </param>
-## <param name="role">
-## <summary>
-## Role allowed access.
-## </summary>
-## </param>
-## <rolecap/>
-#
-interface(`usernetctl_run',`
- gen_require(`
- type usernetctl_t;
- ')
-
- usernetctl_domtrans($1)
- role $2 types usernetctl_t;
-
- sysnet_run_ifconfig(usernetctl_t, $2)
- sysnet_run_dhcpc(usernetctl_t, $2)
-
- optional_policy(`
- iptables_run(usernetctl_t, $2)
- ')
-
- optional_policy(`
- modutils_run_insmod(usernetctl_t, $2)
- ')
-
- optional_policy(`
- ppp_run(usernetctl_t, $2)
- ')
-')
+++ /dev/null
-policy_module(usernetctl, 1.5.0)
-
-########################################
-#
-# Declarations
-#
-
-type usernetctl_t;
-type usernetctl_exec_t;
-application_domain(usernetctl_t, usernetctl_exec_t)
-domain_interactive_fd(usernetctl_t)
-
-########################################
-#
-# Local policy
-#
-
-allow usernetctl_t self:capability { setuid setgid dac_override };
-allow usernetctl_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap };
-allow usernetctl_t self:fd use;
-allow usernetctl_t self:fifo_file rw_fifo_file_perms;
-allow usernetctl_t self:shm create_shm_perms;
-allow usernetctl_t self:sem create_sem_perms;
-allow usernetctl_t self:msgq create_msgq_perms;
-allow usernetctl_t self:msg { send receive };
-allow usernetctl_t self:unix_dgram_socket create_socket_perms;
-allow usernetctl_t self:unix_stream_socket create_stream_socket_perms;
-allow usernetctl_t self:unix_dgram_socket sendto;
-allow usernetctl_t self:unix_stream_socket connectto;
-
-can_exec(usernetctl_t, usernetctl_exec_t)
-
-kernel_read_system_state(usernetctl_t)
-kernel_read_kernel_sysctls(usernetctl_t)
-
-corecmd_list_bin(usernetctl_t)
-corecmd_exec_bin(usernetctl_t)
-corecmd_exec_shell(usernetctl_t)
-
-domain_dontaudit_read_all_domains_state(usernetctl_t)
-
-files_read_etc_files(usernetctl_t)
-files_exec_etc_files(usernetctl_t)
-files_read_etc_runtime_files(usernetctl_t)
-files_list_pids(usernetctl_t)
-files_list_home(usernetctl_t)
-files_read_usr_files(usernetctl_t)
-
-fs_search_auto_mountpoints(usernetctl_t)
-
-auth_use_nsswitch(usernetctl_t)
-
-logging_send_syslog_msg(usernetctl_t)
-
-miscfiles_read_localization(usernetctl_t)
-
-seutil_read_config(usernetctl_t)
-
-sysnet_read_config(usernetctl_t)
-
-userdom_use_inherited_user_terminals(usernetctl_t)
-
-optional_policy(`
- consoletype_exec(usernetctl_t)
-')
-
-optional_policy(`
- hostname_exec(usernetctl_t)
-')
-
-optional_policy(`
- nis_use_ypbind(usernetctl_t)
-')