]> git.ipfire.org Git - people/stevee/selinux-policy.git/commitdiff
Remove module for livecd.
authorStefan Schantl <stefan.schantl@ipfire.org>
Fri, 6 Jan 2012 22:03:49 +0000 (23:03 +0100)
committerStefan Schantl <stefan.schantl@ipfire.org>
Fri, 6 Jan 2012 22:03:49 +0000 (23:03 +0100)
policy/modules/apps/livecd.fc [deleted file]
policy/modules/apps/livecd.if [deleted file]
policy/modules/apps/livecd.te [deleted file]
policy/modules/roles/unconfineduser.te
policy/modules/services/cron.te
policy/modules/system/fstools.te
policy/modules/system/lvm.te
policy/modules/system/mount.te
policy/modules/system/selinuxutil.te

diff --git a/policy/modules/apps/livecd.fc b/policy/modules/apps/livecd.fc
deleted file mode 100644 (file)
index 34937fc..0000000
+++ /dev/null
@@ -1 +0,0 @@
-/usr/bin/livecd-creator        --      gen_context(system_u:object_r:livecd_exec_t,s0)
diff --git a/policy/modules/apps/livecd.if b/policy/modules/apps/livecd.if
deleted file mode 100644 (file)
index c324f94..0000000
+++ /dev/null
@@ -1,126 +0,0 @@
-## <summary>Livecd tool for building alternate livecd for different os and policy versions.</summary>
-
-########################################
-## <summary>
-##     Execute a domain transition to run livecd.
-## </summary>
-## <param name="domain">
-## <summary>
-##     Domain allowed to transition.
-## </summary>
-## </param>
-#
-interface(`livecd_domtrans',`
-       gen_require(`
-               type livecd_t, livecd_exec_t;
-       ')
-
-       domtrans_pattern($1, livecd_exec_t, livecd_t)
-')
-
-########################################
-## <summary>
-##     Execute livecd in the livecd domain, and
-##     allow the specified role the livecd domain.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-#
-interface(`livecd_run',`
-       gen_require(`
-               type livecd_t;
-               type livecd_exec_t;
-       ')
-
-       livecd_domtrans($1)
-       role $2 types livecd_t;
-       role_transition $2 livecd_exec_t system_r;
-       
-       seutil_run_setfiles_mac(livecd_t, system_r)
-
-       optional_policy(`
-               mount_run(livecd_t, $2)
-       ')
-')
-
-########################################
-## <summary>
-##     Dontaudit read/write to a livecd leaks
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain to not audit.
-##     </summary>
-## </param>
-#
-interface(`livecd_dontaudit_leaks',`
-       gen_require(`
-               type livecd_t;
-       ')
-
-       dontaudit $1 livecd_t:unix_dgram_socket { read write };
-')
-
-########################################
-## <summary>
-##     Read livecd temporary files.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`livecd_read_tmp_files',`
-       gen_require(`
-               type livecd_tmp_t;
-       ')
-
-       files_search_tmp($1)
-       read_files_pattern($1, livecd_tmp_t, livecd_tmp_t)
-')
-
-########################################
-## <summary>
-##     Read and write livecd temporary files.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`livecd_rw_tmp_files',`
-       gen_require(`
-               type livecd_tmp_t;
-       ')
-
-       files_search_tmp($1)
-       rw_files_pattern($1, livecd_tmp_t, livecd_tmp_t)
-')
-
-########################################
-## <summary>
-##     Allow read and write access to livecd semaphores.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`livecd_rw_semaphores',`
-       gen_require(`
-               type livecd_t;
-       ')
-
-       allow $1 livecd_t:sem { unix_read unix_write associate read write };
-')
diff --git a/policy/modules/apps/livecd.te b/policy/modules/apps/livecd.te
deleted file mode 100644 (file)
index a3d8afd..0000000
+++ /dev/null
@@ -1,55 +0,0 @@
-policy_module(livecd, 1.0.1)
-
-########################################
-#
-# Declarations
-#
-
-type livecd_t;
-type livecd_exec_t;
-application_domain(livecd_t, livecd_exec_t)
-role system_r types livecd_t;
-
-type livecd_tmp_t;
-files_tmp_file(livecd_tmp_t)
-
-########################################
-#
-# livecd local policy
-#
-
-dontaudit livecd_t self:capability2 mac_admin;
-
-tunable_policy(`deny_ptrace',`',`
-       domain_ptrace_all_domains(livecd_t)
-')
-
-domain_interactive_fd(livecd_t)
-
-manage_dirs_pattern(livecd_t, livecd_tmp_t, livecd_tmp_t)
-manage_files_pattern(livecd_t, livecd_tmp_t, livecd_tmp_t)
-files_tmp_filetrans(livecd_t, livecd_tmp_t, { dir file })
-
-dev_filetrans_all_named_dev(livecd_t)
-storage_filetrans_all_named_dev(livecd_t)
-term_filetrans_all_named_dev(livecd_t)
-
-sysnet_filetrans_named_content(livecd_t)
-
-optional_policy(`
-       ssh_filetrans_admin_home_content(livecd_t)
-')
-
-optional_policy(`
-       unconfined_domain_noaudit(livecd_t)
-')
-
-optional_policy(`
-       hal_dbus_chat(livecd_t)
-')
-
-optional_policy(`
-       # Allow SELinux aware applications to request rpm_script execution
-       rpm_transition_script(livecd_t)
-       rpm_domtrans(livecd_t)
-')
index dde8e418e4a8fd567a014e18882410078f5f9f19..794785d53d69bd5e06487dbc32fc16a137c257de 100644 (file)
@@ -262,10 +262,6 @@ optional_policy(`
        java_run_unconfined(unconfined_t, unconfined_r)
 ')
 
-optional_policy(`
-       livecd_run(unconfined_t, unconfined_r)
-')
-
 optional_policy(`
        lpd_run_checkpc(unconfined_t, unconfined_r)
 ')
index a4d25d94e04c096d6c8d221693476643e734aa43..5f0eed89a04d3a5ae569134794dff3e4394f831a 100644 (file)
@@ -551,10 +551,6 @@ optional_policy(`
        inn_read_config(system_cronjob_t)
 ')
 
-optional_policy(`
-       livecd_read_tmp_files(system_cronjob_t)
-')
-
 optional_policy(`
        lpd_list_spool(system_cronjob_t)
 ')
index 10bc43cea824bf168b6872336c744b3cc2e836a5..8485407139eede357d4cac8a0423b3d3efb18762 100644 (file)
@@ -185,10 +185,6 @@ optional_policy(`
        hal_dontaudit_write_log(fsadm_t)
 ')
 
-optional_policy(`
-       livecd_rw_tmp_files(fsadm_t)
-')
-
 optional_policy(`
        modutils_read_module_config(fsadm_t)
        modutils_read_module_deps(fsadm_t)
index 5e4149d01d869e4fdf0f03841f6c926ed3273c10..9244b0a52d1bd758400ee91c16a9c8a91c0994fb 100644 (file)
@@ -363,10 +363,6 @@ optional_policy(`
        ')
 ')
 
-optional_policy(`
-       livecd_rw_semaphores(lvm_t)
-')
-
 optional_policy(`
        modutils_domtrans_insmod(lvm_t)
 ')
index aa18423dd820c73cef7d7dc089e11b110f910362..4bebf849b53cd7d64ce352aad5a9a8a232a0be7f 100644 (file)
@@ -280,10 +280,6 @@ optional_policy(`
        ')
 ')
 
-optional_policy(`
-       livecd_rw_tmp_files(mount_t)
-')
-
 # Needed for mount crypt https://bugzilla.redhat.com/show_bug.cgi?id=418711
 optional_policy(`
        lvm_domtrans(mount_t)
index ac8b21413ee9f8c5d2a556ad123784a19345597a..08d6d17698bf76e2c5ad299925ab1d9731898c13 100644 (file)
@@ -538,8 +538,6 @@ files_read_all_symlinks(setfiles_t)
 
 optional_policy(`
        files_dontaudit_write_isid_chr_files(setfiles_mac_t)
-       livecd_dontaudit_leaks(setfiles_mac_t)
-       livecd_rw_tmp_files(setfiles_mac_t)
        dev_dontaudit_write_all_chr_files(setfiles_mac_t)
 ')