]> git.ipfire.org Git - people/stevee/selinux-policy.git/commitdiff
Remove module for mono.
authorStefan Schantl <stefan.schantl@ipfire.org>
Fri, 6 Jan 2012 22:22:49 +0000 (23:22 +0100)
committerStefan Schantl <stefan.schantl@ipfire.org>
Fri, 6 Jan 2012 22:22:49 +0000 (23:22 +0100)
policy/modules/admin/rpm.te
policy/modules/apps/mono.fc [deleted file]
policy/modules/apps/mono.if [deleted file]
policy/modules/apps/mono.te [deleted file]
policy/modules/services/cron.te
policy/modules/services/xserver.te
policy/modules/system/init.te
policy/modules/system/userdomain.fc

index a485d760c466010c51c929009bbc09b8d70f49f4..83983df89cb4a8dcb5f5322c6532a89d4baa220e 100644 (file)
@@ -423,10 +423,6 @@ optional_policy(`
        optional_policy(`
                java_domtrans_unconfined(rpm_script_t)
        ')
-
-       optional_policy(`
-               mono_domtrans(rpm_script_t)
-       ')
 ')
 
 optional_policy(`
diff --git a/policy/modules/apps/mono.fc b/policy/modules/apps/mono.fc
deleted file mode 100644 (file)
index b01bc91..0000000
+++ /dev/null
@@ -1 +0,0 @@
-/usr/bin/mono.*        --      gen_context(system_u:object_r:mono_exec_t,s0)
diff --git a/policy/modules/apps/mono.if b/policy/modules/apps/mono.if
deleted file mode 100644 (file)
index 7b08e13..0000000
+++ /dev/null
@@ -1,138 +0,0 @@
-## <summary>Run .NET server and client applications on Linux.</summary>
-
-#######################################
-## <summary>
-##     The role template for the mono module.
-## </summary>
-## <desc>
-##     <p>
-##     This template creates a derived domains which are used
-##     for mono applications.
-##     </p>
-## </desc>
-## <param name="role_prefix">
-##     <summary>
-##     The prefix of the user domain (e.g., user
-##     is the prefix for user_t).
-##     </summary>
-## </param>
-## <param name="user_role">
-##     <summary>
-##     The role associated with the user domain.
-##     </summary>
-## </param>
-## <param name="user_domain">
-##     <summary>
-##     The type of the user domain.
-##     </summary>
-## </param>
-#
-template(`mono_role_template',`
-       gen_require(`
-               type mono_exec_t;
-       ')
-
-       type $1_mono_t;
-       domain_type($1_mono_t)
-       domain_entry_file($1_mono_t, mono_exec_t)
-       role $2 types $1_mono_t;
-
-       domain_interactive_fd($1_mono_t)
-       application_type($1_mono_t)
-
-       allow $1_mono_t self:process { ptrace signal getsched execheap execmem execstack };
-
-       allow $3 $1_mono_t:process { getattr ptrace noatsecure signal_perms };
-
-       domtrans_pattern($3, mono_exec_t, $1_mono_t)
-
-       fs_dontaudit_rw_tmpfs_files($1_mono_t)
-       corecmd_bin_domtrans($1_mono_t, $1_t)
-
-       userdom_manage_user_tmpfs_files($1_mono_t)
-
-       optional_policy(`
-               xserver_role($1_r, $1_mono_t)
-       ')
-')
-
-########################################
-## <summary>
-##     Execute the mono program in the mono domain.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-#
-interface(`mono_domtrans',`
-       gen_require(`
-               type mono_t, mono_exec_t;
-       ')
-
-       corecmd_search_bin($1)
-       domtrans_pattern($1, mono_exec_t, mono_t)
-')
-
-########################################
-## <summary>
-##     Execute mono in the mono domain, and
-##     allow the specified role the mono domain.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-#
-interface(`mono_run',`
-       gen_require(`
-               type mono_t;
-       ')
-
-       mono_domtrans($1)
-       role $2 types mono_t;
-')
-
-########################################
-## <summary>
-##     Execute the mono program in the caller domain.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mono_exec',`
-       gen_require(`
-               type mono_exec_t;
-       ')
-
-       corecmd_search_bin($1)
-       can_exec($1, mono_exec_t)
-')
-
-########################################
-## <summary>
-##     Read and write to mono shared memory.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mono_rw_shm',`
-       gen_require(`
-               type mono_t;
-       ')
-
-       allow $1 mono_t:shm rw_shm_perms;
-')
diff --git a/policy/modules/apps/mono.te b/policy/modules/apps/mono.te
deleted file mode 100644 (file)
index dff0f12..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-policy_module(mono, 1.8.0)
-
-########################################
-#
-# Declarations
-#
-
-type mono_t;
-type mono_exec_t;
-application_type(mono_t)
-init_system_domain(mono_t, mono_exec_t)
-
-########################################
-#
-# Local policy
-#
-
-allow mono_t self:process { ptrace signal getsched execheap execmem execstack };
-
-init_dbus_chat_script(mono_t)
-
-userdom_user_home_dir_filetrans_user_home_content(mono_t, { dir file lnk_file fifo_file sock_file })
-
-optional_policy(`
-       avahi_dbus_chat(mono_t)
-')
-
-optional_policy(`
-       cups_dbus_chat(mono_t)
-')
-
-optional_policy(`
-       hal_dbus_chat(mono_t)
-')
-
-optional_policy(`
-       networkmanager_dbus_chat(mono_t)
-')
-
-optional_policy(`
-       rpm_dbus_chat(mono_t)
-')
-
-optional_policy(`
-       unconfined_domain(mono_t)
-       unconfined_dbus_chat(mono_t)
-       unconfined_dbus_connect(mono_t)
-')
-
-optional_policy(`
-       xserver_rw_shm(mono_t)
-')
index 5f0eed89a04d3a5ae569134794dff3e4394f831a..205952a267b97d28a054c6a368690036f410dfeb 100644 (file)
@@ -713,11 +713,6 @@ tunable_policy(`fcron_crond',`
        allow crond_t user_cron_spool_t:file manage_file_perms;
 ')
 
-# need a per-role version of this:
-#optional_policy(`
-#      mono_domtrans(cronjob_t)
-#')
-
 optional_policy(`
        nis_use_ypbind(cronjob_t)
 ')
index c497adeff4c3ac06f06241cf20b97c0e4ba5ca05..91fc3eee94d4f475f89788c156f8389a4af8f1b0 100644 (file)
@@ -1204,10 +1204,6 @@ optional_policy(`
        ')
 ')
 
-optional_policy(`
-       mono_rw_shm(xserver_t)
-')
-
 optional_policy(`
        rhgb_rw_shm(xserver_t)
        rhgb_rw_tmpfs_files(xserver_t)
index ddc714304e827dea02d5e1e3848346c9d25ef4c3..a31341816b2e5048d3eee77ad803b5b0f527f62c 100644 (file)
@@ -1207,10 +1207,6 @@ optional_policy(`
                unconfined_dontaudit_rw_pipes(daemon)
        ')
 
-       optional_policy(`
-               mono_domtrans(initrc_t)
-       ')
-
        # Allow SELinux aware applications to request rpm_script_t execution
        rpm_transition_script(initrc_t)
        
index ce61aed7850aecd411f180508f8476b4986c3b4d..ec851899761c3d43673a74224f2c3a27d4af1be5 100644 (file)
@@ -6,7 +6,6 @@ HOME_DIR/.+             gen_context(system_u:object_r:user_home_t,s0)
 /root/\.cert(/.*)?     gen_context(system_u:object_r:home_cert_t,s0)
 /root/\.debug(/.*)?    <<none>>
 /dev/shm/pulse-shm.*   gen_context(system_u:object_r:user_tmpfs_t,s0)
-/dev/shm/mono.*                gen_context(system_u:object_r:user_tmpfs_t,s0)
 HOME_DIR/bin(/.*)?     gen_context(system_u:object_r:home_bin_t,s0)
 HOME_DIR/\.local/bin(/.*)?     gen_context(system_u:object_r:home_bin_t,s0)
 HOME_DIR/Audio(/.*)?    gen_context(system_u:object_r:audio_home_t,s0)