]> git.ipfire.org Git - people/stevee/selinux-policy.git/commitdiff
Remove module for podsleuth.
authorStefan Schantl <stefan.schantl@ipfire.org>
Fri, 6 Jan 2012 22:13:27 +0000 (23:13 +0100)
committerStefan Schantl <stefan.schantl@ipfire.org>
Fri, 6 Jan 2012 22:13:27 +0000 (23:13 +0100)
policy/modules/apps/podsleuth.fc [deleted file]
policy/modules/apps/podsleuth.if [deleted file]
policy/modules/apps/podsleuth.te [deleted file]
policy/modules/services/hal.te

diff --git a/policy/modules/apps/podsleuth.fc b/policy/modules/apps/podsleuth.fc
deleted file mode 100644 (file)
index 6fbc01c..0000000
+++ /dev/null
@@ -1,3 +0,0 @@
-/usr/bin/podsleuth     --      gen_context(system_u:object_r:podsleuth_exec_t,s0)
-/usr/libexec/hal-podsleuth --  gen_context(system_u:object_r:podsleuth_exec_t,s0)
-/var/cache/podsleuth(/.*)?     gen_context(system_u:object_r:podsleuth_cache_t,s0)
diff --git a/policy/modules/apps/podsleuth.if b/policy/modules/apps/podsleuth.if
deleted file mode 100644 (file)
index d6d80a0..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-## <summary>Podsleuth is a tool to get information about an Apple (TM) iPod (TM)</summary>
-
-########################################
-## <summary>
-##     Execute a domain transition to run podsleuth.
-## </summary>
-## <param name="domain">
-## <summary>
-##     Domain allowed to transition.
-## </summary>
-## </param>
-#
-interface(`podsleuth_domtrans',`
-       gen_require(`
-               type podsleuth_t, podsleuth_exec_t;
-       ')
-
-       domtrans_pattern($1, podsleuth_exec_t, podsleuth_t)
-       allow $1 podsleuth_t:process signal;
-')
-
-########################################
-## <summary>
-##     Execute podsleuth in the podsleuth domain, and
-##     allow the specified role the podsleuth domain.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-#
-interface(`podsleuth_run',`
-       gen_require(`
-               type podsleuth_t;
-       ')
-
-       podsleuth_domtrans($1)
-       role $2 types podsleuth_t;
-')
diff --git a/policy/modules/apps/podsleuth.te b/policy/modules/apps/podsleuth.te
deleted file mode 100644 (file)
index 9f88c3a..0000000
+++ /dev/null
@@ -1,90 +0,0 @@
-policy_module(podsleuth, 1.4.1)
-
-########################################
-#
-# Declarations
-#
-
-type podsleuth_t;
-type podsleuth_exec_t;
-application_domain(podsleuth_t, podsleuth_exec_t)
-role system_r types podsleuth_t;
-
-type podsleuth_cache_t;
-files_type(podsleuth_cache_t)
-ubac_constrained(podsleuth_cache_t)
-
-type podsleuth_tmp_t;
-files_tmp_file(podsleuth_tmp_t)
-ubac_constrained(podsleuth_tmp_t)
-
-type podsleuth_tmpfs_t;
-files_tmpfs_file(podsleuth_tmpfs_t)
-ubac_constrained(podsleuth_tmpfs_t)
-
-########################################
-#
-# podsleuth local policy
-#
-allow podsleuth_t self:capability { kill dac_override sys_admin sys_rawio };
-allow podsleuth_t self:process { signal signull getsched execheap execmem execstack };
-
-allow podsleuth_t self:fifo_file rw_file_perms;
-allow podsleuth_t self:unix_stream_socket create_stream_socket_perms;
-allow podsleuth_t self:sem create_sem_perms;
-allow podsleuth_t self:tcp_socket create_stream_socket_perms;
-allow podsleuth_t self:udp_socket create_socket_perms;
-
-manage_dirs_pattern(podsleuth_t, podsleuth_cache_t, podsleuth_cache_t)
-manage_files_pattern(podsleuth_t, podsleuth_cache_t, podsleuth_cache_t)
-files_var_filetrans(podsleuth_t, podsleuth_cache_t, { file dir })
-
-allow podsleuth_t podsleuth_tmp_t:dir mounton;
-manage_dirs_pattern(podsleuth_t, podsleuth_tmp_t, podsleuth_tmp_t)
-manage_files_pattern(podsleuth_t, podsleuth_tmp_t, podsleuth_tmp_t)
-files_tmp_filetrans(podsleuth_t, podsleuth_tmp_t, { file dir })
-
-manage_dirs_pattern(podsleuth_t, podsleuth_tmpfs_t, podsleuth_tmpfs_t)
-manage_files_pattern(podsleuth_t, podsleuth_tmpfs_t, podsleuth_tmpfs_t)
-manage_lnk_files_pattern(podsleuth_t, podsleuth_tmpfs_t, podsleuth_tmpfs_t)
-fs_tmpfs_filetrans(podsleuth_t, podsleuth_tmpfs_t, { dir file lnk_file })
-
-kernel_read_system_state(podsleuth_t)
-kernel_request_load_module(podsleuth_t)
-
-corecmd_exec_bin(podsleuth_t)
-
-corenet_tcp_connect_http_port(podsleuth_t)
-
-dev_read_urand(podsleuth_t)
-
-files_read_etc_files(podsleuth_t)
-
-fs_mount_dos_fs(podsleuth_t)
-fs_unmount_dos_fs(podsleuth_t)
-fs_getattr_dos_fs(podsleuth_t)
-fs_read_dos_files(podsleuth_t)
-fs_search_dos(podsleuth_t)
-fs_getattr_tmpfs(podsleuth_t)
-fs_list_tmpfs(podsleuth_t)
-fs_rw_removable_blk_files(podsleuth_t)
-
-miscfiles_read_localization(podsleuth_t)
-
-sysnet_dns_name_resolve(podsleuth_t)
-
-userdom_signal_unpriv_users(podsleuth_t)
-userdom_signull_unpriv_users(podsleuth_t)
-userdom_read_user_tmpfs_files(podsleuth_t)
-
-optional_policy(`
-       dbus_system_bus_client(podsleuth_t)
-
-       optional_policy(`
-               hal_dbus_chat(podsleuth_t)
-       ')
-')
-
-optional_policy(`
-       mono_exec(podsleuth_t)
-')
index 6fdb0cd12fbd4477145042551c200143b9dc5c13..bd85b8f8829ae64ad5ed46c2f9a6e671b26f86ae 100644 (file)
@@ -318,10 +318,6 @@ optional_policy(`
        pcmcia_manage_pid_chr_files(hald_t)
 ')
 
-optional_policy(`
-       podsleuth_domtrans(hald_t)
-')
-
 optional_policy(`
        ppp_domtrans(hald_t)
        ppp_read_rw_config(hald_t)