|
| 1 | +;; |
| 2 | +;; Permission sets definitions |
| 3 | +;; |
| 4 | + |
| 5 | +(classpermission search_dir_perms) |
| 6 | +(classpermissionset search_dir_perms (dir (getattr search))) |
| 7 | + |
| 8 | +(classpermission list_dir_perms) |
| 9 | +(classpermissionset list_dir_perms (dir (getattr search open read lock ioctl))) |
| 10 | + |
| 11 | +(classpermission rw_dir_perms) |
| 12 | +(classpermissionset rw_dir_perms (dir (open read getattr lock search ioctl add_name remove_name write))) |
| 13 | + |
| 14 | +(classpermission manage_dir_perms) |
| 15 | +(classpermissionset manage_dir_perms (dir (create open getattr setattr read write link unlink rename search add_name remove_name reparent rmdir lock ioctl))) |
| 16 | + |
| 17 | +(classpermission rw_chr_file_perms) |
| 18 | +(classpermissionset rw_chr_file_perms (chr_file (getattr open read write append ioctl lock))) |
| 19 | + |
| 20 | +(classpermission read_file_perms) |
| 21 | +(classpermissionset read_file_perms (file (getattr open read lock ioctl))) |
| 22 | + |
| 23 | +(classpermission rw_file_perms) |
| 24 | +(classpermissionset rw_file_perms (file (open getattr read write append ioctl lock))) |
| 25 | + |
| 26 | +(classpermission manage_file_perms) |
| 27 | +(classpermissionset manage_file_perms (file (create open getattr setattr read write append rename link unlink ioctl lock))) |
| 28 | + |
| 29 | +(classpermission exec_file_perms) |
| 30 | +(classpermissionset exec_file_perms (file (getattr open map read execute ioctl execute_no_trans))) |
| 31 | + |
| 32 | +(classpermission read_lnk_file_perms) |
| 33 | +(classpermissionset read_lnk_file_perms (lnk_file (getattr read))) |
| 34 | + |
| 35 | +(classpermission rw_lnk_file_perms) |
| 36 | +(classpermissionset rw_lnk_file_perms (lnk_file (getattr read write lock ioctl))) |
| 37 | + |
| 38 | +(classpermission manage_lnk_file_perms) |
| 39 | +(classpermissionset manage_lnk_file_perms (lnk_file (create read write getattr setattr link unlink rename ioctl lock))) |
| 40 | + |
| 41 | +(classpermission write_sock_file_perms) |
| 42 | +(classpermissionset write_sock_file_perms (sock_file (getattr write open append))) |
| 43 | + |
| 44 | +(classpermission manage_sock_file_perms) |
| 45 | +(classpermissionset manage_sock_file_perms (sock_file (create open getattr setattr read write rename link unlink ioctl lock append))) |
| 46 | + |
| 47 | +(classpermission create_tcp_socket_perms) |
| 48 | +(classpermissionset create_tcp_socket_perms (tcp_socket (ioctl read getattr write setattr append bind connect getopt setopt shutdown listen accept))) |
| 49 | + |
| 50 | +(classpermission create_udp_socket_perms) |
| 51 | +(classpermissionset create_udp_socket_perms (udp_socket (ioctl read getattr write setattr append bind connect getopt setopt shutdown))) |
| 52 | + |
| 53 | +(classpermission create_sctp_socket_perms) |
| 54 | +(classpermissionset create_sctp_socket_perms (sctp_socket (ioctl read getattr write setattr append bind connect getopt setopt shutdown))) |
| 55 | + |
| 56 | +(classpermission rw_shm_perms) |
| 57 | +(classpermissionset rw_shm_perms (shm (lock associate getattr read unix_read unix_write write))) |
| 58 | + |
| 59 | +;; |
| 60 | +;; Base container policy |
| 61 | +;; |
| 62 | + |
| 63 | +(block container |
| 64 | + (blockabstract container) |
| 65 | + |
| 66 | + (type process) |
| 67 | + (type socket) |
| 68 | + |
| 69 | + (roletype system_r process) |
| 70 | + (typeattributeset domain (process)) |
| 71 | + (typeattributeset container_domain (process)) |
| 72 | + (typeattributeset mcs_constrained_type (process)) |
| 73 | + (typeattributeset file_type (socket)) |
| 74 | + |
| 75 | + (allow process socket manage_sock_file_perms) |
| 76 | + (allow container_engine_domain process (key (create search setattr view))) |
| 77 | +) |
0 commit comments